Section 2: Practical Metasploit
Now that you've learned to setup the Metasploit environment, you will explore actual techniques to find and exploit real world vulnerabilities.
This section comprises the following chapters:
Chapter 4, Information Gathering with Metasploit
Chapter 5, Vulnerability Hunting with Metasploit
Chapter 6, Client-Side Attacks with Metasploit
Chapter 7, Web Application Scanning with Metasploit
Chapter 8, Anti-Virus Evasion and Anti-Forensics
Chapter 9, Cyber Attack Management Using Armitage
Chapter 10, Extending Metasploit and Exploit Development
Chapter 11, Real World Case Study