Chapter 1. Metasploit Quick Tips for Security Professionals

In this chapter, we will cover:

  • Configuring Metasploit on Windows
  • Configuring Metasploit on Ubuntu
  • Metasploit with BackTrack 5 – the ultimate combination
  • Setting up the penetration testing lab on a single machine
  • Setting up Metasploit on a virtual machine with SSH connectivity
  • Beginning with the interfaces – the "Hello World" of Metasploit
  • Setting up the database in Metasploit
  • Using the database to store penetration testing results
  • Analyzing the stored results of the database

Introduction

Metasploit is currently the most buzzing word in the field of information security and penetration testing. It has totally revolutionized the way we can perform security tests on our systems. The reason which ...

Get Metasploit Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.