Metasploit Pro 5.0.0 is out now This article explores metasploit pro centralized. . As hackers keep using new weaknesses to attack, the need for ongoing red-teaming and proactive security assessments has never been greater.

Annual penetration tests are no longer enough to keep modern, complicated environments safe. Metasploit Pro 5.0.0 has been officially released to help security teams stay one step ahead of advanced threat actors. This big update brings a whole new way to do red-teaming, with an easy-to-use testing workflow, better Active Directory features, and a set of powerful new modules. With a completely new testing workflow, Metasploit Pro 5.0.0 makes interfaces easier to use.

Testing workflow that makes sense (source: Rapid7) The new user interface lets penetration testers focus only on validating high-value vulnerabilities instead of setting up the tool.

One of the best things about this redesign is the new Network Topology support, which lets you see right away which hosts are compromised, which credentials have been cracked, and which data has been captured. Network Topology support makes data into a visual defense (source: Rapid7) This mapping feature was made just for big businesses. It lets security teams move through hundreds of hosts without any lag, turning complicated data into useful defense plans.

Better at finding vulnerabilities and using AD CS Before carrying out an exploit, security teams need to be sure that it will work and be safe. Metasploit Pro now saves important information about how it finds vulnerabilities while it is running. Modules with pre-check logic can look at a target and give a full picture of the intelligence before trying to exploit it.

Improvements to vulnerability detection (source: Rapid7) This openness helps users make decisions more quickly, saves time, and lowers the chance of bad side effects or failed module runs. The update also fixes one of the most important ways that attackers can get into modern business networks: Active Directory Certificate Services (AD CS). The AD CS Workflows Metamodule has been improved so that it can automatically and completely find nine common AD CS vulnerabilities.

AD CS Workflows Metamodule (source: Rapid7) It now actively supports the newest and most dangerous escalation flaws, such as ESC9, ESC10, and ESC16, so that professionals can neutralize these threats with pinpoint accuracy. More advanced controls and technical improvements Metasploit Pro 5.0.0 gives advanced users more control than ever before, making complicated tasks easier with just a few clicks.

Users no longer have to set every option by hand. Instead, they get smart suggestions for values that work, like network targets and Kerberos credential caches. When new sessions start and analysts switch tasks, context can quickly disappear (source: Rapid7).

Some important technical improvements in this release are: Manual Payload Configuration: Security experts can now manually choose and set up each payload for more precise control. However, for convenience, the system will still default to the most common option. Session Tagging: Analysts can add custom labels like "priority," "role," or "environment" to open sessions to help teams work together better. This keeps context from being lost during fast-paced operations and makes it much easier to keep track of high-value targets across multiple people working together.

SAML Single Sign-On (SSO): Companies can now connect Metasploit Pro to their centralized identity provider.

This makes it possible to log in without a password and use existing Multi-Factor Authentication (MFA) services. Replays with One Click: It's easier than ever to check that remediation has been done. It is now easy to replay module runs to re-exploit targets without having to reconfigure the whole module.

Rapid7 Labs just released the first episode of its new podcast, "Hacktics & Telemetry," which has expert commentary on new threats and a detailed breakdown of Metasploit Pro 5.0.0. Follow them on LinkedIn and X for daily cybersecurity updates. Get in touch with us to have your stories featured.