![]() ![]() Like many information security tools, Metasploit can be used for both legitimate and unauthorized activities. Like comparable commercial products such as Immunity's Canvas or Core Security Technologies' Core Impact, Metasploit can be used to test the vulnerability of computer systems or to break into remote systems. On October 21, 2009, the Metasploit Project announced that it had been acquired by Rapid7, a security company that provides unified vulnerability management solutions. By 2007, the Metasploit Framework had been completely rewritten in Ruby. Moore in 2003 as a portable network tool using Perl. Metasploit is pre-installed in the Kali Linux operating system. ![]() The Metasploit Project includes anti-forensic and evasion tools, some of which are built into the Metasploit Framework. Other important sub-projects include the Opcode Database, shellcode archive and related research. Its best-known sub-project is the open-source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. It is owned by Boston, Massachusetts-based security company Rapid7. The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. com /rapid7 /metasploit-frameworkįramework: BSD, Community/Express/Pro: Proprietary
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |