[Infowarrior] - Metasploit Project Sold To Rapid7

Richard Forno rforno at infowarrior.org
Wed Oct 21 13:24:53 UTC 2009


  Metasploit Project Sold To Rapid7

Open-source Metasploit penetration testing tool creator HD Moore joins  
Rapid7, commercial Metasploit products to come
Oct 21, 2009 | 09:00 AM

By Kelly Jackson Higgins

http://www.darkreading.com/vulnerability_management/security/management/showArticle.jhtml?articleID=220800067
Vulnerability management vendor Rapid7 has purchased the popular open- 
source Metasploit penetration testing tool project and named  
Metasploit founder HD Moore as chief security officer of the company.

Moore, who is synonymous with the Metasploit Project , will continue  
as chief architect of Metasploit in his new role at Rapid7, and with  
an initial team of five Rapid7 researchers dedicated to the open- 
source project, some of whom already have been regular contributors to  
Metasploit. Financial terms of the deal were not disclosed.

Rapid7 plans to enhance its NeXpose vulnerability management product  
line and its own penetration testing services with Metasploit  
technology. The details on how Rapid7 -- which uses Metasploit in its  
penetration testing engagements -- will productize Metasploit are  
still being ironed out: Corey Thomas, vice president of products and  
operations at Rapid7, says he expects Rapid7 to keep Metasploit as a  
separate product with "high integration" with its existing products.  
"But this is all conjecture at this time," he says.

The goal is to leverage Metasploit's exploit technology to help  
identify which vulnerabilities discovered by NeXpose are actually  
exploitable, according to Thomas. "One of the things our customers  
have been pushing us for is how to get better data and information  
about their risk," he says. "And exploits are the key to that."

Either way, the potential for a commercial version of Metasploit  
represents a major shift in the penetration testing market, where  
vendors such as Core Security and Immunity Inc. have offered more user- 
friendly tools for enterprises.

Moore says the Rapid7 acquisition of Metasploit gives the project full- 
time resources -- Moore and his co-developers of Metasploit  
traditionally have done their work on the tool after-hours, during  
lunch breaks, and over weekends. "We are pretty competitive with Core  
and Immunity based on exploit coverage and features. But this is a  
great way to push the project forward ... and kick ass in the  
commercial sector if we want to go in that direction," Moore says.

This also will speed up turnaround of new features in Metasploit, he  
says. "It's night and day. I can now get a feature done in a business  
day, not over an entire weekend ... I'm excited to be able to work on  
this full-time."

Metasploit will also now have Rapid7's vast lab resources, and the  
ability to get more exposure for the project, he says, and expand the  
opportunities for existing Metasploit contributors as well.

Both Moore and Rapid7 say they are well aware of previous open-source  
and commercial marriages that have gone south, however, such as the  
Nessus scanning tool, which went from an open-source to a proprietary,  
closed-source license under Tenable Network Security. They say they  
are focusing on the open source community to leverage Metasploit. "Our  
goal is to make sure we improve the open-source" element, Thomas says.  
"Metasploit will remain open source."

"My goal is if we decide to go commercial, all the features and  
components are going into open-source" Metasploit as well, Moore says.

"We started talking to HD and the Metasploit Project folks a few  
months ago about how to tie in the exploit data [with our products and  
offerings]," Rapid7's Thomas says. "How could we invest and contribute  
to the Project over time for a more robust database [of exploits] at  
our disposal ... We want to use high-quality exploit data to help  
prioritize risk and get better insight into which attacks are most  
likely," for example, he says.

Moore says the combination of Metasploit's exploits and Rapid7's  
vulnerability reports would go "a lot further than any tool in the  
market" today in vulnerability assessment and penetration testing.




More information about the Infowarrior mailing list