Embed presentation
Download to read offline











![
Rob Fuller – mubix [at] hak5 [dot] org
http://www.room362.com/
http://twitter.com/mubix
.. anything /mubix](https://image.slidesharecdn.com/rit2009intellectualownership-131231142148-phpapp02/75/RIT-2009-Intellectual-Pwnership-12-2048.jpg)

The document discusses the Metasploit framework and its uses for penetration testing. It describes how Metasploit can be used for exploit development, tool development, scripting tasks, and testing various systems including software, wireless networks, web applications, and VOIP. It also lists several auxiliary modules and provides links for common exploits like MS08_067 and techniques like pass the hash and token stealing. It encourages users to get involved by joining the mailing list or IRC and provides contact information for the author.











![
Rob Fuller – mubix [at] hak5 [dot] org
http://www.room362.com/
http://twitter.com/mubix
.. anything /mubix](https://image.slidesharecdn.com/rit2009intellectualownership-131231142148-phpapp02/75/RIT-2009-Intellectual-Pwnership-12-2048.jpg)