[framework] Metasploit Framework 3.0 Beta 3 (SVN)
H D Moore
hdm at metasploit.com
Sun Oct 29 21:00:13 PST 2006
I am happy to announce that the third beta release of version 3.0 of the
Metasploit Framework is now available for download. This release includes
numerous bug fixes and feature enhancements since Beta 2.
Windows users should upgrade ASAP, as the entire console interface has
been overhauled to provide a more Unix-like experience. The Windows
installer now includes all of the Rails dependencies that are required to
use the new MSFWeb.
If you would like to discuss the beta release with other users
please subscribe to the framework-beta mailing list by sending a blank
email to framework-beta-subscribe[at]metasploit.com. Please keep all
replies related to the beta release off of the main framework
mailing list in order to spare the bandwidth of those not interested.
Downloads for all platforms can be found here:
Unix users may need to install the openssl zlib and dl ruby modules for
the Framework to load. If you are using Ubuntu you will need to run the
# apt-get install libzlib-ruby
# apt-get install libopenssl-ruby
# apt-get install libdl-ruby
User of other distributions or Unix flavors may want to grab the latest
version of ruby from www.ruby-lang.org and build it from source. We highly
recommend using Ruby version 1.8.4 or newer.Windows users will need to
exit out of any running Cygwin-based applications before running the
installer or using the Framework. The old 3.0 installation should be
uninstalled prior to installing and using this version.
The release packages include Subversion repository information allowing to
synchronize your Beta 3 installation with the live development tree. The
Windows installer includes a "MSFUpdate" menu item that uses Subversion
to download the latest updates.Unix users will need to install the
Subversion client change into the framework directory and execute 'svn
On Unix systems, Subversion will complain about the self-signed
certificate in use at metasploit.com. Please verify that the fingerprint
matches the text below before accepting it:
- The certificate is not issued by a trusted authority. Use the
fingerprint to validate the certificate manually!
- Hostname: metasploit.com
- Valid: from Jun 3 06:56:22 2005 GMT until Mar 31 06:56:22 2007 GMT
- Issuer: Development The Metasploit Project San Antonio Texas US
- Fingerprint: 1f:a2:8e:ad:14:57:53:75:b7:ab:de:67:e8:fa:17:49:76:f2:ee:ad
(R)eject accept (t)emporarily or accept (p)ermanently?
More information about the framework