December 2017
Intermediate to advanced
860 pages
16h 1m
English
Throughout this chapter and the following ones, we will primarily practice on Metasploitable 2 and Metasploitable 3 (intentionally vulnerable operating systems). Additionally, for the exercises which are not covered in Metasploitable distributions, we will use our customized environment:
Read now
Unlock full access