Summary

In this chapter, we covered enumeration, which is the most important part of a pentesting life cycle. We started with enumerating DNS with Metasploit modules and then moved on to enumerating files and directories. Finally, we looked at crawling modules as well as the vhost lookup module.

In the next chapter, we'll be learning about using the web application scanning tool or WMAP. WMAP is a Metasploit plugin that is used to perform vulnerability scanning on a target web application. 

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.151.106