The Pentesting Life Cycle with Metasploit

This section consists of four chapters and focuses on the reconnaissance, enumeration, assessment, and exploitation of web applications using Metasploit. We will also cover WMAP and the Nessus plugin in detail.

This section includes the following chapters: