Metasploit mailing list archives
Pen-Testing and Metasploit Question
From: professor0110 at gmail.com (Professor 0110)
Date: Mon, 20 Apr 2009 09:11:37 +1000
Hi everyone, I'm hoping to officially break into the Penetration Testing/Ethical Hacking/Information Security sector within the next couple of years. I was wondering if just having the Metasploit Framework for exploitation would be enough in a Pen Testing situation - along with Port Scanners, Vulnerability Scanners, and Back-Track of course. :) The reason I ask is that Metasploit doesn't cover every single remote exploit, and to compile an exploit off places such as Milw0rm can be time consuming and inefficient in a Pen testing situation. Especially if the source code is broken and needs tweaking/rewriting to compile properly. Thanks. :) Professor 0110 -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090420/a509415a/attachment.htm>
Current thread:
- Pen-Testing and Metasploit Question Professor 0110 (Apr 19)
- Pen-Testing and Metasploit Question chuks Jonia (Apr 19)
- Pen-Testing and Metasploit Question max (Apr 21)
- Pen-Testing and Metasploit Question Ronald L. Rosson Jr. (Apr 21)
- Pen-Testing and Metasploit Question max (Apr 21)
- Pen-Testing and Metasploit Question rogue (Apr 20)
- Pen-Testing and Metasploit Question chuks Jonia (Apr 20)
- Message not available
- Pen-Testing and Metasploit Question Professor 0110 (Apr 21)
- Pen-Testing and Metasploit Question MaXe (Apr 22)
- Pen-Testing and Metasploit Question Professor 0110 (Apr 21)
- Pen-Testing and Metasploit Question chuks Jonia (Apr 19)
- Pen-Testing and Metasploit Question Simon Taplin (Apr 22)
- Pen-Testing and Metasploit Question pandini pandini (Apr 23)
- Pen-Testing and Metasploit Question Kevin Beaver (Apr 23)
- Pen-Testing and Metasploit Question pandini pandini (Apr 23)