In this chapter, we started with the introduction to penetration testing and its types and stages. We covered the pen testing methodologies and life cycle and we looked at some important terminology. Then, we looked at the OWASP Top 10 and SANS Top 25.
In the next chapter, we will learn about the essentials of Metasploit including the Metasploit framework, installation, and setup.