As of last Thursday, Project Basecamp announced the development of a Stuxnet-like module for Metasploit. As a framework, it eases the effort to exploit known vulnerabilities in networks, operating systems and applications, and to develop new exploits for new or unknown vulnerabilities. Metasploit is a self-described "framework" for cyber exploitation. That should give you some idea of how important Metasploit is in the security community. Metasploit has consistently ranked among the top ten since its inception and currently ranks second. Insecure.Org, run by Fyodor, the founder of Nmap, annually surveys security professionals for their opinion on the top security software. It's used by both novices and advanced professionals. Metasploit is among the most widely used exploitation tools in the hacking/security field. Widely used and trusted in the IT security/pen-testing communityĪs such, no hacker/penetration tool box is complete without the addition of the versatile and powerful Metasploit.There are hundreds of tools out there, but I will focus and those that meet four key criteria: My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing professionals. This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |