Rapid 7 - Metasploit

Put Your Defenses to the Test

Use Metasploit to:
• Know your weak points
• Prioritize what matters most• Improve your outcomes



Knowing the adversary’s moves helps you better prepare your 



Metasploit, backed by a community of 200,000 users and contributors,

gives you that insight. It’s the most impactful penetration testing

solution on the planet. With it, uncover weaknesses in your defenses,

focus on the highest risks, and improve your security outcomes.


Know Your Weak Points

Simulate real-world attacks to find your weak points before a malicious

attacker does. Metasploit seamlessly integrates with the Metasploit

open-source framework, giving you access to exploitation and recon

naissance modules to accelerate testing. Use attacker techniques to

evade anti-virus, find weak credentials, and pivot throughout the network.


Utilize World’s Largest Code-Reviewed Exploit Database

Leading the Metasploit open-source project gives Rapid7 unique insights

into the latest attacker methods and mindset. Rapid7 works with the

user community to add an average of 1 new exploit per day, currently

counting more than 1,300 exploits and more than 2,000 modules.


Simulate Real-World Attacks Against Your Defenses

Metasploit evades leading anti-virus solutions 90% of the time and

enables you to completely take over a machine you have compromised

from over 200 modules. Pivot throughout your network to find out just

how far an attacker can get.

Uncover Weak and Reused Credentials


Test your network for weak and reused passwords. Going beyond just

cracking operating system accounts, Metasploit can run brute-force

attacks against over 20 account types, including databases, web

servers, and remote administration solutions.