The Hacker News Logo
Subscribe to Newsletter

Metasploit Pro 4.0 released - Enterprise Integration, Cloud Deployment & Automation

Metasploit Pro 4.0 released - Enterprise Integration, Cloud Deployment & Automation

Rapid7 launched Metasploit Pro 4.0, a penetration testing solution that provides security professionals with a better view of their threat landscape by integrating with more than a dozen vulnerability management and Web application scanners, and by providing data to security information and event management (SIEM) systems through a documented interface.

This enables defenders to identify vulnerabilities that could lead to a data breach and prioritize their remediation more effectively. Security teams increase their productivity by spending less time fixing unimportant vulnerabilities and have an effective way to verify that remediation was successful.

The new capabilities in Metasploit Pro 4.0 now enable defenders to:

Integrate security risk intelligence

  • Integrate Metasploit Pro with your security information and event management (SIEM) system to improve your dashboard information
  • Import scan results from more than a dozen third-party Web application scanners and vulnerability assessment tools to prioritize vulnerabilities and eliminate false positives
  • Increase productivity in your security team by integrating Metasploit Pro with NeXpose vulnerability management solutions to directly access vulnerabilities that need to be verified
  • Automate verification of vulnerabilities and reporting through new programming interface and XML results
  • Document compliance with FISMA reports that map findings to controls and requirements.
Deploy in a way that works for you
  • Install on Windows, Ubuntu, or Red Hat Enterprise Linux
  • Provision a VMware image to your data centers with VMware vSphere
  • Host an Amazon Machine Image (AMI) in Amazon Elastic Compute Cloud (Amazon EC2).
Automate penetration testing steps
  • Automatically gather evidence with customizable post-exploitation macros
  • Re-establish dropped shells with persistent sessions and listeners
  • Replay previously successful attacks to verify remediation
  • Easily crack encrypted passwords offline
  • Remotely control Metasploit Pro through a programming Interface (RPC API)
  • Pull penetration testing reports from Metasploit Pro in an XML format.

Have something to say about this article? Comment below or share it with us on Facebook, Twitter or our LinkedIn Group.
SHARE
Comments
Latest Stories
Best Deals

Newsletter — Subscribe for Free

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.