In this book, we covered Metasploit and various other related subjects in a practical way. We covered exploit development, module development, porting exploits in Metasploit, client-side attacks, service-based penetration testing, evasion techniques, techniques used by law enforcement agencies, and Armitage. We also had a look at the fundamentals of Ruby programming and Cortana for Armitage.
Once you have read this book, you may find that the following resources provide further details on these topics:
- In order to learn Ruby programming, refer to: http://ruby-doc.com/docs/ProgrammingRuby/
- For assembly programming, refer to: https://github.com/jaspergould/awesome-asm
- For exploit development, refer to: https://www.corelan.be/
- For Metasploit development, refer to: https://github.com/rapid7/metasploit-framework/wiki
- For SCADA-based exploitation, refer to: https:/...