The book will guide you on how to perform a penetration test using the Metasploit
Framework and following the penetration testing execution standard (PTES). Starting with
the basics of information gathering using several auxiliary modules that help...