CDN$ 43.50
  • List Price: CDN$ 71.26
  • You Save: CDN$ 27.76 (39%)
In Stock.
Ships from and sold by Amazon.ca. Gift-wrap available.
Quantity:1
Metasploit: The Penetrati... has been added to your Cart
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

Metasploit: The Penetration Tester's Guide Paperback – Jul 25 2011

5 out of 5 stars 6 customer reviews

See all 4 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
CDN$ 43.50
CDN$ 37.00 CDN$ 39.68

Save an Additional 10% on Textbooks When you Join Amazon Student

Special Offers and Product Promotions

  • Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)

Frequently Bought Together

  • Metasploit: The Penetration Tester's Guide
  • +
  • Hacking : The Art of Exploitation, 2nd Edition
  • +
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Total price: CDN$ 112.61
Buy the selected items together

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your e-mail address or mobile phone number.




Product Details

  • Paperback: 328 pages
  • Publisher: No Starch Press; 1 edition (July 25 2011)
  • Language: English
  • ISBN-10: 159327288X
  • ISBN-13: 978-1593272883
  • Product Dimensions: 17.8 x 2.9 x 23.5 cm
  • Shipping Weight: 635 g
  • Average Customer Review: 5.0 out of 5 stars 6 customer reviews
  • Amazon Bestsellers Rank: #15,917 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

About the Author

David Kennedy is Chief Information Security Officer at Diebold Incorporated and creator of the Social-Engineer Toolkit (SET), Fast-Track, and other open source tools. He is on the Back|Track and Exploit-Database development team and is a core member of the Social-Engineer podcast and framework. Kennedy has presented at a number of security conferences including Black Hat, DEF CON, ShmooCon, Security B-Sides, and more.

Jim O'Gorman is a professional penetration tester with CSC's StrikeForce, a co-founder of Social-Engineer.org, and an instructor at Offensive-Security. He is involved in digital investigations and malware analysis, and helped build forensic capabilities into Back|Track Linux. When not working on various security issues, Jim spends his time assisting his children in their attempts to fight Zombie hordes.

Devon Kearns is an instructor at Offensive-Security, a Back|Track Linux developer, and administrator of The Exploit Database. He has contributed a number of Metasploit exploit modules and is the maintainer of the Metasploit Unleashed wiki.

Mati Aharoni is the creator of the Back|Track Linux distribution and founder of Offensive-Security, the industry leader in security training.


Customer Reviews

5.0 out of 5 stars
5 star
6
4 star
0
3 star
0
2 star
0
1 star
0
See all 6 customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback Verified Purchase
This book will teach you how to use Metasploit (included in every penetration test Linux distribution such as BackTrack, Kali Linux, BackBox...) starting from A to Z and will also teach you step-by-step typical use of Metasploit such as doing a penetration test. This book not only teach you Metasploit but also all the tools/scripts/programs commonly used with Metasploit such as Nmap, Nessus, Airmon-ng, Aircrack-ng etc... and will lead you to exploit a vulnerable machine and give you a remote shell, encoding and installing trojans and rootkits to maintain persistence all that in the first 100 pages.

If you are a beginner, don't worry, this book will show you the way by teaching you also about the other tools you need to use. If you are an elite hacker this can also be for you if you did not master or don't use and looking to use Metasploit this handbook is the only book you will need to take care of Metasploit.

From beginner to advanced this is the only book you will need to know everything about Metasploit and since Metasploit is updated every other day, the authors wrote it having that in mind so this is really the only book you will ever need and be a Mastersploit!

Note: Please use this book with caution and perform your hacking on computers you have authorization to and/or your own network or even your localhost if you use a virtual machine. Hacking should always be performed in an ethical way.
1 of 1 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback Verified Purchase
Exactly what I needed to learn more about Metasploit. Package came quickly, package size was appropriate, and the product is amazing!
1 of 1 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback Verified Purchase
This book is a fantastic introduction to the Metasploit framework. David Kennedy is a very smart individual, and he writes this book at a level that anyone can read. Regardless of whether you are brand new to the program or have been using it for years, I think that anyone could pick up some useful information from this book.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse


Feedback