We performed a comparison between Rapid7 Metasploit and Wireshark based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management."The option to generate phishing emails has proven to be very valuable in understanding the behavior of users."
"Technical support has been helpful and responsive."
"The most valuable features of the solution are the scripts, the modules, and the tools that the Rapid7 Metasploit framework has."
"The solution is open source and has many small targetted penetration tests that have been written by many people that are useful. You can choose different subjects for the test, such as Oracle databases or Apache servers."
"It's not possible to do penetration testing without being very proficient in Metasploit."
"The tool's most useful feature for penetration testing is its automation capabilities. With the professional edition, you can upload the results from Nessus in the Rapid7 Metasploit solution portal."
"Stability-wise, I rate the solution a nine out of ten...Scalability-wise, I rate the solution a nine out of ten."
"I use Rapid7 Metasploit for payload generation and Post-Exploitation."
"The feature to incorporate Voice over IP (VoIP) incidents into network traffic analysis is valuable. Capturing voice or SIP communication allows for examination of interactions between SIP clients and SIP servers. This helps the team investigate or analyze issues related to call center servers and operators."
"The ability to decrypt traffic and the abundance of filters available are both valuable features."
"The options that are required to get the details for the packet drops are good."
"It gives us the ability to pinpoint problems and to communicate network problems with software and hardware vendors."
"Wireshark is a good tool to start with network analyzing and packet capturing."
"It has good basic features."
"The GUI is easy to use."
"The filter option provided by Wireshark is its most valuable feature...Scalability-wise, I rate the solution a ten out of ten."
"The solution should improve the responsiveness of its live technical support."
"Metasploit cannot be installed on a machine with an antivirus."
"The solution is not very scalable, it does not provide any automation to be able to scale it."
"The open-source version has reporting limitations. You need to develop these capabilities yourself. Built-in reporting is an excellent feature for penetration testing, but it isn't a must-have. The solution could also cover more vulnerabilities. Metasploit has around 10,000 exploits in its library, but more is always better."
"It is necessary to add some training materials and a tutorial for beginners."
"We'd like them to offer better coverage of malware."
"At the time I was using it, the graphical user interface needed some improvements."
"Advanced Infrastructure should be implemented in the next release for better orchestration."
"Wireshark's UI isn't easy to handle and doesn't have as nice a view as Omnipeek."
"In the future, it would be nice to see color coding. It is just black and white."
"We'd like to be able to extract the output into an Excel table."
"There is a disadvantage when it comes to sampling intervals. Additionally, I've heard from a colleague that Wireshark might be less effective in the voice domain."
"The Wireshark search function shows green for a correct search and red for an incorrect search. If there were a way to provide a description about what a search - and the similar ones which are available - can do, while a person is typing it, it would make the product easier to use and simultaneously decrease the learning curve."
"The solution has a steep learning curve. There are so many filters and features that are frequently being updated, it takes research, experience and familiarity to be able to use them. It could be a lot more user-friendly."
"I wish the filters were a little bit more prepopulated."
"Wireshark is similar to an OS defense tool, meaning that it runs on an OS such as Ubuntu and Fedora, but I'm unsure if it's compatible with Windows or if it's a straightforward process to run it on Windows. Right now, my team needs to run Wireshark from a dongle to use it, so it's an OS-dependable tool, and that's an area for improvement. I was unable to use Wireshark on Windows, and I couldn't capture it, as I'm unsure how to configure the wireless card into monitoring mode on Windows. The process was straightforward on Linux, but it wasn't the case on Windows OS. It seems Wireshark isn't compatible with all OS. For example, you can analyze the log, and you can analyze it on the Windows server, but you can't do a capture in Windows. Configuring Wireshark for Windows isn't as easy as configuring it for Linux."
Rapid7 Metasploit is ranked 11th in Vulnerability Management with 18 reviews while Wireshark is ranked 3rd in Network Troubleshooting with 61 reviews. Rapid7 Metasploit is rated 7.6, while Wireshark is rated 9.0. The top reviewer of Rapid7 Metasploit writes "Helps find vulnerabilities in a system to determine whether the system needs to be upgraded". On the other hand, the top reviewer of Wireshark writes "User-friendly with an easy setup and a nice interface". Rapid7 Metasploit is most compared with Tenable Nessus, Pentera, Rapid7 InsightVM, Acunetix and Qualys VMDR, whereas Wireshark is most compared with Zabbix, Nagios XI, SolarWinds NPM, ClearSight Analyzer and Observer GigaStor.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.