Attacks/Breaches
12/1/2009
06:06 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Metasploit Gets New Vulnerabilty Scanning Features

Rapid7 takes first step in integrating penetration testing tool with its NeXpose vulnerability scanner, rolls out new free version of NeXpose

A new version Metasploit released today includes integrated vulnerability scanning for the popular open source penetration testing tool.

Rapid7, which recently purchased Metasploit, today announced both the new version of Metasploit, 3.3.1, as well as a new free version of Rapid7's NeXpose vulnerability scanner. The NeXpose Community Edition is basically a slimmed-down version of the company's enterprise-class scanner that's limited in the number of IP's it can scan.

The free NeXpose version is integrated with Metasploit 3.3.1 with a plug-in to the Metasploit console. "This integration is the first to actually run the [vulnerability] scan and do the import of the data for you," says HD Moore, chief security officer for Rapid7 and creator of Metasploit. It lets the penetration tester run the scan, import the data, and automatically run exploits against the vulnerabilities, he says.

"This is the first step in the integration" of Metasploit and the NeXpose vulnerability scanning platform, Moore says. The tools work together from the Metasploit console with a command-line plug-in: the penetration tester loads Metasploit, connects to NeXpose, and runs the scan from there. The scan data is then brought in to Metasploit and cross-referenced with Metasploit's modules, which then are automatically launched to test out the vulnerabilities, he says. "The whole process is from the Metasploit console," he says.

It's the first serious integration of vulnerability scanning into the penetration testing tool. "We already had support [for] importing scan results from older versions of Nessus," Moore says. "We would be happy to support for other vendors if they or one of their users submitted a patch."

Penetration testing and vulnerability scanning have gradually been heading toward tighter integration and interoperability as enterprises increasingly need a way to prioritize and weigh actual risks of a vulnerabilty being exploited, rather than trying to pick and choose from the often overwhelming list of bugs found in a vulnerability scan. "One one hand, these [technologies] should be fully interoperable if not integrated. That's where the market is heading," says Nick Selby, managing director for Trident Risk Management. "What we need and are going toward is risk-based vulnerability analysis. What you need to know is not whether there's vulnerability, but whether the vulnerability is likely to disrupt your business and cost you money."

Selby says Rapid7's first stab at blending of Metasploit and NeXpose more of an experts-only version. "This is step one of a multi-step process," Selby says. "This function exists with Immunity and Core already."

Rapid7's Moore says today's announcement indeed is only the first step. "A much better way of integrating them is to find this vulnerability, and tell me what exploit to run against it," he says.

And the tradeoff with the current release is that doesn't vet the impact of an exploit. "It doesn't take into account the reliability or potential impact of each exploit, so it's possible to run an exploit that is less reliable before one that is very reliable and crash the target in the process," Moore says. "You can, however, control it manually."

Rapid7 is in the process of implementing a way to automatically do this, however, and the feature could become available in about two weeks, Moore says. "You want to be able classify each exploit and risk" so that you don't crash anything, he says.

Metasploit's commercial rival Core Security says its integration with vulnerability scanning is well established, and a healthy separation between pen testing and vulnerabilty scanning should be maintained. "You still need the separate data," says Fred Pinkett, vice president of product management for Core Security. "A pen-testing tool only covers a certain number of remotely exploitable things, so you need that vulnerability scanning data you still need to do those scans and understand what that data is telling you" about what's exploitable, he says.

Pinkett says Core could expand eventually directly launch the vulnerability scan rather than pick up the scan data like it does today, as well as more integration in the graphical user interface. "I could see steps like that where we're even more automated than we are now. Or we could see integration with other types of scanners, for the Web and database," for example, he says.

Meanwhile, Rapid7 says it's serious about preserving Metasploit as an open tool. "Metasploit will remain open and we'll keep adding to it," says Corey Thomas, vice president of products and operations at Rapid7. The company is still looking at how to commercialize Metasploit as well, he says.

"We view these as two separate products, with two separate audiences," he says.

And in the works for Metasploit is moving beyond traditional exploits and vulnerabilities: "We are leveraging the configuration scanning and deep assessment capabilities of NeXpose to exploit vulnerabilities that are caused by human error and design flaws -- and not just missing patches," Rapid7's Moore says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7877
Published: 2014-10-30
Unspecified vulnerability in the kernel in HP HP-UX B.11.31 allows local users to cause a denial of service via unknown vectors.

CVE-2014-3051
Published: 2014-10-29
The Internet Service Monitor (ISM) agent in IBM Tivoli Composite Application Manager (ITCAM) for Transactions 7.1 and 7.2 before 7.2.0.3 IF28, 7.3 before 7.3.0.1 IF30, and 7.4 before 7.4.0.0 IF18 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof s...

CVE-2014-3668
Published: 2014-10-29
Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument t...

CVE-2014-3669
Published: 2014-10-29
Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function ...

CVE-2014-3670
Published: 2014-10-29
The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly exec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.