All I can say is "wow", this is an excellent resource for Metasploit training. I actually started from the back of the book (page 267) to first set up my training lab. I choose Back|Track Linux (a distribution that has Metasploit already installed), and the went the VMWare route. Once my lab was set up I was ready to play with Metasploit (returned back to the beginning of the book) and started my learning. After a pretty decent quick tour of the basics you are launched into a no-fluff-hands-on approach to learning Metasploit -- which I liked. I also liked how to authors painted a scenario, then walked you through, pretty much, step-by-step and then finished with an explanation of what went down. I really found this book to be pretty good at explaining things even though some of the examples took me a couple of go-s (mainly because of my unfamiliarity with metasploit), but persistance paid off because when an example worked, it was pure awesomeness! Finally, I liked how the authors marked key lines in the examples with numbers and then referred back to numbered item during the explanation of what we did. This made it very helpful to follow along and comprehend. All in all, I found this book to great intermediate book for learning Metasploit and would I highly recommend it to anyone wanting to learn how to use the framework.
It's nice when a book not only delivers on its stated objective, but it also opens my eyes to a better understanding of a related subject. Metasploit: The Penetration Tester's Guide by David Kennedy, Jim O'Gorman, Devon Kerns, and Mati Aharoni falls solidly into that class. In addition to learning how I can use Metasploit for network penetration testing, I also saw just how easy it is for someone to compromise a system with very little effort or knowledge. You … more