







Price: $59.99 - $50.71
(as of Nov 24, 2025 02:23:38 UTC – Details)

The new and improved guide to penetration testing using the legendary Metasploit Framework.
Metasploit: The Penetration Tester’s Guide has been the definitive security assessment resource for over a decade. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless, but using it can be challenging for newcomers.
Written by renowned ethical hackers and industry experts, this fully updated second edition includes:
Advanced Active Directory and cloud penetration testingModern evasion techniques and payload encodingMalicious document generation for client-side exploitationCoverage of recently added modules and commands
Starting with Framework essentials—exploits, payloads, Meterpreter, and auxiliary modules—you’ll progress to advanced methodologies aligned with the Penetration Test Execution Standard (PTES). Through real-world examples and simulated penetration tests, you’ll:
Conduct network reconnaissance and analyze vulnerabilitiesExecute wireless network and social engineering attacksPerform post-exploitation techniques, including privilege escalationDevelop custom modules in Ruby and port existing exploitsUse MSFvenom to evade detectionIntegrate with Nmap, Nessus, and the Social-Engineer Toolkit
Whether you’re a cybersecurity professional, ethical hacker, or IT administrator, this second edition of Metasploit: The Penetration Tester’s Guide is your key to staying ahead in the ever-evolving threat landscape.
From the Publisher



About the Authors
David Kennedy, founder of Binary Defense and TrustedSec, is a cybersecurity leader who advised on the Emmy-winning series Mr. Robot. Mati Aharoni, OffSec founder, is a veteran pentester who has uncovered major security flaws. Devon Kearns co-founded the Exploit Database and Kali Linux. Jim O’Gorman heads the Kali Linux project at OffSec. Daniel G. Graham is a professor of computer science at the University of Virginia and a former program manager at Microsoft.

About the Publisher
No Starch Press has published the finest in geek entertainment since 1994, creating both timely and timeless titles like Python Crash Course, Python for Kids, How Linux Works, and Hacking: The Art of Exploitation. An independent, San Francisco-based publishing company, No Starch Press focuses on a curated list of well-crafted books that make a difference. They publish on many topics, including computer programming, cybersecurity, operating systems, and LEGO. The titles have personality, the authors are passionate experts, and all the content goes through extensive editorial and technical reviews. Long known for its fun, fearless approach to technology, No Starch Press has earned wide support from STEM enthusiasts worldwide.
Publisher : No Starch Press
Publication date : January 28, 2025
Edition : 2nd
Language : English
Print length : 288 pages
ISBN-10 : 1718502982
ISBN-13 : 978-1718502987
Item Weight : 2.31 pounds
Dimensions : 7.13 x 0.61 x 9.31 inches
Best Sellers Rank: #93,366 in Books (See Top 100 in Books) #26 in Cloud Computing (Books) #31 in Computer Network Security #39 in Computer Hacking
Customer Reviews: 4.6 4.6 out of 5 stars 35 ratings var dpAcrHasRegisteredArcLinkClickAction; P.when(‘A’, ‘ready’).execute(function(A) { if (dpAcrHasRegisteredArcLinkClickAction !== true) { dpAcrHasRegisteredArcLinkClickAction = true; A.declarative( ‘acrLink-click-metrics’, ‘click’, { “allowLinkDefault”: true }, function (event) { if (window.ue) { ue.count(“acrLinkClickCount”, (ue.count(“acrLinkClickCount”) || 0) + 1); } } ); } }); P.when(‘A’, ‘cf’).execute(function(A) { A.declarative(‘acrStarsLink-click-metrics’, ‘click’, { “allowLinkDefault” : true }, function(event){ if(window.ue) { ue.count(“acrStarsLinkWithPopoverClickCount”, (ue.count(“acrStarsLinkWithPopoverClickCount”) || 0) + 1); } }); });