- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 163字
- 2021-06-30 19:16:02
Metasploit
This is a legendary framework made up of a number of tools that are used for scanning and exploiting networks. Due to the far-reaching capabilities of this tool, most white hat trainers use it to pass knowledge to their students. It is also a penetration tester that is the software of choice in a number of organizations. So far, the framework has over 1,500 exploits that can be used against browsers, Android, Microsoft, Linux and Solaris operating systems, and varied other exploits applicable to any platform. The tool deploys its payloads using a command shell, the meterpreter, or dynamic payloads.
The advantage of Metasploit is that it has mechanisms that detect and evade security programs that can be present inside a network. The framework has several commands that can be used to sniff information from networks. It also has complementary tools that can be used for exploitation after information about vulnerabilities in a network has been collected.
Following are screenshots of Metasploit:


- Linux設備驅動開發(fā)詳解(第2版)
- Mastering vRealize Operations Manager(Second Edition)
- Implementing Cisco UCS Solutions
- 大學計算機應用基礎實踐教程(Windows 7+Office 2013)
- SOA實踐者說
- 構建可擴展分布式系統(tǒng):方法與實踐
- SharePoint 2013 應用開發(fā)實戰(zhàn)
- 異質結原理與器件
- Dreamweaver CS5.5 Mobile and Web Development with HTML5,CSS3,and jQuery
- AutoCAD 2014中文版從入門到精通
- INSTANT Migration from Windows Server 2008 and 2008 R2 to 2012 How-to
- OpenStack系統(tǒng)架構設計實戰(zhàn)
- Windows 7實戰(zhàn)從入門到精通
- Building Telephony Systems With Asterisk
- Windows 7實戰(zhàn)從入門到精通(超值版)