Front Cover; Metasploit Toolkit: For Penetration Testing, Exploit Development, and Vulnerability Reasearch; Copyright Page; Contents; Chapter 1. Introduction to Metasploit; Chapter 2. Architecture, Environment, and Installation; Chapter 3. Metasploit Framework and Advanced Environment Configurations; Chapter 4. Advanced Payloads and Add-on Modules; Chapter 5. Adding New Payloads; Case Studies; Appendix A. Advantages of Network Vulnerability Testing with Metasploit 3.0; Appendix B. Building a Test Lab for Penetration Testing; Appendix C. Glossary of Technology and Terminology; Index.
Summary
Metasploit is the #5 most commonly used network security tool according to a poll conducted by www.insecure.org, yet there are no books.