Merged revisions 5382-5383 via svnmerge from

svn+ssh://metasploit.com/home/svn/framework3/branches/framework-3.1

........
  r5383 | hdm | 2008-01-27 21:42:09 -0600 (Sun, 27 Jan 2008) | 3 lines
  
  Add Mr. Wilson's quote
........


git-svn-id: file:///home/svn/framework3/trunk@5384 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2008-01-28 03:43:11 +00:00
parent 3110b821b0
commit e53b412599
1 changed files with 8 additions and 5 deletions

View File

@ -65,11 +65,14 @@ Borland's InterBase product line. "I found so many holes that I just
gave up releasing all of them", said Ramon de Carvalho, founder of RISE gave up releasing all of them", said Ramon de Carvalho, founder of RISE
Security, and Metasploit contributor. Security, and Metasploit contributor.
The Metasploit Framework is used by network security professionals "Metasploit continues to be an indispensable and reliable penetration
to perform penetration tests, system administrators to verify patch testing framework for our modern era", says C. Wilson, a security
installations, product vendors to perform regression testing, and engineer who uses Metasploit in his daily work. Metasploit is used by
security researchers world-wide. The framework is written in the Ruby network security professionals to perform penetration tests, system
programming language and includes components written in C and assembler. administrators to verify patch installations, product vendors to
perform regression testing, and security researchers world-wide. The
framework is written in the Ruby programming language and includes
components written in C and assembler.
Metasploit runs on all modern operating systems, including Linux, Metasploit runs on all modern operating systems, including Linux,
Windows, Mac OS X, and most flavors of BSD. Metasploit has been used Windows, Mac OS X, and most flavors of BSD. Metasploit has been used