
Dec 15, 2010
MSFU Updates – December 2010
This month we have again been steadily updating the Metasploit Module Reference section of Metasploit Unleashed and also added some great new content covering the setup and usage of databases with Metasploit under BackTrack4 R2. This month also saw the introduction of the excellent GUI front-end, Armitage.
This month we have again been steadily updating the Metasploit Module Reference section of Metasploit Unleashed and also added some great new content covering the setup and usage of databases with Metasploit under BackTrack4 R2. This month also saw the introduction of the excellent GUI front-end, Armitage.
General Additions and Updates:
- Added Configuring Databases Section
- Added Using the MSF Database Section
- Rewrote the Pivoting Section
- Updated the Packet Sniffing Section with packetrecorder Coverage
- Updated the WMAP Web Scanner Section
- Updated the VBScript Infection Methods Section
- Updated the Meterpreter Screen Capture Section
Additions to the Module Reference Section:
- ftp/anonymous
- ftp/ftp_login
- ftp/ftp_version
- http/cert
- http/dir_listing
- http/dir_scanner
As always, we ask that if you find this content useful, please consider making a donation to Hackers for Charity to show your appreciation
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2025-24893 – Unauthenticated Remote Code Execution in XWiki via SolrSearch Macro
An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access.
Jun 5, 2025
2 min read

Insights
OffSec’s Take on the Global Generative AI Adoption Index
Discover OffSec’s take on the latest Global Generative AI Adoption Index report released by AWS.
May 30, 2025
3 min read

Research & Tutorials
CVE-2025-0655 – Remote Code Execution in D-Tale via Unprotected Custom Filters
A critical remote code execution (RCE) vulnerability in the D-Tale data visualization tool was identified which allowed attackers to execute arbitrary system exams, abusing an exposed API endpoint.
May 29, 2025
2 min read