Blog
Jun 16, 2011
MSFU Updates – June 2011
Over this past month, we have put a great deal of time into bringing our free online course, Metasploit Unleashed in line with BackTrack 5. The majority of these changes are cosmetic in nature but they should help to reduce confusion for newcomers to Metasploit and BackTrack while ensuring a consistent look throughout. We have also taken this opportunity to do more functionality verification in the course.
1 min read

Over this past month, we have put a great deal of time into bringing our free online course, Metasploit Unleashed in line with BackTrack 5. The majority of these changes are cosmetic in nature but they should help to reduce confusion for newcomers to Metasploit and BackTrack while ensuring a consistent look throughout. We have also taken this opportunity to do more functionality verification in the course.
Updates
- Updated the Dradis Section
- Updated the Configuring Databases Section
- Updated the Port Scanning Section
- Updated the Auxiliary Plugins Section
- Updated the Hunting for MSSQL Section
- Updated the Service Identification Section
- Updated the SMB Login Check Section
- Added MSFvenom Coverage
- Added MSFpayload Coverage
Module Reference Additions
- multi/gather/ssh_creds
- linux/gather/hashdump
- linux/gather/enum_services
As always, we ask that if you find this content useful, that you consider making a donation to Hackers for Charity to show your appreciation.
Cybersecurity leader resources
Sign up for the Secure Leader and get the latest info on industry trends, resources and best practices for security leaders every other week
Latest from OffSec

Insights
Empowering Women in Cybersecurity: How Education and Training Are Key
While women represent only 24% of the cybersecurity workforce, hands-on training is changing the game.
Feb 28, 2025
5 min read

Insights
Women in Cybersecurity Leadership: Inspiring Role Models at the Top
Celebrate Women’s History Month by recognizing the women shaping cybersecurity and driving innovation in the industry.
Feb 24, 2025
11 min read

Federal
Addressing the Unique Cybersecurity Challenges Faced by Government Agencies
Explore the unique cybersecurity challenges government agencies face and how tailored strategies can protect national security and public trust.
Feb 12, 2025
8 min read