Since the October release of Metasploit exploit added 54, 66 auxiliary modules and 43 post-exploit modules and 18 “fillings» (payloads), it turns out that version 4.1 was added to the average of six modules per day.
Developers lists several key features . First, the new version comes with 13 new “stuffing”, which supports the discovery team sessions and shells in the networks of IPv6. In addition, many old tools Metasploit is also updated to support IPv6. The main library of Rex, as well as the backend Metasploit is now fully supports IPv6 address space to search and scanning hosts for vulnerabilities. The developers emphasize that the opportunity to work in IPv6 networks is extremely important as more and more sites move to the new protocol.
In addition to IPv6, another important innovation of Metasploit 4.2 is a set of new modules aimed at the interface of VMware vSphere / ESX SOAP, and a couple of modules to brute force passwords vmauthd and Virtual Web Services. Here is a brief list of modules:
tag_vm : record any message in the log as evidence of cracking VMware;
vmware_screenshot_stealer : removal of a screenshot VMware guest operating system as proof of the burglary;
terminate_esx_sessions : Disable the user from the server ESX;
vmauthd_version : detection of the version number of the service vmauthd;
esx_fingerprint : Identification (numbers to build) Server ESX;
vmware_http_login : bruteforce local accounts VMware via Web Services;
vmauthd_login : bruteforce local accounts through VMware Service vmauthd;
vmware_enum_users : transfer of local and domain accounts VMware;
vmware_enum_permissions : Enumeration of locally defined user and group permissions for the instance, and VMware;
vmware_enum_sessions : list of active sessions, VMware;
vmware_enum_vms : listing of all local virtual machines on a local instance VMware;
vmware_host_details : a study of hardware and host software VMware.
In addition to mass recharge modules, IPv6, and VMware, along with a new version of the single modules are available, made by independent experts, including the SSH scanner from HD Moore’a and search for H.323-sensitive devices from him.
Program Metasploit 4.2 can be downloaded here (Windows, Linux 32-bit, Linux 64-bit).