and over one million other books are available for Amazon Kindle. Learn more

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research 1st Edition

5 customer reviews
ISBN-13: 978-1597490740
ISBN-10: 1597490741
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used
$49.99
Buy new
$59.55
Amazon Price New from Used from
Kindle
"Please retry"
Paperback, October 2, 2007
"Please retry"
$59.55
$12.00 $11.78
More Buying Choices
34 New from $12.00 22 Used from $11.78
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


InterDesign Brand Store Awareness Rent Textbooks
$59.55 FREE Shipping. Only 2 left in stock (more on the way). Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research + The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy
Price for both: $76.27

Buy the selected items together

Editorial Reviews

About the Author

David Maynor is a Senior Researcher, SecureWorks. He was formerly a research engineer with the ISS Xforce R&D team where his primary responsibilities include reverse engineering high risk applications, researching new evasion techniques for security tools, and researching new threats before they become widespread.
NO_CONTENT_IN_FEATURE


Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Paperback: 350 pages
  • Publisher: Syngress; 1 edition (October 2, 2007)
  • Language: English
  • ISBN-10: 1597490741
  • ISBN-13: 978-1597490740
  • Product Dimensions: 7.5 x 0.6 x 9.2 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 2.4 out of 5 stars  See all reviews (5 customer reviews)
  • Amazon Best Sellers Rank: #1,346,656 in Books (See Top 100 in Books)

More About the Author

I am a computer security consultant living in Atlanta, GA. I like to educate people of technical topics through the use of fiction. I also like to write scifi of my own creation. I am part of the Electric Sheep Scribes.

Customer Reviews

Most Helpful Customer Reviews

22 of 22 people found the following review helpful By Chris Gates on March 20, 2008
Format: Paperback
I'm going to take a harsh stance on this book, mostly because this book had potential to really build upon all the information publicly available for Metasploit and really make a great book on Metasploit internals and advanced usage. Instead it seems like current public/free information was just rehashed and new information not updated for the 3.x branch of MSF.

What I consider the "meat" of this book, and what should have made this a 4 or 5 star book, covers the Metasploit Framework 2.x branch and NOT the current 3.x branch. By "meat" I mean the case studies covering exploitation using MSF. The major difference between the two is that 2.x was written in Perl and 3.x in Ruby. To be fair the first 5 chapters cover using MSF 3.x, but I really didn't feel they covered much, if anything, that's not out on the net with the exception of Chapter 5 (Adding new Payloads). "Using" Metasploit has been covered a million times in a million other books. A book specifically on Metasploit should have covered things not covered in every other hacking book.

Chapter 1 is an "Introduction to Metasploit." If you haven't ever used the tool and didn't want to RTFM, then "maybe" it would be useful for you. Most of the material I felt could be found on the Metasploit main support page, the wiki, or via google, but mostly the first two. I'm also not sure why there are pages and pages of current payloads and exploits with no explanations as to why I would use one type of payload versus another especially for the obscure ones like find tag or ordinal payloads. Doing a "show exploits" or "show payloads" without dialogue on the differences adds little value.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Rick Campbell on December 8, 2008
Format: Paperback Verified Purchase
What could have been a brillent book, turned out to be more of a dud then anything else. By the time this book came out, Framework 3 should have been covered, instead, the book focuses on version 2.x.

If you are a newbie to Metasploit I can understand that this book could have been helpful, primarily for the historical purposes, and if you've used 2.x and intend on staying at the version, go ahead, read the book. But, if you are like 99.9% of the rest of use, save your money and wait until someone else either writes an in-depth book on the actual use of the most current version of Metaspolit and the inner workings, etc, or, look up the information needed on the web. You'll feel more satisified with yourself knowing you didn't waste your time and money.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By J. H. Morgan on May 3, 2009
Format: Paperback Verified Purchase
This was a good intro to Metasploit. However, in order to get Metasploit to do more than hack your old Windows box, you'll need to add your own code. There is nothing about the libraries and functions built into Ruby to help you do this. They have included nothing in the book about altering your payload so that virus checkers won't scream at it.

A version of Meterpreter that could pass by the virus checkers would be a huge asset to IT departments doing remote support over slow links. Having had to do support for computers on oil rigs (60 computers sharing a 128kb/sec VSAT link), remote desktop of any kind was not an option.

It's a good start, I just wish it had more meat.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By IRN on December 18, 2009
Format: Paperback
Much like the other reviews, I would have to say the information is outdated and very basic. The section on analyzing the different exploit modules would be useful if it was up to date. No need to repeat what has already been said. I had high hopes for this book. Wish I read the reviews first. For a list price of $60? Way overpriced. It's a book capitalizing on the popularity of the tool.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
This book is an absolutely fabulous reference into the Metasploit application. I have already tried reading the Metasploit book by No Starch Press several times, which in one of the highest rated books on this subject. But, despite how many times I tried reading chapters of the No Starch Press book, I find it to be very hard to follow along with and there is very few hands on illustrations.

However, with THIS book, it contains several case studies, as well as a complete history of Metaspolit. I have not read it too deeply, for I recently purchased it and don't have time to read it at the moment. But, I like what I saw in respect to how far I've gotten thus far. It is very interesting, and illustrates ideas way better than the other book I referred to above.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This item: Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Price: $59.55
Ships from and sold by Amazon.com

Want to discover more products? Check out these pages to see more: model horses for sale, capture hd mac