<s>
The	B-Application
Metasploit	I-Application
Project	I-Application
is	O
a	O
computer	O
security	O
project	O
that	O
provides	O
information	O
about	O
security	O
vulnerabilities	O
and	O
aids	O
in	O
penetration	O
testing	O
and	O
IDS	O
signature	O
development	O
.	O
</s>
<s>
It	O
is	O
owned	O
by	O
Boston	O
,	O
Massachusetts-based	O
security	O
company	O
Rapid7	B-Application
.	O
</s>
<s>
Its	O
best-known	O
sub-project	O
is	O
the	O
open-source	B-Application
Metasploit	B-Application
Framework	I-Application
,	O
a	O
tool	O
for	O
developing	O
and	O
executing	O
exploit	O
code	O
against	O
a	O
remote	O
target	O
machine	O
.	O
</s>
<s>
Other	O
important	O
sub-projects	O
include	O
the	O
Opcode	B-Application
Database	I-Application
,	O
shellcode	O
archive	O
and	O
related	O
research	O
.	O
</s>
<s>
The	B-Application
Metasploit	I-Application
Project	I-Application
includes	O
anti-forensic	O
and	O
evasion	O
tools	O
,	O
some	O
of	O
which	O
are	O
built	O
into	O
the	O
Metasploit	B-Application
Framework	I-Application
.	O
</s>
<s>
Metasploit	B-Application
is	O
pre-installed	O
in	O
the	O
Kali	O
Linux	B-Application
operating	I-Application
system	I-Application
.	O
</s>
<s>
Metasploit	B-Application
was	O
created	O
by	O
H	O
.	O
D	O
.	O
Moore	O
in	O
2003	O
as	O
a	O
portable	O
network	O
tool	O
using	O
Perl	B-Language
.	O
</s>
<s>
By	O
2007	O
,	O
the	O
Metasploit	B-Application
Framework	I-Application
had	O
been	O
completely	O
rewritten	O
in	O
Ruby	B-Language
.	O
</s>
<s>
On	O
October	O
21	O
,	O
2009	O
,	O
the	B-Application
Metasploit	I-Application
Project	I-Application
announced	O
that	O
it	O
had	O
been	O
acquired	O
by	O
Rapid7	B-Application
,	O
a	O
security	O
company	O
that	O
provides	O
unified	O
vulnerability	O
management	O
solutions	O
.	O
</s>
<s>
Like	O
comparable	O
commercial	O
products	O
such	O
as	O
Immunity	O
's	O
Canvas	O
or	O
Core	O
Security	O
Technologies	O
 '	O
Core	O
Impact	O
,	O
Metasploit	B-Application
can	O
be	O
used	O
to	O
test	O
the	O
vulnerability	O
of	O
computer	O
systems	O
or	O
to	O
break	O
into	O
remote	O
systems	O
.	O
</s>
<s>
Like	O
many	O
information	O
security	O
tools	O
,	O
Metasploit	B-Application
can	O
be	O
used	O
for	O
both	O
legitimate	O
and	O
unauthorized	O
activities	O
.	O
</s>
<s>
Since	O
the	O
acquisition	O
of	O
the	O
Metasploit	B-Application
Framework	I-Application
,	O
Rapid7	B-Application
has	O
added	O
two	O
open	O
core	O
proprietary	O
editions	O
called	O
Metasploit	B-Application
Express	O
and	O
Metasploit	B-Application
Pro	O
.	O
</s>
<s>
Metasploit	B-Application
's	O
emerging	O
position	O
as	O
the	O
de	O
facto	O
exploit	O
development	O
framework	O
led	O
to	O
the	O
release	O
of	O
software	O
vulnerability	O
advisories	O
often	O
accompanied	O
by	O
a	O
third	O
party	O
Metasploit	B-Application
exploit	O
module	O
that	O
highlights	O
the	O
exploitability	O
,	O
risk	O
and	O
remediation	O
of	O
that	O
particular	O
bug	B-Error_Name
.	O
</s>
<s>
Metasploit	B-Application
3.0	O
began	O
to	O
include	O
fuzzing	O
tools	O
,	O
used	O
to	O
discover	O
software	O
vulnerabilities	O
,	O
rather	O
than	O
just	O
exploits	O
for	O
known	O
bugs	B-Error_Name
.	O
</s>
<s>
This	O
avenue	O
can	O
be	O
seen	O
with	O
the	O
integration	O
of	O
the	O
lorcon	B-Protocol
wireless	O
(	O
802.11	O
)	O
toolset	O
into	O
Metasploit	B-Application
3.0	O
in	O
November	O
2006	O
.	O
</s>
<s>
Choosing	O
and	O
configuring	O
an	O
exploit	O
(	O
code	O
that	O
enters	O
a	O
target	O
system	O
by	O
taking	O
advantage	O
of	O
one	O
of	O
its	O
bugs	B-Error_Name
;	O
about	O
900	O
different	O
exploits	O
for	O
Windows	B-Application
,	O
Unix/Linux	O
and	O
macOS	B-Application
systems	O
are	O
included	O
)	O
.	O
</s>
<s>
Choosing	O
and	O
configuring	O
a	O
payload	O
(	O
code	O
that	O
will	O
be	O
executed	O
on	O
the	O
target	O
system	O
upon	O
successful	O
entry	O
;	O
for	O
instance	O
,	O
a	O
remote	O
shell	O
or	O
a	O
VNC	B-Protocol
server	I-Protocol
)	O
.	O
</s>
<s>
Metasploit	B-Application
often	O
recommends	O
a	O
payload	O
that	O
should	O
work	O
.	O
</s>
<s>
Metasploit	B-Application
runs	O
on	O
Unix	B-Application
(	O
including	O
Linux	B-Application
and	O
macOS	B-Application
)	O
and	O
on	O
Windows	B-Application
.	O
</s>
<s>
The	O
Metasploit	B-Application
Framework	I-Application
can	O
be	O
extended	O
to	O
use	O
add-ons	O
in	O
multiple	O
languages	O
.	O
</s>
<s>
This	O
information	O
can	O
be	O
gleaned	O
with	O
port	O
scanning	O
and	O
TCP/IP	B-Protocol
stack	I-Protocol
fingerprinting	I-Protocol
tools	O
such	O
as	O
Nmap	B-Language
.	O
</s>
<s>
Vulnerability	O
scanners	O
such	O
as	O
Nessus	B-Protocol
,	O
and	O
OpenVAS	B-Protocol
can	O
detect	O
target	O
system	O
vulnerabilities	O
.	O
</s>
<s>
Metasploit	B-Application
can	O
import	O
vulnerability	O
scanner	O
data	O
and	O
compare	O
the	O
identified	O
vulnerabilities	O
to	O
existing	O
exploit	O
modules	O
for	O
accurate	O
exploitation	O
.	O
</s>
<s>
There	O
are	O
several	O
interfaces	O
for	O
Metasploit	B-Application
available	O
.	O
</s>
<s>
The	O
most	O
popular	O
are	O
maintained	O
by	O
Rapid7	B-Application
and	O
Strategic	O
Cyber	O
LLC	O
.	O
</s>
<s>
This	O
free	O
version	O
of	O
the	B-Application
Metasploit	I-Application
project	I-Application
also	O
includes	O
Zenmap	O
,	O
a	O
well	O
known	O
security	O
scanner	O
,	O
and	O
a	O
compiler	O
for	O
Ruby	B-Language
,	O
the	O
language	O
in	O
which	O
this	O
version	O
of	O
Metasploit	B-Application
was	O
written	O
.	O
</s>
<s>
In	O
October	O
2010	O
,	O
Rapid7	B-Application
added	O
Metasploit	B-Application
Pro	O
,	O
an	O
open-core	O
commercial	O
Metasploit	B-Application
edition	O
for	O
penetration	O
testers	O
.	O
</s>
<s>
Metasploit	B-Application
Pro	O
adds	O
onto	O
Metasploit	B-Application
Express	O
with	O
features	O
such	O
as	O
Quick	O
Start	O
Wizards/MetaModules	O
,	O
building	O
and	O
managing	O
social	O
engineering	O
campaigns	O
,	O
web	O
application	O
testing	O
,	O
an	O
advanced	O
Pro	O
Console	O
,	O
dynamic	O
payloads	O
for	O
anti-virus	O
evasion	O
,	O
integration	O
with	O
Nexpose	O
for	O
ad-hoc	O
vulnerability	O
scans	O
,	O
and	O
VPN	O
pivoting	O
.	O
</s>
<s>
The	O
edition	O
was	O
released	O
in	O
October	O
2011	O
,	O
and	O
included	O
a	O
free	O
,	O
web-based	O
user	O
interface	O
for	O
Metasploit	B-Application
.	O
</s>
<s>
Metasploit	B-Application
Community	O
Edition	O
was	O
based	O
on	O
the	O
commercial	O
functionality	O
of	O
the	O
paid-for	O
editions	O
with	O
a	O
reduced	O
set	O
of	O
features	O
,	O
including	O
network	O
discovery	O
,	O
module	O
browsing	O
and	O
manual	O
exploitation	O
.	O
</s>
<s>
Metasploit	B-Application
Community	O
was	O
included	O
in	O
the	O
main	O
installer	O
.	O
</s>
<s>
On	O
July	O
18	O
,	O
2019	O
,	O
Rapid7	B-Application
announced	O
the	O
end-of-sale	O
of	O
Metasploit	B-Application
Community	O
Edition	O
.	O
</s>
<s>
It	O
offers	O
a	O
graphical	O
user	O
interface	O
,	O
It	O
integrated	O
nmap	B-Language
for	O
discovery	O
,	O
and	O
added	O
smart	O
brute-forcing	O
as	O
well	O
as	O
automated	O
evidence	O
collection	O
.	O
</s>
<s>
On	O
June	O
4	O
,	O
2019	O
,	O
Rapid7	B-Application
discontinued	O
Metasploit	B-Application
Express	O
Edition	O
.	O
</s>
<s>
Armitage	B-Application
is	O
a	O
graphical	O
cyber	O
attack	O
management	O
tool	O
for	O
the	B-Application
Metasploit	I-Application
Project	I-Application
that	O
visualizes	O
targets	O
and	O
recommends	O
exploits	O
.	O
</s>
<s>
It	O
is	O
a	O
free	B-License
and	I-License
open	I-License
source	I-License
network	O
security	O
tool	O
notable	O
for	O
its	O
contributions	O
to	O
red	O
team	O
collaboration	O
allowing	O
for	O
shared	O
sessions	O
,	O
data	O
,	O
and	O
communication	O
through	O
a	O
single	O
Metasploit	B-Application
instance	O
.	O
</s>
<s>
Armitage	B-Application
latest	O
release	O
was	O
at	O
2015	O
.	O
</s>
<s>
Cobalt	O
Strike	O
is	O
a	O
collection	O
of	O
threat	O
emulation	O
tools	O
provided	O
by	O
HelpSystems	O
to	O
work	O
with	O
the	O
Metasploit	B-Application
Framework	I-Application
.	O
</s>
<s>
Cobalt	O
Strike	O
includes	O
all	O
features	O
of	O
Armitage	B-Application
and	O
adds	O
post-exploitation	O
tools	O
,	O
in	O
addition	O
to	O
report	O
generation	O
features	O
.	O
</s>
<s>
Metasploit	B-Application
currently	O
has	O
over	O
2074	O
exploits	O
,	O
organized	O
under	O
the	O
following	O
platforms	O
:	O
AIX	B-Application
,	O
Android	B-Application
,	O
BSD	B-Operating_System
,	O
BSDi	O
,	O
Cisco	O
,	O
Firefox	B-Application
,	O
FreeBSD	B-Operating_System
,	O
HP-UX	B-Application
,	O
Irix	B-Operating_System
,	O
Java	B-Language
,	O
JavaScript	B-Language
,	O
Linux	B-Application
,	O
mainframe	B-Architecture
,	O
multi	O
(	O
applicable	O
to	O
multiple	B-Operating_System
platforms	I-Operating_System
)	O
,	O
NetBSD	B-Device
,	O
NetWare	B-Operating_System
,	O
nodejs	B-Language
,	O
OpenBSD	B-Operating_System
,	O
macOS	B-Application
,	O
PHP	B-Application
,	O
Python	B-Language
,	O
R	B-Language
,	O
Ruby	B-Language
,	O
Solaris	B-Application
,	O
Unix	B-Application
,	O
and	O
Windows	B-Application
.	O
</s>
<s>
Metasploit	B-Application
currently	O
has	O
over	O
592	O
payloads	O
.	O
</s>
<s>
Meterpreter	O
(	O
the	O
Metasploit	B-Application
Interpreter	O
)	O
enables	O
users	O
to	O
control	O
the	O
screen	O
of	O
a	O
device	O
using	O
VNC	B-Protocol
and	O
to	O
browse	O
,	O
upload	O
and	O
download	O
files	O
.	O
</s>
<s>
The	O
Metasploit	B-Application
Framework	I-Application
includes	O
hundreds	O
of	O
auxiliary	O
modules	O
that	O
can	O
perform	O
scanning	O
,	O
fuzzing	O
,	O
sniffing	O
,	O
and	O
much	O
more	O
.	O
</s>
<s>
Metasploit	B-Application
Framework	I-Application
operates	O
as	O
an	O
open-source	B-Application
project	O
and	O
accepts	O
contributions	O
from	O
the	O
community	O
through	O
GitHub.com	B-Application
pull	O
requests	O
.	O
</s>
<s>
Submissions	O
are	O
reviewed	O
by	O
a	O
team	O
consisting	O
of	O
both	O
Rapid7	B-Application
employees	O
and	O
senior	O
external	O
contributors	O
.	O
</s>
