{"id":2960,"date":"2022-06-07T09:41:00","date_gmt":"2022-06-07T09:41:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=2960"},"modified":"2022-05-10T15:42:50","modified_gmt":"2022-05-10T15:42:50","slug":"a-brief-overview-of-the-metasploit-framework","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/","title":{"rendered":"A Brief Overview of the Metasploit Framework"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Metasploit Framework is an open-source platform that\u2019s useful for detecting vulnerabilities and creating tools that enhance an organization\u2019s network security. Let\u2019s look at an overview of the Metasploit Framework and what it entails<\/h2>\n\n\n\n<p>When we think of how to make software and systems more secure, something that comes to mind (aside from PKI) is a phrase by a notable American engineer and author:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cMore than the act of testing, the act of designing tests is one of the best bug preventers known. The thinking that must be done to create a useful test can discover and eliminate bugs before they are coded \u2014 indeed, test-design thinking can discover and eliminate bugs at every stage in the creation of software, from conception to specification, to design, coding, and the rest.\u201d<\/p><cite>\u2014 <a href=\"https:\/\/www.oreilly.com\/library\/view\/creating-a-software\/9780133489279\/ch13.html\">Boris Beizer<\/a>, <em>Software Testing Techniques<\/em><\/cite><\/blockquote>\n\n\n\n<p>If you\u2019re involved with developing and maintaining the security of your organization\u2019s software and networks, you\u2019ll understand the importance of reliable penetration tools like <a href=\"https:\/\/www.netsparker.com\/\">Netsparker<\/a>, <a href=\"https:\/\/www.wireshark.org\/\">Wireshark<\/a>, and <a href=\"https:\/\/www.metasploit.com\/\">Metasploi<\/a><a href=\"https:\/\/www.metasploit.com\/\">t<\/a>. These tools enable you to test your software for exploitable vulnerabilities and play a vital role in the ongoing war against cybercriminals.<\/p>\n\n\n\n<p>This article will focus on one of the most popular open source <a href=\"https:\/\/sectigostore.com\/blog\/13-vulnerable-websites-web-apps-for-pen-testing-and-research\/\">penetration testing<\/a> tools \u2014 Metasploit Framework. We\u2019ll look at some features, commands, and briefly explore how to use Metasploit Framework.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is the Metasploit Framework? A Look at Metasploit<\/h2>\n\n\n\n<p>Metasploit, or what\u2019s often called the Metasploit Framework (MSF), is a powerful open source penetration testing platform that\u2019s used by hackers and defenders alike. It\u2019s free for anybody to use and aids in vulnerability and exploit investigations, testing, and tool creation. It\u2019s got a multitude of libraries, modules and tools you can use to assess the security and exploitability of your organization\u2019s networks and report on them. This way, you can find and test vulnerabilities so you can prioritize and mitigate them before bad guys can use them to their advantage.<\/p>\n\n\n\n<p>An exploit is a code or program designed to take advantage of a vulnerability in software or a network. Developers and security experts use exploits to detect flaws or vulnerabilities in their software before its release. Networks also need to be checked for possible flaws or vulnerabilities as they can provide an open door for cybercriminals.<\/p>\n\n\n\n<p>Security professionals and white-hat hackers carry out penetration tests (pen tests) to identify vulnerabilities in software and networks. They do this with the permission of the target organization they\u2019re trying to penetrate, often using testing tools that provide automated vulnerability detection, making testing much easier than using manual techniques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Metasploit Framework vs Metasploit Pro<\/h3>\n\n\n\n<p>Metasploit is a collaborative effort between the open source community and cybersecurity experts <a href=\"https:\/\/www.rapid7.com\/\">Rapid7<\/a>. It\u2019s used to carry out vulnerability analysis, security assessments, and to improve security awareness. There are two services available:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Metasploit Framework<\/strong> \u2014 This is the free, basic open source version of the framework that\u2019s available free of charge. It offers limited capabilities and no automated features. Rapid7.com lists this platform as being ideal for developers and security researchers who don\u2019t need the same in-depth functionalities and features as security practitioners and penetration testers.<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-banner.png\" alt=\"A screenshot of the msfconsole in Linux commandline\" class=\"wp-image-2964\" width=\"840\" height=\"711\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-banner.png 949w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-banner-300x254.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-banner-560x474.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-banner-940x796.png 940w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><figcaption><em>A screenshot of the Metasploit Framework msfconsole captured using a virtual machine<\/em>.<\/figcaption><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Metasploit Pro<\/strong> \u2014 This commercial service provides a wider range of services and features, including network discovery, automated operations, and web app testing for the <a href=\"https:\/\/owasp.org\/www-project-top-ten\/\">OWASP top 10 vulnerabilities<\/a>. This platform is geared for pentesters and IT security teams.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"592\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-pro-dashboard-1024x592.jpg\" alt=\"A screenshot from Rapid7.com of the Metasploit Pro dashboard.\" class=\"wp-image-2963\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-pro-dashboard-1024x592.jpg 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-pro-dashboard-300x174.jpg 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-pro-dashboard-560x324.jpg 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-pro-dashboard-940x544.jpg 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-pro-dashboard.jpg 1075w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>A screenshot of the Metasploit Pro dashboard. Image source: rapid7.com.<\/figcaption><\/figure>\n\n\n\n<p>Often, when people are talking about Metasploit or Metasploit Framework, they\u2019re typically meaning the Metasploit Pro version. It\u2019s kind of like how people often use the terms \u201cSSL certificate\u201d and \u201cTLS certificate\u201d interchangeably \u2014 technically, they\u2019re two separate things, but they essentially help you achieve the same thing in the end (i.e., secure your website\u2019s data in transit).<\/p>\n\n\n\n<p>For the sake of accuracy, we have to, at least, ensure that you understand that Metasploit Framework and Metasploit Pro are two separate products \u2014 the former is the \u201cbasic\u201d version and the Pro version has all the bells and whistles.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Using a Penetration Tool Like Metasploit Framework Matters<\/h2>\n\n\n\n<p>Metasploit Framework helps programmers detect potential vulnerabilities in their program before it is used online. If a defective program is used, the bad guys would be able to break into it using the vulnerability, resulting in a network or data breach. Any glitch in the network or software can also be discovered with Metasploit penetration testing.<\/p>\n\n\n\n<p>Once you identify these gaps in your cyber defenses, you can prioritize mitigation of these vulnerabilities before any bad guys beat you to the punch. What consequences can you face if you don\u2019t take steps to mitigate vulnerabilities before a bad guy finds and uses them? Consider the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.ibm.com\/security\/data-breach\">IBM Security<\/a> reported that when the initial vector of a data breach is a third-party software vulnerability, it costs an average of $4.33 million per breach. These cases constitute 14% of the total data breaches in 2021.<\/li><li>If your software has an undetected vulnerability that results in a data breach, you\u2019ll face some serious consequences that include:<ul><li>non-compliance issues, penalties &amp; fines,<\/li><\/ul><ul><li>lost relationships and revenue<\/li><\/ul><ul><li>reputational harm and professional embarrassment).<\/li><\/ul><\/li><\/ul>\n\n\n\n<p>No organizations are safe from cybercriminals. Even an institution like <a href=\"https:\/\/portswigger.net\/daily-swig\/red-cross-servers-were-hacked-via-unpatched-manageengine-flaw\">the Red Cross<\/a>, which aims to work for the betterment of humanity, can fall prey to data breaches due to exploited, unpatched vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Are the Features of Metasploit Framework?<\/h2>\n\n\n\n<p>The Metasploit Framework includes hundreds of tools and modules for a wide array of penetration testing and development applications. Let\u2019s quickly explore the basic features:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A Basic Command Line Interface<\/h3>\n\n\n\n<p>Users interact with MSF via the commandline interface. Once Metasploit Framework is installed, you can open the <em>msfconsole<\/em> to input commands and quickly access the full range of tools, libraries, modules, and document resources.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Network Data Scanning Capabilities<\/h3>\n\n\n\n<p>Metasploit Framework\u2019s scanning tool scans the network to identify the operating systems running on it, maps them to IP addresses, and identifies the open ports and services on those systems.<\/p>\n\n\n\n<p>The Metasploit Framework allows you to download and save the results of a network data scan. You can then compare scans from different projects or compare the data from the same project before and after patching. You can also download scan results to Metasploit Framework from other scanners, or integrate data from other scanners. Metasploit also allows you to export reports to other scanners for a detailed comparison.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Support for Manual Exploitation<\/h3>\n\n\n\n<p>Manual exploitation means choosing and configuring an exploit rather than using an automated program to do the work. With a manual exploit, you choose the appropriate exploit to target a particular vulnerability. Metasploit Framework allows you to take matters into your own hands by facilitating manual exploits.<\/p>\n\n\n\n<p>If you want to use automation for this purpose, you\u2019d likely have to look at the Metasploit Pro tool instead. The Metasploit Framework (free) platform doesn\u2019t offer the automation features you\u2019ll find in the pro version.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Manual Credential Brute Force Capabilities<\/h3>\n\n\n\n<p>In a <a href=\"https:\/\/owasp.org\/www-community\/attacks\/Brute_force_attack\">brute force attack<\/a>, a cybercriminal uses trial and error to crack passwords or other credentials. They systematically try guessing different username-password combinations until they find a match. They can then use this login information for malicious purposes, such as stealing data, transferring money, or committing identity theft.<\/p>\n\n\n\n<p>Brute force attacks are extremely common, so it\u2019s crucial to conduct penetration testing of your network, web apps, and other resources to determine whether they\u2019re vulnerable to this technique. Metasploit Framework has a tool to test your network against brute force attacks, helping you to analyze security risks and form policies to prevent them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Modules Does MSF Include?<\/h2>\n\n\n\n<p>MSF has a huge number of tools and modules to help you carry out tests on your software and networks. <a href=\"https:\/\/docs.rapid7.com\/metasploit\/msf-overview\/\">Rapid7\u2019s website<\/a> lists the five overarching module categories (listed in alphabetical order) as the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Auxiliary<\/strong> \u2014 These modules provide a slew of tools (scanners, \u201cfuzzers,\u201d etc.) that you can use for detecting specific information about vulnerabilities and active services. Basically, they do many arbitrary actions that aren\u2019t exploits in and of themselves.<\/li><li><strong>Exploit<\/strong> \u2014 This group of modules should speak for itself. They\u2019re all about exploiting vulnerabilities and executing payloads.<\/li><li><strong>Post-Exploitation <\/strong>\u2014 These modules help you take your exploit tactics a step further to gain additional intel and insights about the exploited system.<\/li><li><strong>NOP<\/strong> \u2014 NOP generator modules are for facilitating benign instructions that help you bypass security detection systems.<\/li><li><strong>Payload<\/strong> \u2014 This set of modules enables you to execute commands (carry out specific actions) during the exploitation process. These are the often-malicious codes you always have to be on the lookout for.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">An Example of Running a Scan Using Metasploit Framework<\/h2>\n\n\n\n<p>So, what does it look like when you decide to put one of Metasploit Framework\u2019s scanning tools to the test? I asked a colleague to help me demonstrate how Metasploit Framework works using a couple of auxiliary scanning tools. In this case, she\u2019ll check to see whether a test website has expired SSL\/TLS certificates installed on it:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"946\" height=\"802\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-cert-tool.jpg\" alt=\"A screenshot within a Linux virtual machine of the Metasploit Framework msfconsole using the certificate scanner tool.\" class=\"wp-image-2962\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-cert-tool.jpg 946w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-cert-tool-300x254.jpg 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-cert-tool-560x475.jpg 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-cert-tool-940x797.jpg 940w\" sizes=\"auto, (max-width: 946px) 100vw, 946px\" \/><figcaption>A screenshot from within Metasploit on a virtual machine that shows the use of the <em>use auxiliary\/scanner\/http\/cert<\/em> tool.<\/figcaption><\/figure>\n\n\n\n<p>In the screenshot above, she used commands to display information relating to the target website\u2019s SSL\/TSL certificate (what site the certificate was issued to, when it was issued and when it will expire). The commands she used to display this information are as follows:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>use auxiliary\/scanner\/http\/cert\nshow options\nset RHOSTS &#091;target IP address]\nset THREADs 30\nrun<\/code><\/pre>\n\n\n\n<p>Taking things a step further, she queries to see whether any additional SSL\/TLS certificate information is available using the <em>use auxiliary\/scanner\/http\/ssl<\/em> module:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"967\" height=\"820\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-ssl-tool.jpg\" alt=\"A screenshot within a Linux virtual machine of the Metasploit Framework msfconsole using the SSL scanner tool.\" class=\"wp-image-2961\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-ssl-tool.jpg 967w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-ssl-tool-300x254.jpg 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-ssl-tool-560x475.jpg 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/metasploit-framework-ssl-tool-940x797.jpg 940w\" sizes=\"auto, (max-width: 967px) 100vw, 967px\" \/><figcaption>A screenshot of the <em>use auxiliary\/scanner\/http\/ssl<\/em> module in action using a Linux virtual machine.<\/figcaption><\/figure>\n\n\n\n<p>In this case, <em>msfconsole<\/em> displays information relating to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>What domain the certificate is issued to<\/li><li>What CA issued the certificate<\/li><li>Which algorithms were used to create the digital signature<\/li><li>What size public key the certificate uses<\/li><li>The certificate\u2019s issuance and expiration dates<\/li><li>Whether the certificate is publicly trusted (in this case, it\u2019s likely a self-signed certificate)<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What Systems Support Metasploit Framework<\/h2>\n\n\n\n<p>Because the Metasploit framework is open source, it works with many of the leading browsers and operating systems:<\/p>\n\n\n\n<p>Browsers&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Google Chrome (latest)<\/li><li>Microsoft Edge (latest)<\/li><li>Mozilla Firefox (latest)<\/li><\/ul>\n\n\n\n<p>Operating Systems<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Microsoft Windows (7 SP1+, 8.1, and 10)<\/li><li>Microsoft Windows Server (2008 R2, 2012 R2, 2016, and 2019)<\/li><li>Red Hat Enterprise Linux Server (5.10, 6.5, 7.1 and 8 or later)<\/li><li>Ubuntu Linux (14.04 LTS, 16.04 LTS, and 18.04 LTS)<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">A Brief History of the Metasploit Framework<\/h2>\n\n\n\n<p>Metasploit began as a collection of exploits and tools and was initially written in Perl with some components in C, assembler, and Python. It had open source and commercial purpose licenses under GPLv2 and Perl Artistic.<\/p>\n\n\n\n<p>Today, MSF is completely written in Ruby and supports a wide variety of application programming interfaces (APIs). It now has its own license, which aims to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Allow Metasploit Framework to remain open source<\/li><li>Allow modules and plugin developers to choose their own licensing terms<\/li><li>Prevent MSF from being bundled or sold commercially by third parties<\/li><li>Make third-party patches available to everybody<\/li><li>Provide legal support to the contributors<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts on Metasploit Framework<\/h2>\n\n\n\n<p>Pentesting tools like Metasploit Framework help organizations detect any vulnerabilities present in the software or network. This, in turn, reduces the chances of <a class=\"wpil_keyword_link \" href=\"https:\/\/sectigostore.com\/blog\/10-different-types-of-cyber-attacks-how-they-work\/\" title=\"cyber attacks\" data-wpil-keyword-link=\"linked\">cyber attacks<\/a> considerably. Just like we test if the cake is cooked properly by inserting a toothpick inside, programmers test their codes by throwing known exploits at it. If the exploit works, the vulnerabilities will be exposed. Then, they can patch these vulnerabilities before releasing their software to the world.<\/p>\n\n\n\n<p>Needless to say, penetration testing is an important (but often overlooked) step in protecting the <a href=\"https:\/\/sectigostore.com\/blog\/12-network-security-best-practices-to-secure-your-business\/\">network security<\/a> of any organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Metasploit Framework is an open-source platform that\u2019s useful for detecting vulnerabilities and creating tools that enhance an organization\u2019s network security. Let\u2019s look at an overview of the Metasploit Framework and&#8230;<\/p>\n","protected":false},"author":19,"featured_media":2966,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,1],"tags":[253,254],"class_list":["post-2960","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-web-security","tag-metasploit-framework","tag-penetration-testing","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Brief Overview of the Metasploit Framework - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"Metasploit Framework is one of the world&#039;s most commonly used penetration testing tools for vulnerability discovery and exploit testing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Brief Overview of the Metasploit Framework - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"Metasploit Framework is one of the world&#039;s most commonly used penetration testing tools for vulnerability discovery and exploit testing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-07T09:41:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/what-is-metasploit-framework-feature.png\" \/>\n\t<meta property=\"og:image:width\" content=\"785\" \/>\n\t<meta property=\"og:image:height\" content=\"491\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Megha Thakkar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Megha Thakkar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-brief-overview-of-the-metasploit-framework\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-brief-overview-of-the-metasploit-framework\\\/\"},\"author\":{\"name\":\"Megha Thakkar\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/77f01ec498571464bae513fa5bfd42da\"},\"headline\":\"A Brief Overview of the Metasploit Framework\",\"datePublished\":\"2022-06-07T09:41:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-brief-overview-of-the-metasploit-framework\\\/\"},\"wordCount\":1969,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-brief-overview-of-the-metasploit-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/what-is-metasploit-framework-feature.png\",\"keywords\":[\"Metasploit Framework\",\"Penetration Testing\"],\"articleSection\":[\"Cyber Security\",\"Web Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-brief-overview-of-the-metasploit-framework\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-brief-overview-of-the-metasploit-framework\\\/\",\"name\":\"A Brief Overview of the Metasploit Framework - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-brief-overview-of-the-metasploit-framework\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-brief-overview-of-the-metasploit-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/what-is-metasploit-framework-feature.png\",\"datePublished\":\"2022-06-07T09:41:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/77f01ec498571464bae513fa5bfd42da\"},\"description\":\"Metasploit Framework is one of the world's most commonly used penetration testing tools for vulnerability discovery and exploit testing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-brief-overview-of-the-metasploit-framework\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-brief-overview-of-the-metasploit-framework\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-brief-overview-of-the-metasploit-framework\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/what-is-metasploit-framework-feature.png\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/what-is-metasploit-framework-feature.png\",\"width\":785,\"height\":491},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-brief-overview-of-the-metasploit-framework\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Brief Overview of the Metasploit Framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/77f01ec498571464bae513fa5bfd42da\",\"name\":\"Megha Thakkar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g\",\"caption\":\"Megha Thakkar\"},\"description\":\"Megha can usually be found reading, writing, or watching documentaries, guaranteed to bore her family. She is a techno-freak with interests ranging from cooking to travel. A regular contributor to various web security blogs, she has earned her diploma in network-centric computing. Being a mother has taught her to speak less and write more (coz who listens to moms, right?).\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Brief Overview of the Metasploit Framework - InfoSec Insights","description":"Metasploit Framework is one of the world's most commonly used penetration testing tools for vulnerability discovery and exploit testing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/","og_locale":"en_US","og_type":"article","og_title":"A Brief Overview of the Metasploit Framework - InfoSec Insights","og_description":"Metasploit Framework is one of the world's most commonly used penetration testing tools for vulnerability discovery and exploit testing.","og_url":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/","og_site_name":"InfoSec Insights","article_published_time":"2022-06-07T09:41:00+00:00","og_image":[{"width":785,"height":491,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/what-is-metasploit-framework-feature.png","type":"image\/png"}],"author":"Megha Thakkar","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Megha Thakkar","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/"},"author":{"name":"Megha Thakkar","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/77f01ec498571464bae513fa5bfd42da"},"headline":"A Brief Overview of the Metasploit Framework","datePublished":"2022-06-07T09:41:00+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/"},"wordCount":1969,"image":{"@id":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/what-is-metasploit-framework-feature.png","keywords":["Metasploit Framework","Penetration Testing"],"articleSection":["Cyber Security","Web Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/","url":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/","name":"A Brief Overview of the Metasploit Framework - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/what-is-metasploit-framework-feature.png","datePublished":"2022-06-07T09:41:00+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/77f01ec498571464bae513fa5bfd42da"},"description":"Metasploit Framework is one of the world's most commonly used penetration testing tools for vulnerability discovery and exploit testing.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/what-is-metasploit-framework-feature.png","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/05\/what-is-metasploit-framework-feature.png","width":785,"height":491},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/a-brief-overview-of-the-metasploit-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Brief Overview of the Metasploit Framework"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/77f01ec498571464bae513fa5bfd42da","name":"Megha Thakkar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g","caption":"Megha Thakkar"},"description":"Megha can usually be found reading, writing, or watching documentaries, guaranteed to bore her family. She is a techno-freak with interests ranging from cooking to travel. A regular contributor to various web security blogs, she has earned her diploma in network-centric computing. Being a mother has taught her to speak less and write more (coz who listens to moms, right?)."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2960","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=2960"}],"version-history":[{"count":2,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2960\/revisions"}],"predecessor-version":[{"id":3024,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2960\/revisions\/3024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/2966"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=2960"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=2960"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=2960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}