Home page logo
/

metasploit logo Metasploit mailing list archives

Metasploit Framework News
From: h0ttzfg at gmail.com (h0ttz)
Date: Fri, 5 Aug 2005 11:42:41 -0300

I would like to thank you for the exploits... but there's some problem
with the sql exploit, I already tried in over 100 different IPs and
nothing... Anybody tested it?

You should add the dsconfig.exe exploit too, it is more important.



2005/8/5, H D Moore <hdm at metasploit.com>:
A few recent updates...

Four new exploit modules have been pushed to msfupdate:
 * cabrightstor_sqlagent [its getting h0ttz in here!]
 * backupexec_registry [thanks pedram!]
 * phpbb_highlight [thanks valsmith!]
 * ie_objecttype [thanks skape!]

The solaris_dtspcd_noir module now strips out null bytes from the data
printed to the screen. [reported by Pavel K.]

The msfconsole and msfcli user interfaces will now strip terminal escape
sequences from any output. [overhyped by the Shmoo Group]

A new reference type, 'NSS', can now be used to reference Nessus Script
IDs from within metasploit modules. [requested by Sensepost]

Skape and spoonm's Black Hat 2005 slides are now online at:
 - http://metasploit.com/confs/

Sensepost released BiDiBLAH, which uses the Framework:
 - http://www.sensepost.com/research/bidiblah/

We now have our very first security advisory :-)
 - http://osvdb.org/18495
 - http://secunia.com/advisories/16318/

There is a good chance that a preview version of 3.0 will be ready in the
next couple months. Version 2.5 will be released Soon (TM), pending some
really nice feature enhancements.

-HD




  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]