0% found this document useful (0 votes)
110 views2 pages

Put Your Defenses To The Test: Metasploit

Uploaded by

Jaime
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views2 pages

Put Your Defenses To The Test: Metasploit

Uploaded by

Jaime
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

metasploit

®
PRODUCT BRIE F

Put Your Defenses


to the Test

Knowing Adversaries’ Moves Helps Rapid7’s penetration testing


You Better Prepare Your Defenses solution, Metasploit, increases
Metasploit gives you insight that’s backed by a community
penetration testers’ productivity,
of well over 200,000 users and contributors: It’s the validates vulnerabilities, enables
most impactful penetration testing solution on the planet. phishing and broader social
With Metasploit you can uncover weaknesses in your engineering, and improves
defenses, focus on the highest risks, and improve your
security outcomes.
security awareness.

Know Your Weak Points


Simulate real-world attacks to find your weak points before
a malicious attacker does. Metasploit seamlessly integrates
with the open-source Metasploit Framework, giving you Uncover Weak and Reused Credentials
access to exploitation and reconnaissance modules to save Test your network for weak and reused passwords.
you effort and accelerate testing. Use attacker techniques Going beyond just cracking operating system accounts,
to evade antivirus, find weak credentials, and pivot Metasploit can run brute-force attacks against over 15
throughout the network. account types, including databases, web servers, and
remote administration solutions.
Utilize the World’s Largest Code-Reviewed
Exploit Database Prioritize What Matters Most
Leading the Metasploit Framework open-source project
gives Rapid7 unique insights into the attacker mindset, Finding your weak points is only half the battle. As a
current vectors, and methodologies. Rapid7 works with penetration tester, it is your job to perform thorough
the user community to regularly add new exploits every assessments and communicate how to reduce the risk of
week, currently amassing more than 2,300 exploits and a breach. Metasploit allows you to pinpoint the weak links
more than 3,300 modules and payloads. in the attack chain, then validate and prioritize vulnerabilities
seamlessly with InsightVM or Nexpose closed-loop
integration using Top Remediation Reports.
Simulate Real-World Attacks Against Your Defenses
Metasploit consistently evades leading antivirus solutions
and enables you to efficiently exfiltrate data from Pinpoint Weak Links in the Attack Chain
compromised machines with over 330 post-exploitation Attacks are more sophisticated today; the adversary is
modules. Once one machine is compromised, dig deeper using multiple, combined techniques to breach your systems
in your network with the Credential Domino MetaModule faster than ever. With Metasploit, you can simulate attacks
or easy-to-use VPN pivot, and find out how far an attacker from the perspective of the adversary and easily report the
can get. biggest security risks.

011819
2,300 3,300 “The
exploitation
modules
Rapid7 has worked with the user community to amass more than that are in
2,300 exploits and more than 3,300 modules and payloads.
Metasploit
Pro are great.
It saves me
Closed-Loop Integration with Rapid7 InsightVM and
from having to
Nexpose for Remediation
When other departments question the validity of scan results, document so
demonstrate that a vulnerability puts systems and data at risk. You’ll much by hand
get quick buy-in for remediation measures and build credibility with
stakeholders. The integration of Metasploit and InsightVM (or Nexpose) and saves
provides the only closed-loop validation solution from a single vendor that me a lot of
simplifies vulnerability prioritization and remediation reporting.
man-hours.”
Improve Your Outcomes
— Tim Lawrence, IT
Time is of the essence. As a penetration tester, you don’t have the luxury Security Analyst
to wait. Metasploit allows you to accelerate improvement by running
penetration tests at scale and completing compliance programs faster.
In addition, you can simulate phishing campaigns to harvest credentials,
deliver payloads, and improve security awareness.

Run Penetration Testing Programs at Scale


Conducting an assessment and managing data in networks with
Ready to Get Started?
over 100 hosts can be challenging with traditional command line tools.
Metasploit scales to support thousands of hosts per project on call +1.866.7.RAPID7
engagements involving multiple, simultaneous penetration testers.
email: [email protected]
Automate penetration testing steps with Task Chains, Resource Scripts,
and MetaModules to improve productivity.

Start a Free Trial:


Test and Infiltrate Users with Sophisticated Social Engineering www.rapid7.com/
Send and track emails to thousands of users with Metasploit Pro’s scalable metasploit-download
phishing campaigns. Clone web application login pages with one click to
harvest credentials, deliver payloads, and direct security awareness training
by measuring conversion rates at each step in the social engineering Training:
campaign funnel.
www.rapid7.com/pen-test-training

Complete Compliance Programs Faster


Generate reports to show your findings and sort them by regulations
such as PCI DSS and FISMA. Additionally, users can verify that
Support
compensating controls implemented to protect systems are operational call +1.866.380.8113
and effective. How can Metasploit adapt to your organization? Create
vulnerability exceptions based on hard evidence that will easily pass your
next audit. Even better, automatically record actions and findings from Customer Portal
your network and application-layer assessment to save valuable time
otherwise spent manually building reports.

©RAPID7 2018

You might also like