Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research 1st Edition

2.8 out of 5 stars 6 customer reviews
ISBN-13: 978-1597490740
ISBN-10: 1597490741
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$3.98 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$52.12 On clicking this link, a new layer will be open
More Buying Choices
38 New from $1.95 30 Used from $2.00
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Save Up to 90% on Textbooks Textbooks
$52.12 FREE Shipping. Only 2 left in stock (more on the way). Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

  • Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
  • +
  • The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy
Total price: $71.54
Buy the selected items together

Editorial Reviews

About the Author

David Maynor is a Senior Researcher, SecureWorks. He was formerly a research engineer with the ISS Xforce R&D team where his primary responsibilities include reverse engineering high risk applications, researching new evasion techniques for security tools, and researching new threats before they become widespread.
NO_CONTENT_IN_FEATURE



Product Details

  • Paperback: 350 pages
  • Publisher: Syngress; 1 edition (October 2, 2007)
  • Language: English
  • ISBN-10: 1597490741
  • ISBN-13: 978-1597490740
  • Product Dimensions: 7.5 x 0.6 x 9.2 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 2.8 out of 5 stars  See all reviews (6 customer reviews)
  • Amazon Best Sellers Rank: #2,150,085 in Books (See Top 100 in Books)

More About the Author

I am a computer security consultant living in Atlanta, GA. I like to educate people of technical topics through the use of fiction. I also like to write scifi of my own creation. I am part of the Electric Sheep Scribes.

Customer Reviews

Top Customer Reviews

Format: Paperback
I'm going to take a harsh stance on this book, mostly because this book had potential to really build upon all the information publicly available for Metasploit and really make a great book on Metasploit internals and advanced usage. Instead it seems like current public/free information was just rehashed and new information not updated for the 3.x branch of MSF.

What I consider the "meat" of this book, and what should have made this a 4 or 5 star book, covers the Metasploit Framework 2.x branch and NOT the current 3.x branch. By "meat" I mean the case studies covering exploitation using MSF. The major difference between the two is that 2.x was written in Perl and 3.x in Ruby. To be fair the first 5 chapters cover using MSF 3.x, but I really didn't feel they covered much, if anything, that's not out on the net with the exception of Chapter 5 (Adding new Payloads). "Using" Metasploit has been covered a million times in a million other books. A book specifically on Metasploit should have covered things not covered in every other hacking book.

Chapter 1 is an "Introduction to Metasploit." If you haven't ever used the tool and didn't want to RTFM, then "maybe" it would be useful for you. Most of the material I felt could be found on the Metasploit main support page, the wiki, or via google, but mostly the first two. I'm also not sure why there are pages and pages of current payloads and exploits with no explanations as to why I would use one type of payload versus another especially for the obscure ones like find tag or ordinal payloads. Doing a "show exploits" or "show payloads" without dialogue on the differences adds little value.
Read more ›
Comment 22 of 22 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
What could have been a brillent book, turned out to be more of a dud then anything else. By the time this book came out, Framework 3 should have been covered, instead, the book focuses on version 2.x.

If you are a newbie to Metasploit I can understand that this book could have been helpful, primarily for the historical purposes, and if you've used 2.x and intend on staying at the version, go ahead, read the book. But, if you are like 99.9% of the rest of use, save your money and wait until someone else either writes an in-depth book on the actual use of the most current version of Metaspolit and the inner workings, etc, or, look up the information needed on the web. You'll feel more satisified with yourself knowing you didn't waste your time and money.
Comment 3 of 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
This was a good intro to Metasploit. However, in order to get Metasploit to do more than hack your old Windows box, you'll need to add your own code. There is nothing about the libraries and functions built into Ruby to help you do this. They have included nothing in the book about altering your payload so that virus checkers won't scream at it.

A version of Meterpreter that could pass by the virus checkers would be a huge asset to IT departments doing remote support over slow links. Having had to do support for computers on oil rigs (60 computers sharing a 128kb/sec VSAT link), remote desktop of any kind was not an option.

It's a good start, I just wish it had more meat.
Comment 2 of 2 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This item: Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Price: $52.12
Ships from and sold by Amazon.com

Want to discover more products? Check out this page to see more: capture hd mac