The Metasploit Project is ostensibly a group formed to "provide useful information to people who perform penetration testing, IDS signature development, and exploit research."
Their latest release, the Metasploit Framework version 2.0, claims to be "an advanced open-source platform for developing, testing, and using exploit code."
While it is true that the tools and functionality built in to the Metasploit Framework might prove valuable for a security auditor or penetration tester to use in verifying the security of a system or network, it is probably as true or more so that script-kiddies and other wannabe hackers or developers of malicious code might put this tool to use as an express lane or fast track to help them create exploits and malware.
I don't really know enough about the Metasploit Project or the developers who have worked on this utility to say whether their motives were pure. It seems that often the line between providing network security and breaking network security is a thin one and it doesn't take much for some otherwise rational people to accuse security researchers or administrators of less than honorable intentions. Some presume that anyone in network security is also a hacker on the side and many question the true intent of tools which double as powerful weapons for script-kiddies.
Even if we assume that their goal truly is to provide useful information and tools to help further the cause of development and security research, it doesn't change the fact that the tool is available for all to download and there is no way to predict or control what the end user will do with it.
The Metasploit Project says that their Metasploit Framework can be compared with expensive commercial products such as Immunity's CANVAS or Core Security Technology's Core Impact. These tools also provide the same or similar functionality. One of the main reasons that they have not come under the scrutiny that the Metasploit Framework has is the pricetag. Since few can afford these packages they pose little risk, but if you take that same power and distribute it freely there is a greater concern that the wrong people will use it for the wrong reasons.
The Metasploit Framework seems to be a powerful tool. I downloaded a copy myself to play with- on my own network against my lab computers. I think that for security administrators it may prove valuable in the battle to ensure your computer and network security and make sure you are protected. But, I think we may also start to see new exploits and malware hitting the streets once the script-kiddies start playing with this tool and learning just how powerful it can be as a weapon.
Download Free:
1. Metasploit For Windows
2. Metasploit For Linux
Pencarian
Blog Archive
-
▼
2009
(52)
-
▼
December
(52)
- 140 Amazing Hacks For your PC
- Ultra Hacker 155 in 1
- Full Hack Pack 2009 [Exclusive]
- Wifi Hacks 2009 AIO
- Wireless Hack Toolz 2009
- Dangerous Hack Tool 2010
- KingCripts Hacking Pack
- ESET Nod32 Keys Finder V7
- A.I.O USB Utilities Tools
- Hacking Tools - 85 in 1
- Metasploit Framework
- Network Spy 2.0
- "UU ITE Bermasalah di Penerapan"
- Tifatul: UU ITE Miliki Beberapa Kejanggalan
- Tutorial LAN Hacking (Newbie)
- Nessus
- Linux sock_sendpage
- Linux kernel 2.4/2.6
- Kernel 2.6.17
- Bug&dork New
- Meffy Scanner
- Albania Scanner
- Defacing malaysuck site
- Defacing malaysian site
- Rose Scanner
- About | MIRC
- Make Proxy From Shell
- Rafly Scanner
- Pittbull Scanner
- SQL Injection Attacks by Example
- Bug Dork PHPBB
- Bug Dork WordPress
- Bajo Sanner
- HACK WIFI
- Joomla Bugs
- Remote File Include (RFI)
- Hacker
- Zell Scanner
- Install Eggdrop
- Alb Scanner
- Italian Scanner
- The Best Hack Tools Collection Ever
- Feelcomz Scanner
- Defacing Indonesian Site
- Mamboleto Joomla! component Remote File Include Vu...
- Old Bug&Dork
- Old Bug-Dork
- Joomla Component com_jphoto SQL injection vulnerab...
- Bug&Dork
- Joomla Component MojoBlog Multiple Remote File Inc...
- Joomla Component com_jsjobs Multiple SQL injection
- Bug-Dork
-
▼
December
(52)
Labels
- Article (17)
- bug dork lfi (5)
- bug dork list (5)
- bug dork rfi (5)
- bug dork sql (5)
- bug dork timthumb (5)
- bug dork xml (5)
- Dork RFI (8)
- Exploit (5)
- Hacking Tools (52)
- Kill-9 News (14)
- lfi bug dork (5)
- Lfi Dork (3)
- LFI Scanner (5)
- Linux-Kernel (17)
- list bug (5)
- list bug dork (5)
- rfi bug dork (5)
- Rfi Scanner (17)
- SQLi (15)
- tutorial (36)
Statistic User
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment