Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Rapid7 Expands Integration Between Metasploit and Nexpose

On Tuesday, Boston-based Rapid7 announced that they have introduced the means to increase vulnerability management efficiency by offering tighter integration between Nexpose and Metasploit.

On Tuesday, Boston-based Rapid7 announced that they have introduced the means to increase vulnerability management efficiency by offering tighter integration between Nexpose and Metasploit.

The tie-in of the two products enables security teams to locate issues, prove they are exploitable and prioritize them, mitigate them, and then track the effectiveness of the mitigation itself. This process is important, Rapid7 explains, because while a given vulnerability may be a large problem for an organization, the same vulnerability could be no problem at all to a different organization; even if they are in the same market space.

Rapid7According to the release notes, the latest integrations between Nexpose and Metasploit Pro offer security teams the ability to import vulnerability scans; automatically validate the exploitability of a given high-risk vulnerability; spot-check individual vulnerabilities; push granular exploit results back to Nexpose via Vulnerability Exceptions; push device classifications back to Nexpose Asset Groups via Metasploit Tags; and monitor all of this with enhanced reports that are augmented with Nexpose data.

“Security professionals face a huge and complex challenge and they need to know that they are focusing their efforts on the highest risk vulnerabilities,” said HD Moore, CSO of Rapid7 and chief architect of the Metasploit Project.

“With Metasploit and Nexpose, security professionals can identify which of the numerous potential vulnerabilities are real in-roads for an attacker and prioritize these for remediation, making a more meaningful improvement to the organization’s security posture,” he added.

Metasploit version 4.4 is available now.

Written By

Click to comment

Expert Insights

Related Content

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.

Network Security

Cisco patched a high-severity SQL injection vulnerability in Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition (CM SME).

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Vulnerabilities identified in TP-Link and NetComm router models could be exploited to achieve remote code execution (RCE).

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...