- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 163字
- 2021-06-30 19:16:02
Metasploit
This is a legendary framework made up of a number of tools that are used for scanning and exploiting networks. Due to the far-reaching capabilities of this tool, most white hat trainers use it to pass knowledge to their students. It is also a penetration tester that is the software of choice in a number of organizations. So far, the framework has over 1,500 exploits that can be used against browsers, Android, Microsoft, Linux and Solaris operating systems, and varied other exploits applicable to any platform. The tool deploys its payloads using a command shell, the meterpreter, or dynamic payloads.
The advantage of Metasploit is that it has mechanisms that detect and evade security programs that can be present inside a network. The framework has several commands that can be used to sniff information from networks. It also has complementary tools that can be used for exploitation after information about vulnerabilities in a network has been collected.
Following are screenshots of Metasploit:


- BPEL and Java Cookbook
- 曝光:Linux企業運維實戰
- VMware Horizon View 6 Desktop Virtualization Cookbook
- Windows Vista融會貫通
- Moodle 3.x Teaching Techniques(Third Edition)
- 嵌入式系統及其應用(第三版)
- AWS Development Essentials
- NetDevOps入門與實踐
- RHCSARHCE 紅帽Linux認證學習指南(第7版)EX200 & EX300
- Windows 8實戰從入門到精通(超值版)
- Learn CUDA Programming
- 統信UOS應用開發進階教程
- OpenHarmony開發與實踐:基于紅莓RK2206開發板
- Learn Quantum Computing with Python and IBM Quantum Experience
- 計算機操作系統(第3版)(微課版)