The book is divided into 5 chapters (Introduction to Metasploit, Architecture, Environment, and Installation, Metasploit Framework and Advanced Environment Configurations, Advanced Payloads and Add-on Modules and Adding new Payloads) and 5 case studies.
The first chapter gives an introduction to Metasploit for those who are not familiar with it yet. The reader will know after reading this how it is structured, Metasploit's history, short description of some payloads etc. Unfortunately the authors did not explain why to use one over the other payload or give a more detailed explanation on them.
Chapter two explains how to actually install Metasploit and advices to keep your system up to date.
Chapter three is as short as chapter two (11 pages versus 5 pages) and only covers some basic knowledge about the content of your Metasploit framework installation directory and how to use the setg-command.
The fourth chapter covers meterpreter, VNC inject and PassiveX payloads, auxiliary modules and automation of a pen-test with autopwn. As this chapter is again very short (18 pages) it is lacking in detail and only provides a brief overview of the mentioned topics although it is not that bad at all.
Adding new Payloads which is the title of the fifth and last chapter, finally gives a good explanation on MSF 3.x (which the whole book should have covered) and how to add new exploit and auxiliary payloads as well as building a SIP invite auxiliary module. Although a short chapter too it is well written and explains the tasks in an easy to follow way.
Full review can be read at www.awesec.com.
I know that this book is already outdated and many reviews are already available, but as I had the opportunity to get my hands on a copy of it, i still decided to read through it and write a little review.
More reviews to come.