1 00:00:00,470 --> 00:00:10,550 So here we are, meet the Métis Point framework, this is pretty much your Swiss Army knife to pen testing. 2 00:00:11,780 --> 00:00:18,420 Until now, you might recall the basic phases of a penetration tester and completed the lab setup. 3 00:00:18,440 --> 00:00:22,190 So let's talk about the big picture Métis Boite framework. 4 00:00:23,650 --> 00:00:31,520 I consider the MSF to be one of the most useful penetration testing tools freely available, the Menace 5 00:00:31,550 --> 00:00:37,690 Boyd framework provides an impressive workspace that is well beyond any others that I can think of, 6 00:00:38,410 --> 00:00:43,240 because it's beyond any one particular tool that has a bunch of exploits. 7 00:00:44,370 --> 00:00:48,380 So it's more than that, though, you can customize it for your own purpose. 8 00:00:49,970 --> 00:00:56,000 From a wide variety of commercial exploits, as well as an extensive exploit development environment 9 00:00:56,540 --> 00:01:03,230 all the way to network information gathering tools and web vulnerability plug ins, you can pretty much 10 00:01:03,230 --> 00:01:07,190 find almost everything that you need for a penetration test. 11 00:01:09,300 --> 00:01:15,690 But to be clear about this course is I have prepared this in a manner to encompass only the front end 12 00:01:15,690 --> 00:01:23,490 or the user aspects of the framework, pretty much with the aim to give an in-depth look into the many 13 00:01:23,490 --> 00:01:24,930 features of Métis POIT. 14 00:01:26,070 --> 00:01:34,500 So this isn't an exploit development course for MSF, I'll plan that for later and you'll be raring 15 00:01:34,500 --> 00:01:34,890 to go. 16 00:01:36,120 --> 00:01:38,040 But it is an amazing tool for sure. 17 00:01:39,330 --> 00:01:46,050 So before we do a little walk around, let's have a little brief talk about its history and believe 18 00:01:46,050 --> 00:01:47,400 me, I'll be brief. 19 00:01:47,680 --> 00:01:48,470 Won't be too long. 20 00:01:49,920 --> 00:01:57,780 So the creator of Métis Point is Heidi Moore, who was spending most of his time validating and sanitizing 21 00:01:57,780 --> 00:02:06,060 public exploit codes to use in 2003, then the idea of a framework formed in his mind. 22 00:02:06,970 --> 00:02:08,500 And the first edition came out. 23 00:02:09,530 --> 00:02:17,210 The first edition was a complete Pearl Project, released in 2003 with a total of 11 XPoint. 24 00:02:18,780 --> 00:02:26,790 Then, with the help of some other friends, Métis Boy 2.0 was released in 2004 with 19 boys and over 25 00:02:26,790 --> 00:02:28,650 27 payloads. 26 00:02:29,850 --> 00:02:36,900 Then shortly after this release, the team continued to widen and Métis boy gained popularity in the 27 00:02:36,900 --> 00:02:38,490 information security community. 28 00:02:39,560 --> 00:02:44,540 Then following a complete rewrite in the Ruby programming language. 29 00:02:45,800 --> 00:02:50,890 The Métis boy team released Métis Point 3.0 in 2007. 30 00:02:52,420 --> 00:03:00,400 150000 lines of code added to the project in an 18 month period after migrating from Ruby. 31 00:03:02,060 --> 00:03:09,920 With the 3.0 release, Métis, Boit saw widespread adoption in the security community and also a big 32 00:03:09,920 --> 00:03:18,680 increase in user contributions in the fall of 2009, Métis Point was acquired by Rapide seven. 33 00:03:19,600 --> 00:03:27,160 Which allowed HD to build a team to focus only on the development of the Métis Boit framework after 34 00:03:27,160 --> 00:03:31,900 the acquisition updates have occurred more well rapidly. 35 00:03:32,740 --> 00:03:40,210 Then Rapid Seven released two commercial product based on the Métis boy framework, Métis, Boyd Xpress 36 00:03:40,480 --> 00:03:42,250 and Métis Boit Pro. 37 00:03:43,630 --> 00:03:47,590 Motorsport Express was a lighter version of the Métis pro. 38 00:03:49,340 --> 00:03:55,900 But for this version, Rapide seven announced the end of life on June 4th, 2018. 39 00:03:57,190 --> 00:04:03,670 So the team will focus on Métis boy pro by adding new features such as collaboration, group penetration 40 00:04:03,670 --> 00:04:05,890 testing and oh so much more. 41 00:04:06,990 --> 00:04:08,290 So I told you I'd be brief. 42 00:04:08,490 --> 00:04:15,060 This was your history class of the Métis Point project, so like it or not, basically the life cycle 43 00:04:15,060 --> 00:04:18,270 of a product pretty much defines what it is.