Metasploit Updates - Are your Servers Patched?

Top Page
Attachments:
Message as email
+ (text/plain)
+ (text/html)
+ (text/plain)
Delete this message
Reply to this message
Author: Lisa Kachold
Date:  
To: PLUG Linux Security Team, Main PLUG discussion list
Subject: Metasploit Updates - Are your Servers Patched?
This past month has seen a number of additions to our free Metasploit
Unleashed<http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training>training
course, primarily in our on-going effort to build out the Metasploit
Module Reference<http://www.offensive-security.com/metasploit-unleashed/Metasploit_Module_Reference>section.
The Metasploit team has been developing at a rapid pace with new
features and modules being frequently added. We are also continuing to go
through the course content itself and verify the functionality of the
provided material.

Updates

- Updated the Event Log
Management<http://www.offensive-security.com/metasploit-unleashed/Event_Log_Management>Section
- Updated the Interacting with the
Registry<http://www.offensive-security.com/metasploit-unleashed/Interacting_With_The_Registry>Section
- Updated the Persistent Netcat
Backdoor<http://www.offensive-security.com/metasploit-unleashed/Persistent_Netcat_Backdoor>Section
- Updated the Enabling Remote
Desktop<http://www.offensive-security.com/metasploit-unleashed/Enabling_Remote_Desktop>Section

Module Reference Additions

- http/dir_webdav_unicode_bypass<http://www.offensive-security.com/metasploit-unleashed/HTTP_Dir_Webdav_Unicode_Bypass>
- http/enum_delicious<http://www.offensive-security.com/metasploit-unleashed/HTTP_Enum_Delicious>
- http/enum_wayback<http://www.offensive-security.com/metasploit-unleashed/HTTP_Enum_Wayback>
- http/files_dir<http://www.offensive-security.com/metasploit-unleashed/HTTP_Files_Dir>
- http/open_proxy<http://www.offensive-security.com/metasploit-unleashed/HTTP_Open_Proxy>
- http/options<http://www.offensive-security.com/metasploit-unleashed/HTTP_Options>
- http/robots_txt<http://www.offensive-security.com/metasploit-unleashed/HTTP_Robots_Txt>
- http/ssl<http://www.offensive-security.com/metasploit-unleashed/HTTP_SSL>
- http/http_version<http://www.offensive-security.com/metasploit-unleashed/HTTP_HTTP_Version>
- snmp/snmp_login<http://www.offensive-security.com/metasploit-unleashed/SNMP_SNMP_Login>
- snmp/snmp_enum<http://www.offensive-security.com/metasploit-unleashed/SNMP_SNMP_Enum>
- snmp/snmp_enumshares<http://www.offensive-security.com/metasploit-unleashed/SNMP_SNMP_Enumshares>
- snmp/snmp_enumusers<http://www.offensive-security.com/metasploit-unleashed/SNMP_SNMP_Enumusers>
- vnc/vnc_login<http://www.offensive-security.com/metasploit-unleashed/VNC_VNC_Login>
- vnc/vnc_none_auth<http://www.offensive-security.com/metasploit-unleashed/VNC_VNC_None_Auth>



--

(503) 754-4452
(623) 688-3392

http://www.obnosis.com
---------------------------------------------------
PLUG-discuss mailing list -
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss