Blog
May 16, 2011
MSFU Updates – May 2011
This month, even with the rampant development and release of BackTrack 5, we still devoted some time to updating Metasploit Unleashed. The Metasploit team is making a great deal of progress switching over to post-exploitation modules so we focused entirely on them this month and added many to the Metasploit Module Reference section.
1 min read
This month, even with the rampant development and release of BackTrack 5, we still devoted some time to updating Metasploit Unleashed. The Metasploit team is making a great deal of progress switching over to post-exploitation modules so we focused entirely on them this month and added many to the Metasploit Module Reference section.
Module Reference Additions
- multi/gather/env
- multi/gather/firefox_creds
- windows/capture/keylog_recorder
- windows/gather/arp_scanner
- windows/gather/checkvm
- windows/gather/credential_collector
- windows/gather/dumplinks
- windows/gather/enum_appliations
- windows/gather/enum_logged_on_users
- windows/gather/enum_shares
- windows/gather/enum_snmp
- windows/gather/hashdump
- windows/gather/usb_history
- windows/manage/autoroute
- windows/manage/delete_user
- windows/manage/migrate
- windows/manage/multi_meterpreter_inject
As always, we ask that if you find this content useful, that you consider making a donation to Hackers for Charity to show your appreciation.
Cybersecurity leader resources
Sign up for the Secure Leader and get the latest info on industry trends, resources and best practices for security leaders every other week
Latest from OffSec
Enterprise Security
Red Team vs Blue Team in Cybersecurity
Learn what a red team and blue team in cybersecurity are, pros and cons of both, as well as how they work together.
Dec 13, 2024
13 min read
Enterprise Security
Building a Future-Ready Cybersecurity Workforce: The OffSec Approach to Talent Development
Learn all about our recent webinar “Building a Future-Ready Cyber Workforce: The OffSec Approach to Talent Development”.
Dec 13, 2024
4 min read
Enterprise Security
How to Become the Company Top Cyber Talent Wants to Join
Become the company cybersecurity talent wants to join. Learn how to attract, assess, and retain experts with strategies that set you apart.
Dec 4, 2024
5 min read