Information gathering using metasploit
The foundation for any successful penetration test is solid
reconnaissance. Failure to perform proper information gathering will have
you flailing around at random, attacking machines that are not vulnerable
and missing others that are.
- port scanning
- service identification
- password sniffing
- port sniffing
metasploit use for exploiting mobile devices.
1. Find Android Exploits
2. Find Android Payloads
3. Build an APK file
tools in metasploit framework
- bundler.
- curl.
- gcc-mingw-w64-i686-win32.
- gcc-mingw-w64-x86-64-win32.
- git.
- john.
- libc6.
- libffi8.
No comments:
Post a Comment
Tell us how you like it.