Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security IT

Metasploit Hacking Tool To Get Services-Based Model 29

ancientribe writes "Metasploit hacking tool creator HD Moore told Dark Reading that the open-source hacking tool soon will come with back-end services-based features aimed at offloading resource-intensive penetration testing tasks. This is a departure for the software-oriented Metasploit, and Moore and company just may be on to something: it turns out commercial penetration testing tool vendors are looking at adding services-based versions of their software. Immunity Inc. will do so this year, and Core Security Technologies is considering doing so as well."
This discussion has been archived. No new comments can be posted.

Metasploit Hacking Tool To Get Services-Based Model

Comments Filter:
  • Legal minefield (Score:4, Interesting)

    by Anonymous Coward on Monday February 09, 2009 @08:17PM (#26792851)

    Do they really expect professional penetration testers to use a third party to attack production networks? Most companies hardly have the guts to even hire a penetration tester. I doubt they'll be thrilled that the list of their vulnerabilities is shared with another company.

    • Do they really expect professional penetration testers to use a third party to attack production networks?

      That's what she said!

    • Who the hell would run a simulated attach on a production network, run it against the test environment, which should mirror production.
      • Re: (Score:2, Insightful)

        by Tekfactory ( 937086 )

        Its about belief, some folks won't trust the model to simulate the production environment. Even if you make the VM or Ghost image right off of the real hardware, and put it onto another machine of the same model with the same specs, someone in the chain of command or legal will want to know if you tested the real thing.

        And if it goes far enough, say after a data breach, leave it to a lawyer in court to ask if you on the stand, if tested the live system or some rigged demo designed to fool the auditors.

  • Coming off of the Kaspersky breach yesterday this hitting the news today seems like it should raise some eyebrows. If one well regarded security firm has trouble controlling customer data, does offloading actual penetration testing of your network to a remote system seem very bright. Especially if the penetration test reveals flaws that leave vulnerable information on the remote machines. I don't think its a strictly legal minefield so much as well, a minefield.
  • by timeOday ( 582209 ) on Monday February 09, 2009 @08:51PM (#26793109)
    In my day we just called them botnets.
  • Resource intensive? (Score:5, Interesting)

    by Bert64 ( 520050 ) <.moc.eeznerif.todhsals. .ta. .treb.> on Monday February 09, 2009 @10:33PM (#26793247) Homepage

    Maybe if they hadn't decided to rewrite metasploit in ruby it wouldn't be so resource intensive...
    The speed difference between 2.x and 3.x is absolutely insane. Calling the msfcli interface results in 10+ seconds of initialization before it even starts trying to exploit the target, when you have a script calling msfcli multiple times it soon gets tiring... And this is on a fairly modern dual core box. I used to run metasploit 2.x on a much slower single core box and it performed quite well.

    • by mindstrm ( 20013 )

      This really isn't an obstacle to a professional pen-tester - 10 seconds to fire up metasploit is not a problem.

      It's possible that without Ruby, we'd have a much faster, much less feature-rich framework.

    • Re: (Score:1, Insightful)

      by Anonymous Coward

      A few points:

      1. If you are scripting with msfcli, you are probably doing it wrong and should be writing plugins or resources scripts for msfconsole.

      2. The module count between 2 and 3 has more than doubled.

      3. Its only using one core no matter what, so core counts aren't relevant.

      I agree that 3.x is still pretty damned slow, but I disagree that its the languages's fault. The basic issue is a lack of "real" module caching, something we will try to tackle for 3.3. Thanks for the feedback!

    • Agreed. I've griped about Ruby with hdm(you can reach him on freenode, btw), but it's not my project. It does allow rapid development of new modules though, and is simple enough that you can patch together an exploit by copy and pasting bits of code from other modules and then throwing your shellcode in. In short, Metasploit's still the best framework we've got... although nmap's scripting engine is sorta sexy too.
      • by Bert64 ( 520050 )

        You could also rapidly develop new modules in the way you described in perl...
        Perl provided a good compromise between speed and ease of development, ruby however, and assembly at the opposite end of the spectrum, just sacrifice too much.
        Perl is also already installed and well supported on virtually everything...

        Ditching the perfectly working perl framework and rewrite it in what amounts to a "fashionable" language, while effectively rendering the whole thing useless on small devices (think wireless aps, net

As you will see, I told them, in no uncertain terms, to see Figure one. -- Dave "First Strike" Pare

Working...