Metasploit Framework v3.3.1 released
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.
Version 3.3.1
- Metasploit now has 453 exploit modules and 218 auxiliary modules (from 445 and 216 respectively in v3.3)
- Metasploit now integrates with all editions of NeXpose (see NeXpose_Plugin)
- The msfconsole now stores and loads history automatically
- The Linux installer now correctly unsets GEM_PATH to avoid gem installation conflicts
- Generated Windows executables are much more random and AV-resistant
- WMAP reporting now uses the notes table instead of a separate set of reporting tables
- Auxiliary scanners are now much more stable on Ruby 1.9.1
- Meterpreter migration sanity checks added
- The Windows installer now includes Nmap 5.10BETA1
NeXpose Community Edition provides users with:
- Unrivaled breadth of vulnerability scanning for up to 32 IPs
- Regular vulnerability updates
- Accurate scan results
- Prioritized risk assessment
- Remediation guidance
- Out-of-the box Metasploit integration
- Extensive community support at http://community.rapid7.com
- Simple deployment
- No cost start-up security solution
Post scriptum
Compliance Mandates
|