Use the Metasploit framework to exploit Windows operating systems
Advanced footprinting goes beyond mere vulnerability scanning
Exploit a segmented network using the pivot
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.