Tuesday, August 29, 2006

Updating My Metasploit

y3dips@hogwartz:~/pentest/exploits/framework-2.6$ ./msfupdate -u

+ -- --=[ msfupdate v2.6 [revision 1.45]

[*] Calculating local file checksums, please wait...

[*] Online Update Task Summary

Update: ./docs/BUGS
Update: ./docs/COPYING
Update: ./docs/COPYING.GNU
Update: ./docs/SECURITY
Update: ./docs/VERSION
Update: ./exploits/badblue_ext_overflow.pm
Update: ./exploits/bomberclone_overflow_win32.pm
Update: ./exploits/cesarftp_mkd.pm
Update: ./exploits/eiq_license.pm
Update: ./exploits/firefox_queryinterface_linux.pm
Update: ./exploits/firefox_queryinterface_osx.pm
Update: ./exploits/freesshd_key_exchange.pm
Update: ./exploits/futuresoft_tftpd.pm
Update: ./exploits/ie_createobject.pm
Update: ./exploits/ie_createtextrange.pm
Update: ./exploits/ie_xp_pfv_metafile.pm
Update: ./exploits/lsass_ms04_011.pm
Update: ./exploits/mercur_imap_select_overflow.pm
Update: ./exploits/mercury_imap.pm
Update: ./exploits/mozilla_compareto.pm
Update: ./exploits/ms05_030_nntp.pm
Update: ./exploits/netapi_ms06_040.pm
Update: ./exploits/niprint_lpd.pm
Update: ./exploits/realvnc_client.pm
Update: ./exploits/rras_ms06_025.pm
Update: ./exploits/rras_ms06_025_rasman.pm
Update: ./exploits/securecrt_ssh1.pm
Update: ./exploits/tftpd32_long_filename.pm
Update: ./lib/Msf/PayloadComponent/BSD/BindStager.pm
Update: ./lib/Msf/PayloadComponent/BSD/FindRecvStager.pm
Update: ./lib/Msf/PayloadComponent/BSD/Payload.pm
Update: ./lib/Msf/PayloadComponent/BSD/ReverseStager.pm
Update: ./lib/Msf/PayloadComponent/BSD/StagePayload.pm
Update: ./lib/Msf/PayloadComponent/BSD/ia32/BindStager.pm
Update: ./lib/Msf/PayloadComponent/BSD/ia32/FindRecvStager.pm
Update: ./lib/Msf/PayloadComponent/BSD/ia32/ReverseStager.pm
Update: ./lib/Msf/PayloadComponent/BSD/ia32/ShellStage.pm
Update: ./lib/Msf/PayloadComponent/OSX/BindStager.pm
Update: ./lib/Msf/PayloadComponent/OSX/FindRecvStager.pm
Update: ./lib/Msf/PayloadComponent/OSX/Payload.pm
Update: ./lib/Msf/PayloadComponent/OSX/ReverseStager.pm
Update: ./lib/Msf/PayloadComponent/OSX/StagePayload.pm
Update: ./lib/Msf/PayloadComponent/OSX/ppc/BindStager.pm
Update: ./lib/Msf/PayloadComponent/OSX/ppc/FindRecvPeekStager.pm
Update: ./lib/Msf/PayloadComponent/OSX/ppc/FindRecvStager.pm
Update: ./lib/Msf/PayloadComponent/OSX/ppc/ReverseNFStager.pm
Update: ./lib/Msf/PayloadComponent/OSX/ppc/ReverseStager.pm
Update: ./lib/Msf/PayloadComponent/OSX/ppc/ShellStage.pm
Update: ./lib/Pex/DCERPC.pm
Update: ./lib/Pex/Utils.pm
Update: ./msfconsole
Update: ./msfpayload
Update: ./msfpescan
Update: ./payloads/osx_ia32_bind.pm
Update: ./src/shellcode/win32/dllinject/README
Update: ./src/shellcode/win32/dllinject/vncinject/vncdll/zlib/FAQ
Update: ./src/shellcode/win32/dllinject/vncinject/vncdll/zlib/INDEX
Update: ./src/shellcode/win32/dllinject/vncinject/vncdll/zlib/README
Update: ./src/shellcode/win32/standard/README
Update: ./src/shellcode/win32/standard/templates/inc/README

Continue? (yes or no) > yes


[*] Starting online update of 60 file(s)...

[0001/0060 - 0x000334 bytes] ./docs/BUGS
[0002/0060 - 0x0008d0 bytes] ./docs/COPYING
[0003/0060 - 0x00464e bytes] ./docs/COPYING.GNU
[0004/0060 - 0x000b7d bytes] ./docs/SECURITY
[0005/0060 - 0x00000c bytes] ./docs/VERSION
[0006/0060 - 0x000c74 bytes] ./exploits/badblue_ext_overflow.pm
[0007/0060 - 0x000c72 bytes] ./exploits/bomberclone_overflow_win32.pm
[0008/0060 - 0x000d68 bytes] ./exploits/cesarftp_mkd.pm
[0009/0060 - 0x000a4e bytes] ./exploits/eiq_license.pm
[0010/0060 - 0x0016a9 bytes] ./exploits/firefox_queryinterface_linux.pm
[0011/0060 - 0x0016a9 bytes] ./exploits/firefox_queryinterface_osx.pm
[0012/0060 - 0x000c27 bytes] ./exploits/freesshd_key_exchange.pm
[0013/0060 - 0x000ce6 bytes] ./exploits/futuresoft_tftpd.pm
[0014/0060 - 0x00205e bytes] ./exploits/ie_createobject.pm
[0015/0060 - 0x00209c bytes] ./exploits/ie_createtextrange.pm
[0016/0060 - 0x002fae bytes] ./exploits/ie_xp_pfv_metafile.pm
[0017/0060 - 0x001b2a bytes] ./exploits/lsass_ms04_011.pm
[0018/0060 - 0x000de4 bytes] ./exploits/mercur_imap_select_overflow.pm
[0019/0060 - 0x001016 bytes] ./exploits/mercury_imap.pm
[0020/0060 - 0x00181d bytes] ./exploits/mozilla_compareto.pm
[0021/0060 - 0x000f61 bytes] ./exploits/ms05_030_nntp.pm
[0022/0060 - 0x0021ca bytes] ./exploits/netapi_ms06_040.pm
[0023/0060 - 0x000795 bytes] ./exploits/niprint_lpd.pm
[0024/0060 - 0x000e23 bytes] ./exploits/realvnc_client.pm
[0025/0060 - 0x001502 bytes] ./exploits/rras_ms06_025.pm
[0026/0060 - 0x00211f bytes] ./exploits/rras_ms06_025_rasman.pm
[0027/0060 - 0x000d40 bytes] ./exploits/securecrt_ssh1.pm
[0028/0060 - 0x000acc bytes] ./exploits/tftpd32_long_filename.pm
[0029/0060 - 0x000297 bytes] ./lib/Msf/PayloadComponent/BSD/BindStager.pm
[0030/0060 - 0x000457 bytes] ./lib/Msf/PayloadComponent/BSD/FindRecvStager.pm
[0031/0060 - 0x000508 bytes] ./lib/Msf/PayloadComponent/BSD/Payload.pm
[0032/0060 - 0x0002a7 bytes] ./lib/Msf/PayloadComponent/BSD/ReverseStager.pm
[0033/0060 - 0x000592 bytes] ./lib/Msf/PayloadComponent/BSD/StagePayload.pm
[0034/0060 - 0x0004c2 bytes] ./lib/Msf/PayloadComponent/BSD/ia32/BindStager.pm
[0035/0060 - 0x000499 bytes] ./lib/Msf/PayloadComponent/BSD/ia32/FindRecvStager.pm
[0036/0060 - 0x0004c2 bytes] ./lib/Msf/PayloadComponent/BSD/ia32/ReverseStager.pm
[0037/0060 - 0x000410 bytes] ./lib/Msf/PayloadComponent/BSD/ia32/ShellStage.pm
[0038/0060 - 0x000297 bytes] ./lib/Msf/PayloadComponent/OSX/BindStager.pm
[0039/0060 - 0x000424 bytes] ./lib/Msf/PayloadComponent/OSX/FindRecvStager.pm
[0040/0060 - 0x000508 bytes] ./lib/Msf/PayloadComponent/OSX/Payload.pm
[0041/0060 - 0x0002a6 bytes] ./lib/Msf/PayloadComponent/OSX/ReverseStager.pm
[0042/0060 - 0x000592 bytes] ./lib/Msf/PayloadComponent/OSX/StagePayload.pm
[0043/0060 - 0x000cd8 bytes] ./lib/Msf/PayloadComponent/OSX/ppc/BindStager.pm
[0044/0060 - 0x000c36 bytes] ./lib/Msf/PayloadComponent/OSX/ppc/FindRecvPeekStager.pm
[0045/0060 - 0x0008a2 bytes] ./lib/Msf/PayloadComponent/OSX/ppc/FindRecvStager.pm
[0046/0060 - 0x001265 bytes] ./lib/Msf/PayloadComponent/OSX/ppc/ReverseNFStager.pm
[0047/0060 - 0x0009fd bytes] ./lib/Msf/PayloadComponent/OSX/ppc/ReverseStager.pm
[0048/0060 - 0x000ced bytes] ./lib/Msf/PayloadComponent/OSX/ppc/ShellStage.pm
[0049/0060 - 0x007904 bytes] ./lib/Pex/DCERPC.pm
[0050/0060 - 0x00247f bytes] ./lib/Pex/Utils.pm
[0051/0060 - 0x0061c9 bytes] ./msfconsole
[0052/0060 - 0x000f04 bytes] ./msfpayload
[0053/0060 - 0x002d2a bytes] ./msfpescan
[0054/0060 - 0x0006ea bytes] ./payloads/osx_ia32_bind.pm
[0055/0060 - 0x0000e5 bytes] ./src/shellcode/win32/dllinject/README
[0056/0060 - 0x000e09 bytes] ./src/shellcode/win32/dllinject/vncinject/vncdll/zlib/FAQ
[0057/0060 - 0x0009c6 bytes] ./src/shellcode/win32/dllinject/vncinject/vncdll/zlib/INDEX
[0058/0060 - 0x001add bytes] ./src/shellcode/win32/dllinject/vncinject/vncdll/zlib/README
[0059/0060 - 0x0008e3 bytes] ./src/shellcode/win32/standard/README
[0060/0060 - 0x000051 bytes] ./src/shellcode/win32/standard/templates/inc/README

[*] Regenerating local file database
y3dips@hogwartz:~/pentest/exploits/framework-2.6$ ./msfconsole



# # ###### ##### ## #### ##### # #### # #####
## ## # # # # # # # # # # # #
# ## # ##### # # # #### # # # # # # #
# # # # ###### # ##### # # # # #
# # # # # # # # # # # # # #
# # ###### # # # #### # ###### #### # #


+ -- --=[ msfconsole v2.6 [153 exploits - 76 payloads]

msf >

No comments:

Post a Comment