Wireless exploits coming to Metasploit 3…



and the script kiddies rejoiced… It reads as though Metasploit 3 will make it easier than ever for script kiddies everywhere to take full advantage of the local wireless hotspots. Of course, metasploit has it’s good uses by people legitimately testing systems that they are responsible for, for vulnerabilities. But, it does make it very easy for the less skilled to pull off some exploits.

In many ways, the security software debate many times turns into something akin to the gun control debate…. “criminalize security penetration testing software and only criminals will have penetration testing software..” Which does make a certain amount of sense…. there are those that have no compunctions against doing illegal things and it can be a helpful thing for people that are motivated to protect themselves and others to have the tools to understand and see the effects of what the criminals would use whether they were legal or not.

I’ve made use of the Metasploit framework for testing my own machines (and as I recall for testing the WMF vulnerability last winter.) I am thankful to have access to the same kind of tools an attacker does because it opens my eyes to what they MIGHT be able to do and gives me a better chance to 1) avoid situations where you can be targetted and 2) be aware of possible signs of an attack and 3) mitigate the software vectors that can be used for the attacks.

Related Posts

Blog Traffic Exchange Related Posts
  • The biggest computer security vulnerability ever I talk quite a bit about computer viruses and computer security on this site. It's probably one of the bigger problems that I grapple with for my customers. Today I'm going to talk about the biggest computer security vulnerability there is. In fact, this is a general security vulnerability. It......
  • Network security - what does arp spoofing mean for wireless? So, if you haven't already had enough cause to tighten your wireless security.... we've been talking about arp poisoning (spoofing) and the basic conclusion is that IF an attacking machine is on the same subnet as your machine (same IP address range), they can "own" all traffic from you machine......
  • Australia to ask Google Maps to pull images over security concerns According to this article, Australia will ask Google to pull satellite photos of its only Nuclear plant. It's worth noting that several locations in the US Capital are either reduced resolution or blocked out with solid colors. Now that we live in an era of private satellite imagery are services......
Blog Traffic Exchange Related Websites
  • Metasploit Pro - Now Available - Free Trial & Webcast with HD Moore From a Rapid 7 email.  I love the Metasploit and I like what these guys have done with it too...  Wow Metasploit Pro Rapid7 is thrilled to announce the introduction of Metasploit Pro™, the new product for penetration testers who need an advanced tool to penetrate networks efficiently and from......
  • Is Your blog Content Stinky? What Makes Blog Content Stinky? Do you ever wonder what it takes to make your content readable? There are a million blogs out there much of the blog content you will find is dull and not at all interesting. But you will find among all the trashy blogs those few......
  • Metasploit Pro Webcast with HD Moore - Recording Now Available for On Demand Viewing Recently, Metasploit founder and Rapid7 CSO, HD Moore, conducted a live walk through of Metasploit Pro, the new commercial penetration testing tool based on the open source Metasploit Framework. Whether you attended that session and would like a repeat, or you weren't able to attend and would love to catch......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site