Metasploit mailing list archives

Pen-Testing and Metasploit Question


From: chuksjonia at gmail.com (chuks Jonia)
Date: Mon, 20 Apr 2009 09:52:02 +0300

The most important thing is practice,  to understand how you can
pentest different platforms and networks. And also bypassing of IDSs
and IPS system. Maybe you have a good background in networking,
administration and development which adds an advantage, but this field
may need alot of work and patience to make it.

On Mon, Apr 20, 2009 at 2:11 AM, Professor 0110 <professor0110 at gmail.com> wrote:
Hi everyone,
I'm hoping to officially break into the Penetration Testing/Ethical
Hacking/Information Security sector within the next couple of years. I was
wondering if just having the Metasploit Framework for exploitation would be
enough in a Pen Testing situation - along with Port Scanners, Vulnerability
Scanners, and Back-Track of course. :)
The reason I ask is that Metasploit doesn't cover every single remote
exploit, and to compile an exploit off places such as Milw0rm can be time
consuming and inefficient in a Pen testing situation. Especially if the
source code is broken and needs tweaking/rewriting to compile properly.
Thanks. :)
Professor 0110
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework




-- 
-- 
Gichuki John Ndirangu,
I.T Security Analyst and Penetration Tester
infosigmer at inbox.com

{FORUM}http://lists.my.co.ke/pipermail/security/
http://nspkenya.blogspot.com/
http://chuksjonia.blogspot.com/
http://www.kamongo.co.ke/


Current thread: