Put Your Defenses to the Test
Rapid7’s penetration testing solution, Metasploit, increases penetration testers’ productivity, validates vulnerabilities, enables phishing and broader social engineering, and improves security awareness.
Automate Every Step of Your Penetration Test
- Conducting a thorough penetration test is time consuming for even the most experienced pentester. Metasploit makes it easy to automate all phases of a penetration test, from choosing the right exploits to streamlining evidence collection and reporting. Every hour you save is an hour you can spend digging deeper into your network.
Put Your People to the Test
- Real attackers know people are generally the weakest link in the security chain. Our penetration testing software creates sophisticated attacks to test user weaknesses, including cloning websites with the click of a button for phishing campaigns and masking malicious files for USB drop campaigns. Keep track of who falls for what to assess your user awareness—or to gain a foothold for a deeper attack.
Test with Success, Regardless of Experience
- Every organization is open to cyberattack, so every defender needs to be able to test their defenses. Metasploit Pro makes the powerful Metasploit Framework accessible to all with an easy-to-use interface, as well as wizards to get you launching and reporting on full pen tests in seconds.
Gather and Reuse Credentials
- Credentials are the keys to any network, and the biggest prize for a penetration tester. With our penetration testing software, you can catalog and track gathered creds for reporting and try them across every other system in the network with a simple credential domino wizard, ensuring you leave no stone unturned.
Become a Next-Level Pen Tester
- If you’ve already spent years becoming a Metasploit Framework expert, Metasploit Pro has a lot to offer: Maneuver through a network with ease with VPN pivoting and antivirus evasion capabilities, create instant reports on your progress and evidence, or, best of all, go down into the command line framework at any time and seamlessly use your custom scripts.
- 2 GHz+ processor
- 4 GB RAM available (8 GB recommended)
- 1 GB available disk space (50 GB recommended)
- 64-bit versions of the following platforms are supported.
- Ubuntu Linux 14.04 LTS (RECOMMENDED)
- Ubuntu Linux 16.04 LTS
- Microsoft Windows Server 2008 R2
- Microsoft Windows Server 2012 R2
- Microsoft Windows 10
- Microsoft Windows 8.1
- Microsoft Windows 7 SP1+
- Red Hat Enterprise Linux Server 7.1 or later
- Red Hat Enterprise Linux Server 6.5 or later
- Red Hat Enterprise Linux Server 5.10 or later
- Google Chrome (latest)
- Mozilla Firefox (latest)
- Microsoft Internet Explorer 11
This video is about Metasploit Technical Overview by E-SPIN that will give you more information regarding this product.
For those who can not join us for the session, please see the summary and highlight clip for the event.
E-SPIN recently run a Metasploit what’s new session cover what new for new user and existing users.
If you have any inquiry or questions, feel free to contact E-SPIN for solution, product and project requirements.