[Plug-security] Metasploit Updates - Are your Servers Patched?

Lisa Kachold lisakachold at obnosis.com
Mon Jan 17 14:53:48 MST 2011


This past month has seen a number of additions to our free Metasploit
Unleashed<http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training>training
course, primarily in our on-going effort to build out the Metasploit
Module Reference<http://www.offensive-security.com/metasploit-unleashed/Metasploit_Module_Reference>section.
The Metasploit team has been developing at a rapid pace with new
features and modules being frequently added. We are also continuing to go
through the course content itself and verify the functionality of the
provided material.

Updates

   - Updated the Event Log
Management<http://www.offensive-security.com/metasploit-unleashed/Event_Log_Management>Section
   - Updated the Interacting with the
Registry<http://www.offensive-security.com/metasploit-unleashed/Interacting_With_The_Registry>Section
   - Updated the Persistent Netcat
Backdoor<http://www.offensive-security.com/metasploit-unleashed/Persistent_Netcat_Backdoor>Section
   - Updated the Enabling Remote
Desktop<http://www.offensive-security.com/metasploit-unleashed/Enabling_Remote_Desktop>Section

Module Reference Additions

   - http/dir_webdav_unicode_bypass<http://www.offensive-security.com/metasploit-unleashed/HTTP_Dir_Webdav_Unicode_Bypass>
   - http/enum_delicious<http://www.offensive-security.com/metasploit-unleashed/HTTP_Enum_Delicious>
   - http/enum_wayback<http://www.offensive-security.com/metasploit-unleashed/HTTP_Enum_Wayback>
   - http/files_dir<http://www.offensive-security.com/metasploit-unleashed/HTTP_Files_Dir>
   - http/open_proxy<http://www.offensive-security.com/metasploit-unleashed/HTTP_Open_Proxy>
   - http/options<http://www.offensive-security.com/metasploit-unleashed/HTTP_Options>
   - http/robots_txt<http://www.offensive-security.com/metasploit-unleashed/HTTP_Robots_Txt>
   - http/ssl<http://www.offensive-security.com/metasploit-unleashed/HTTP_SSL>
   - http/http_version<http://www.offensive-security.com/metasploit-unleashed/HTTP_HTTP_Version>
   - snmp/snmp_login<http://www.offensive-security.com/metasploit-unleashed/SNMP_SNMP_Login>
   - snmp/snmp_enum<http://www.offensive-security.com/metasploit-unleashed/SNMP_SNMP_Enum>
   - snmp/snmp_enumshares<http://www.offensive-security.com/metasploit-unleashed/SNMP_SNMP_Enumshares>
   - snmp/snmp_enumusers<http://www.offensive-security.com/metasploit-unleashed/SNMP_SNMP_Enumusers>
   - vnc/vnc_login<http://www.offensive-security.com/metasploit-unleashed/VNC_VNC_Login>
   - vnc/vnc_none_auth<http://www.offensive-security.com/metasploit-unleashed/VNC_VNC_None_Auth>



-- 

(503) 754-4452
(623) 688-3392

 http://www.obnosis.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.PLUG.phoenix.az.us/pipermail/plug-security/attachments/20110117/9ba0c6d7/attachment.html>


More information about the Plug-security mailing list