This section consists of four chapters and focuses on the reconnaissance, enumeration, assessment, and exploitation of web applications using Metasploit. We will also cover WMAP and the Nessus plugin in detail.
This section includes the following chapters: