Exploitation is the main part of
penetration testing many security professionals’ careers. The ability to
gain full control over a targeted machine is a great feeling. Various system
and network protections have made it increasingly more difficult to succeed
with basic exploits. So we need to know advance exploitation.
In this article, we move into more
difficult attack methods, beginning with command-line interfaces to the
Metasploit Framework. Most of the attacks and customizations discussed in this
article will occur in msfconsole, msfencode, and msfpayload.
Before you begin to exploit
systems, we need to understand a few things about penetration testing and
exploitation.