Jump to ratings and reviews
Rate this book

Metasploit Penetration Testing Cookbook, Second Edition by Monika Agarwal

Rate this book
Over 70 recipes to master the most widely used penetration testing framework More than 80 recipes/practicaltasks that will escalate the reader's knowledge from beginner to an advanced level Special focus on the latest operating systems, exploits, and penetration testing techniques Detailed analysis of third party tools based on the Metasploit framework to enhance the penetration testing experience

Paperback

First published January 1, 2012

6 people are currently reading
119 people want to read

About the author

Abhinav Singh

46 books6 followers
Abhinav singh is a young information security specialist from India. He has a keen interest in the field of Information security and has adopted it as his full time profession. His core work areas include Malware analysis, Network security, System and Enterprise security. He is also the author or “Metasploit Penetration testing Cookbook” and “Instant Wireshark” published by Packt.
Abhinav’s work has been quoted in several Infosec magazines and portals. He shares his day to day security encounters on
www.securitycalculus.com.
Currently he is working as Cyber Security Engineer for JP Morgan.

Linkedin profile: sg.linkedin.com/in/abhinavbom/

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
18 (30%)
4 stars
19 (31%)
3 stars
16 (26%)
2 stars
2 (3%)
1 star
5 (8%)
Displaying 1 - 8 of 8 reviews
1 review
December 19, 2013
This book offers a broad coverage on how network based pen-testing which would serve as a good reference for beginners. Some of the tips and references provided are useful. However, there are some assumptions are inaccurate which you may need to be cautious. E.g 1) DLL injection is not the same as DLL hijacking; and 2) with the presence of AV it does not mean that all malwares could be detected and deleted. Overall, I like the way that it is presented, but I would hope to see more advance chapters included.
227 reviews1 follower
May 24, 2021
Przeczytawszy I wydanie tej książki, coś mnie podkusiło, żeby kupić II część. Spis treści co prawda się różnił, data drugiego wydania było w 2014 roku, no i inni autorzy. Jest inaczej, ale nie do końca. W obu pozycjach powtarzają się techniki łamania, komendy msf, ale są też inne. W I tomie jest główny nacisk na assembler, w II tomie o tym praktycznie nic nie ma. Jest za to łamanie przez Wifi i pivoting. Podsumowując, jeżeli ktoś nie czytał żadnego tomu, może zacząć od drugiego. Jeżeli zaś ktoś jest zagorzałym fanem Metasploita, może przeczytać oba tomy.Ja chyba przeczytam i III wersje, jeżeli już będzie dostępna w Polsce.
22 reviews1 follower
November 17, 2022
Good to read 📚

Facebook is good to have your five good test your face challenges everybody is good and easy to understand how they work the tools you need and guys and the steps you can do very easy you do not need to read the book but to know the commands
Profile Image for Paul.
169 reviews8 followers
January 25, 2020
Second Edition 2013 is a bit dated now, but good for a quick scan of the concepts and capabilities.
Profile Image for F.
93 reviews9 followers
July 25, 2018
The Metasploit framework is a very powerful set of tools in the right hands. This second edition of the Penetration Testing Cookbook is a timely update to Abhinav Singh's first edition. From configuring your environment whether in Windows, Linux (Ubuntu specifically), kali, or a virtual machine,

Singh goes on to expand beyond the basic usage of the Metasploit framework and explores additional tools for port scanning, exploiting browser and/or OS vulnerabilities, and SQL injection. Singh also explores wireless and voice over IP pen testing and social engineering.

The wireless and VoIP chapters were pretty interesting, but I found the chapter on social engineering a bit weak and would recommend a book dedicated to that topic in order to really learn more about it. But the core material in this book - using the Metasploit framework to pen test via a number of different attack vectors - is satisfactory. Not ground-breaking, and you may want to start with a more introductory book (or one that is not in the cookbook format) on the Metasploit framework before diving into this cookbook, but if you prefer to jump in and get your hands dirty right away, this is the book for you.
Overall, I would recommend this book to every security professional as it has too much content
2 reviews1 follower
March 24, 2014
Metasploit has gained a lot of popularity since last couple of years. This is simply because of its proven ability to help the security testers in the process of penetration testing and exploitation. The book titled "Metasploit Penetration Testing Cookbook, Second Edition" completely guides the user from basics to advance of Metasploit Framework. It does so following the 'recipe' style of writing giving crisp understanding of all concepts with suitable illustrations and references. Thus its really a good resource to get started with learning MEtasploit.
Profile Image for Fuat .
22 reviews
August 4, 2014
One of the best books to deepen your knowledge about Metasploit.
Displaying 1 - 8 of 8 reviews

Can't find what you're looking for?

Get help and learn more about the design.