I use this solution to check if there are any vulnerabilities that I find during scanning.
Senior Manager of System Security at a tech services company with 1,001-5,000 employees
The integration between Nmap, the database and Metasploit saves a lot of time. The initial setup was a bit tricky.
Pros and Cons
- "It's not possible to do penetration testing without being very proficient in Metasploit."
- "The initial setup was a bit "tweaky" for the open-source version."
What is our primary use case?
How has it helped my organization?
The search engine is actually pretty cool. It actually allows you to search the vulnerability very fast, and the big difference is that the exploit you see on Metasploit has been tested and imported, it's going to work and it is not going to crash anything. That's a big thing. That's basically why I use it.
What is most valuable?
The most valuable one is the integration between Nmap, the database and Metasploit. That saves a lot of time.
For how long have I used the solution?
More than five years.
Buyer's Guide
Rapid7 Metasploit
December 2024
Learn what your peers think about Rapid7 Metasploit. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
What do I think about the stability of the solution?
I had some issues with stability in the past, but it appears that the latest upgraded version has sorted out those issues.
What do I think about the scalability of the solution?
I do not think it scales. But, I do not understand why someone would want to scale Metasploit, at it is very specific on what you are attacking. It attacks a particular server. You can only scale if you are using Nmap.
How was the initial setup?
The initial setup was a bit "tweaky" for the open-source version.
What's my experience with pricing, setup cost, and licensing?
I use the open-source version, not the paid version of this product.
Which other solutions did I evaluate?
We looked at Metasploit vs Tenable Nessus and Metasploit vs OpenVAS. These solutions were more general scanners, and not as precise as Metasploit.
What other advice do I have?
It's not possible to do penetration testing without being very proficient in Metasploit. It's impossible.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Manager of Data Center at a integrator with 51-200 employees
Metasploit is the top choice of the best information security professionals and penetration testers
Valuable Features:
Good features-
1) Availability of both graphical and command line interfaces.
2) HTML based report collection
3) Integration with PostgreSQL
4) Integration of NMAP for network scanning, brute force techniques
5) Around 800 active modules with exploits for linux, bsd , microsoft and MacOS
6) Collaboration with team feature also available
7) Open Source
8)Integration with Backtrack OS
Room for Improvement:
Few cons of metasploit are
1) Exploit updates are slow after security patches to a certain OS
2) High resource utilization when run under Window7 and Windows Server 2008 R2
3) Fewer browser exploits
4) Payloads not extremely effective against updated anti viruses.
Other Advice:
Metasploit is the most favored toolkit for network security professionals and penetration testers. It is one of the best tools for zero day exploits and payloads for operating systems such as, Microsoft Windows, Linux, and Sun Solaris. Metasploit, which has been written in Ruby, provides the ability to seamlessly create and simulate attacks on networks and provide protection. It deals with the largest database of exploits, till date available, in a single tool for both active and passive attacks on networks and applications.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Rapid7 Metasploit
December 2024
Learn what your peers think about Rapid7 Metasploit. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
Senior Cyber Security Specialist at a tech services company with 1,001-5,000 employees
Open-source, simple and quick to install, with a variety of payload options
Pros and Cons
- "Rapid7 Metasploit is a useful product."
- "Rapid7 Metasploit can add a GUI feature because it is only available online."
What is our primary use case?
We mainly use Rapid7 Metasploit for the network penetration testing activities.
We have used the payload during our penetration testing activities.
What is most valuable?
It is easy to use.
Rapid7 Metasploit is a useful product.
It has a very long list of available payloads.
What needs improvement?
Rapid7 Metasploit can add a GUI feature because it is only available online.
While it is simple to use, including a GUI would make things easier. It would be very helpful.
For how long have I used the solution?
I have been using Rapid7 Metasploit for more than four years.
What do I think about the scalability of the solution?
Our company performs penetration testing for our clients. It is not used in the client's organization by any users normally, instead, it is used by the penetration tester, who performs the penetration testing activities.
Our company is a professional services company with 15 team members. All 15 team members are using this solution.
How are customer service and support?
We have not opened any tickets, as we have not experienced any issues.
Also, the free version does not offer support, it is only included with the Pro Version.
If you're using the free version, there's an online community where you can look for a similar problem that needs to be solved.
How was the initial setup?
The initial setup is straightforward. It's very easy to install Rapid7 Metasploit.
It's only five minutes to install.
This solution can be deployed and managed by a single person.
What's my experience with pricing, setup cost, and licensing?
There are two versions available, one of which is the Pro version, and the other is the free version.
In the four years that we've been using this solution, we've only used the free version. We haven't had any reason to use the Pro Version.
What other advice do I have?
I would recommend this solution to others who are interested in using it.
I would rate Rapid7 Metasploit an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Rapid7 Metasploit Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Product Categories
Vulnerability ManagementPopular Comparisons
Qualys VMDR
Tenable Nessus
Tenable Security Center
Tenable Vulnerability Management
Orca Security
Pentera
Acunetix
Check Point CloudGuard CNAPP
Skybox Security Suite
Microsoft Defender Vulnerability Management
The NodeZero Platform
Amazon Inspector
PortSwigger Burp Suite Enterprise Edition
Nucleus
Arctic Wolf Managed Risk
Buyer's Guide
Download our free Rapid7 Metasploit Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How inadvisable is it to use a single vulnerability analysis tool?
- What are the benefits of continuous scanning for vulnerability management?
- When evaluating Vulnerability Management, what aspect do you think is the most important to look for?
- What is a more effective approach to cyber defense: risk-based vulnerability management or vulnerability assessment?
- What are the main KPIs that need to be implemented to have better posture in vulnerability projects?
- Which is the best vulnerability scanner tool?
- What are your recommended automated penetration testing tools?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- Can you recommend API for Tenable Connector into ServiceNow
- What penetration testing tool (or tools) do you recommend for SMB/SME?