mailing list archives
Metasploit Framework News
From: h0ttzfg at gmail.com (h0ttz)
Date: Fri, 5 Aug 2005 11:42:41 -0300
I would like to thank you for the exploits... but there's some problem
with the sql exploit, I already tried in over 100 different IPs and
nothing... Anybody tested it?
You should add the dsconfig.exe exploit too, it is more important.
2005/8/5, H D Moore <hdm at metasploit.com>:
A few recent updates...
Four new exploit modules have been pushed to msfupdate:
* cabrightstor_sqlagent [its getting h0ttz in here!]
* backupexec_registry [thanks pedram!]
* phpbb_highlight [thanks valsmith!]
* ie_objecttype [thanks skape!]
The solaris_dtspcd_noir module now strips out null bytes from the data
printed to the screen. [reported by Pavel K.]
The msfconsole and msfcli user interfaces will now strip terminal escape
sequences from any output. [overhyped by the Shmoo Group]
A new reference type, 'NSS', can now be used to reference Nessus Script
IDs from within metasploit modules. [requested by Sensepost]
Skape and spoonm's Black Hat 2005 slides are now online at:
Sensepost released BiDiBLAH, which uses the Framework:
We now have our very first security advisory :-)
There is a good chance that a preview version of 3.0 will be ready in the
next couple months. Version 2.5 will be released Soon (TM), pending some
really nice feature enhancements.