Programming Books C Java PHP Python Learn more Browse Programming Books
Metasploit Penetration Testing Cookbook and over one million other books are available for Amazon Kindle. Learn more
Qty:1
  • List Price: $49.99
  • Save: $5.00 (10%)
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Metasploit Penetration Te... has been added to your Cart
FREE Shipping on orders over $35.
Used: Good | Details
Sold by RentU
Condition: Used: Good
Comment: Fast shipping from Amazon! Qualifies for Prime Shipping and FREE standard shipping for orders over $35. Overnight, 2 day and International shipping available! Excellent Customer Service.. May not include supplements such as CD, access code or DVD.
Trade in your item
Get a $2.00
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Metasploit Penetration Testing Cookbook Paperback – June 22, 2012


See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$44.99
$32.00 $24.36
Amazon%20Web%20Services



Frequently Bought Together

Metasploit Penetration Testing Cookbook + BackTrack 5 Cookbook + Metasploit: The Penetration Tester's Guide
Price for all three: $118.69

Buy the selected items together

If you buy a new print edition of this book (or purchased one in the past), you can buy the Kindle edition for only $2.99 (Save 84%). Print edition purchase must be sold by Amazon. Learn more.


Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 268 pages
  • Publisher: Packt Publishing (June 22, 2012)
  • Language: English
  • ISBN-10: 1849517428
  • ISBN-13: 978-1849517423
  • Product Dimensions: 7.5 x 0.6 x 9.2 inches
  • Shipping Weight: 1.1 pounds (View shipping rates and policies)
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (12 customer reviews)
  • Amazon Best Sellers Rank: #1,228,869 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Abhinav Singh

Abhinav Singh is a young Information Security specialist from India. He has a keen interest in the field of hacking and network security. He actively works as a freelancer with several security companies and is a consultant. Currently he is employed as Systems Engineer in Tata Consultancy Services, India. He is an active contributor to the SecurityXploded community. He is well recognized for his blog http://hackingalert.blogspot.com where he shares his encounters with hacking and network security. Abhinav's works have been quoted in several technology magazines and portals.

Customer Reviews

4.2 out of 5 stars
5 star
5
4 star
6
3 star
0
2 star
0
1 star
1
See all 12 customer reviews
Singh's book is written in a cookbook style which makes it easy to refer to it when attempting specific tasks.
Philip A. Polstra
At the very beginning of getting into pentesting most users come across Metasploit as an embedded tool in Back Track.
Lonnie Kelley
SUMMARY: The book is good, however most of it can be found on the Internet sometimes in a well made form for free.
Gergely Revay

Most Helpful Customer Reviews

9 of 9 people found the following review helpful By Philip A. Polstra on September 10, 2012
Format: Paperback
Overview: Singh provides an introduction to the widely used Metasploit framework in the form of seventy plus recipes for various penetration testing tasks. In a previous blog, I reviewed Dave Kennedy's Metasploit book. Both texts are well written. The format is different, however. Singh's book is written in a cookbook style which makes it easy to refer to it when attempting specific tasks. Kennedy's book is written in a more traditional style with an introduction and then survey of various aspects of Metasploit.

The differences between these two books extends beyond format. Singh's book goes beyond a basic coverage of Metasploit and covers additional penetration testing tools such as various scanners and evasion tools. So which book should you buy if you had to pick just one? To me it mostly comes down to personal preference. If you are just learning Metasploit, either should be a great aid in this process. If you want a book you can refer back to later, the Singh book may be slightly more convenient.

The publisher may also be a consideration. The Kennedy book is published by No Starch Press, whereas Singh's book is published by Packt. If you like eBooks you may prefer books from Packt Publishing. Packt provides DRM-free books in both PDF and ePub formats. This can be extremely convenient if you like to read your books on multiple devices. Personally I find myself reading books on my tablet and also keeping a copy on my penetration testing platform as a reference.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Gergely Revay on October 31, 2012
Format: Paperback
To begin with this is a nice book. It covers more or less the whole function set of Metasploit and some other related tools. Sometimes I felt that it is a bit clumsy and sometimes it starts topics but doesn't go deep in it which I felt unnecessary to even start that topic. For instance explaining how to start a scan with Nessus is really not a magic and I felt that it is a waste of paper to write it down. But you can also consider it as a plus you got included in your Metasploit book.

FORMAT:
I like the Cookbook style however the first part of the book is written in the Cookbook format but it is actually more like a guide or tutorial then a cookbook because the recepies are very much related to each other, hence it is difficult to read just single recepies. On the other hand the second part of the book really follows the original Cookbook idea.

TARGET AUDIANCE:
It is actually written in the book that it is from beginners to experienced people. And that is true. I knew metasploit from a average user's point of view but I don't use it everyday, hence the first part was a bit boring for me but the second where it went quite deep into Ruby scripting gave me some interesting new stuff.

SUMMARY:
The book is good, however most of it can be found on the Internet sometimes in a well made form for free. But if you like to have a book at home (like me) that you can sometimes open when you have a specific problem to solve with Metasploit then it is a good choice. However I haven't read any other books on this topic so I cannot really compare it to anything.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By bellyboy101 on July 27, 2012
Format: Paperback Verified Purchase
precise instructions, step by step guide , easy to follow, easy to read guide book. The author of this book provided alot of examples and easy to follow steps. Real life scenario that a IT professional would probably encounter. If you're an IT professional and you don't have this book then you're missing out on the new and awesome new tools that you can learn to use to protect your network security system.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Lonnie Kelley on October 30, 2012
Format: Paperback
At the very beginning of getting into pentesting most users come across Metasploit as an embedded tool in Back Track. And many times our first experience is this... cd /opt/framework3/msf/ .... Scratching our heads wondering what's next. Well after some Google searches we come up with the answer "ah, yes! I must enter msfconsole or was it ./msfconsole" and this most glorious low-tech ascii picture comes up, sometime a cow, sometimes the word Metasploit, but it's splendor lays in that blinking cursor preceded by " msf >" it's laying there waiting, wanting for a command to do it's master's bidding. Then reality hits you over the head like Hacksaw Jim Duggan with a 2x4 - I don't know what to do! This is where Metasploit Penetration Testing Cookbook by Abhinav Singh comes in handy.

The book does a really good job of providing a beginning foundation with escalating use of difficulty. It was not overly difficult to follow along but I think it's strong point will be in providing reference for different areas in the use of Metasploit.

I really think the book was a stand out in a few areas:

- The quick walk through of what could go wrong during setup and how to potentially fix the issue. The screen shots served as a good reference point of what to expect in that regard. From memory I cannot recall very many technical security books that addressed what could go wrong and the fix(es).

- The use of SSH to help save on memory resources. I think many like to use the Linux UI to get to the Metasploit framework and this is a great alternative to reach Metasploit and really exercise ones command line skillz. (yes, I actually used "z" instead of "s"... Gotta keep street cred Yo!)

- The inclusion of multiple OS's for targeting against.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews