Home page logo

metasploit logo Metasploit mailing list archives

Metasploit Framework News
From: h0ttzfg at gmail.com (h0ttz)
Date: Fri, 5 Aug 2005 11:42:41 -0300

I would like to thank you for the exploits... but there's some problem
with the sql exploit, I already tried in over 100 different IPs and
nothing... Anybody tested it?

You should add the dsconfig.exe exploit too, it is more important.

2005/8/5, H D Moore <hdm at metasploit.com>:
A few recent updates...

Four new exploit modules have been pushed to msfupdate:
 * cabrightstor_sqlagent [its getting h0ttz in here!]
 * backupexec_registry [thanks pedram!]
 * phpbb_highlight [thanks valsmith!]
 * ie_objecttype [thanks skape!]

The solaris_dtspcd_noir module now strips out null bytes from the data
printed to the screen. [reported by Pavel K.]

The msfconsole and msfcli user interfaces will now strip terminal escape
sequences from any output. [overhyped by the Shmoo Group]

A new reference type, 'NSS', can now be used to reference Nessus Script
IDs from within metasploit modules. [requested by Sensepost]

Skape and spoonm's Black Hat 2005 slides are now online at:
 - http://metasploit.com/confs/

Sensepost released BiDiBLAH, which uses the Framework:
 - http://www.sensepost.com/research/bidiblah/

We now have our very first security advisory :-)
 - http://osvdb.org/18495
 - http://secunia.com/advisories/16318/

There is a good chance that a preview version of 3.0 will be ready in the
next couple months. Version 2.5 will be released Soon (TM), pending some
really nice feature enhancements.


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]