Table of Contents
Chapter 1: Introduction to Metasploit
Overview: Why Is Metasploit Here?
Leveraging Metasploit on Penetration Tests
Understanding Metasploit Channels
Chapter 2: Architecture, Environment, and Installation
Understanding the Soft Architecture
Configuring and Locking Down Your System
Chapter 3: Metasploit Framework and Advanced Environment Configurations
Get Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.