This article discusses how to use Metasploit for scanning, crawling, and attacking web applications.
f1cc7c7ac8d8fc3a74105e7d8d02584bf9e083b1aa1fc066326798f75e73ec12
Whitepaper called Penetration Testing Linux with Brute Forcing Tool. It discusses using Backtrack, Metasploit, and various brute forcing tools for breaking into a Linux host.
ff57b1b9ae4de5159ef5bbd7da8a1491e036234017481810575435a054afdb7f