Getting ready

We will start our penetration testing process right from msfconsole. So, launch the console and perform a port scan to gather information about the target. We discussed port scanning in detail in the previous chapter. Here, I will assume that you have gathered information about the target system and its services. So, let's proceed with selecting exploits and payloads.

Sometimes, looking at the output of a Nmap or even vulnerability scanners is not enough. The output of the services command just shows us that the server is running a version of Apache:

msf > services -p 8020 192.168.216.10Services========host port proto name state info---- ---- ----- ---- ----- ----192.168.216.10 8020 tcp http open Apache httpdmsf > 

There is ...

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.