Second beta of bug-discovery tool Metasploit 3.0 fixes Windows glitch, adds multi-host feature

Researcher HD Moore today released the second beta of Metasploit Framework 3.0 Beta 2, which fixes bugs in the previous beta release and comes with new features for the vulnerability-finding tool. (See Metasploit 3.0 Makes Splash at Black Hat.)

This release is geared mostly for developers building modules and plug-ins for Metasploit, as well as early adopters. The final Metasploit 3.0 release, due by the end of the year, will contain more refinements and be even more user-friendly for researchers and penetration testers, says Moore, who heads up the Metasploit Project.

The new beta repaired a bug that prevented many modules from working on Windows, as well as a handful of other glitches. Among the new features of Metasploit 3.0 is one that lets researchers use a single Metasploit exploit for multiple targets. "Previously, you would need to select the specific exploit for the type of system you were going to attack," Moore says. "Now you can write things like browser exploits, where you don't know the operating system or architecture of the target until the client connects."

And the new auxiliary module enhancement feature lets developers build modules that work on multiple types of hosts simultaneously. "That's a big deal because it's the next step toward using the framework as a generic vulnerability assessment platform, which is a side goal of the 3.0 release," Moore says.

Moore says Metasploit is looking for feedback from developers and early adopters with beta versions of Metasploit 3.0.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

About the Author(s)

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights