First, let's look at the process of running Metasploit.
首先,让我们看看运行Metasploit的过程。
As of this writing, the stable version of Metasploit is version 3.1.
本文撰写之时,Metasploit的稳定版本是Version 3.1。
To use Metasploit to run an exploit, perform the following steps.
要使用Metasploit运行一个攻击,执行以下步骤。
So, what's the purpose of vulnerability scanning, and how does Metasploit fit in?
那么,漏洞扫描的目的是什么? Metasploit如何进行漏洞扫描?
From the command line, type the following command to launch the Metasploit console.
从命令行输入以下命令启动Metasploit控制台。
Currently, Metasploit contains more than 400 exploits for most of the modern operating systems.
当前,Metasploit包含400个攻击,针对大多数现代操作系统。
This section provides an overview of what the Metasploit Framework does for users trying to discover vulnerabilities.
这个部分简要介绍 Metasploit Framework对于试图发现漏洞的用户有什么用。
Currently, Metasploit runs on most of the Nix-based systems as well as on some of the other common operating systems in use.
当前,Metasploit在大多数基于Nix的系统上运行,也用于一些常用操作系统。
Metasploit goes a step beyond regular vulnerability scanners: it provides you the ability to develop your own exploits and delivery mechanisms.
Metasploit比常规漏洞扫描器更进一步:它支持您研究自己的攻击和交付机制。
Although using Metasploit to perform your own vulnerability scanning is outside the scope of this article, many tutorials and books are available to help (see Resources).
使用Metasploit进行漏洞扫描超出了本文的范围,您可以阅读多种教程和书籍获得帮助(参见参考资料)。
The idea is that where other scanning methods rely on known problems, Metasploit allows you to develop your own with the intention of allowing more flexibility in scanning as well as research.
尽管其他扫描方法依赖已知的问题,但Metasploit允许研究自己的问题,从而提高扫描和研究的灵活性。
The idea is that where other scanning methods rely on known problems, Metasploit allows you to develop your own with the intention of allowing more flexibility in scanning as well as research.
尽管其他扫描方法依赖已知的问题,但Metasploit允许研究自己的问题,从而提高扫描和研究的灵活性。
应用推荐