I read ecsployt's quick tutorial on metasploit and it intrigued me..

i got to the end and read a few comments on how good and helpfull it was.

but i have to say i still dont have clue what is going on. can someone suggest some reading for someone like me, (lets say a total vegatable).

Thanks.