The Metasploit team is rolling to the end of the year featuring a week of modules, updates, and our annual CTF. I say rolling in part because here in the US, we’re coming off our week of Thanksgiving, which involves lots of pies, and we’re probably all a bit more spherical than normal! For those of you currently participating in our CTF, we’re looking forward to hosting you, and for those that are not, we do still have some slots open, so head on down to metasploitctf.com and create your own team or join someone else’s!
reload_allby cgranleese-r7 fixed a bug where reloading a module crashed because it attempted to alter a constant string.
As always, you can update to the latest Metasploit Framework with
msfupdate and you can get more details on the changes since the last blog post from GitHub:
If you are a
git user, you can clone the Metasploit Framework repo (master branch) for the latest. To install fresh without using git, you can use the open-source-only Nightly Installers or the binary installers (which also include the commercial edition).