Chapter 7: Advanced Exploitation with Metasploit
Anyone who has been in the field in the last 18 years knows what Metasploit can do. There are all kinds of Metasploiters out there, but we’re going to think about two kinds in particular. First, you have the intrepid amateur. They downloaded Kali Linux and installed it on a Virtual Machine (VM). Then, they fired up Metasploit and learned the basics – how to set an exploit, a payload, and the options, and then launch missiles! In this scenario, Metasploit quickly becomes the metaphorical hammer, and every problem starts to look like a nail.
On the other hand, there is the seasoned security administrator, who is comfortable with the command line. They fire up Metasploit and know how to search for specific modules, as well as how to gather the appropriate information to populate options fields. However, they feel bound by what’s already there. They recently found that they could make their life a lot easier...