The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide.
Changes in this version:
- The Windows installer now ships with a working Postgres connector
- New session notifications now always print a timestamp regardless of the TimestampOutput setting
- Addition of the auxiliary/scanner/discovery/udp_probe module, which works through Meterpreter pivoting
- HTTP client library is now more reliable when dealing with broken/embedded web servers
- Improvements to the database import code, covering NeXpose, Nessus, Qualys, and Metasploit Express
- The msfconsole “connect” command can now speak UDP (specify the -u flag)
- Nearly all exploit modules now have a DisclosureDate field
- HTTP fingerprinting routines added to some exploit modules
- The psexec module can now run native x64 payloads on x64 based Windows systems
- A development style guide has been added in the HACKING file in the SVN root
- FTP authentication bruteforce modules added.