Metasploit Pro 4.0 |
Metasploit Pro 4.0 Released | Rapid7 meluncurkan Metasploit Pro 4.0, pengujian penetrasi solusi yang menyediakan keamanan profesional dengan tampilan yang lebih baik landscape ancaman mereka dengan mengintegrasikan dengan lebih dari selusin manajemen kerentanan dan scanner aplikasi Web, dan dengan menyediakan data untuk security information and event management (SIEM) melalui antarmuka didokumentasikan.
Hal ini memungkinkan para pembela HAM untuk mengidentifikasi kerentanan yang dapat menyebabkan pelanggaran data dan memprioritaskan perbaikan mereka lebih efektif. Tim keamanan meningkatkan produktivitas mereka dengan menghabiskan lebih sedikit waktu untuk memperbaiki kerentanan penting dan memiliki cara yang efektif untuk memastikan bahwa perbaikan berhasil.
Kemampuan baru di Metasploit Pro 4.0 sekarang memungkinkan para defenders untuk:
Integrate security risk intelligence
- Integrate Metasploit Pro with your security information and event management (SIEM) system to improve your dashboard information
- Import scan results from more than a dozen third-party Web application scanners and vulnerability assessment tools to prioritize vulnerabilities and eliminate false positives
- Increase productivity in your security team by integrating Metasploit Pro with NeXpose vulnerability management solutions to directly access vulnerabilities that need to be verified
- Automate verification of vulnerabilities and reporting through new programming interface and XML results
- Document compliance with FISMA reports that map findings to controls and requirements.
Deploy in a way that works for you
- Install on Windows, Ubuntu, or Red Hat Enterprise Linux
- Provision a VMware image to your data centers with VMware vSphere
- Host an Amazon Machine Image (AMI) in Amazon Elastic Compute Cloud (Amazon EC2).
Automate penetration testing steps
- Automatically gather evidence with customizable post-exploitation macros
- Re-establish dropped shells with persistent sessions and listeners
- Replay previously successful attacks to verify remediation
- Easily crack encrypted passwords offline
- Remotely control Metasploit Pro through a programming Interface (RPC API)
- Pull penetration testing reports from Metasploit Pro in an XML format.
via | THN
thanks for your comment...!
visit my blog back for more informatin about IT and Security EmoticonEmoticon