Metasploit 6.2 Released – 138 New modules, 148 New Enhancements & 150+ Bugs Fixed
The company Rapid7 has launched a mark-recent version of Metasploit, Metasploit 6.2.0, which has a whole lot of enhancements and enhanced facets.
Besides to to the present facets, this recent version provides the next issues:-
- 138 New modules
- 148 Enhancements and facets
- 156 Worm fixes
With 864 payloads and 2,227 exploits, Metasploit is one of the most most-pale penetration attempting out frameworks. In say to evaluate the vulnerability of a network and to examine its defenses, these ingredients can all be pale.
Penetration attempting out and breaching networks would possibly maybe moreover moreover be executed with this framework. And now no longer most attention-grabbing that however this framework would possibly maybe be pale by the chance actors as successfully.
Among the most practical likely-identified cybersecurity instruments at the present time, Metasploit has change into one of the most most popular instruments due to the its ease of exhaust and the many payloads that it contains.
New Ingredients of Metasploit 6.2
Among the reasonably loads of many facets of this application, six of them are highlighted by the developers of Rapid7 and right here they’re talked about below:-
- Capture plugin: Insecurity testers, particularly offensive security testers, occupy in ideas capturing credentials to be the most a in point of fact predominant and early piece of their playbooks. Since Metasploit has been providing protocol-particular modules for years, you would possibly maybe moreover without complications cease this aim.
- SMB v3 server toughen: This a ways flung portion would possibly maybe moreover moreover be pale by penetration testers to host their payloads or DLLs after which to copy them to targets or remotely create them.
- Enhanced SMB relay toughen: This module would possibly maybe moreover moreover be pale for concentrating on a whole lot of units at a time in one session, the module invoking varied configurations for every instrument to substantiate excellent and efficient concentrating on.
- Improved pivoting & NATed providers toughen: A NAT or port-ahead configuration is predominant for the aim to join to Metasploit the utilization of this module.
- Debugging Meterpreter sessions: The logging of network queries and responses between MSFconsole and Meterpreter valid through a session can now be pale to debug Meterpreter sessions.
- Local exploit suggests enhancements: An improved particular person interface and malicious program fixes were included into this module in say to spice up its functionality.
High modules
Here below we now occupy talked about the total prime and most pale modules:-
- VMware vCenter Server Unauthenticated JNDI Injection RCE (via Log4Shell)
- F5 BIG-IP iControl RCE via REST Authentication Bypass
- VMware Workspace ONE Entry CVE-2022-22954
- Zyxel Firewall ZTP Unauthenticated Negate Injection
- Windows CVE-2022-21999 SpoolFool Privesc
- Soiled Pipe Local Privilege Escalation via CVE-2022-0847
Source credit : cybersecuritynews.com