Preview

Metasploit Research

Good Essays
Open Document
Open Document
676 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Metasploit Research
SUBJECT: Technical Paper on the Metasploit Project

1. The Metasploit framework was originally a framework developed in PERL scripting language by HD Moore in 2003. He initially developed this framework as a network tool for penetration testing using common publically known methods. The Metasploit framework later was rewritten in the RUBY programming language. Since it’s creation it has become the largest and most widely used tool for penetration testing by nearly every security firm and penetration testing companies.

2. HD Moore’s creativity and precision forethought has allowed hundreds of thousands of organizations to be able to conduct security audits without a vast knowledge of programming, reverse engineering, and network attack specialty skill sets. Before the days of The Metasploit framework, a vulnerability assessment required a person or team of highly specialized engineers to inform the leaders of the organization on how to secure their network and applications from possible threats. 3. With the availability of the Internet, almost any computer savvy person can begin using the Metasploit framework in order to conduct a vulnerability assessment. Now with these assessments comes a risk that must be accepted or migrated by the leadership of an organization. There are a great number of security related youtube videos out there to teach and demonstrate how to use the Metasploit framework. The framework can be run on almost any OS platform out there today that is use by the masses. It can be run by using Unix/Linux, Mac OS X, and also on Windows. With this sort of interoperability it allows the user of the framework to run it natively on their host system without a lot of reconfiguration to an OS they are not familiar with.

4. One of the greatest features of the toolkit is that it is modular. This modular approach allows practically any combination of exploits, with almost any payload attached that is compatible with the targeted system.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt2670 Unit 7 Lab 1

    • 402 Words
    • 2 Pages

    1. Manages the application pool configuration and for the creation and lifetime of worker processes for HTTP and other protocols.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows 2003 XP server?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | * OS level * Patch history * Resilient computing * Stateful inspection * Whitelists-Blacklists * DB encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 10 Lab

    • 563 Words
    • 2 Pages

    4. Nessus® provides useful and up to date software vulnerability assessment and suggested remediation plans via updates and plug-ins. Nessus® can help security practitioners with shrinking the software vulnerability window with up to date software patching and security updates.Nmap (ZeNmap GUI) provides security practitioners with an easy to use, automated network discovery and inventory management tool. Nmap can provide a quick reconnaissance and prove of an IP network infrastructure and allows for more targeted software vulnerability scans performed by Nessus®.…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It gives developers necessary, universal concepts so they can develop and perfect protocols that can work with operating systems and network products developed by other…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved April 29, 2015, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4

    • 342 Words
    • 2 Pages

    6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft 2003 XP SP2 Workstation?…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    analysis are either built into the operating system, or are available at no cost. Two such tools for…

    • 3838 Words
    • 17 Pages
    Good Essays
  • Better Essays

    The review results were positive with a suggestion for an improvement. The team found that RedSeal product provides the intelligence necessary to improve defenses, maintain continuous compliance and mitigate real-world risks by identifying the available paths of access and exposed vulnerabilities present across a network (Stephenson, 2012). The RedSeal solution is either a hardware appliance or software product and is architected for a fast and efficient means of implementing the system (Stephenson, 2012). The design will provide the most secure, scalable, and dependable deployment possible (Stephenson, 2012). Continuous monitoring focuses on correlating IT, network, and vulnerability feeds (Stephenson, 2012). The system identifies risk associated with the business’s security effectiveness as opposed to policy and compliance driven tools (Stephenson, 2012). RedSeal provides a large library of supported vendor products, allowing security and vulnerability data to be quickly and easily imported into the system. The system automatically builds network maps and correlates the map data with configuration and vulnerability data, which creates a threat reference library. RedSeal finds and eliminates gaps in businesses security controls and prioritizes the impact of those gaps. RedSeal is not an assessment or audit tool, but it does correlate risk to various controls for compliance regulations, creating reports that show gaps in deployed configurations/controls (Stephenson, 2012). The team would have liked to have seen more integration with governance, risk, and compliance solutions (Stephenson, 2012). The product only provided a piece of the risk picture. The piece is important, and one that a number of assessment and audit driven tools do not deliver and could leverage (Stephenson,…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The implementation of security scanners and profilers such as Microsoft’s Baseline Security Analyzer (MBSA) are an important component of maintaining an up-to-date and secure Windows infrastructure.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    7. Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microsoft Windows platforms, what would you do to identify known software vulnerabilities and exploits?…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Features of MoShell

    • 327 Words
    • 1 Page

    MoShell also supports scripting, which gives new opportunities for node management, because many processes can be automated.…

    • 327 Words
    • 1 Page
    Satisfactory Essays

Related Topics