Lucene search

thnThe Hacker NewsTHN:B2716F4C8EE59105D421C342BBFFB8BF
HistoryJul 27, 2011 - 11:14 a.m.

Metasploit Pro 4.0 released - Enterprise Integration, Cloud Deployment & Automation

The Hacker News

Metasploit Pro 4.0 released - Enterprise Integration, Cloud Deployment & Automation

The Hacker News

Rapid7 launched Metasploit Pro 4.0, a penetration testing solution that provides security professionals with a better view of their threat landscape by integrating with more than a dozen vulnerability management and Web application scanners, and by providing data to security information and event management (SIEM) systems through a documented interface.

This enables defenders to identify vulnerabilities that could lead to a data breach and prioritize their remediation more effectively. Security teams increase their productivity by spending less time fixing unimportant vulnerabilities and have an effective way to verify that remediation was successful.

The new capabilities in Metasploit Pro 4.0 now enable defenders to:

Integrate security risk intelligence

  • Integrate Metasploit Pro with your security information and event management (SIEM) system to improve your dashboard information

  • Import scan results from more than a dozen third-party Web application scanners and vulnerability assessment tools to prioritize vulnerabilities and eliminate false positives

  • Increase productivity in your security team by integrating Metasploit Pro with NeXpose vulnerability management solutions to directly access vulnerabilities that need to be verified

  • Automate verification of vulnerabilities and reporting through new programming interface and XML results

  • Document compliance with FISMA reports that map findings to controls and requirements.
    Deploy in a way that works for you

  • Install on Windows, Ubuntu, or Red Hat Enterprise Linux

  • Provision a VMware image to your data centers with VMware vSphere

  • Host an Amazon Machine Image (AMI) in Amazon Elastic Compute Cloud (Amazon EC2).
    Automate penetration testing steps

  • Automatically gather evidence with customizable post-exploitation macros

  • Re-establish dropped shells with persistent sessions and listeners

  • Replay previously successful attacks to verify remediation

  • Easily crack encrypted passwords offline

  • Remotely control Metasploit Pro through a programming Interface (RPC API)

  • Pull penetration testing reports from Metasploit Pro in an XML format.