Table of Contents
- Introduction to Metasploit & Supporting Tools
- Setting up your environment
- Metasploit Components and Environment Configuration
- Information Gathering with Metasploit
- Vulnerability hunting with Metasploit
- Client Side attacks with Metasploit
- Web Application Scanning with Metasploit
- Anti-Virus Evasion and Anti-Forensics
- Cyber Attack Management using Armitage
- Extending Metasploit & Exploit Development

