[Plug-security] Metasploit Updates - Are your Servers Patched?
Lisa Kachold
lisakachold at obnosis.com
Mon Jan 17 14:53:48 MST 2011
This past month has seen a number of additions to our free Metasploit
Unleashed<http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training>training
course, primarily in our on-going effort to build out the Metasploit
Module Reference<http://www.offensive-security.com/metasploit-unleashed/Metasploit_Module_Reference>section.
The Metasploit team has been developing at a rapid pace with new
features and modules being frequently added. We are also continuing to go
through the course content itself and verify the functionality of the
provided material.
Updates
- Updated the Event Log
Management<http://www.offensive-security.com/metasploit-unleashed/Event_Log_Management>Section
- Updated the Interacting with the
Registry<http://www.offensive-security.com/metasploit-unleashed/Interacting_With_The_Registry>Section
- Updated the Persistent Netcat
Backdoor<http://www.offensive-security.com/metasploit-unleashed/Persistent_Netcat_Backdoor>Section
- Updated the Enabling Remote
Desktop<http://www.offensive-security.com/metasploit-unleashed/Enabling_Remote_Desktop>Section
Module Reference Additions
- http/dir_webdav_unicode_bypass<http://www.offensive-security.com/metasploit-unleashed/HTTP_Dir_Webdav_Unicode_Bypass>
- http/enum_delicious<http://www.offensive-security.com/metasploit-unleashed/HTTP_Enum_Delicious>
- http/enum_wayback<http://www.offensive-security.com/metasploit-unleashed/HTTP_Enum_Wayback>
- http/files_dir<http://www.offensive-security.com/metasploit-unleashed/HTTP_Files_Dir>
- http/open_proxy<http://www.offensive-security.com/metasploit-unleashed/HTTP_Open_Proxy>
- http/options<http://www.offensive-security.com/metasploit-unleashed/HTTP_Options>
- http/robots_txt<http://www.offensive-security.com/metasploit-unleashed/HTTP_Robots_Txt>
- http/ssl<http://www.offensive-security.com/metasploit-unleashed/HTTP_SSL>
- http/http_version<http://www.offensive-security.com/metasploit-unleashed/HTTP_HTTP_Version>
- snmp/snmp_login<http://www.offensive-security.com/metasploit-unleashed/SNMP_SNMP_Login>
- snmp/snmp_enum<http://www.offensive-security.com/metasploit-unleashed/SNMP_SNMP_Enum>
- snmp/snmp_enumshares<http://www.offensive-security.com/metasploit-unleashed/SNMP_SNMP_Enumshares>
- snmp/snmp_enumusers<http://www.offensive-security.com/metasploit-unleashed/SNMP_SNMP_Enumusers>
- vnc/vnc_login<http://www.offensive-security.com/metasploit-unleashed/VNC_VNC_Login>
- vnc/vnc_none_auth<http://www.offensive-security.com/metasploit-unleashed/VNC_VNC_None_Auth>
--
(503) 754-4452
(623) 688-3392
http://www.obnosis.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.PLUG.phoenix.az.us/pipermail/plug-security/attachments/20110117/9ba0c6d7/attachment.html>
More information about the Plug-security
mailing list