Abstract
The previous two chapters covered NMAP and OpenVAS, which you can use to perform information gathering, enumeration, and vulnerability assessments. Moving ahead, this chapter covers the basics of Metasploit, which will help you sail through the remaining phases of the penetration testing lifecycle. Specifically, this chapter covers the following:
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Sagar Rahalkar
About this chapter
Cite this chapter
Rahalkar, S. (2019). Metasploit. In: Quick Start Guide to Penetration Testing. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4270-4_3
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4270-4_3
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4269-8
Online ISBN: 978-1-4842-4270-4
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books