Chapter 8

Vulnerability Exploitation

Abstract

This chapter examines different methods of exploiting vulnerabilities, including both manual and automated attacks against target systems. In this chapter, we use exploit code found within Metasploit, and also from Exploit-db.com, to successfully exploit vulnerable systems.

Keywords

Metasploit

Vulnerability exploitation

Hacking

Exploit code

Pentest

Contents

Chapter Points

 Automated Tools

 Exploit Code

Introduction

In Chapter 7, we discussed how to identify potentially ...

Get Professional Penetration Testing, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.