Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Metasploit Framework 6.4 Released

March 25, 2024
Reading Time: 3 mins read
in News
Metasploit Framework 6.4 Released

Metasploit Framework 6.4, the latest release from Metasploit, introduces a host of new features and enhancements, exemplifying its steadfast commitment to fortify the arsenal of cybersecurity professionals and penetration testers. Noteworthy improvements in this release include substantial enhancements in Kerberos authentication support, with new capabilities added to support diamond and sapphire techniques in addition to golden and silver techniques. This update ensures compatibility with Windows Server 2022, aligning Metasploit with the latest Windows targets.

Furthermore, Framework 6.4 introduces a new module enabling the extraction of Kerberos tickets from a compromised host, enhancing the toolkit available to cybersecurity professionals for exploiting instances of Unconstrained Delegation. The release also emphasizes improvements in handling DNS queries within the framework, enabling the configuration of hostname resolutions, especially valuable in pivoting scenarios. This enhancement ensures that DNS queries for internal resources originate from compromised hosts, bolstering operational security.

Additionally, Metasploit 6.4 presents new session types for PostgreSQL, MSSQL, MySQL, and SMB, facilitating interactive queries with remote database instances and direct interaction with SMB shares, promoting efficiency and effectiveness in executing multiple modules against a single session. Importantly, this update supports indirect syscalls, a technique often utilized by security software to bypass EDR/AV detection and evade dynamic analysis, enhancing the stealthiness of operations within Metasploit.

Metasploit 6.4 also introduces improvements to module discoverability, featuring a new Hierarchical Search feature that streamlines users’ ability to navigate and identify the extensive array of modules within the framework. These enhancements underscore Metasploit’s continuous endeavor to equip cybersecurity professionals with indispensable tools to combat the evolving cyber threat landscape.

Reference:
  • Metasploit 6.4 Released Enhancements for Cybersecurity Pros
Tags: Cyber NewsCyber News 2024Cyber threatsCybersecurityKerberosMarch 2024Metasploit Framework 6.4
ADVERTISEMENT

Related Posts

New CISA Budget Slashes Staff And Funds

New CISA Budget Slashes Staff And Funds

June 3, 2025
New CISA Budget Slashes Staff And Funds

Microsoft and CrowdStrike Align Hacker Names

June 3, 2025
New CISA Budget Slashes Staff And Funds

Aussie Ransom Reporting Rules Now In Effect

June 3, 2025
Senators Urge CSRB Return For Salt Typhoon

Senators Urge CSRB Return For Salt Typhoon

June 2, 2025
Senators Urge CSRB Return For Salt Typhoon

Authorities Takedown Malware Hiding Tools

June 2, 2025
Senators Urge CSRB Return For Salt Typhoon

Alleged Conti and Trickbot Leader Unmasked

June 2, 2025

Latest Alerts

Fake FB Ban Fix Extension Steals Accounts

Actively Exploited Chrome V8 Flaw Patched

DevOps Servers Hit By JINX0132 Crypto Mine

Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

Google Script Used In New Phishing Scams

Subscribe to our newsletter

    Latest Incidents

    Cartier Data Breach Exposes Client Info

    White House Chief of Staff’s Phone Hacked

    The North Face Hit By 4th Credential Hack

    Covenant Health Cyberattack Shuts Hospitals

    Moscow DDoS Attack Cuts Internet For Days

    Puerto Rico’s Justice Department Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial