
Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Over 100 recipes for penetration testing using Metasploit and virtual machines
If you are a Security professional or pentester and want to get into vulnerability exploitation and make the most of the Metasploit framework, then this book is for you. Some prior understanding of penetration testing and Metasploit is required.
