Blog
Jun 16, 2011
MSFU Updates – June 2011
Over this past month, we have put a great deal of time into bringing our free online course, Metasploit Unleashed in line with BackTrack 5. The majority of these changes are cosmetic in nature but they should help to reduce confusion for newcomers to Metasploit and BackTrack while ensuring a consistent look throughout. We have also taken this opportunity to do more functionality verification in the course.
1 min read

Over this past month, we have put a great deal of time into bringing our free online course, Metasploit Unleashed in line with BackTrack 5. The majority of these changes are cosmetic in nature but they should help to reduce confusion for newcomers to Metasploit and BackTrack while ensuring a consistent look throughout. We have also taken this opportunity to do more functionality verification in the course.
Updates
- Updated the Dradis Section
- Updated the Configuring Databases Section
- Updated the Port Scanning Section
- Updated the Auxiliary Plugins Section
- Updated the Hunting for MSSQL Section
- Updated the Service Identification Section
- Updated the SMB Login Check Section
- Added MSFvenom Coverage
- Added MSFpayload Coverage
Module Reference Additions
- multi/gather/ssh_creds
- linux/gather/hashdump
- linux/gather/enum_services
As always, we ask that if you find this content useful, that you consider making a donation to Hackers for Charity to show your appreciation.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-2928: MLflow Local File Inclusion via URI Fragment Manipulation
Read about an LFI vulnerability disclosed in MLflow which allowed unauthenticated remote attackers to read arbitrary files by exploiting URI fragments containing directory traversal sequences.
May 15, 2025
3 min read

Research & Tutorials
CVE-2025-23211: Tandoor Recipes Jinja2 SSTI to Remote Code Execution
A critical SSTI vulnerability was discovered in the open-source meal planning application Tandoor Recipes leading to a full system compromise.
May 8, 2025
2 min read

Research & Tutorials
CVE-2025-29927: Next.js Middleware Authorization Bypass
In this CVE blog, we explore a vulnerability in Next.js stemming from the improper trust of the x-middleware-subrequest header.
May 1, 2025
3 min read