Hands-On Web Penetration Testing with Metasploit
上QQ阅读APP看书,第一时间看更新

The Pentesting Life Cycle with Metasploit

This section consists of four chapters and focuses on the reconnaissance, enumeration, assessment, and exploitation of web applications using Metasploit. We will also cover WMAP and the Nessus plugin in detail.

This section includes the following chapters:

  • Chapter 4Using Metasploit for Reconnaissance
  • Chapter 5Web Application Enumeration Using Metasploit
  • Chapter 6Vulnerability Scanning Using WMAP
  • Chapter 7, Vulnerability Assessment Using Metasploit (Nessus)