Metasploit mailing list archives
Re: Hello from Rapid7!
From: Rob Fuller <mubix () room362 com>
Date: Wed, 21 Oct 2009 13:26:31 -0400
As simply a community member, not formally attached to Metasploit in any way, I want to say welcome. In many ways, as you have stated, both sides are not at all new to the other, and this simply seems like a positive move for both parties. I am sure there are those in the community that are mad, or have complaints about such commercializing (as they see it) of a project, and rightfully so as time and time again the track record for deals like this leave the community high and dry. However, I believe the whole Metasploit Dev Team is so engrossed in the community / community aspect of the project, that by effect, the majority of the community has faith that the dev team wouldn't let anything happen, and in time I'm sure Rapid7 will be included in that trust. Where this is all going is that I wanted to say we appreciate your email, and look forward to the Metasploit Framework only getting better. -- Rob Fuller | Mubix Room362.com | Hak5.org | TheAcademyPro.com On Wed, Oct 21, 2009 at 12:13 PM, Mike Tuchen <Mike.Tuchen () rapid7 com>wrote:
Metasploit community, Since joining Rapid7, I’ve learned about some of the key principles of network security: defense in depth, continuously identifying and fixing your vulnerabilities, and continuously improving security through investments in people, process, and technology. Rapid7 has always believed that vulnerability management software should be augmented with penetration testing by experts. Guys like ‘jabra’ and ‘jcran’ on our pen test team or ‘bevand’ on our vuln team have used Metasploit for a long time to enable our customers find holes in their infrastructure. When the opportunity to meet HD came up some months ago, I jumped at the chance and it became obvious that there was a lot more we could do together by combining our resources. Nine years at Microsoft made me a big fan of open source. I'm kidding but only a little. Sitting on the other side of the room and watching the community at work left me with a huge respect for the power of an active and vibrant community like Metasploit. I’m looking forward to working with you to continue to develop Metasploit. We’re thrilled that Egypt and HD will be joining Rapid7 to work full-time on the open-source Metasploit Framework code. We see a couple of low hanging fruit opportunities to improve both products: we’ll leverage exploit data from Metasploit to expand the risk analysis capabilities of Rapid7's NeXpose TM product and will contribute vulnerability data from the NeXpose product to expand the accuracy and reliability of the Metasploit Framework. We’re also looking at ways to integrate NeXpose and Metasploit more tightly to provide new features to NeXpose users and exploit automation to Metasploit users, and we’d love to get your ideas there. If you have any questions or suggestions, feel free to post them on the Metasploit list, or email HD or me directly. I can't promise that I will respond to every email directly, but I do want to hear what you have to say, and I will commit to doing everything we can to grow the Metasploit community. Mike Tuchen President & CEO [image: R7_Logo_noTag.jpg] 545 Boylston Street 4th Floor Boston, MA 02116 *Direct*: *Fax*: *E-mail*: +1 (857) 288-7355 +1 (617) 249-0684* *mike.tuchen () rapid7 com *Rapid7 Ranked #1 Fastest Growing Vulnerability Management Company in the US by Inc. Magazine* _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Hello from Rapid7! Mike Tuchen (Oct 21)
- Re: Hello from Rapid7! Rob Fuller (Oct 21)
- Re: Hello from Rapid7! kuza55 (Oct 21)
- Re: Hello from Rapid7! Ricardo F. Teixeira (Oct 21)
- Re: Hello from Rapid7! kuza55 (Oct 21)
- Re: Hello from Rapid7! egypt (Oct 21)