Book Content
chapters • 14h40m total length
1. Approaching a Penetration Test Using Metasploit
2. Reinventing Metasploit
3. The Exploit Formulation Process
4. Porting Exploits
5. Offstage Access to Testing Services
6. Virtual Test Grounds and Staging
7. Client Side Exploitation
8. Metasploit Extended
9. Speeding Up Penetration Testing
10. Visualizing with Armitage














