Penetration Testing
Metasploit was written in Ruby!
- Footprinting
- Scanning
compiling exploits
shellcode
payload
privilege escalation
“Proxy pivoting generally describes the practice channeling traffic through a compromised target using a proxy payload on the machine and launching attacks from this computer. This type of pivoting is restricted to certain TCP and UDP ports that are supported by the proxy.”
Post-Exploitation
log cleanup
persistence
cybersecurity
]