19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 11-19:<br />

Metasploit<br />

Pro’s<br />

graphical<br />

interface<br />

provides<br />

broad security<br />

testing<br />

capabilities.<br />

Chapter 11: Windows<br />

Metasploit Pro provides you with the ability to import scanner findings (typically<br />

XML files) from third-party vulnerability scanners such as Acunetix Web<br />

Vulnerability Scanner, Nmap, and QualysGuard. Simply click the Analysis tab<br />

and select Import. After the scan data is imported, you can click Vulnerabilities<br />

(under Analysis) and see all the original vulnerability scanner findings. To<br />

exploit one of the vulnerabilities (it’ll have to be a supported exploit), simply<br />

click the finding under the Name column and you’ll be presented with a new<br />

page that allows you to exploit the flaw, as shown in Figure 11-20.<br />

Keep in mind that I’ve demonstrated only a fraction of what Metasploit can<br />

do. I highly recommend you download it and familiarize yourself with it.<br />

Numerous resources are available at www.metasploit.com/help. The<br />

power of Metasploit is unbelievable all by itself. Combine it with the exploit<br />

code that’s continually updated at Offensive Security’s Exploits Database<br />

(www.exploit-db.com), and you have practically everything you need if<br />

you choose to drill down to that level of exploitation.<br />

223

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!