Programming Books C Java PHP Python Learn more Browse Programming Books
and over one million other books are available for Amazon Kindle. Learn more
Qty:1
  • List Price: $62.95
  • Save: $21.61 (34%)
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Want it tomorrow, April 22? Order within and choose One-Day Shipping at checkout. Details
FREE Shipping on orders over $35.
Used: Very Good | Details
Sold by NorthEastBooks
Condition: Used: Very Good
Comment: **FAST SHIPPING!!** 100% satisfaction guaranteed!!** Looks like a typical used book with some shelf wear** We carefully inspected this item**
Add to Cart
Trade in your item
Get a $4.69
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research Paperback

ISBN-13: 978-1597490740 ISBN-10: 1597490741 Edition: 1st

See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from Collectible from
Kindle
"Please retry"
Paperback
"Please retry"
$41.34
$15.00 $15.77

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research + Metasploit: The Penetration Tester's Guide + The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy
Price for all three: $90.77

Some of these items ship sooner than the others.

Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Paperback: 350 pages
  • Publisher: Syngress; 1 edition (October 2, 2007)
  • Language: English
  • ISBN-10: 1597490741
  • ISBN-13: 978-1597490740
  • Product Dimensions: 9.2 x 7.6 x 0.8 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 1.8 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #1,394,588 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

David Maynor is a Senior Researcher, SecureWorks. He was formerly a research engineer with the ISS Xforce R&D team where his primary responsibilities include reverse engineering high risk applications, researching new evasion techniques for security tools, and researching new threats before they become widespread.


More About the Author

I am a computer security consultant living in Atlanta, GA. I like to educate people of technical topics through the use of fiction. I also like to write scifi of my own creation. I am part of the Electric Sheep Scribes.

Customer Reviews

1.8 out of 5 stars
5 star
0
4 star
0
3 star
0
2 star
3
1 star
1
See all 4 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

22 of 22 people found the following review helpful By Chris Gates on March 20, 2008
Format: Paperback
I'm going to take a harsh stance on this book, mostly because this book had potential to really build upon all the information publicly available for Metasploit and really make a great book on Metasploit internals and advanced usage. Instead it seems like current public/free information was just rehashed and new information not updated for the 3.x branch of MSF.

What I consider the "meat" of this book, and what should have made this a 4 or 5 star book, covers the Metasploit Framework 2.x branch and NOT the current 3.x branch. By "meat" I mean the case studies covering exploitation using MSF. The major difference between the two is that 2.x was written in Perl and 3.x in Ruby. To be fair the first 5 chapters cover using MSF 3.x, but I really didn't feel they covered much, if anything, that's not out on the net with the exception of Chapter 5 (Adding new Payloads). "Using" Metasploit has been covered a million times in a million other books. A book specifically on Metasploit should have covered things not covered in every other hacking book.

Chapter 1 is an "Introduction to Metasploit." If you haven't ever used the tool and didn't want to RTFM, then "maybe" it would be useful for you. Most of the material I felt could be found on the Metasploit main support page, the wiki, or via google, but mostly the first two. I'm also not sure why there are pages and pages of current payloads and exploits with no explanations as to why I would use one type of payload versus another especially for the obscure ones like find tag or ordinal payloads. Doing a "show exploits" or "show payloads" without dialogue on the differences adds little value.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Richard Campbell on December 8, 2008
Format: Paperback Verified Purchase
What could have been a brillent book, turned out to be more of a dud then anything else. By the time this book came out, Framework 3 should have been covered, instead, the book focuses on version 2.x.

If you are a newbie to Metasploit I can understand that this book could have been helpful, primarily for the historical purposes, and if you've used 2.x and intend on staying at the version, go ahead, read the book. But, if you are like 99.9% of the rest of use, save your money and wait until someone else either writes an in-depth book on the actual use of the most current version of Metaspolit and the inner workings, etc, or, look up the information needed on the web. You'll feel more satisified with yourself knowing you didn't waste your time and money.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By IRN on December 18, 2009
Format: Paperback
Much like the other reviews, I would have to say the information is outdated and very basic. The section on analyzing the different exploit modules would be useful if it was up to date. No need to repeat what has already been said. I had high hopes for this book. Wish I read the reviews first. For a list price of $60? Way overpriced. It's a book capitalizing on the popularity of the tool.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By J. H. Morgan on May 3, 2009
Format: Paperback Verified Purchase
This was a good intro to Metasploit. However, in order to get Metasploit to do more than hack your old Windows box, you'll need to add your own code. There is nothing about the libraries and functions built into Ruby to help you do this. They have included nothing in the book about altering your payload so that virus checkers won't scream at it.

A version of Meterpreter that could pass by the virus checkers would be a huge asset to IT departments doing remote support over slow links. Having had to do support for computers on oil rigs (60 computers sharing a 128kb/sec VSAT link), remote desktop of any kind was not an option.

It's a good start, I just wish it had more meat.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Product Images from Customers

Search
ARRAY(0xa564d2b8)

What Other Items Do Customers Buy After Viewing This Item?