Table of Contents
- Approaching a Penetration Test Using Metasploit
- Reinventing Metasploit
- The Exploit Formulation Process
- Porting Exploits
- Offstage Access to Testing Services
- Virtual Test Grounds and Staging
- Client Side Exploitation
- Metasploit Extended
- Speeding Up Penetration Testing
- Visualizing with Armitage

