Metasploit mailing list archives
Re: Hello from Rapid7!
From: "Ricardo F. Teixeira" <ricardo.teixas () gmail com>
Date: Thu, 22 Oct 2009 00:42:07 +0100
From the README file under Metasploit folder:
The Metasploit Framework is provided under the 3-clause BSD license above.
The copyright on this package is held by Rapid7 LLC.
This license does not apply to the following components:
- The OpenSSL library embedded into the Meterpreter payload binaries and
the
corresponding header files in the source tree - The Packet Sniffer SDK (MicroOLAP) library embedded into the Meterpreter Sniffer extension. HD Moore has a single-seat developer license. - The vncdll.dll binary and its associated source code (modified RealVNC) - The icons used by msfweb that were not created by Metasploit - The BinData library located under lib/bindata - The Bit-Struct library located under lib/bit-struct - The Byakugan plugin located under external/source/byakugan - The Metasm library located under lib/metasm - The Ole::Storage library located under lib/ole - The PacketFu library located under lib/packetfu - The PcapRub library located under external/pcaprub - The Rabal library located under lib/rabal - The Racket library located under lib/racket - The Ruby-Lorcon library located under external/ruby-lorcon - The SNMP library located under lib/snmp - The Zip library located under lib/zip -- Ricardo F. Teixeira uid: 0x5BBD1456 On Thu, Oct 22, 2009 at 12:34 AM, kuza55 <kuza55 () gmail com> wrote:
I know you said that Metasploit will remain open source, but will the Metasploit project remain BSD-licensed, or is there a license change planned? - kuza55 2009/10/22 Mike Tuchen <Mike.Tuchen () rapid7 com>Metasploit community, Since joining Rapid7, I’ve learned about some of the key principles ofnetwork security: defense in depth, continuously identifying and fixing your vulnerabilities, and continuously improving security through investments in people, process, and technology. Rapid7 has always believed that vulnerability management software should be augmented with penetration testing by experts. Guys like ‘jabra’ and ‘jcran’ on our pen test team or ‘bevand’ on our vuln team have used Metasploit for a long time to enable our customers find holes in their infrastructure. When the opportunity to meet HD came up some months ago, I jumped at the chance and it became obvious that there was a lot more we could do together by combining our resources.Nine years at Microsoft made me a big fan of open source. I'm kidding butonly a little. Sitting on the other side of the room and watching the community at work left me with a huge respect for the power of an active and vibrant community like Metasploit. I’m looking forward to working with you to continue to develop Metasploit.We’re thrilled that Egypt and HD will be joining Rapid7 to work full-timeon the open-source Metasploit Framework code. We see a couple of low hanging fruit opportunities to improve both products: we’ll leverage exploit data from Metasploit to expand the risk analysis capabilities of Rapid7's NeXposeTM product and will contribute vulnerability data from the NeXpose product to expand the accuracy and reliability of the Metasploit Framework. We’re also looking at ways to integrate NeXpose and Metasploit more tightly to provide new features to NeXpose users and exploit automation to Metasploit users, and we’d love to get your ideas there.If you have any questions or suggestions, feel free to post them on theMetasploit list, or email HD or me directly. I can't promise that I will respond to every email directly, but I do want to hear what you have to say, and I will commit to doing everything we can to grow the Metasploit community.Mike Tuchen President & CEO 545 Boylston Street 4th Floor Boston, MA 02116 Direct: Fax: E-mail: +1 (857) 288-7355 +1 (617) 249-0684 mike.tuchen () rapid7 com Rapid7 Ranked #1 Fastest Growing Vulnerability Management Company in theUS by Inc. Magazine_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Hello from Rapid7! Mike Tuchen (Oct 21)
- Re: Hello from Rapid7! Rob Fuller (Oct 21)
- Re: Hello from Rapid7! kuza55 (Oct 21)
- Re: Hello from Rapid7! Ricardo F. Teixeira (Oct 21)
- Re: Hello from Rapid7! kuza55 (Oct 21)
- Re: Hello from Rapid7! egypt (Oct 21)