Summary

In this chapter, we had a good look at Armitage and its multiple features. We kicked off by looking at the interface and building up workspaces. We also saw how we could exploit a host with Armitage. We looked at remote as well as client-side exploitation and post-exploitation. Furthermore, we jumped into Cortana and discussed about its fundamentals, using it to control Metasploit, writing post-exploitation scripts, custom menus, and interfaces as well.

Get Mastering Metasploit - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.