Saturday, 2019-02-16, 5:06 AM
Welcome Guest | RSS

Total online: 1
Guests: 1
Users: 0
Site menu
Our Documentations
Blog Category
# Only for beginners [39]
This category contains some introductions and tutorials about UBUNTU and BACKTRACK for those who just start using LINUX.
# Computer Security [11]
In this category, you will find all courses about the Informatique Security
# LINUX [2]
# BackTrack 5 Tutorials [6]
In this categorie, I will post all tutorials about BackTrack5 (Installation, Configuration, Update, Hacking...)
# TechnicDynamic Tutorials [12]
Technic Dynamic is a source of education focused in the following categories of technology: (Computer - Design - Gadgets - Networking - Security) Link :
# Vishnuvalentino Tutorials [2]
He is a computer security specialist, and also freelance website designer. Read more :
# Hackers News [6]
All news about the hackers of the world ...
# Tools [18]
All Security Tools
Entries archive

Follow us
Main » 2012 » March » 21 » #MetaSploit - I - Introduction
3:47 AM
#MetaSploit - I - Introduction
"If I had eight hours to chop down a tree, I’d spend the first six of them sharpening my axe.”

-Abraham Lincoln


This saying has followed me for many years, and is a constant reminder to me that approaching a problem with the right set of tools is imperative for success. So what does this semi philosophical opening have to do with the Metasploit Framework? Before approaching a penetration test or an audit, I take care to "sharpen my tools” and update anything updatable in BackTrack. This includes a short chain reaction, which always starts with a prompt "msfupdate” of the Metasploit framework.

I consider the MSF to be one of the single most useful auditing tools freely available to security professionals today. From a wide array of commercial grade exploits and an extensive exploit development environment, all the way to network information gathering tools and web vulnerability plugins. The Metasploit Framework provides a truly impressive work environment. The MSF is far more than just a collection of exploits, it's an infrastructure that you can build upon and utilize for your custom needs. This allows you to concentrate on your unique environment, and not have to reinvent the wheel.

This course has be written in a manner to encompass not just the front end "user" aspects of the framework, but rather give you an introduction to the capabilities that Metasploit provides. We aim to give you an in depth look into the many features of the MSF, and provide you with the skill and confidence to utilize this amazing tool to its utmost capabilities.

We will attempt to keep this course up to date with all new and exciting Metasploit features as they are added.

A degree of prerequisite knowledge is expected and required of students before the content provided in this course will be useful. If you find you are unfamiliar with a certain topic, we recommend you spend time engaging in self research on the problem before attempting the module. There is nothing more satisfying than solving problems yourself, so we we highly encourage you to Try Harder™

Source :

Category: # BackTrack 5 Tutorials | Views: 587 | Added by: Administrator | Tags: metasploit, INTRODUCTION | Rating: 0.0/0
Total comments: 0
Name *:
Email *:
Code *:

Share This On:
Google Translator
Login form
Our poll
Rate my site
Total of answers: 17
Clock & Calendar

«  March 2012  »