Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework
Nipun Jaswal
BIRMINGHAM—MUMBAI