Blog
May 16, 2011
MSFU Updates – May 2011
This month, even with the rampant development and release of BackTrack 5, we still devoted some time to updating Metasploit Unleashed. The Metasploit team is making a great deal of progress switching over to post-exploitation modules so we focused entirely on them this month and added many to the Metasploit Module Reference section.
1 min read
This month, even with the rampant development and release of BackTrack 5, we still devoted some time to updating Metasploit Unleashed. The Metasploit team is making a great deal of progress switching over to post-exploitation modules so we focused entirely on them this month and added many to the Metasploit Module Reference section.
Module Reference Additions
- multi/gather/env
- multi/gather/firefox_creds
- windows/capture/keylog_recorder
- windows/gather/arp_scanner
- windows/gather/checkvm
- windows/gather/credential_collector
- windows/gather/dumplinks
- windows/gather/enum_appliations
- windows/gather/enum_logged_on_users
- windows/gather/enum_shares
- windows/gather/enum_snmp
- windows/gather/hashdump
- windows/gather/usb_history
- windows/manage/autoroute
- windows/manage/delete_user
- windows/manage/migrate
- windows/manage/multi_meterpreter_inject
As always, we ask that if you find this content useful, that you consider making a donation to Hackers for Charity to show your appreciation.
Cybersecurity leader resources
Sign up for the Secure Leader and get the latest info on industry trends, resources and best practices for security leaders every other week
Latest from OffSec
OffSec News
Master Incident Response with Hands-On Training in IR-200: Foundational Incident Response
OffSec is excited to announce the immediate availability of a new course: IR-200: Foundational Incident Response.
Oct 29, 2024
4 min read
Enterprise Security
Beyond the Resume: Effective Techniques for Qualifying Top Cybersecurity Talent
Building a cybersecurity team takes more than resumes. Discover effective techniques to identify top talent ready to tackle today’s cyber threats.
Oct 24, 2024
6 min read
Enterprise Security
How to Upskill and Fill Cybersecurity Skill Gaps on Your Team With Custom Learning Paths
Learn how to upskill your team with tailored learning paths, ensuring relevant, actionable training for real-world challenges.
Oct 24, 2024
5 min read