Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Security

Metasploit Reloaded

By ryan naraine March 27, 2007, 1:17 AM PDT

Image
1
of 10

Metasploit Reloaded

Installations screen

Installations screen

HD Moore’s open-source Metasploit Framework has been rewritten from scratch and released with 177 exploits, 104 payloads and new modules to exploit Wi-Fi driver vulnerabilities in the Windows kernel.rn

In addition to hundreds of exploits and payloads, Moore said Metasploit 3.0 also ships with 30 auxiliary modules to perform tasks like host discovery, protocol fuzzing, and denial-of-service testing. See Ryan Naraine’s report on the new version here.

Metasploit Reloaded

Web console

Web console

The Metasploit Framework Web Console 3.0, showing in Microsoft’s Internet Explorer 7.

Metasploit Reloaded

Web console in IE 7

Web console in IE 7

The web interface (msfweb) is a Ruby on Rails application that uses the Prototype JavaScript Framework to provide in-browser windowing support. Asynchronous JavaScript is used to provide as-you-type search results for any module type and provide tab completion for the web console interface.

Metasploit Reloaded

Metasploit console interface

Metasploit console interface

The Metasploit console interface has a new “route” command that
allows all network connections to a given subnet to be routed through an existing session.

Metasploit Reloaded

Metasploit 3.0 help menu

Metasploit 3.0 help menu

A help menu provides assistance for pen testers.

Metasploit Reloaded

Modules organized in directory structure

Modules organized in directory structure

Metasploit modules are now organized in a directory structure instead of a single flat directory. A caching system provides faster loading times. The result is a scalable system that can manage hundreds of different modules at a time (over 300 alone in this release).

Metasploit Reloaded

VNC injection

VNC injection

Visual evidence of a successful VNC code execution exploit.

Metasploit Reloaded

Dumping SAM hashes

Dumping SAM hashes

A “priv” extension (accessible by the “use priv” command) provides the hashdump command for dumping password hashes and the timestomp command for erasing file system timestamps.

Metasploit Reloaded

Backgrounded Exploit Session

Backgrounded Exploit Session

hanks to Ruby’s in-process threading support, it is possible to share a single Metasploit instance with other users, exploit multiple hosts at the same time, and run persistent background services, while only consuming the system resources of a single process.

Metasploit Reloaded

Nop and Payload Generation

Nop and Payload Generation

Metasploit 3.0 contains 177
exploits, 104 payloads, 17 encoders, and 3 nop modules. Additionally, 30 auxiliary modules are included that perform a wide range of tasks,
including host discovery, protocol fuzzing, and denial of service testing.

  • Security
  • Account Information

    Share with Your Friends

    Metasploit Reloaded

    Your email has been sent

Share: Metasploit Reloaded
Image of ryan naraine
By ryan naraine
  • Account Information

    Contact ryan naraine

    Your message has been sent

  • |
  • See all of ryan's content

TechRepublic Premium

  • TechRepublic Premium

    Diversity and inclusion policy

    The importance of diversity and inclusion in any given organization cannot be overstated. It establishes a level playing field, brings together people with different backgrounds, perspectives, traditions and ideas and enriches company culture by ensuring fairness and tolerance. This helps build a more effective and collaborative workforce which enables the business to run in a ...

    Downloads
    Published:  June 5, 2023, 4:00 PM EDT Modified:  June 6, 2023, 9:27 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Development lifecycle policy

    Software development is a complex process that involves a specific series of steps (known as the development lifecycle) to transform a concept into a deliverable product. The steps involved with creating the finished product must be carefully adhered to yield the best results, reduce inefficiencies and maximize customer satisfaction. The purpose of this policy from ...

    Downloads
    Published:  June 5, 2023, 4:00 PM EDT Modified:  June 6, 2023, 9:15 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Checklist: Network and systems security

    Cybersecurity demands and the stakes of failing to properly secure systems and networks are high. While every organization’s specific security needs form a unique and complex blend of interconnected requirements, numerous security fundamentals almost always apply to each of these groups. It stands to reason that cybersecurity pros who effectively identify network and systems risks ...

    Published:  June 1, 2023, 4:00 PM EDT Modified:  June 2, 2023, 7:48 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to host multiple websites on Linux with Apache

    In this guide from TechRepublic Premium we’re going to explore the various things you can do with a Linux server. We won’t leave out any steps, so you won’t have to refer to another tutorial to complete the process. The only step we will leave out is the installation of Linux, as we’ll assume you ...

    Downloads
    Published:  May 31, 2023, 4:00 PM EDT Modified:  June 1, 2023, 7:45 AM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice