background image

S I M U L A T E D   P E N E T R A T I O N   T E S T

Penetration testing is the pinnacle for most of us, and 
successfully bypassing an organization’s defenses dur-
ing a penetration test is one of our most rewarding 
experiences. In this chapter, we’ll pull together what 
you’ve learned in previous chapters as we simulate a 
complete penetration test. You will be re-creating steps 
that you’ve seen in previous chapters, so most of what 
is shown here should be familiar.

Before you begin, download and install Metasploit’s vulnerable Linux 

virtual machine called 

Metasploitable

. (You can find it at 

http://www.thepiratebay

.org/torrent/5573179/Metasploitable/

.) Metasploitable was created to train indi-

viduals to use Metasploit for successful exploitation. Follow the directions on 
the site to install Metasploitable, and then power it on. We’ll be running the