Metasploit 3.0 Beta 3 Released

Outsmart Malicious Hackers

The Metasploit Framework is an advanced open-source exploit development platform. The 3.0 tree represents a complete rewrite of the 2.0 codebase and provides a scalable and extensible framework for security tool development. The 3.0 Beta 3 release includes support for exploit automation, 802.11 wireless packet injection, and kernel-mode payloads.

Windows users are now presented with a RXVT console and an updated Cygwin environment, which greatly improves the usability of the 3.0 interface on the Windows platform.

The Metasploit Web Interface is still in development, but this release includes a preview of what the end functionality will look like. The web interface provides a “webtop” interface for interacting with the framework and uses aynschronous javascript to provide live searching. A early version of Metasploit IDE is also included with the web interface.

Downloads for all platforms can be found here:

The latest version can be pulled directly from Subversion:

Unix users may need to install the openssl zlib and dl ruby modules for the Framework to load. If you are using Ubuntu you will need to run the following commands:

Unix users who wish to try the new web interface will need to install the ‘rubygems’ package and the ‘rails’ gem. Please see for more information and platform-specific installation instructions.

Users of other distributions or Unix flavors may want to grab the latest version of ruby from and build it from source. We highly recommend using Ruby version 1.8.4 or newer.Windows users will need to exit out of any running Cygwin-based applications before running the installer or using the Framework. The old 3.0 installation should be uninstalled prior to installing and using this version.

The release packages include Subversion repository information allowing you to synchronize your Beta 3 installation with the live development tree. The Windows installer includes a “MSFUpdate” menu item that uses Subversion to download the latest updates.Unix users will need to install the Subversion client change into the framework directory and execute ‘svn update’.

On Unix systems, Subversion will complain about the self-signed certificate in use at Please verify that the fingerprint matches the one below before accepting it:

– Hostname:
– Valid: from Jun 3 06:56:22 2005 GMT until Mar 31 06:56:22 2007 GMT
– Issuer: Development The Metasploit Project San Antonio Texas US
– Fingerprint: 1f:a2:8e:ad:14:57:53:75:b7:ab:de:67:e8:fa:17:49:76:f2:ee:ad

Posted in: Exploits/Vulnerabilities, Hacking Tools, Programming

, , , , , , , , , , ,

Recent in Exploits/Vulnerabilities:
- DJI Firmware Hacking Removes Drone Flight Restrictions
- GnuPG Crypto Library libgcrypt Cracked Via Side-Channel
- NotPetya Ransomeware Wreaking Havoc

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 238,531 views
- AJAX: Is your application secure enough? - 120,734 views
- eEye Launches 0-Day Exploit Tracker - 86,319 views

3 Responses to Metasploit 3.0 Beta 3 Released

  1. Gouki December 7, 2006 at 1:08 am #

    Using Ubuntu, are we ST? :)

  2. Darknet December 8, 2006 at 4:02 am #

    Ubuntu Rox!

  3. Gouki December 8, 2006 at 7:43 am #

    Heheh! Indeed … (;