Following on from the previous chapter, will focus on exploiting various types of service and client-side exploitation while this will focus on post-exploitation, and writing quick scripts that helps with gathering the required information from the exploited systems.Book chapter presents the reader with the techniques involved in scanning and exploiting various services, such as databases, mobile devices, and VOIP. The chapters prepares the reader to speed up and integrate Metasploit with leading industry tools for penetration testing. Finally, book brings in sophisticated attack vectors and challenges based on the user's preparation over the past six days and ends with a Metasploit challenge to solve.
Metasploit Bootcamp

ISBN: 1985210037
ISBN 13: 9781985210035
Publication Date: July 27, 2017
Publisher: Createspace Independent Publishing Platform
Pages: 214
Format: Paperback
Author: Charles Fountain