Book Content
chapters • 6h20m total length
1. Introduction to Metasploit & Supporting Tools
2. Setting up your environment
3. Metasploit Components and Environment Configuration
4. Information Gathering with Metasploit
5. Vulnerability hunting with Metasploit
6. Client Side attacks with Metasploit
7. Web Application Scanning with Metasploit
8. Anti-Virus Evasion and Anti-Forensics
9. Cyber Attack Management using Armitage
10. Extending Metasploit & Exploit Development














