Friday, April 11, 2025
HomeCyber Security NewsMetasploit Framework Released with New Features

Metasploit Framework Released with New Features

Published on

SIEM as a Service

Follow Us on Google News

The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced an exciting new release packed with cutting-edge features.

The latest update includes new payloads targeting the emerging RISC-V architecture, a sophisticated SMB-to-HTTP(S) relay exploit for Active Directory Certificate Services (AD CS), and several new modules addressing high-profile vulnerabilities.

These additions continue to augment the framework’s capabilities, allowing penetration testers to exploit vulnerabilities across an even broader range of environments.

- Advertisement - Google News

New RISC-V Payloads

With this update, Metasploit has expanded its payload arsenal to include support for the RISC-V architecture, an open-source instruction set architecture (ISA) that has gained significant traction in hardware development.

Attend a Free Webinar on How to Maximize Cybersecurity Program ROI

New payloads targeting 32-bit and 64-bit RISC-V systems enable penetration testers to execute commands on compromised hardware, extending Metasploit’s reach to various IoT devices, embedded systems, and servers running on this architecture.

The payloads include Linux Execute Command and Linux Reboot options, allowing testers to control compromised systems remotely. As the adoption of RISC-V grows, these payloads ensure Metasploit remains relevant in cutting-edge environments.

SMB-to-HTTP(S) Relay Exploit Targeting ESC8 Vulnerability

Another headline feature in this release is the SMB-to-HTTP(S) relay exploit, designed to target the ESC8 vulnerability within Active Directory Certificate Services (AD CS).

Developed by Rapid7 contributors, this exploit is part of ongoing efforts to target Kerberos and Active Directory vulnerabilities.

The new module includes a modified SMB capture server, which repackages and forwards authentication data to an NTLM-authenticating HTTP server.

Once authenticated, the HTTP client interacts with the ESC8 module to request and download certificates, potentially granting attackers access to sensitive infrastructure.

A notable addition to Metasploit’s payload library is the Python Exec payload, contributed by zeroSteiner.

This payload supports Python 2.7 and Python 3.4+, enabling testers to execute arbitrary OS commands on compromised systems. Python’s versatility makes it a valuable tool for targeting various environments, from servers to IoT devices.

Several new modules have been introduced in this release, including:

  • SolarWinds Web Help Desk Backdoor (CVE-2024-28987): A module that exploits a backdoor in SolarWinds Web Help Desk to retrieve all tickets from the system.
  • WordPress TI WooCommerce Wishlist SQL Injection (CVE-2024-43917): This module targets an SQL injection vulnerability in the TI WooCommerce Wishlist plugin for WordPress, enabling attackers to dump usernames and hashed passwords.

This release includes new payloads, modules, and significant enhancements, such as the updated pipe_dcerpc_auditor module and an upgrade to Ruby 3.2.5, ensuring a smoother and more robust user experience.

With these new features, Metasploit users can target various systems and vulnerabilities, cementing the framework’s position as a must-have tool for security professionals and ethical hackers.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...