Metasploit vSploit Modules

Video thumbnail (Frame 0) Video thumbnail (Frame 3854) Video thumbnail (Frame 5945) Video thumbnail (Frame 7314) Video thumbnail (Frame 9241) Video thumbnail (Frame 10160) Video thumbnail (Frame 13709) Video thumbnail (Frame 15142) Video thumbnail (Frame 16393) Video thumbnail (Frame 19685) Video thumbnail (Frame 21081) Video thumbnail (Frame 23232) Video thumbnail (Frame 25304) Video thumbnail (Frame 26522) Video thumbnail (Frame 27531) Video thumbnail (Frame 28756) Video thumbnail (Frame 30956) Video thumbnail (Frame 39248) Video thumbnail (Frame 47186) Video thumbnail (Frame 52575) Video thumbnail (Frame 53414) Video thumbnail (Frame 58430) Video thumbnail (Frame 60729)
Video in TIB AV-Portal: Metasploit vSploit Modules

Formal Metadata

Metasploit vSploit Modules
Title of Series
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Release Date

Content Metadata

Subject Area
This talk is for security practitioners who are responsible for and need to test enterprise network security solutions. Marcus Carey, David Rude, and Will Vandevanter discuss how to use the Metasploit Framework beyond penetration testing to validate whether security solutions are working as expected. Marcus initiated the creation vSploit auxiliary modules that emulate real-world network attacks. This can be used for good and evil purpose. This talk will debut several Metasploit modules designed specifically for testing firewalls, IDS, IPS, and DLP solutions. This presentation will show how to emulate persistent network attacks with vSploit modules which can come in handy if you are a penetration tester. Marcus J. Carey is the Enterprise Security Community Manager at Rapid7. Marcus has over 17 years experience in information assurance experience working in the DoD as well as Federal and State Government organizations. Marcus holds a M.S. in Network Security From Capitol College as well as several security related certifications. David Rude is a Metasploit Exploit Developer at Rapid7. David writes code that executes code. David has worked for years as a professional security researcher. He has a fascination with finding and exploiting vulnerabilities. At Rapid7, David currently works as a developer who writes exploits and codes awesomeness for Metasploit Framework, Metasploit Express, and Metasploit Pro. Will Vandevanter is a senior penetration tester at Rapid7. His focus interests include web application security, DoS attacks, and secure code. He has a Masters degree in Computer Science (focus in Secure Software Engineering) and a BSc with joint majors in Computer Science and Mathematics.

Related Material

Video is accompanying material for the following resource
Modul <Datentyp>
Architecture Computer font Expression Moore's law View (database) Penetrationstest Metasploit-Framework Open source Computing platform Modul <Datentyp> Information security Shareware
Architecture Metasploit-Framework Entropie <Informationstheorie> Interface (computing) Exploit (computer security) Code Core dump Computer worm Modul <Datentyp> Module (mathematics)
Architecture Metasploit-Framework Drill commands Exploit (computer security) Modul <Datentyp>
Dependent and independent variables Exploit (computer security) Computer network Focus (optics) Staff (military) Statistical hypothesis testing Statistical hypothesis testing Architecture Root Emulator Software framework Modul <Datentyp> Information security Electric current
Vulnerability (computing) Firewall (computing) Intrusion detection system Personal digital assistant Computer network Mathematical analysis Information security Electronic signature
Query language Simulation
Operations research Dependent and independent variables Process capability index Computer network Plastikkarte Electronic signature Data management Number Event horizon Intrusion detection system Insertion loss Blog Cross-correlation Information Information security Physical system
Configuration space Module (mathematics) Group action
Server (computing) Configuration space Host Identity Protocol
Mathematical analysis Group action
Repository (publishing) Modul <Datentyp>
Inclusion map Pointer (computer programming) Execution unit View (database) Internet forum Web page Menu (computing) Machine code Shareware 10 (number) Perspective (visual) Magnetic stripe card
Inclusion map Mathematics Computer icon Asynchronous Transfer Mode Chain Independent set (graph theory) Programmable read-only memory Maximum likelihood Machine code Perspective (visual)
Rule of inference Email Image resolution Real number Server (computing) Exploit (computer security) Public domain Computer network Statistical hypothesis testing Shareware Statistical hypothesis testing Intrusion detection system System programming Modul <Datentyp> Simulation Fingerprint
Execution unit View (database) Online help Server (computing) Maxima and minima Exploit (computer security) Core dump Stack (abstract data type) Uniform resource locator Network socket Query language Software framework Video game console Gastropod shell Interrupt <Informatik> Logic gate Summierbarkeit Local ring Window Address space
Supremum View (database) Sine Normed vector space Computer file Time zone Synchronization Convex hull Bookmark (World Wide Web) Library (computing) Emulation Window
Intel Scripting language Proxy server View (database) Twin prime Server (computing) Concurrency (computer science) MIDI Core dump Range (statistics) Thread (computing) Uniform resource locator Chain Computer configuration Video game console Convex hull Interrupt <Informatik> Gastropod shell Local ring Electric current Window Address space Chi-squared distribution