Access "Metasploit Framework 3.0 Product Review"
This article is part of the July/August 2007 issue of CISO survival guide: 18 of the best security tips
PENETRATION TESTING Metasploit Framework 3.0 REVIEWED BY PETER GIANNACOPOULOS Metasploit LLC Price: Free The Metasploit Framework is a platform for developing, testing and executing exploit code for all popular Unix, Linux and Windows platforms; it's an essential tool for the serious penetration tester or security professional. The latest release only serves to further cement its formidable capabilities. Installation is a breeze: download the appropriate package (Windows or Linux) and execute. The Meta-sploit Framework can either be used via the familiar and capable console interface or the much improved Web interface. For a free product, it contains surprisingly good documentation for users and developers, so it's fairly easy to get productive quickly. Metasploit has a searchable database of more than 180 exploits, targeting multiple processor architectures and operating systems, with more than 70 payloads that can be delivered to exploitable systems. Using the product is ridiculously simple: select the exploit via the Web or console GUI, specify target, ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Emerging Technologies: How to secure new products
New business initiatives mean new threats.
-
Protecting Your Brand
Customer confidence is at risk when a breach occurs.
-
Securing Extranets
Is perimeter security viable with Swiss cheese networks?
-
At Your Service: Veracode's SaaS-based application analysis
Veracode
-
Metasploit Framework 3.0 Product Review
In this product review, learn everything about the Metasploit Framework 3.0, a penetration testing tool for Linux and Windows platforms.
-
Emerging Technologies: How to secure new products
-
-
Office Politics
Success requires skills in business, technology and people.
-
Antivirus: ESET's NOD32 Antivirus 2.7
ESET's NOD32 Antivirus 2.7
-
Unified Threat Management: Secure Computing's Sidewinder 2150 v7
Secure Computing's Sidewinder 2150 v7
-
Encryption software vendors can expect challenge from hardware front
Until now, the laptop encryption market has belonged to software vendors. Learn how all that has changed.
-
Endpoint Security: F-Secure's Client Security 7.0
F-Secure's Client Security 7.0
-
Office Politics
-
Columns
-
Ping: Dave Drab
Dave Drab
-
Perspectives: Smoke and mirrors certifications
Professional organizations use ethics policies to protect their certifications instead of promoting ethical behavior.
-
Editor's Desk: Freeing Julie Amero
Justice Served
- Viewpoint: Background check faux pas
-
Ping: Dave Drab
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO