Key FeaturesCarry out penetration testing in highly-secured environments with MetasploitLearn to bypass different defenses to gain access into different systems.A step-by-step guide that will quickly enhance your penetration testing skills.Book DescriptionThis book will begin by introducing you to Metasploit and its functionality. Next, you will learn how to set up and configure Metasploit on various platforms to create …