Metasploit mailing list archives

Pen-Testing and Metasploit Question


From: chuksjonia at gmail.com (chuks Jonia)
Date: Mon, 20 Apr 2009 19:06:23 +0300

Telling people to use Core Impact is naive, since between Core and
Meta, Meta is much more better, especially when running it on Linux.
Those clicking stuffs of next and next will never help coz they will
give you what they have been programmed to, but not what they see.
Meta actually gives you the heads up to also try manual pentesting. Do
you think those guys that get paid millions to gain access to your
systems can easily be caught by ur IDSs?

On Mon, Apr 20, 2009 at 6:59 PM, rogue <wullie19 at ntlworld.com> wrote:
Hi there,

Good luck with that Its got to be one of the most high skilled under payed
jobs there is. There's a mailing list called security basics, its a high
volume list that's perfect for people just getting into it like yourself as it
covers all kind of info not just exploits. No offence but anybody can download
the framework exploit a VM and call themselves a pentester. sort of like
renting an office buying a stethoscope and calling your self a surgeon

-rogue.




Hi everyone,
I'm hoping to officially break into the Penetration Testing/Ethical
Hacking/Information Security sector within the next couple of years. I was
wondering if just having the Metasploit Framework for exploitation would be
enough in a Pen Testing situation - along with Port Scanners, Vulnerability
Scanners, and Back-Track of course. :)

The reason I ask is that Metasploit doesn't cover every single remote
exploit, and to compile an exploit off places such as Milw0rm can be time
consuming and inefficient in a Pen testing situation. Especially if the
source code is broken and needs tweaking/rewriting to compile properly.

Thanks. :)

Professor 0110

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework




-- 
-- 
Gichuki John Ndirangu,
I.T Security Analyst and Penetration Tester
infosigmer at inbox.com

{FORUM}http://lists.my.co.ke/pipermail/security/
http://nspkenya.blogspot.com/
http://chuksjonia.blogspot.com/
http://www.kamongo.co.ke/


Current thread: