Attacks/Breaches
12/1/2009
06:06 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Metasploit Gets New Vulnerabilty Scanning Features

Rapid7 takes first step in integrating penetration testing tool with its NeXpose vulnerability scanner, rolls out new free version of NeXpose

A new version Metasploit released today includes integrated vulnerability scanning for the popular open source penetration testing tool.

Rapid7, which recently purchased Metasploit, today announced both the new version of Metasploit, 3.3.1, as well as a new free version of Rapid7's NeXpose vulnerability scanner. The NeXpose Community Edition is basically a slimmed-down version of the company's enterprise-class scanner that's limited in the number of IP's it can scan.

The free NeXpose version is integrated with Metasploit 3.3.1 with a plug-in to the Metasploit console. "This integration is the first to actually run the [vulnerability] scan and do the import of the data for you," says HD Moore, chief security officer for Rapid7 and creator of Metasploit. It lets the penetration tester run the scan, import the data, and automatically run exploits against the vulnerabilities, he says.

"This is the first step in the integration" of Metasploit and the NeXpose vulnerability scanning platform, Moore says. The tools work together from the Metasploit console with a command-line plug-in: the penetration tester loads Metasploit, connects to NeXpose, and runs the scan from there. The scan data is then brought in to Metasploit and cross-referenced with Metasploit's modules, which then are automatically launched to test out the vulnerabilities, he says. "The whole process is from the Metasploit console," he says.

It's the first serious integration of vulnerability scanning into the penetration testing tool. "We already had support [for] importing scan results from older versions of Nessus," Moore says. "We would be happy to support for other vendors if they or one of their users submitted a patch."

Penetration testing and vulnerability scanning have gradually been heading toward tighter integration and interoperability as enterprises increasingly need a way to prioritize and weigh actual risks of a vulnerabilty being exploited, rather than trying to pick and choose from the often overwhelming list of bugs found in a vulnerability scan. "One one hand, these [technologies] should be fully interoperable if not integrated. That's where the market is heading," says Nick Selby, managing director for Trident Risk Management. "What we need and are going toward is risk-based vulnerability analysis. What you need to know is not whether there's vulnerability, but whether the vulnerability is likely to disrupt your business and cost you money."

Selby says Rapid7's first stab at blending of Metasploit and NeXpose more of an experts-only version. "This is step one of a multi-step process," Selby says. "This function exists with Immunity and Core already."

Rapid7's Moore says today's announcement indeed is only the first step. "A much better way of integrating them is to find this vulnerability, and tell me what exploit to run against it," he says.

And the tradeoff with the current release is that doesn't vet the impact of an exploit. "It doesn't take into account the reliability or potential impact of each exploit, so it's possible to run an exploit that is less reliable before one that is very reliable and crash the target in the process," Moore says. "You can, however, control it manually."

Rapid7 is in the process of implementing a way to automatically do this, however, and the feature could become available in about two weeks, Moore says. "You want to be able classify each exploit and risk" so that you don't crash anything, he says.

Metasploit's commercial rival Core Security says its integration with vulnerability scanning is well established, and a healthy separation between pen testing and vulnerabilty scanning should be maintained. "You still need the separate data," says Fred Pinkett, vice president of product management for Core Security. "A pen-testing tool only covers a certain number of remotely exploitable things, so you need that vulnerability scanning data you still need to do those scans and understand what that data is telling you" about what's exploitable, he says.

Pinkett says Core could expand eventually directly launch the vulnerability scan rather than pick up the scan data like it does today, as well as more integration in the graphical user interface. "I could see steps like that where we're even more automated than we are now. Or we could see integration with other types of scanners, for the Web and database," for example, he says.

Meanwhile, Rapid7 says it's serious about preserving Metasploit as an open tool. "Metasploit will remain open and we'll keep adding to it," says Corey Thomas, vice president of products and operations at Rapid7. The company is still looking at how to commercialize Metasploit as well, he says.

"We view these as two separate products, with two separate audiences," he says.

And in the works for Metasploit is moving beyond traditional exploits and vulnerabilities: "We are leveraging the configuration scanning and deep assessment capabilities of NeXpose to exploit vulnerabilities that are caused by human error and design flaws -- and not just missing patches," Rapid7's Moore says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-2086
Published: 2015-02-26
Cross-site scripting (XSS) vulnerability in the live preview in the Panopoly Magic module before 7.x-1.17 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via a pane title.

CVE-2015-2087
Published: 2015-02-26
Unrestricted file upload vulnerability in the Avatar Uploader module before 6.x-1.3 for Drupal allows remote authenticated users to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via unspecified vectors.

CVE-2015-2088
Published: 2015-02-26
Cross-site scripting (XSS) vulnerability in unspecified administration pages in the Term Queue module before 6.x-1.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via unknown vectors.

CVE-2015-2089
Published: 2015-02-26
Multiple cross-site request forgery (CSRF) vulnerabilities in the CrossSlide jQuery (crossslide-jquery-plugin-for-wordpress) plugin 2.0.5 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings or conduct cross-site scripting (...

CVE-2015-2090
Published: 2015-02-26
SQL injection vulnerability in the ajax_survey function in settings.php in the WordPress Survey and Poll plugin 1.1.7 for Wordpress allows remote attackers to execute arbitrary SQL commands via the survey_id parameter in an ajax_survey action to wp-admin/admin-ajax.php.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.