Home page logo

metasploit logo Metasploit mailing list archives

Re: Update surprise
From: Joshua Smith <lazydj98 () gmail com>
Date: Tue, 2 Apr 2013 11:06:18 -0500

This shouldn't have been too big of a surprise, it's been around for about 3 months:  
As the Open Source Issue Manager, someone who does not work for Rapid7, I can tell you that this actually makes it 
easier to update core libraries and such.  At the same time, it can be sidestepped for those that prefer to do so by 
git cloning the repo and handling the dependencies yourself.  Unfortunately you can't have your cake and eat it too in 
this scenario.  As a side effect, I imagine it helps to further justify the continued support of the Metasploit 
Framework (not the paid versions) when Rapid7 management can see at least some of the cases when people upgrade from 
the community edition to the paid versions.  Given all that MSF has gained from the acquisition, I think this is a 
small "price" to pay, esp. since it can be side-stepped w/o penalty.


On Apr 2, 2013, at 10:56 AM, James Lay wrote:

On 2013-04-02 09:35, Tod Beardsley wrote:
Was this on Kali? The binary installers require some kind of X/windowed

You might also consider just a source checkout given your resource

git clone git://github.com/rapid7/metasploit-framework

On 04/02/2013 10:28 AM, Robin Wood wrote:
On 2 April 2013 16:17, James Lay <jlay () slave-tothe-box net
<mailto:jlay () slave-tothe-box net>> wrote:

   So after installing the latest and greatest on a server with no X,
   I'm greeted with:

   [-] In order to update your Metasploit installation,
   [-] you must first register it through the UI, here:
   [-] https://localhost:3790 (note, Metasploit Community
   [-] Edition is totally free and takes just a few seconds
   [-] to register!)

   Seriously?  I'm open to suggestions on what next....thanks for any

lynx or elinks.

Or port forward that to a machine which has X and browser over there.


Thanks for the quick responses all..I do appreciate it.  Was there a particular reason for this?  I love the 
metasploit app and was pretty concerned once Rapid7 acquired it.  Are there any other surprises on the horizon we 
should know about?  Thank you.



  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]