Table of Contents
- Approaching a Penetration Test Using Metasploit
- Reinventing Metasploit
- The Exploit Formulation Process
- Porting Exploits
- Testing Services with Metasploit
- Virtual Test Grounds and Staging
- Client-Side Exploitation
- Metasploit Extended
- Evasion with Metasploit
- Metasploit for Secret Agents
- Visualizing Metasploit
- Tips and Tricks

