Metasploit mailing list archives

Re: Hello from Rapid7!


From: "Ricardo F. Teixeira" <ricardo.teixas () gmail com>
Date: Thu, 22 Oct 2009 00:42:07 +0100

From the README file under Metasploit folder:

The Metasploit Framework is provided under the 3-clause BSD license above.


The copyright on this package is held by Rapid7 LLC.


This license does not apply to the following components:

 - The OpenSSL library embedded into the Meterpreter payload binaries and
the

   corresponding header files in the source tree

 - The Packet Sniffer SDK (MicroOLAP) library embedded into the Meterpreter

   Sniffer extension. HD Moore has a single-seat developer license.

 - The vncdll.dll binary and its associated source code (modified RealVNC)

 - The icons used by msfweb that were not created by Metasploit

 - The BinData library located under lib/bindata

 - The Bit-Struct library located under lib/bit-struct

 - The Byakugan plugin located under external/source/byakugan

 - The Metasm library located under lib/metasm

 - The Ole::Storage library located under lib/ole

 - The PacketFu library located under lib/packetfu

 - The PcapRub library located under external/pcaprub

 - The Rabal library located under lib/rabal

 - The Racket library located under lib/racket

 - The Ruby-Lorcon library located under external/ruby-lorcon

 - The SNMP library located under lib/snmp

 - The Zip library located under lib/zip


-- 
Ricardo F. Teixeira

uid:  0x5BBD1456

On Thu, Oct 22, 2009 at 12:34 AM, kuza55 <kuza55 () gmail com> wrote:

I know you said that Metasploit will remain open source, but will the
Metasploit project remain BSD-licensed, or is there a license change
planned?

 - kuza55

2009/10/22 Mike Tuchen <Mike.Tuchen () rapid7 com>

Metasploit community,



Since joining Rapid7, I’ve learned about some of the key principles of
network security: defense in depth, continuously identifying and fixing your
vulnerabilities, and continuously improving security through investments in
people, process, and technology. Rapid7 has always believed that
vulnerability management software should be augmented with penetration
testing by experts.  Guys like ‘jabra’ and ‘jcran’ on our pen test team or
‘bevand’ on our vuln team have used Metasploit for a long time to enable our
customers find holes in their infrastructure. When the opportunity to meet
HD came up some months ago, I jumped at the chance and it became obvious
that there was a lot more we could do together by combining our resources.



Nine years at Microsoft made me a big fan of open source. I'm kidding but
only a little. Sitting on the other side of the room and watching the
community at work left me with a huge respect for the power of an active and
vibrant community like Metasploit.  I’m looking forward to working with you
to continue to develop Metasploit.



We’re thrilled that Egypt and HD will be joining Rapid7 to work full-time
on the open-source Metasploit Framework code. We see a couple of low hanging
fruit opportunities to improve both products: we’ll leverage exploit data
from Metasploit to expand the risk analysis capabilities of Rapid7's
NeXposeTM product and will contribute vulnerability data from the NeXpose
product to expand the accuracy and reliability of the Metasploit Framework.
We’re also looking at ways to integrate NeXpose and Metasploit more tightly
to provide new features to NeXpose users and exploit automation to
Metasploit users, and we’d love to get your ideas there.



If you have any questions or suggestions, feel free to post them on the
Metasploit list, or email HD or me directly. I can't promise that I will
respond to every email directly, but I do want to hear what you have to say,
and I will commit to doing everything we can to grow the Metasploit
community.



Mike Tuchen

President & CEO

545 Boylston Street
4th Floor
Boston, MA 02116



Direct:
Fax:
E-mail:



+1 (857) 288-7355
+1 (617) 249-0684
mike.tuchen () rapid7 com

Rapid7 Ranked #1 Fastest Growing Vulnerability Management Company in the
US by Inc. Magazine





_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: