Metasploit Reloaded
![ryan-naraine.jpg](https://www.zdnet.com/a/img/resize/58705b1ab848cb0209d7d7d504dffaab176d93aa/2014/07/22/4b4e2273-1175-11e4-9732-00505685119a/ryan-naraine.jpg?auto=webp&fit=crop&frame=1&height=192&width=192)
![59906.jpg](https://www.zdnet.com/a/img/resize/3544069fb6ad6808bdf73dc8c115bebadcd31453/2014/08/29/d126bd45-2f3e-11e4-9e6a-00505685119a/59906.jpg?auto=webp&width=1280)
In addition to hundreds of exploits and payloads, Moore said Metasploit 3.0 also ships with 30 auxiliary modules to perform tasks like host discovery, protocol fuzzing, and denial-of-service testing. See Ryan Naraine's report on the new version here.
The Metasploit Framework Web Console 3.0, showing in Microsoft's Internet Explorer 7.
The web interface (msfweb) is a Ruby on Rails application that uses the Prototype JavaScript Framework to provide in-browser windowing support. Asynchronous JavaScript is used to provide as-you-type search results for any module type and provide tab completion for the web console interface.
allows all network connections to a given subnet to be routed through an existing session.
A help menu provides assistance for pen testers.
Metasploit modules are now organized in a directory structure instead of a single flat directory. A caching system provides faster loading times. The result is a scalable system that can manage hundreds of different modules at a time (over 300 alone in this release).
Visual evidence of a successful VNC code execution exploit.
A "priv" extension (accessible by the "use priv" command) provides the hashdump command for dumping password hashes and the timestomp command for erasing file system timestamps.
hanks to Ruby's in-process threading support, it is possible to share a single Metasploit instance with other users, exploit multiple hosts at the same time, and run persistent background services, while only consuming the system resources of a single process.
exploits, 104 payloads, 17 encoders, and 3 nop modules. Additionally, 30 auxiliary modules are included that perform a wide range of tasks,
including host discovery, protocol fuzzing, and denial of service testing.