Introduction

With more than three hundred post-exploitation modules, Metasploit is one of the best frameworks for penetration testing, covering every phase from information gathering to post-exploitation, and even reporting in the pro version.

Now that you have learned how to exploit remote targets, this chapter will focus on privilege escalation, persistence, grabbing credentials, and lateral movement.

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.