Home page logo

metasploit logo Metasploit mailing list archives

Re: Update surprise
From: James Lay <jlay () slave-tothe-box net>
Date: Tue, 02 Apr 2013 09:56:11 -0600

On 2013-04-02 09:35, Tod Beardsley wrote:
Was this on Kali? The binary installers require some kind of X/windowed

You might also consider just a source checkout given your resource

git clone git://github.com/rapid7/metasploit-framework

On 04/02/2013 10:28 AM, Robin Wood wrote:
On 2 April 2013 16:17, James Lay <jlay () slave-tothe-box net
<mailto:jlay () slave-tothe-box net>> wrote:

So after installing the latest and greatest on a server with no X,
    I'm greeted with:

    [-] In order to update your Metasploit installation,
    [-] you must first register it through the UI, here:
    [-] https://localhost:3790 (note, Metasploit Community
    [-] Edition is totally free and takes just a few seconds
    [-] to register!)

Seriously? I'm open to suggestions on what next....thanks for any

lynx or elinks.

Or port forward that to a machine which has X and browser over there.


Thanks for the quick responses all..I do appreciate it. Was there a particular reason for this? I love the metasploit app and was pretty concerned once Rapid7 acquired it. Are there any other surprises on the horizon we should know about? Thank you.


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]