Table of Contents
- Approaching a Penetration Test Using Metasploit
- Reinventing Metasploit
- The Exploit Formulation Process
- Porting Exploits
- Offstage Access to Testing Services
- Virtual Test Grounds and Staging
- Sophisticated Client-side Attacks
- Metasploit Extended and Speeding Up Penetration Testing
- Antivirus Evasion with Metasploit
- Metasploit and Offense / Metasploit for Secret agents
- Visualizing with Armitage
- Tips and Tricks

