Read more about Metasploit
Bookmark and Share
  • Penetration testing for mobile phones

    04.08.2011

    Core Security announced the Core Impact Pro v12 penetration testing software, a commercial-grade solution that pinpoints security exposures in Android, BlackBerry and iPhone mobile devices to help prevent the theft and compromise of sensitive enterprise data accessible deeply within them.

  • First SIEM and penetration testing integration

    03.08.2011

    NitroSecurity and Rapid7 announced the pairing of NitroSecurity’s NitroView with Rapid7’s Metasploit Pro 4.0 solution, in order to enable security operations managers to identify and validate critical vulnerabilities that could lead to a data breach, and to prioritize their remediation efforts more effectively.

  • Metasploit module for imitating Cisco devices

    02.08.2011

    SecureState announced the release of the CDP tool, an additional module for the Metasploit Framework, this time for forging Cisco Discovery Protocol frames.

  • Metasploit Pro 3.6 released

    07.03.2011

    Metasploit brings an enhanced command-line feature set for increased proficiency and detailed PCI reports with pass/fail information for a view of compliance posture with PCI regulations. Metasploit Express and the free, open source Metasploit Framework also saw several improvements with this release.

  • Metasploit 3.5.1 adds Cisco device exploitation

    16.12.2010

    Metasploit now enables security professionals to exploit Cisco devices, performs passive reconnaissance through traffic analysis, provides more exploits and evaluates an organization’s password security by brute forcing an ever increasing range of services. This latest release adds stealth features, exposing common flaws in IDS and IPS, and anti-virus threat detection.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Apr 17th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //