Summary

In this chapter, we have seen several exploitation and penetration testing scenarios that we can perform using various services, such as databases, VOIP, SCADA, and even iDevices. Throughout this chapter, we learned about SCADA and its fundamentals. We saw how we can gain a variety of information about a database and how to gain complete control over it. We also saw how we could test VOIP services by scanning the network for VOIP clients and spoofing VOIP calls as well.

In the next chapter, we will see how we can perform a complete penetration test using Metasploit and various other popular scanning tools used in penetration testing. We will cover how to systematically proceed while carrying out penetration testing on a given subject. We ...

Get Mastering Metasploit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.