Dean Bushmiller thinks this is interesting: Metasploit From Chapter 4. Auditing Tools and Techniques from Network Security Auditing by Chris Jackson - CCIE No. 6256 Publisher: Cisco Press Released: June 2010 Note This is date information : missing Rapid7 data Share this highlight http://www.safaribooksonline.com/a/network-security-auditing/7472619/ Twitter Facebook Google Plus Email Get Instant Access Now Start a Free Trial Learn about Safari for Business Have an account? Sign in. Minimise Unlock the rest of Network Security Auditing and 30,000 other books and videos By clicking this box, you confirm that you have read and agree to the terms and conditions of our Membership Agreement, and you understand that when your trial period ends, you will be required to provide billing information if you wish to continue using the service. Unlock the rest of this book Start a Free 10-Day Trial loading Learn about Safari for Business Have an account? Sign in.