Example environment being tested

Based on the information we gathered using questionnaires, interactions, and the client site visit, we conclude with the following example environment, which will be tested:

We are provided with VPN access, and asked to perform a penetration test of the network. We are also told about the OSs running on the company's net, which are Windows-based operating systems. We are assuming that we have concluded our NMAP scans based on the knowledge we acquired in Chapter 1Approaching a Penetration Test Using Metasploit, and found a user system running on 192.168.0.196. We are now ready to conduct a full-fledged penetration ...

Get Mastering Metasploit - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.