lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200406091628.34266@M3T4>
From: fdlist at digitaloffense.net (H D Moore)
Subject: Metasploit Framework v2.1

The Metasploit Framework is an advanced open-source exploit development 
and testing environment. Version 2.1 fixes many issues that users have 
reported since the release of 2.0 and adds several new features.

The bug fixes alone are more than worth the time to upgrade. If you 
currently use the Framework under Windows, we strongly urge that you 
update to the 2.1 release; quite a few features and payloads simply don't 
work right with version 2.0 and Cygwin.

This release includes 21 exploits and 27 payloads; many of these exploits 
are either the only ones publicly available or just much more reliable 
than anything else out there.

The Framework will run on any modern system that has a working Perl 
interpreter, the Windows installer includes a slimmed-down version of the 
Cygwin environment. We have tested the Framework on Linux, BSD, Mac OS X, 
Solaris, AIX, and Windows (NT, 2000, XP, 2003).

Some highlights in this release:
  - Many Cygwin induced bugs fixed
  - Improved msfconsole tab completion
  - Fixed problems with logging functionality
  - Improvements on msfpescan to scan memory dumps from memdump.exe
  - socketNinja tool for doing all sorts of connection foo

This release is available from the Metasploit.com web site:
  - http://metasploit.com/projects/Framework/

Direct download links are provided below.

Unix-like operating systems:
  - http://metasploit.com/tools/framework-2.1.tar.gz

Windows-based operating systems:
  - http://metasploit.com/tools/framework-2.1.exe

You can subscribe to the Metasploit Framework mailing list by sending a 
blank email to framework-subscribe [at] metasploit.com. This is the 
preferred way to submit bugs, suggest new features, and discuss the 
Framework with other users. This is also where we send out updates and 
new modules. This mailing list is low traffic and archived online at:
  - http://metasploit.com/archive/framework/threads.html

The Framework was written by spoonm and H D Moore, if you would like to 
contact us directly, please email us at msfdev [at] metasploit.com. Don't 
be shy, your feedback is very important. Drop us a line even if it is 
just tell us that you use it!

We would like to thank everyone contributing to the metasploit project, 
with special thanks to skape, optyx, and the anonymous user who made the 
first donation to the metabeverage fund :)

This release added the following new exploit modules:
 - windows_ssl_pct
 - svnserve_date
 - samba_nttrans

... and some nice improvements to many existing modules.

Check out the new "exploits" section at the Framework project page; you 
can now download the latest versions of the exploit modules directly from 
the web site. All new exploits developed before the final 2.2 release 
will be made available via this page. Once we get some free time, we plan 
on adding exploitation and usage notes to this page. A new module has 
already been uploaded for the Squid NTLM buffer overflow bug...

Enjoy!

- spoonm and HD


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ