Further reading
In this book, we have covered Metasploit and various other related subjects in a practical way. We covered exploit development, module development, porting exploits in Metasploit, client-side attacks, speeding up penetration testing, Armitage, and testing services. We also had a look at the fundamentals of assembly language, Ruby programming, and Cortana scripting.
Once you have read this book, you may find the following resources provide further details on these topics:
For learning Ruby programming, refer to http://ruby-doc.com/docs/ProgrammingRuby/
For assembly programming, refer to https://courses.engr.illinois.edu/ece390/books/artofasm/artofasm.html
For exploit development, refer to http://www.corelan.be
For Metasploit development, refer to http://dev.metasploit.com/redmine/projects/framework/wiki/DeveloperGuide
For SCADA-based exploitation, refer to http://www.scadahacker.com
For in-depth attack documentation on Metasploit, refer to http://www.offensive-security.com/metasploit...