Chapter 4. Basic attacks (this begins with easy attacks that are very likely to work, and are against easy targets)
At least 8 different attacks against less secure Windows variants are explored.
In depth discussion of why these attacks work and how they work
How to find exploits
Chapter 5. More with Metasploit
Leaning to use msfvenom
Attacking more secure Windows variants (i.e. patched and firewalled)
Attacking Linux boxes
Chapter 6. Advanced Metasploit
Anti-virus avoidance techniques
Firewall evasion techniques
Moving through a router
Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well
as public sector institutions such as the Department of Defence and the Department of Health.