What is Metasploit Project - Metasploit Framework? - Definition from WhatIs.com

Definition

Metasploit Project - Metasploit Framework

Part of the Security management glossary:

The Metasploit Project is an open source project that provides a public resource for researching security vulnerabilities and developing code that allows a network administrator to break into his own network to identify security risks and document which vulnerabilities need to be addressed first.

The Metasploit Project offers penetration (pen) testing software and provides tools for automating the comparison of a program's vulnerability and its repaired (patched) version.  Anti-forensic and advanced evasion tools are also offered, some of them built into the Metasploit Framework.

Metasploit Framework, the Metasploit Project's best-known creation, is a software platform for developing, testing, and executing exploits. It can be used to create security testing tools and exploit modules and also as a penetration testing system. It was originally created as a portable network tool in 2003 by HD Moore.

The Metasploit Project also offers Metasploit Express, Metasploit Pro, the Opcode Database (currently out of date) and a shellcode database.  Shellcode is a type of exploit code in which bytecode is inserted to accomplish a particular objective. Common shellcode objectives include adding a rootkit or performing a reverse telnet back to the attacker's machine. Metasploit also offers a payload database, allowing the pen tester to mix and match exploit code and objectives. 

In 2009, the Metasploit Project was acquired by computer security company Rapid7. Metasploit Express and Metasploit Pro are "open core" versions of the Metasploit Framework, with more features added. (Open core is an approach to delivering products that combine open source and proprietary software.) Rapid7 continues to develop Metasploit in collaboration with the open source commmunity.

This was last updated in August 2011
Posted by: Margaret Rouse

Related Terms

Definitions

  • physical security

    - Physical security is the protection of people and systems from damage or loss due to physical events such as fire, flood, disasters, crimes or accidents. (SearchSecurity.com)

  • buffer overflow

    - A buffer overflow occurs when a program attempts to write more data to a fixed length block of memory, or buffer, than the buffer is allocated to hold. Buffer overflow exploits may enable remote ex... (SearchSecurity.com)

  • Code of Connection (CoCo)

    - In the U.K., the Code of Connection (CoCo) is a mandatory set of requirements that must be demonstrated before local authorities in England and Wales can connect to the Government Secure Intranet (... (WhatIs.com)

Glossaries

  • Security management

    - Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorizati...

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About Metasploit Project - Metasploit FrameworkPowered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.