April 2020
Beginner
246 pages
4h 10m
English
Now that you've learned to setup the Metasploit environment, you will explore actual techniques to find and exploit real world vulnerabilities.
This section comprises the following chapters:
Chapter 4, Information Gathering with Metasploit
Chapter 5, Vulnerability Hunting with Metasploit
Chapter 6, Client-Side Attacks with Metasploit
Chapter 7, Web Application Scanning with Metasploit
Chapter 8, Anti-Virus Evasion and Anti-Forensics
Chapter 9, Cyber Attack Management Using Armitage
Chapter 10, Extending Metasploit and Exploit Development
Chapter 11, Real World Case Study
Read now
Unlock full access