• Welcome
    • Quick Start Guide
    • Getting Started
    • Metasploit Basics
      • What is Penetration Testing?
      • Glossary
      • Keyboard Shortcuts
    • Getting Support
      • Submitting a Request for Enhancement
    • Rapid7's End of Life Policy
  • Installing Metasploit
    • Installing Metasploit Pro
      • System Requirements
    • Setting Up a Vulnerable Target
      • Metasploitable 2
      • Metasploitable 2 Exploitability Guide
  • Discovery
    • Discovery Scan
    • Importing Data
      • Importing Project Sonar
    • Vulnerability Scanning with Nexpose
    • Tracking Real-Time Statistics and Events
  • Validate Vulnerabilities
    • Validating a Vulnerability
    • Working with the Vulnerability Validation Wizard
    • Validating Vulnerabilities Discovered by Nexpose
    • Sharing Validation Results with Nexpose
  • Exploitation
    • Listener
    • Using Exploits
    • Skipping Fragile Devices
  • Payloads
    • Working with Payloads
    • The Payload Generator
  • Post-exploitation
    • About Post-Exploitation
    • Manage Meterpreter and Shell Sessions
    • Meterpreter getsystem
  • Credentials
    • Understanding Credentials
    • Managing Credentials
    • Reusing Credentials
    • Searching Credentials
    • Bruteforce Attacks
      • Understanding Bruteforce Findings
  • Social Engineering
    • About Social Engineering
    • Create a New Campaign
    • Create a Custom Campaign
    • Managing Campaigns
    • Review Your Findings
    • Managing Target Lists
    • Uploading Custom SSL Certificates
    • Modifying the SSL Cipher for Web Servers
    • Best Practices for Social Engineering
  • Automating Tasks
    • About Task Chains
    • Create a Task Chain
    • Managing and Editing Task Chains
    • Scheduling Task Chains
    • Resource Scripts
  • Reporting
    • About Reports
      • Activity Report
      • Audit Report
      • Collected Evidence Report
      • Compromised and Vulnerable Hosts Report
      • Credentials Report
      • FISMA Compliance Report
      • PCI Compliance Report
      • Social Engineering Campaign Details Report
      • Services Report
    • Customizing Standard Reports
    • Working with Custom Templates
    • About MetaModule Reports
      • AD CS Workflows MetaModule Report
      • Credentials Domino MetaModule Report
      • Known Credentials Intrusion Report
      • Single Password Testing MetaModule Report
      • SSH Key Testing MetaModule Report
      • Pass the Hash Report
  • Logs
    • Accessing Logs
    • Rotating Logs
    • Exporting Logs
    • Find Recently Changed Logs
  • MetaModules
    • AD CS Workflows MetaModule
    • Credentials Domino MetaModule
      • Understanding the Credentials Domino MetaModule Findings
    • Single Credential Testing MetaModule
    • SSH Key Testing MetaModule
    • Known Credentials Intrusion MetaModule
    • Segmentation and Firewall Testing MetaModule
  • Tutorials
    • Passing the Hash Tutorial
    • Testing a Single Credential Tutorial
    • Credentials Tutorial
  • Metasploit Pro Web Interface
    • Using the Metasploit Web Interface
    • The Projects Page
    • The Analysis Page
    • The Sessions Page
    • The Campaign Page
    • The Modules Page
    • The Tasks Page
    • The Administration Page
  • Managing Projects
    • Creating and Managing Projects
    • Exporting Project Data
    • Team Collaboration
  • Hosts
    • Managing Hosts
  • Managing and Updating Metasploit
    • Managing User Accounts
    • Managing License Keys
    • Verifying Downloads with SHA-1 Hashes
    • Backing Up and Restoring Metasploit Data
    • Notification Center
    • Updating Metasploit
    • Restarting Metasploit Services
    • Uninstalling Metasploit
    • Replacing the SSL Certificate
    • Set Up a Global SMTP Server
    • Reset Username and Password
  • Pro Console
    • About the Pro Console
    • Auto-Exploitation
    • Exporting and Importing Data
    • Managing Credentials
    • Managing the Database from the Pro Console
    • Managing Notes
    • Managing Tasks
    • Managing Vulnerabilities
    • Manual Exploitation
    • Managing Metasploit
    • Working with Projects
    • Pro Console Reports
    • Scanning and Managing Hosts
  • Troubleshooting
    • Unable to Connect
    • Does Pro include Framework as well?
    • How Are Logins Created?
    • Project Report Taking a Long Time
    • Exploit Has Been Running for a Long Time
    • Installation Troubleshooting
      • Download fails at x% error
      • Anti-virus Interrupts Installation
      • Metasploit service can"t bind to port 3790
      • “Metasploit is initializing” error
      • Metasploit Pro Free Trial
      • Invalid Email/ Domain
      • Register Without Internet Connection
      • Activation Failed Error
      • Prohibited Countries
      • Set the lhost in Metasploit
    • Update Troubleshooting
      • Incremental Updates
      • Items Displaying Incorrectly After Update
      • Installation failed: Signature failure Error
      • Failed to Update
    • Administration Troubleshooting
      • Support for 32-bit Operating Systems
      • Use Meterpreter Locally Without an Exploit
      • Issue Restarting on Windows Due to RangeError
      • Where Is the Activity Log?
      • Logs and Reports after Metasploit 4.9
      • Why Can"t I Add a New User?
    • Database Troubleshooting
      • No Database Connection
      • Automatically Connect the Database
      • Postgres Unable to Connect
    • Payloads Troubleshooting
      • Encoded Payloads Don"t Bypass Anti-virus
      • Getsystem Command
    • Social Engineering Troubleshooting
      • Frequently Asked Questions
      • Social Engineering Campaigns Report Image Broken
      • Social Engineering Campaign Not Working
      • Server Is Not Sending Emails
      • Social Engineering Campaign Taking a Long Time
    • Nexpose Troubleshooting
      • Nexpose host is unreachable
      • Authentication required for API access
      • Nexpose Scan Blackout
      • Scans Are Not Importing
    • Bruteforce Attacks Troubleshooting
      • What Happens When a Credential Fails?
      • Bruteforce Attack Is Not Working
  • Metasploit Framework
    • Metasploit Framework
    • Installing the Metasploit Framework
    • Managing the Database
    • Managing Workspaces
    • Modules
    • Running Metasploit Remotely
    • Tagging Hosts in msfconsole
  • Using APIs
    • Standard API Methods
    • Standard API Methods Reference
    • Pro API Methods Reference
      • Pro General API
      • Pro License API
      • Pro Updates API
      • Pro Task API
      • Pro Feature API
      • Pro Import API
      • Pro Loot API
      • Pro Module API
    • REST API
      • REST API Endpoints
    • RPC API
      • Sample Usage of the RPC API
  • Release Notes
    • Command Platform Release Notes

Update Troubleshooting
Copy link

Software updates contain new features and fixes that are necessary to continuously improve Metasploit. It is strongly recommended that you to install updates as soon as they are available.

  • Incremental Updates
  • Items Displaying Incorrectly After Update
  • “Installation failed: Signature failure” Error
  • Failed to Update

  • © Rapid7
    • Legal Terms
    • Privacy Policy
    • Export Notice
    • Trust