Metasploit GUI integrated with Nessus in Kali Linux

Metasploit is the renowned Penetration testing framework created by H. D. Moore in 2003, metasploit was created to hack into computer systems for testing purpose. Metasploit can be used for following purposes:

  • Validate security risks as part of your vulnerability management program.
  • Safely simulate attacks on your network to uncover security issues.
  • Verify your defenses, security controls and mitigation efforts.
  • Measure the effectiveness of your security awareness program.
  • Audit password security beyond Windows and Linux logins.

Whereas, Nessus is a proprietary comprehensive vulnerability scanner which is developed by Tenable Network Security. It is free of charge for personal use in a non-enterprise environment. Key features of Nessus are:

  • Patch Management Integration
  • Malware/Botnet Detection
  • Mobile Device Auditing
  • Configuration & Compliance Auditing
  • Scanning & Auditing Virtualization & Cloud Platforms

And the last but not the least Kali Linux, which is the successor of backtrack linux. Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd.

Metasploit Graphical User Interface Tutorial

So it was the basic introduction of the tools that we are going to discuss, metasploit GUI comes under many umbrella; for example: Pro, community, Express and framework. In this tutorial I will use the Community version of metasploit.

  • Download the community version of metasploit from rapid7 website and get the activation code.
  • Configure it (if you need guideline then let us know, we will create a tutorial for the configuration too)

     Click here for metasploit configuration tutorial.

For better understanding of the work-flow, the video tutorial has been created. 

Something went wrong after uploading the video, skip the first 5 sec to get better quality. 
Metasploit GUI integrated with Nessus in Kali Linux Reviewed by Ethical Hacking on 12:10 PM Rating: 5

No comments:

Feel free to ask questions, we love to respond.

All Rights Reserved by The World of IT & Cyber Security: © 2014 - 2015
Powered By Blogger, Designed by Sweetheme

Contact Form


Email *

Message *

Powered by Blogger.