BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Video Demo: Retina / Metasploit Integration

Posted April 20, 2011    Morey Haber

Marc and I have been having a little fun lately with third-party integrations. We support a wide variety of tools from Network Management Systems, Call Centers, Security Information Managers, and all the way through Network Access Control, and Governance Risk and Compliance solutions.  We have been exploring other tools that can gain value from our results and in the process, we stumbled on an interesting trend that not many people may know about. Hence, this blog.

One of the most common requests we receive is for Retina Network to integrate into Penetration Testing solutions. eEye has a long history and a rock-solid integration with Core Security for Core Impact (the best on the market),  but many people may not be aware that we integrate with the Metasploit Framework as well. In fact, we integrate with all versions of Metasploit from the Free Framework all the way through the paid Professional version, which is really the same engine with a fancy UI. (I prefer the command line myself).

Marc Maiffret and the Retina team also wanted to add a personal thank you to HD Moore and the entire Metasploit team for solely doing the work of updating Metasploit to be able to import Retina data. We both appreciate the work they did here for Retina and continue to do for the community. The free version of Metasploit continues to be the best free tool for performing penetration testing functions and we believe the combined integration of eEye’s free Retina Community and Metasploit Free are two great free tools for any IT security folks toolkit.

So, if you are looking for penetration testing integration, watch the short (four-minute) demo below. You can save some money on the free Metasploit framework and provide comprehensive vulnerability assessment scanning and penetration testing in one simple shot.

Good Hunting !

Leave a Reply

Additional articles

webinar_chalk

Webinar March 4th: Recreating the Carbanak Breach & Techniques for Mitigating Similar Attacks

Posted March 3, 2015    Lindsay Marsh

Join BeyondTrust Research and Development team for an in-depth live webinar that will explore the attack vectors used in the Carbanak Bank Breach and share successful mitigation techniques needed to prevent this type of attack.

Tags:
, ,
VMware Hardening Guidelines-img3

How to Audit VMware ESX and ESXi Servers Against the VMware Hardening Guidelines with Retina CS

Posted February 27, 2015    BeyondTrust Research Team

Retina CS Enterprise Vulnerability Management has included advanced VMware auditing capabilities for some time, including virtual machine discovery and scanning through a cloud connection, plus the ability to scan ESX and ESXi hosts using SSH. However, in response to recent security concerns associated with SSH, VMware has disabled SSH by default in its more recent…

Tags:
, , , ,
dave-shackleford-headshot

Privileged Passwords: The Bane of Security Professionals Everywhere

Posted February 19, 2015    Dave Shackleford

Passwords have been with us since ancient times. Known as “watchwords”, ancient Roman military guards would pass a wooden tablet with a daily secret word engraved from one shift to the next, with each guard position marking the tablet to indicate it had been received. The military has been using passwords, counter-passwords, and even sound…

Tags:
, , ,