This section consists of four chapters and focuses on the reconnaissance, enumeration, assessment, and exploitation of web applications using Metasploit. We will also cover WMAP and the Nessus plugin in detail.
This section includes the following chapters:
- Chapter 4, Using Metasploit for Reconnaissance
- Chapter 5, Web Application Enumeration Using Metasploit
- Chapter 6, Vulnerability Scanning Using WMAP
- Chapter 7, Vulnerability Assessment Using Metasploit (Nessus)