| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
The Metasploit framework provides penetration testers with an unprecedented
ability to find and exploit vulnerable machines, but a good penetration tester
knows exploitation is only the beginning. Metasploit post exploitation modules
allow penetration testers to gather data from exploited machines, including
hashes, tokens, application passwords and much more. During this presentation we
will discuss useful post exploitation modules, developing post exploitation
modules, and contributing modules to the Metasploit framework.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast