[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200404071529.51962@M3T4>
Date: Wed, 7 Apr 2004 15:29:51 -0500
From: H D Moore <sflist@...italoffense.net>
To: BUGTRAQ <bugtraq@...urityfocus.com>
Subject: Metasploit Framework 2.0 Released!
The Metasploit Framework is an advanced open-source platform for
developing, testing, and using exploit code. After nearly six months of
development, version 2.0 is being released to the public.
This release includes 18 exploits and 27 payloads; many of these exploits
are either the only ones publicly available or just much more reliable
than anything else out there.
The Framework will run on any modern system that has a working Perl
interpreter, the Windows installer includes a slimmed-down version of the
Cygwin environment.
Some highlights in this release:
- Three UI's: CLI, Console, Web
- Solid multi-stage payload implementation
- Infinitely chainable proxies (http, socks4)
- Integrated support for InlineEgg payloads
- Integrated support for Impurity executables
- Includes the msfpescan opcode scanner
- Includes standalone payload generator
- Includes standalone payload encoder
This release is available from the Metasploit.com web site, direct links
are provided below.
Unix-like operating systems:
- http://metasploit.com/tools/framework-2.0.tar.gz
Windows-based operating systems:
- http://metasploit.com/tools/framework-2.0.exe
You can subscribe to the Metasploit Framework mailing list by sending a
blank email to framework-subscribe [at] metasploit.com. This is the
preferred way to submit bugs, suggest new features, and discuss the
Framework with other users.
The Framework was written by spoonm and H D Moore, if you would like to
contact us directly, please email us at msfdev [at] metasploit.com.
We would like to thank everyone who participated in the beta test,
especially those who provided significant feedback (Marco, Arrigo, Matt,
etc).
This release includes the following exploit modules:
- apache_chunked_win32
- blackice_pam_icq
- exchange2000_xexch50
- frontpage_fp30reg_chunked
- ia_webmail
- iis50_nsiislog_post
- iis50_printer_overflow
- iis50_webdav_ntdll
- imail_ldap
- msrpc_dcom_ms03_026
- mssql2000_resolution
- poptop_negative_read
- realserver_describe_linux
- samba_trans2open
- sambar6_search_results
- servu_mdtm_overflow
- solaris_sadmind_exec
- warftpd_165_pass
This release includes the following payload modules:
- bsdx86bind
- bsdx86bind_ie
- bsdx86findsock
- bsdx86reverse
- bsdx86reverse_ie
- cmd_generic
- cmd_sol_bind
- cmd_unix_reverse
- linx86bind
- linx86bind_ie
- linx86findsock
- linx86reverse
- linx86reverse_ie
- linx86reverse_imp
- linx86reverse_xor
- solx86bind
- solx86findsock
- solx86reverse
- winadduser
- winbind
- winbind_stg
- winbind_stg_upexec
- winexec
- winreverse
- winreverse_stg
- winreverse_stg_ie
- winreverse_stg_upexec
Powered by blists - more mailing lists