Definitions
Sorry, no definitions found. You may find more data at metasploit.
Etymologies
Sorry, no etymologies found.
Support

Help support Wordnik (and make this page ad-free) by adopting the word Metasploit.
Examples
-
But the largest collections currently available from Core Security Technologies, Immunity and an open source project known as Metasploit include exploits for less than 10% of the 14,000 security flaws publicly revealed in information technology systems over the last five years.
Digital Arms Dealer 2010
-
Security experts have developed an easy-to-use, automated software tool that can remotely break into over the Internet to simulate attacks on computer systems, but cybercrooks can use it for hacking. open-source software project known as Metasploit, which releases its free software over the Web.
-
"It's likely that many of these vulnerabilities will be weaponzied in a framework such as Metasploit," said Josh Abraham, a security researcher with Rapid7, the company that also manages the open-source Metasploit hacking toolkit.
CIO News 2010
-
Documented at BlackHat DC 2009, tools such as Metasploit, SSLsniff and SSLstrip expose a series of newly publicized vulnerabilities to SSL / TLS encryption, the most common method used for securing Internet applications, services and transactions.
unknown title 2009
-
The very next day, last Friday, Metasploit researcher HD Moore revealed how the new, unpatched IE security flaw could be exploited on IE7 and IE8, the latest versions of Microsoft's popular Web browser.
Microsoft to issue emergency patch for flaw used in Google attack 2010
-
But the largest collections currently available from Core Security Technologies, Immunity and an open-source project known as Metasploit include exploits for less than 10% of the 14,000 security flaws publicly revealed in information technology systems over the last five years.
NSS Labs' Nasdaq For Hackers Andy Greenberg 2010
-
Metasploit has freaking iPhone exploits in it, along with OS X, linux, and Windows exploits.
Kaboom « Whatever 2008
-
Especially a vendor as large as Symantec, said H.D. Moore, chief architect of Metasploit, a platform that security experts use to test whether computer systems are vulnerable to attack.
The Full Feed from HuffingtonPost.com Reuters 2012
-
A set of "Metasploit" modules for the GE D20ME, including a module that downloads and stores the complete configuration of the D20ME, including usernames and passwords in plain text using the Trivial File Transfer Protocol TFTP.
Ars Technica Sean Gallagher 2012
-
When a target is identified, the app offers up a simple menu with commands like "Man-In-The-Middle" to eavesdrop on local devices, or even "Attack"; The app is designed to run exploits collected in platforms like Metasploit or ExploitDB, using vulnerabilities in out-of-date software to compromise targets.
unknown title 2011
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.