Conversation with creator of Metasploit (The Abhisek Cast)

In this episode of The Abhisek Cast, HD Moore, the creator of Metasploit and founder of runZero, explores the real evolution of cybersecurity - from underground hacking culture to modern security companies and products.

HD shares his early journey into computers without privilege or access, why open source became central to his philosophy, and how Metasploit was designed to intentionally challenge and break security products. We talk openly about the backlash Metasploit faced, the realities of commercializing open source, and why many security tools today exist more for business optics than real defense.

The conversation also dives deep into why asset discovery and inventory remain one of the hardest unsolved problems in security, and how runZero approaches this challenge differently by applying a pentester’s mindset to enterprise environments.

We also cover bug bounties, crowdsourced security, AI hype versus reality, and practical advice for newcomers - especially why learning programming and core networking fundamentals still matters, even in the age of LLMs.

This episode is especially valuable for builders, pentesters, and anyone trying to understand the trade-offs between open source, security research, and sustainable security businesses.

Key Topics Covered:

  • Early hacker culture vs modern cybersecurity
  • Why Metasploit was controversial—and why it worked
  • Open source vs commercial security models
  • Asset discovery and attack surface management
  • Bug bounties vs traditional penetration testing
  • AI in security: overhyped or inevitable?
  • Advice for people entering cybersecurity today

Meet Our Speakers

HD Moore

Founder & CEO, runZero

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Podcasts
The infinite eye: How AI threat intelligence gives defenders an asymmetric edge
Tod Beardsley, HD Moore, and Jonathan Cran discuss how AI-powered threat intelligence is providing defenders with a much-needed advantage.
Podcasts
Perimeters and pathways: Protecting the complete attack surface
Tod Beardsley, Jared Atkinson, Zakir Durumeric, and HD Moore discuss the perimeters and pathways that connect internal networks to the global...
Podcasts
Bug bounties in the age of AI
In this session, Tod Beardsley and Casey Ellis explore the evolving role of bug bounties in a world increasingly shaped by artificial intelligence.
Podcasts
The network edge: EOL and exploitation
Tod Beardsley is joined by Kimber Duke & Patrick Garrity of VulnCheck to discuss the critical intersection of EOL hardware and cybersecurity...

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.