Summary

In this chapter, we started by introducing the Nessus bridge. We then learned about configuring the bridge. Next, we saw how to initiate Nessus scans from the Metasploit console, and finally, we learned how to import scan results into the Metasploit database for further use.

In the next chapter, we'll be learning how to perform a penetration test on a Content Management Systems (CMS), starting with the popular system, WordPress.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.228.88