- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 163字
- 2021-06-30 19:16:02
Metasploit
This is a legendary framework made up of a number of tools that are used for scanning and exploiting networks. Due to the far-reaching capabilities of this tool, most white hat trainers use it to pass knowledge to their students. It is also a penetration tester that is the software of choice in a number of organizations. So far, the framework has over 1,500 exploits that can be used against browsers, Android, Microsoft, Linux and Solaris operating systems, and varied other exploits applicable to any platform. The tool deploys its payloads using a command shell, the meterpreter, or dynamic payloads.
The advantage of Metasploit is that it has mechanisms that detect and evade security programs that can be present inside a network. The framework has several commands that can be used to sniff information from networks. It also has complementary tools that can be used for exploitation after information about vulnerabilities in a network has been collected.
Following are screenshots of Metasploit:


- Linux設備驅動開發詳解:基于最新的Linux4.0內核
- 鴻蒙生態:開啟萬物互聯的智慧新時代
- Linux從零開始學(視頻教學版)
- Kubernetes網絡權威指南:基礎、原理與實踐
- Ubuntu Linux操作系統
- macOS效率手冊
- Windows 7中文版從入門到精通(修訂版)
- Linux系統安全基礎:二進制代碼安全性分析基礎與實踐
- Windows Server 2012網絡操作系統項目教程(第4版)
- NetDevOps入門與實踐
- 跟老男孩學Linux運維:Shell編程實戰
- Windows Vista終極技巧金典
- 電腦辦公(Windows 10 + Office 2016)入門與提高(超值版)
- Learn OpenShift
- Java EE 8 High Performance