
















desertcart.com: Metasploit, 2nd Edition: 9781718502987: Kennedy, David, Aharoni, Mati, Kearns, Devon, O'Gorman, Jim, Graham, Daniel G.: Books Review: Excellent - Exvellent book Review: Great Metasploit Guide/Refresher for 2025 - It's everything I expect for a clear, concise, and straight to the point guide/refresher on using the Metasploit Framework. It's up to date too for the year 2025 (This review was written on 4/4/2025). The parts I like or looking forward to is Chapter 1 which references the PTES Methodology and Chapters 15 & 16 which demonstrates (book-wise) a simulated Pentest and talks about Pentesting the Cloud (uses AWS in this chapter) respectively! Also, Chapter 3 Intel gathering shows you just 3 parameters you commonly need when using Nmap (and db_nmap for the msfconsole too), one of which is the parameter for Stealth Scanning (TCP Scanning which is "-sS", this differs from avoiding Firewalls and IDS/IPSs). There are tools shown and explained that are not specificly Metasploit but is used to complement Metasploit e.g Aircrack-ng for Wireless Pentesting with Metasploit. Chapters 12-14 talks about how about how to write your own MSF module in Assembly and Ruby languages (but not in detail of teaching you the basics of these programming languages for beginners). One of these chapters does mention it's possible to write MSF modules in other languages like in Perl, Python, C/C++.




| Best Sellers Rank | #141,089 in Books ( See Top 100 in Books ) #47 in Cloud Computing (Books) #72 in Computer Hacking #100 in Computer Network Security |
| Customer Reviews | 4.7 4.7 out of 5 stars (43) |
| Dimensions | 7.13 x 0.61 x 9.31 inches |
| Edition | 2nd |
| ISBN-10 | 1718502982 |
| ISBN-13 | 978-1718502987 |
| Item Weight | 2.31 pounds |
| Language | English |
| Print length | 288 pages |
| Publication date | January 28, 2025 |
| Publisher | No Starch Press |
R**O
Excellent
Exvellent book
J**E
Great Metasploit Guide/Refresher for 2025
It's everything I expect for a clear, concise, and straight to the point guide/refresher on using the Metasploit Framework. It's up to date too for the year 2025 (This review was written on 4/4/2025). The parts I like or looking forward to is Chapter 1 which references the PTES Methodology and Chapters 15 & 16 which demonstrates (book-wise) a simulated Pentest and talks about Pentesting the Cloud (uses AWS in this chapter) respectively! Also, Chapter 3 Intel gathering shows you just 3 parameters you commonly need when using Nmap (and db_nmap for the msfconsole too), one of which is the parameter for Stealth Scanning (TCP Scanning which is "-sS", this differs from avoiding Firewalls and IDS/IPSs). There are tools shown and explained that are not specificly Metasploit but is used to complement Metasploit e.g Aircrack-ng for Wireless Pentesting with Metasploit. Chapters 12-14 talks about how about how to write your own MSF module in Assembly and Ruby languages (but not in detail of teaching you the basics of these programming languages for beginners). One of these chapters does mention it's possible to write MSF modules in other languages like in Perl, Python, C/C++.
R**X
Good for starting off
Good for basic knowledge but you will have to do own research as some things are already outdated. This will not make you a pro hacker in any way but is a good starting point book to see if you like metasploit
W**R
Great book that isn't AI slop
The book is laid out really well and actually has terminal commands and their output. Covers relevant tools in the industry and gives you a great baseline. It's not just an AI generated script, it reads like it was actually written by people.
H**7
Useful info a little expensive
The way is written, makes Ms accessible for anyone
I**A
hack
buy...
J**R
Learn the ins and outs, and build your own module
As a penetration tester, and hobby-hacker, I use Metasploit on an almost daily basis. I 'search' and 'use' and 'run', but did I truly understand Metasploit? I got this book hoping to learn more about how Metasploit works and to give me a better idea of how to make my own Metasploit modules. The book has been fantastic! I am a lot more comfortable with the tool ever since reading it, and best of all it walks you through creating your own modules! I ended up writing my very first Ruby program, and my very first Metasploit module that deployes a Meterpreter session on a Palo. In the end, I learned that the authors of the exploit I used had a pending module in Metasploit's git, so I didn't try to publish my module, but I am motivated to make another. I highly recommend this book for anyone who uses Metasploit, or wants to learn how to use it. It's also a great introduction to writing your own modules.
X**M
I highly recommend this book to anyone interested in pentesting. It's an excellent resource for both beginners and seasoned professionals who want to learn how to use Metasploit. Additionally, it serves as a fantastic introduction to writing your own modules. If you're looking to expand your knowledge in this area, this book is a must-read.
A**R
Some good stuf if you know what you are doing. Not good, not bad, expensive for what it is.
Trustpilot
3 dagen geleden
1 maand geleden