Book Content
chapters • 8h12m total length
1. Introduction and Environment Setup
2. Setting up Your Environment
3. Metasploit Components and Environment Configuration
4. Information Gathering with Metasploit
5. Vulnerability Hunting with Metasploit
6. Client-side Attacks with Metasploit
7. Web Application Scanning with Metasploit
8. Anti-Virus Evasion and Anti-Forensics
9. Cyber Attack Management using Armitage
10. Extending Metasploit and Exploit Development
11. Real World Case Study














