Return of the GSoC!
The Metasploit project is proud to return to Google Summer of Code this year. Student applications are open until March 27th, so there's still time to get in! Coding begins on May 14th, and we're eager to hear what you'd like to see added to Metasploit. Not only do you get to work on a cool project, but you'll get paid too! Need some inspiration? Check out our list of project ideas. Apply directly via the Google Summer of Code, but also take a look at what we'd like to see in your proposal.
Metasploit without Metasploit?
Last week, two of our team, Adam Cammack and James Barnett, presented "Metasploit Minus Metasploit" at BSidesAustin2018. They demonstrated some cutting-edge functionality in Metasploit: pivoting proxies, new data collection functionality, and (GASP!) Python modules! Check out their slide deck, as well as Adam's HaXmas post about Python module functionality in Metasploit.
Metasploitable3 has now been released for both Linux and Windows! Maybe you played in our CTF and didn't get enough? Or maybe you missed it? No worries! You too can have your very own Metaspoitable3 CTF, now including both Linux and Windows environments, chock-full of vulnerable services ready for the 'sploitin. Download your copy today and check out this detailed video tutorial on how to setup your very own environment, thanks to @webpwnized. Also, @mubix did an amazing writeup that you should absolutely check out, even if you already played.
typo3_news_module_sqliperforms blind SQL injection against vulnerable TYPO3 news extension modules to retrieve the username and password hash of an administrative user.
enum_juniper- @h00die updated enum_juniper to support screenos. Now you can extract Juniper ScreenOS passwords and hashes straights to your Metasploit loot!
slowloris.py- @acammack updated this Python module to add IPv6 support to the slowloris DoS attack and fixed an error where the 'RHOST' option would not always appear.
varnish_cli_file_read- @hoodie added support for Varnish HTTP Cache 5.0, which is vulnerable to a partial arbitrary file read though the
As always, you can update to the latest Metasploit Framework with msfupdate, and you can get more details on the changes since the last blog post from GitHub:
To install fresh, check out the open-source-only Nightly Installers, or the binary installers which also include the commercial editions. PLEASE NOTE that these installers, and Metasploit Framework versions included in distros such as Kali, Parrot, etc., are based off the stable Metasploit 4 branch. If you'd like to try out the newer things going into Metasploit 5, that work is available in the master branch of the Metasploit Framework repo on GitHub.