Wanted to cross post this so OWASP NJ Members can take advantage of
testing version Metasploit Framework 3.0 Beta 2
FYI - At our 12/7 meeting in Jersey City, NJ Paul Battista will be
speaking about Metasploit Framework and Buffer Overflows.
For more details on the upcoming event on 10/25 and 12/7 visit:
From: H D Moore [mailto:hdm@...
Sent: Sunday, August 27, 2006 9:43 PM
Subject: [framework] Metasploit Framework 3.0 Beta 2 (SVN)
I am happy to annouce that the second (and possibly last) Beta release
of version 3.0 is now available for download.=20
If you would like to discuss the beta release with other users please
subscribe to the framework-beta mailing list by sending a blank email to
framework-beta-subscribe[at]metasploit.com. Please keep all replies
related to the beta release off of the main framework mailing list in
order to spare the bandwidth of those not interested.
Downloads for all platforms can be found here:
Unix users may need to install the openssl zlib and dl ruby modules for
the Framework to load. If you are using Ubuntu run the following
# apt-get install libzlib-ruby
# apt-get install libopenssl-ruby
# apt-get install libdl-ruby
User of other distributions or Unix flavors may want to grab the latest
version of ruby from http://www.ruby-lang.org and build it from source.
Windows users will need to exit out of any running Cygwin-based
applications before running the installer or using the Framework. We
really tried to work with the native ruby interpreter for Windows but
numerous io/readline/stdin issues came up and we will try again once the
code base gets a little more stable.
The release packages now include Subversion repository information
allowing to synchronize your Beta 2 installation with the live
development tree. The Windows installer includes a "msfupdate" script
that uses Subversion to download the latest updates but Unix users will
need to install Subversion change into the framework directory and
execute 'svn update'.
On Unix systems Subversion will complain about the self-signed
certificate in use at metasploit.com. Please verify that the fingerprint
matches the text below before accepting it:
- The certificate is not issued by a trusted authority. Use the
fingerprint to validate the certificate manually!
- Hostname: metasploit.com
- Valid: from Jun 3 06:56:22 2005 GMT until Mar 31 06:56:22 2007 GMT
- Issuer: Development, The Metasploit Project, San Antonio, Texas, US
(R)eject, accept (t)emporarily or accept (p)ermanently?
PS. Check out the new web site design: http://metasploit.com/