Screencast: Penetration testing with Metasploit

Peter Giannoulis of Bones Consulting demonstrates how the tool can be used to test commercial and custom-made applications, servers and operating systems.

Watch in full-screen!

Check out Peter Gianoullis's Metasploit demonstration in a larger window.
One of today's most popular penetration testers is the freely available Metasploit, which allows hackers and security professionals alike to examine how vulnerable a given system is to known exploits and payloads.

This month, Peter Giannoulis of http://theacademy.ca demonstrates how the tool can be used to test commercial and custom-made applications, servers and operating systems.

For more information about the tool you've seen here:

  • In 2007, Metasploit creator HD Moore published shellcode for Apple's iPhone that could turn the popular device into a pocket-sized attack platform. See how.
  • Learn more about the new features in the recently released Metasploit Framework 3.1.
  • Get the latest news and expert advice on penetration testing and ethical hacking.

    Want more screencasts? Make sure to check out our other demonstrations of today's security tools.

    About the author:
    Peter Giannoulis, GSEC, GCIH, GCIA, GCFA, GCFW, GREM, CISSP, is an information security consultant in Toronto, Ontario. He currently maintains www.theacademy.ca, which provides organizations streaming video on how to configure and troubleshoot many of today's top security products. He also serves as a technical director for GIAC.

  • This was last published in April 2008

    Dig Deeper on Security Testing and Ethical Hacking

    PRO+

    Content

    Find more PRO+ content and other member only offers, here.

    Start the conversation

    Send me notifications when other members comment.

    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

    Please create a username to comment.

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close