Table of Contents Introduction and Environment Setup Setting up Your Environment Metasploit Components and Environment Configuration Information Gathering with Metasploit Vulnerability Hunting with Metasploit Client-side Attacks with Metasploit Web Application Scanning with Metasploit Anti-Virus Evasion and Anti-Forensics Cyber Attack Management using Armitage Extending Metasploit and Exploit Development Real World Case Study
Sagar Rahalkar is a seasoned information security professional having more than 10 years of comprehensive experience in various verticals of IS. His domain expertise is mainly into breach detection, cyber crime investigations, digital forensics, application security, vulnerability assessment and penetration testing, compliance for mandates and regulations, IT GRC, and much more. He holds a master's degree in computer science and several industry-recognized certifications such as Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist-Rational AppScan, Certified Information Security Manager (CISM), and PRINCE2. He has been closely associated with Indian law enforcement agencies for more than 3 years dealing with digital crime investigations and related training and received several awards and appreciations from senior officials of the police and defense organizations in India. Sagar has also been a reviewer and author for various books and online publications.