Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Excel 2016 For Dummies Video Training
Discover what Excel can do for you with self-paced video lessons from For Dummies. Learn more.
Frequently Bought Together
Customers Who Bought This Item Also Bought
Top Customer Reviews
What I consider the "meat" of this book, and what should have made this a 4 or 5 star book, covers the Metasploit Framework 2.x branch and NOT the current 3.x branch. By "meat" I mean the case studies covering exploitation using MSF. The major difference between the two is that 2.x was written in Perl and 3.x in Ruby. To be fair the first 5 chapters cover using MSF 3.x, but I really didn't feel they covered much, if anything, that's not out on the net with the exception of Chapter 5 (Adding new Payloads). "Using" Metasploit has been covered a million times in a million other books. A book specifically on Metasploit should have covered things not covered in every other hacking book.
Chapter 1 is an "Introduction to Metasploit." If you haven't ever used the tool and didn't want to RTFM, then "maybe" it would be useful for you. Most of the material I felt could be found on the Metasploit main support page, the wiki, or via google, but mostly the first two. I'm also not sure why there are pages and pages of current payloads and exploits with no explanations as to why I would use one type of payload versus another especially for the obscure ones like find tag or ordinal payloads. Doing a "show exploits" or "show payloads" without dialogue on the differences adds little value.Read more ›
However, with THIS book, it contains several case studies, as well as a complete history of Metaspolit. I have not read it too deeply, for I recently purchased it and don't have time to read it at the moment. But, I like what I saw in respect to how far I've gotten thus far. It is very interesting, and illustrates ideas way better than the other book I referred to above.
If you are a newbie to Metasploit I can understand that this book could have been helpful, primarily for the historical purposes, and if you've used 2.x and intend on staying at the version, go ahead, read the book. But, if you are like 99.9% of the rest of use, save your money and wait until someone else either writes an in-depth book on the actual use of the most current version of Metaspolit and the inner workings, etc, or, look up the information needed on the web. You'll feel more satisified with yourself knowing you didn't waste your time and money.
Most Recent Customer Reviews
Much like the other reviews, I would have to say the information is outdated and very basic. The section on analyzing the different exploit modules would be useful if it was up to... Read morePublished on December 18, 2009 by IRN