-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Mastering Metasploit
By :

Having gathered exploit development experience in Metasploit, let's now talk about testing various specialized services. It is likely that, during your career as a penetration tester, you will come across a testable environment that only requires testing to be performed within a service such as databases, Voice Over Internet Protocol (VOIP), or Supervisory Control and Data Acquisition (SCADA). In this chapter, we will look at the various developing strategies to use when carrying out penetration tests on these services. In this chapter, we will cover the following topics:
Service-based penetration testing requires sharp skills and a good understanding of the services that we can successfully exploit. Therefore, in this chapter, we will look at both the theoretical and practical challenges we might face during a service-oriented...