Hi there,
This is yet another book that I'd like to recommend, even though it is quite
outdated now due to a lot of the examples in this book are related to older
versions of Metasploit, I still like to browse through it from time to time.
Link:
It gave me a better understanding of how the Metasploit Framework worked
and also how it could be used. If you're a CTP Student, don't forget to check
out my thread with more nice resources to the Metasploit Framework!
Link:
Best regards,
This is yet another book that I'd like to recommend, even though it is quite
outdated now due to a lot of the examples in this book are related to older
versions of Metasploit, I still like to browse through it from time to time.
Link:
It gave me a better understanding of how the Metasploit Framework worked
and also how it could be used. If you're a CTP Student, don't forget to check
out my thread with more nice resources to the Metasploit Framework!
Link:
Best regards,
Comment