Authors: David Kennedy, Jim O’Gorman, Devon Kearns, Mati Aharoni
Publisher: O’Reilly Media, Inc.
Reviewer/Blogger: Virginia Benedict
Target Audience: This Guide offers a wealth of information to both the novice as Tutorial and the experienced as Reference. For starters, the Novice will learn relevant steps on how to get started; and the Experienced with benefit from the discussions on Methodology. Program Managers and Stake Holders will benefit from a managers perspective
Pre-requisites: Desire to lean, Integrity, Methodical, Analytical, Programming & Scripting languages recommended but not required
Overview: This Metasploit guide will help the Pen Tester get started; or take him/her to the next level
Related Standards: Pen Testing Standards are loosely followed due to the nature of the investigative process and intelligent garthering.
Related Commercial Products: Metasploit Express Edition || Metasploit Pro Edition
Related Basic Products: Metasploit Framework Edition || Metasploit Community Edition
Chapters: Seventeen Chapters extensively indexed and a Cheat Sheet referencing important commands with syntax commonly used within Metasploit’s various interfaces and utilities.
A guide such as this is best produced by an extensive collaborative effort of experienced professionals. It is especially valuable when the related community of information security experienced professionals has had direct or indirect input into the final product, as with this outstanding effort.
Once the authors have taken the reader through the absolute basics of Penetration Testing, then they introduce the basics of Metasploit, arming the novice with the necessary knowledgebase to move into the intelligence gathering processes while teaching you the various commands and tools.
I found their discussion on the risks and responsibilities of the Tester very poignant.
I recommend that since the Metasploit Framework is large and complex requiring an array of innate and learned skill sets that the novice reader first study the organizational framework of this guide. In other words, become familiar with the flow of the work by creating an inventory of the various learning points.
As with any learning process, I always recommend that the “student” begin by fully understanding their learning style(s). Be aware that you, as many of us do, may have different learning styles and combinations thereof for different learning requirements. As a reader in this case, you might have a couple of learning styles, which you might apply in perspective. By studying the method(s) used by the authors hereby to present the information and processes, you will gain the ability to understand and retain the knowledge presented.
About the Authors
Devon kearns (dookie2000ca) is a former Communications Technician and IS Security Analyst with over 15 years of formal IT experience but his true passion lies in the field of information security, most notably in the realm of software exploitation and bug hunting. This fascination with vulnerabilities has led Devon to being the lead administrator of the Exploit Database, a co-author of the free online Metasploit Unleashed training course, and a Kali Linux developer.
Jim O'GormanJim (Elwood) is a professional penetration tester, an instructor at Offensive Security, and manages Offensive Security’s consulting services. Jim has lived online from the times of BBS’s, to FidoNet, to when SLIP connections were the new hotness. Jim spends time on both network intrusion simulation as well as digital investigations and malware analysis. When not working on various security issues, Jim spends his time assisting his children in their attempts to fight Zombie hordes.
David Kennedy is Chief Information Security Officer at Diebold Incorporatedand creator of the Social-Engineer Toolkit (SET), Fast-Track, and other open source tools. He is on the Back|Track and Exploit Database development team and is a core member of the Social-Engineer podcast and framework.Kennedy has presented at a number of security conferences including Black Hat, Defcon, ShmooCon, Security B-Sides, and more.
Post a Comment
Thank you for posting.