From the course: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep

Unlock the full course today

Join today to access over 24,600 courses taught by industry experts.

Exploitation frameworks

Exploitation frameworks

- [Instructor] Security professionals need to be able to use the same tools available to attackers seeking to exploit security controls. An exploitation framework offers an efficient way to do that, and Metasploit is the most common exploitation framework. It's basically a hacker's Swiss Army Knife, providing an extensible way to test vulnerabilities using modular plugins. Unfortunately, Metasploit, like many security tools, can be used for good or for evil. The same flexibility that makes Metasploit an excellent security testing tool also makes it a powerful weapon for attackers. Metasploit began its life as an open-source project, but it was later purchased by the security firm Rapid7. Because of this heritage, there are now two versions of METAS Exploit available. The Metasploit Framework Edition remains free, while the Metasploit Pro Edition is a commercial product with some extra features. The Metasploit website contains a feature comparison chart to help you understand what…

Contents