Cybersecurity and Compliance Lead Engineer at Banglalink
Real User
Top 5
2024-02-23T10:40:25Z
Feb 23, 2024
We use the solution to detect and prevent attacks. Penetration testing aims to prove vulnerabilities. The vulnerability scanning results provide key IDs that can be explored using tools like Rapid7 Metasploit.
We are using the solution to assess vulnerabilities. We have aligned the solution with our information assets, such as the multiple plants we have. We have aligned Rapid7 Metasploit with the IP addresses, given the range of the IPs, and we scan it by using this Rapid7 Metasploit to identify vulnerabilities. We do this on a quarterly basis, but if any critical vulnerabilities, such as zero days, are identified, we immediately remediate them or take action until the patch has been deployed.
The last use case is for customers that want to use the features of Metasploit, for phishing detection. We give awareness about phishing on their email accounts in the organization.
Project Director at a tech services company with 1,001-5,000 employees
Real User
2020-10-20T04:19:00Z
Oct 20, 2020
I used the community edition. It's a very handy and powerful product. For a free product, the capabilities are absolutely astonishing. I used Rapid7 Metasploit as a marketing solution. I was working as a security expert and whenever I would meet a client as a consultant or a freelancer, I would open my laptop and start using the software. Rapid7 Metasploit is a standalone solution, intended to be used by one person, but it can be used by a few people in a team — maybe 10 people or less.
Principal security consultant at a computer software company with 201-500 employees
Real User
2020-06-04T09:41:24Z
Jun 4, 2020
We are a solution provider and we offer a variety of services that include security and vulnerability management. Rapid7 Metasploit is one of the products that we use to identify vulnerabilities. Specifically, Metasploit is for penetration testing. It uses models to check for exploitable vulnerabilities, and if one is detected then we would raise the importance of solving the problem. We normally operate Metasploit at the client site, which helps us to explore and assess the vulnerabilities directly in the environment.
What is vulnerability management? Vulnerability management is the meticulous, exhaustive, systematic process implemented to discover any potential threats or vulnerabilities, stop those threats, and repair those vulnerabilities before any serious problems develop with your important operating systems. Vulnerability management also involves fixes and patches to repair those threats and vulnerabilities. It is generally accomplished in combination with additional risk assessment and...
We use the solution to detect and prevent attacks. Penetration testing aims to prove vulnerabilities. The vulnerability scanning results provide key IDs that can be explored using tools like Rapid7 Metasploit.
Our use case is for penetration testing.
I use it for scanning purposes, particularly focusing on systems Rapid7 Exposed or managed through Rapid7 InsightVM.
The solution is used for process automation and tracking testing in OMS.
We use Metasploit for penetration testing. Three to five testers use it annually.
I use the solution for the validation of vulnerability.
We are using the solution to assess vulnerabilities. We have aligned the solution with our information assets, such as the multiple plants we have. We have aligned Rapid7 Metasploit with the IP addresses, given the range of the IPs, and we scan it by using this Rapid7 Metasploit to identify vulnerabilities. We do this on a quarterly basis, but if any critical vulnerabilities, such as zero days, are identified, we immediately remediate them or take action until the patch has been deployed.
The last use case is for customers that want to use the features of Metasploit, for phishing detection. We give awareness about phishing on their email accounts in the organization.
We mainly use Rapid7 Metasploit for the network penetration testing activities. We have used the payload during our penetration testing activities.
We have Rapid7 Metasploit installed on our Kali Linux system and we use it for penetration testing.
I used the community edition. It's a very handy and powerful product. For a free product, the capabilities are absolutely astonishing. I used Rapid7 Metasploit as a marketing solution. I was working as a security expert and whenever I would meet a client as a consultant or a freelancer, I would open my laptop and start using the software. Rapid7 Metasploit is a standalone solution, intended to be used by one person, but it can be used by a few people in a team — maybe 10 people or less.
We're using the solution in conjunction with some governmental agencies.
We are a solution provider and we offer a variety of services that include security and vulnerability management. Rapid7 Metasploit is one of the products that we use to identify vulnerabilities. Specifically, Metasploit is for penetration testing. It uses models to check for exploitable vulnerabilities, and if one is detected then we would raise the importance of solving the problem. We normally operate Metasploit at the client site, which helps us to explore and assess the vulnerabilities directly in the environment.
We use it for penetration testing of our internal systems.
I use this solution to check if there are any vulnerabilities that I find during scanning.