Posts by Christian Kirsch

Products and Tools
Firewall Egress Filtering
Christian Kirsch

Products and Tools
SecureNinjaTV Interview: Tod Beardsley About Metasploit 10th Anniversary
Christian Kirsch

Rapid7 Blog
Metasploit 4.7's New MetaModules Simplify Security Testing
Christian Kirsch

Exposure Management
How To Do Internal Security Audits Remotely To Reduce Travel Costs
Christian Kirsch

Products and Tools
Metasploit Now Supports Kali Linux, the Evolution of BackTrack
Christian Kirsch

Products and Tools
How to Verify that the Payload Can Connect Back to Metasploit on a NATed Network
Christian Kirsch

Products and Tools
Free Metasploit Penetration Testing Lab in the Cloud
Christian Kirsch

Products and Tools
Using BackTrack 5 R3 with Metasploit Community or Metasploit Pro
Christian Kirsch

Products and Tools
Security Death Match: Open Source vs. Pay-for-Play Exploit Packs
Christian Kirsch

Vulnerabilities and Exploits
How Metasploit's 3-Step Quality Assurance Process Gives You Peace Of Mind
Christian Kirsch

Exposure Management
5 Tips to Ensure Safe Penetration Tests with Metasploit
Christian Kirsch

Vulnerabilities and Exploits
November Exploit Trends: Apache Killer Exploit New to List
Christian Kirsch

Vulnerabilities and Exploits
Free Scanner for MySQL Authentication Bypass CVE-2012-2122
Christian Kirsch

Vulnerabilities and Exploits
Webcast: Decrease Your Risk of a Data Breach - Effective Security Programs with Metasploit
Christian Kirsch

Vulnerabilities and Exploits
Exploit Trends: New Microsoft and MySQL Exploits Make the Top 10
Christian Kirsch

Rapid7 Blog
Mentoring Junior Red Team Members with Metasploit Pro
Christian Kirsch

Exposure Management
Creating a PCI 11.3 Penetration Testing Report in Metasploit
Christian Kirsch

Products and Tools
How to Create Custom Reports in Metasploit
Christian Kirsch

Vulnerabilities and Exploits
Exploit Trends: CCTV DVR Login Scanning and PHP CGI Argument Injection
Christian Kirsch

Products and Tools
Webcast: Don't Pick the Lock, Steal the Key - Password Auditing With Metasploit
Christian Kirsch

Products and Tools
Can't Exploit Machines? A Metasploit Troubleshooting How To
Christian Kirsch