metasploit

资源

Below are some recommended resources on Metasploit.

Metasploit product brief

Metasploit Product Brief: Put Your Defenses to the Test

Knowing the adversary’s moves helps you better prepare your defenses. Metasploit, backed by a community of 200,000 users 和 contributors, gives you that insight. It’s the most impactful penetration testing solution on the planet. 用它, uncover weaknesses in your defenses, focus on the highest risks, 和 improve your security outcomes.

Download the product brief
What is penetration testing

 

What Is Penetration Testing? An Introduction for IT 经理s

A penetration test is often a key requirement for compliance with key regulations. But while many organizations know they need penetration testing, it can be hard to know how to fit them in to a larger security program, or even how to get started.

Our white paper, "What Is Penetration Testing? An Introduction for IT 经理s," is a clear 和 succinct introduction to the core principles 和 best practices of penetration testing.

Download the white paper
Wiltshire Council case study

Customer Story: Rapid7 Nexpose 和 Metasploit "Make Life Easier" at Wiltshire Council

As one of more than 5,000名员工, Steve’s role includes the management of Wiltshire residents’ personal information. 他说, “In my role I have a duty to protect this information as well as providing support, 维护, 和 strategic advice to more than 350 diverse services. It is vital therefore that the IT service provided is both efficient 和 effective.” Using Rapid7 Nexpose 和 Metasploit helps him deliver what’s needed.

What is penetration testing infographic

Infographic: What Is Penetration Testing?

New to the concept of penetration testing? Check out this simple infographic to learn why it's important, what's typically involved, 和 best practices to set yourself up for success.

Download the infographic
Combating Phishing Attacks

Combating Phishing Attacks

It seems like we’ve been hearing a lot about phishing in the news in recent years, 和 this threat hasn’t abated yet. Why are attacks via phishing –和 social engineering in general —so prevalent 和 so effective?  This white paper examines the many different methods employed in phishing attacks 和 social engineering campaigns, 和 offers a solution-based approach to mitigating risk from these attack vectors.

Download the white paper