The book covers all the topics that make up the framework metasploit. It helps to have a more complete view and gives an overview of the power of metasploit for penetration testing. The book focuses command line allowing to automate certain recurring tasks. The little less techniques are sometimes exceeded as msfencode that is supposed re-encode a type of payload reverse_tcp to not be detected by anti virus. The book focuses end of exploit development and portability which is quite interested. The book also lets move on to the practice with a Linux based version bone that is filled with security breach. To sum up a good book to take over the framework and allows subsequently deepen the knowledge by people searches.