Metasploit Issues New Beta

Second beta of bug-discovery tool Metasploit 3.0 fixes Windows glitch, adds multi-host feature

Dark Reading logo in a gray background | Dark Reading

Researcher HD Moore today released the second beta of Metasploit Framework 3.0 Beta 2, which fixes bugs in the previous beta release and comes with new features for the vulnerability-finding tool. (See Metasploit 3.0 Makes Splash at Black Hat.)

This release is geared mostly for developers building modules and plug-ins for Metasploit, as well as early adopters. The final Metasploit 3.0 release, due by the end of the year, will contain more refinements and be even more user-friendly for researchers and penetration testers, says Moore, who heads up the Metasploit Project.

The new beta repaired a bug that prevented many modules from working on Windows, as well as a handful of other glitches. Among the new features of Metasploit 3.0 is one that lets researchers use a single Metasploit exploit for multiple targets. "Previously, you would need to select the specific exploit for the type of system you were going to attack," Moore says. "Now you can write things like browser exploits, where you don't know the operating system or architecture of the target until the client connects."

And the new auxiliary module enhancement feature lets developers build modules that work on multiple types of hosts simultaneously. "That's a big deal because it's the next step toward using the framework as a generic vulnerability assessment platform, which is a side goal of the 3.0 release," Moore says.

Moore says Metasploit is looking for feedback from developers and early adopters with beta versions of Metasploit 3.0.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

About the Author

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with three decades of experience in reporting and editing for various technology and business publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was selected three consecutive times as one of the Top 10 Cybersecurity Journalists in the US, and was named as one of Folio's 2019 Top Women in Media. She has been with Dark Reading since its launch in 2006.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights