We performed a comparison between Rapid7 Metasploit and Wireshark based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management."It's not possible to do penetration testing without being very proficient in Metasploit."
"The Search Engineering feature is good."
"Technical support has been helpful and responsive."
"It allows us to concentrate solely on identified vulnerabilities without the hassle of additional setup."
"The solution is open source and has many small targetted penetration tests that have been written by many people that are useful. You can choose different subjects for the test, such as Oracle databases or Apache servers."
"The greatest advantage of Rapid7 Metasploit is that it is the only system that can directly exploit vulnerabilities on the Metasploit platform."
"I use Rapid7 Metasploit for payload generation and Post-Exploitation."
"Stability-wise, I rate the solution a nine out of ten...Scalability-wise, I rate the solution a nine out of ten."
"The most valuable feature is the traffic gate, which shows which IPs are getting more bandwidth or traffic."
"The feature to incorporate Voice over IP (VoIP) incidents into network traffic analysis is valuable. Capturing voice or SIP communication allows for examination of interactions between SIP clients and SIP servers. This helps the team investigate or analyze issues related to call center servers and operators."
"It's easy to troubleshoot issues because there's a large online community."
"The solution is easy to install and use."
"The product is simple to implement."
"Being able to dissect email data and figure out what is inside email messages was the most valuable feature. Such a feature is pretty helpful for an ongoing forensic investigation or when there is a potential insider threat that you are trying to investigate. It allows you to see the network activity of the users you are investigating. It also gives you more visibility into your network. It was very easy to set up. There is a lot of information out there on Google and YouTube about how to use it. There is also community support. If you have any trouble, it is pretty easy to find an answer online. You will have to do some digging only if you have a very specific use case."
"It gives us the ability to pinpoint problems and to communicate network problems with software and hardware vendors."
"I use the filters very often, to determine what type of traffic I am looking for. The use of filter allows traffic to be segmented so that a value can be looked at individually apart from the other traffic."
"At the time I was using it, the graphical user interface needed some improvements."
"I would like to see more capabilities, more functions, and more features. More types of attack vectors."
"There are numerous outdated exploits in their database that should be updated."
"We'd like them to offer better coverage of malware."
"The open-source version has reporting limitations. You need to develop these capabilities yourself. Built-in reporting is an excellent feature for penetration testing, but it isn't a must-have. The solution could also cover more vulnerabilities. Metasploit has around 10,000 exploits in its library, but more is always better."
"Advanced Infrastructure should be implemented in the next release for better orchestration."
"The solution is not very scalable, it does not provide any automation to be able to scale it."
"The solution should improve the responsiveness of its live technical support."
"The decryption of encrypted packets could be better."
"I wish the filters were a little bit more prepopulated."
"Wireshark could make the filtering rules easier to apply and offer a drag-and-drop option as opposed to type and text."
"With Wireshark, you cannot download and utilize the packet in automation."
"The solution’s user interface could be improved."
"Wireshark is restricted when any sort of encryption is involved, such as XSL encryption or DLX."
"The Wireshark search function shows green for a correct search and red for an incorrect search. If there were a way to provide a description about what a search - and the similar ones which are available - can do, while a person is typing it, it would make the product easier to use and simultaneously decrease the learning curve."
"Wireshark could be improved with a delay option when getting data automatically."
Rapid7 Metasploit is ranked 11th in Vulnerability Management with 18 reviews while Wireshark is ranked 3rd in Network Troubleshooting with 61 reviews. Rapid7 Metasploit is rated 7.6, while Wireshark is rated 9.0. The top reviewer of Rapid7 Metasploit writes "Helps find vulnerabilities in a system to determine whether the system needs to be upgraded". On the other hand, the top reviewer of Wireshark writes "User-friendly with an easy setup and a nice interface". Rapid7 Metasploit is most compared with Tenable Nessus, Pentera, Acunetix, Rapid7 InsightVM and Qualys VMDR, whereas Wireshark is most compared with Zabbix, Nagios XI, SolarWinds NPM, ClearSight Analyzer and Observer GigaStor.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.