BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Video Demo: Retina / Metasploit Integration

Posted April 20, 2011    Morey Haber

Marc and I have been having a little fun lately with third-party integrations. We support a wide variety of tools from Network Management Systems, Call Centers, Security Information Managers, and all the way through Network Access Control, and Governance Risk and Compliance solutions.  We have been exploring other tools that can gain value from our results and in the process, we stumbled on an interesting trend that not many people may know about. Hence, this blog.

One of the most common requests we receive is for Retina Network to integrate into Penetration Testing solutions. eEye has a long history and a rock-solid integration with Core Security for Core Impact (the best on the market),  but many people may not be aware that we integrate with the Metasploit Framework as well. In fact, we integrate with all versions of Metasploit from the Free Framework all the way through the paid Professional version, which is really the same engine with a fancy UI. (I prefer the command line myself).

Marc Maiffret and the Retina team also wanted to add a personal thank you to HD Moore and the entire Metasploit team for solely doing the work of updating Metasploit to be able to import Retina data. We both appreciate the work they did here for Retina and continue to do for the community. The free version of Metasploit continues to be the best free tool for performing penetration testing functions and we believe the combined integration of eEye’s free Retina Community and Metasploit Free are two great free tools for any IT security folks toolkit.

So, if you are looking for penetration testing integration, watch the short (four-minute) demo below. You can save some money on the free Metasploit framework and provide comprehensive vulnerability assessment scanning and penetration testing in one simple shot.

Good Hunting !

Leave a Reply

Additional articles

PowerBroker for Unix & Linux helps prevent Shellshock

Posted September 25, 2014    Paul Harper

Like many other people who tinker with UNIX and Linux on a regular basis, BASH has always been my shell of choice.  Dating back to the early days moving from Windows to a non-Windows platform, mapping the keys correctly to allow easy navigation and control helped ensure an explosion of use for the shell. Unfortunately,…

Bash “Shellshock” Vulnerability – Retina Updates

Posted September 24, 2014    BeyondTrust Research Team

A major vulnerability was recently discovered within bash which allows arbitrary command execution via specially crafted environment variables. This is possible due to the fact that bash supports the assignment of shell functions to shell variables. When bash parses environment shell functions, it continues parsing even after the closing brace of the function definition. If…

pbps-blog3

7 Reasons Customers Switch to Password Safe for Privileged Password Management

Posted September 24, 2014    Chris Burd

It’s clear that privileged password management tools are essential for keeping mission-critical data, servers and assets safe and secure. However, as I discussed in my previous post, there are several pitfalls to look out for when deploying a privileged password management solution. At this point, you may be wondering how BeyondTrust stacks up. With that,…

Tags:
, , , , ,