Wireless exploits coming to Metasploit 3…



and the script kiddies rejoiced… It reads as though Metasploit 3 will make it easier than ever for script kiddies everywhere to take full advantage of the local wireless hotspots. Of course, metasploit has it’s good uses by people legitimately testing systems that they are responsible for, for vulnerabilities. But, it does make it very easy for the less skilled to pull off some exploits.

In many ways, the security software debate many times turns into something akin to the gun control debate…. “criminalize security penetration testing software and only criminals will have penetration testing software..” Which does make a certain amount of sense…. there are those that have no compunctions against doing illegal things and it can be a helpful thing for people that are motivated to protect themselves and others to have the tools to understand and see the effects of what the criminals would use whether they were legal or not.

I’ve made use of the Metasploit framework for testing my own machines (and as I recall for testing the WMF vulnerability last winter.) I am thankful to have access to the same kind of tools an attacker does because it opens my eyes to what they MIGHT be able to do and gives me a better chance to 1) avoid situations where you can be targetted and 2) be aware of possible signs of an attack and 3) mitigate the software vectors that can be used for the attacks.

Related Posts

Blog Traffic Exchange Related Posts
  • Australia to ask Google Maps to pull images over security concerns According to this article, Australia will ask Google to pull satellite photos of its only Nuclear plant. It's worth noting that several locations in the US Capital are either reduced resolution or blocked out with solid colors. Now that we live in an era of private satellite imagery are services......
  • The biggest computer security vulnerability ever I talk quite a bit about computer viruses and computer security on this site. It's probably one of the bigger problems that I grapple with for my customers. Today I'm going to talk about the biggest computer security vulnerability there is. In fact, this is a general security vulnerability. It......
  • Version 2 of the WMF exploit vs Windows 98 SE Ok, I wasn't quite satisfied with the results of the tests against the first version of the WMF (Windows Metafile) zero day exploit that's now up to 4 or 5 days or so... Windows 98 is listed as being vulnerable, but there are no patches or workarounds currently available for......
Blog Traffic Exchange Related Websites
  • How Soon we Forget - Gas Prices Drop [/caption] There is an interesting debate going on Blueprint to Financial Prosperity, when he highlighted the "hack" that one could trigger Costco's "member prices" when you use an amex card (full post and ensuing debate HERE). For various reasons, I am not going to get into the moral debate whether......
  • Should You Neuter Your Dog? [/caption]It's one of the most crucial questions a new dog owner will face: whether or not to neuter their dog. If you barely have any knowledge of animal behavior and simply like to "go with the flow," you might do well to educate yourself on this important pet-related issue. Many......
  • Is Social Security a Ponzi Scheme? (Part 2: An Explanation of Social Security Works) The following is a continuation of the Is Social Security a Ponzi Scheme? (Part 1). That article dealt with the history of Charles Ponzi and the original Ponzi scheme. In this article we'll cover the Social Security system in general. Social Security also works best as a pyramid There is......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site