Evasion with Metasploit

We have covered all of the major phases of a penetration test in the last eight chapters. In this chapter, we will include the problems that tend to occur for a penetration tester in real-world scenarios. Gone are the days where a straightforward attack would pop you a shell in Metasploit. With the increase of attack surface these days, security perspectives have also increased gradually. Hence, tricky mechanisms are required to circumvent security controls of various natures. In this chapter, we'll look at different methods and techniques that can prevent security controls deployed at the target's endpoint. Throughout this chapter, we will cover:

  • Bypassing AV detection for Meterpreter payloads
  • Bypassing IDS systems ...

Get Mastering Metasploit - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.