Metasploit on the pwnpad

After putting the Doctor (se-toolkit latest version) I decided to play around with metasploit and getting that all set up. As the title suggests I have the latest version on my pwnpad (bleeding edge). This wasn’t exactly hard but it did take a few steps to figure out.  First I wanted to simply run msfupdate but heard that there was “ruby” issues when you do that so after some googling I cam across the following helpful  information.

 

1. According to Jcran comments on the following post :http://www.toolswatch.org/2013/05/installing-my-own-pwnpad-community-for-fun-and-for-less-than-300/  I set up the alternatives (mine were pointing to 1.9.1. anyways if I recall correctly and then I purged the 1.8 stuff as he indicates

2.  I did an apt-get to make sure I had the latest 1.9.1 ruby – I actually uninstalled/removed it too and re-installed it (you shouldn’t have to do this I just wanted to make sure it registered the new stuff)

3. Went to the Metasploit-framework directory and performed a gem install bundle && bundle install

4. I then ran ./msfupdate (still from the metasploit-framework directory of course). and everything updated just fine 🙂

Hope this helps others.

Posted in Latest Posts, News and tagged , , , .

Leave a Reply

Your email address will not be published. Required fields are marked *