Section 3 – Post-Exploitation and Evasion
This section focuses heavily on extracting information from compromised machines while not triggering any alarms, such as an antivirus (AV) system or a firewall barrier.
This section comprises the following chapters:
- Chapter 8, Metasploit Extended
- Chapter 9, Evasion with Metasploit
- Chapter 10, Metasploit for Secret Agents
- Chapter 11, Visualizing Metasploit
- Chapter 12, Tips and Tricks