Metasploit Framework
 
 
 
 
 
 
Go to file
RageLtMan 125aa43072 PowerShell post module download and exec
This adds sempervictus's PowerShell post module, along with a default
post module one can use for quick testing (for expected results, see
the screencap Gist at https://gist.github.com/6011cb87b01e970deca8

[Closes #403]

Squashed commit of the following:

commit c6b5a6aac1dc8781c67b611289d7710129592e83
Author: Tod Beardsley <todb@metasploit.com>
Date:   Mon May 21 14:43:48 2012 -0500

    Minor tweaks to language

commit ef088e135cd7b0ccb514a3011889154661d5bd09
Merge: 0a05455 1e14211
Author: Tod Beardsley <todb@metasploit.com>
Date:   Mon May 21 14:34:27 2012 -0500

    Merge remote branch 'todb/default-powershell' into Pull403

commit 0a0545558604c53d4648e3314ca8963ff9b225a7
Author: Tod Beardsley <todb@metasploit.com>
Date:   Mon May 21 14:33:33 2012 -0500

    Reverting unrelated telnet fix

    While I'm sure it's great, it needs to be tested.

commit 1e1421102b44a4c60c6eb9b442227075e959d7c6
Author: Tod Beardsley <todb@metasploit.com>
Date:   Mon May 21 14:14:09 2012 -0500

    Adds a default path to a script for exec_powershell.rb

commit 9978787f44896d06744d50febf4344111edcd7b1
Author: Tod Beardsley <todb@metasploit.com>
Date:   Mon May 21 14:06:46 2012 -0500

    Adds a new default powershell script

commit 25b605949fbf772e95a510162ca5af510c59788f
Author: RageLtMan <rageltman [at] sempervictus>
Date:   Mon May 21 14:15:15 2012 -0400

    Synchronized SVIT version of lib...powershell.rb to github. Adds timeout option, check for script encoding, etc. Added post/windows/manage/powershell folder with script execution module. Other modules which can be placed here would be WinRM meterp exec, PS persistence, etc

commit c4a7fd932fb8850de732bfa911cf8d729a5db42d
Merge: 21b31f1 36207eb
Author: RageLtMan <rageltman [at] sempervictus>
Date:   Mon May 21 14:07:26 2012 -0400

    msfvenom formatting merge conflict fix

commit 36207eb21ee04483c19790b5db7855d0a715e43d
Merge: c77eb03 4772c12
Author: RageLtMan <rageltman [at] sempervictus>
Date:   Mon May 21 14:06:07 2012 -0400

    Merge branch 'master' of https://github.com/rapid7/metasploit-framework

commit 21b31f10c505862c14234824d4dabbb6fdfe7cbb
Merge: 81a7d62 c77eb03
Author: RageLtMan <rageltman [at] sempervictus>
Date:   Fri May 18 12:57:52 2012 -0400

    Merge branch 'master' into powershell

commit c77eb03ca4428a741f5d231b3ec1cf80c90e9395
Merge: 89d5af7 52183aa
Author: RageLtMan <rageltman [at] sempervictus>
Date:   Fri May 18 12:57:21 2012 -0400

    Merge branch 'master' of https://github.com/rapid7/metasploit-framework

commit 89d5af7ab2fe1ce31cd70561893d94bb73f3762c
Author: RageLtMan <rageltman [at] sempervictus>
Date:   Fri Mar 2 01:28:02 2012 -0500

    Banner encoding fix when running against dd-wrt on ruby 1.9.3

commit 81a7d62c6dab8404c1c0566a8be84c7280edeef8
Author: RageLtMan <rageltman [at] sempervictus>
Date:   Tue Mar 20 20:19:13 2012 -0400

    powershell for msfvenom

commit 672c7bc37ea37a3b111f755ef17fe0c16047e488
Merge: 3e86dc4 ed542e2
Author: RageLtMan <rageltman [at] sempervictus>
Date:   Tue Mar 20 20:08:12 2012 -0400

    exe.rb merge cleanup

commit 3e86dc4c40da1df3d0ff4a9ab6fffe8eeda52544
Author: RageLtMan <rageltman [at] sempervictus>
Date:   Tue Mar 20 20:06:03 2012 -0400

    psh encoder cleanup

commit f619ed477fef7a2830b99ce6a9b27bb523c9d3ce
Author: RageLtMan <rageltman@sempervictus.com>
Date:   Sun Feb 5 13:35:11 2012 -0500

    method call fix for psh-net encoder

commit 7b035e6da0ead328aebbfdf9fbbebed506cdca18
Author: RageLtMan <rageltman@sempervictus.com>
Date:   Fri Feb 3 18:53:54 2012 -0500

    PS encoders: .net and architecture dependent native (psh-net, psh)

commit 7a2749bf2682686a87d37d240e61adece53fba8e
Merge: 32730b9 f89853d
Author: RageLtMan <rageltman@sempervictus.com>
Date:   Fri Feb 3 18:38:03 2012 -0500

    Merge branch 'master' into powershell

commit 32730b96be4c9bd73f1f45b5d2d4330b8fb72cb8
Merge: e69fcd1 f6a6963
Author: RageLtMan <rageltman@sempervictus.com>
Date:   Wed Jan 25 10:33:17 2012 -0500

    Merge branch 'master' of https://github.com/rapid7/metasploit-framework into powershell

commit e69fcd1a83412d6c0c96605b5acf0675e5b07205
Author: RageLtMan <rageltman@sempervictus.com>
Date:   Wed Jan 25 07:59:38 2012 -0500

    msfvenom psh addition

commit 9a5d8ead7e69c40ff5e9a73244165a5685ca47ec
Author: RageLtMan <rageltman@sempervictus.com>
Date:   Wed Jan 25 07:29:38 2012 -0500

    Proper author reference

commit 9fd8ac75a89ca2678b0d09192227eb23f00bf549
Author: RageLtMan <rageltman@sempervictus.com>
Date:   Tue Jan 24 19:07:30 2012 -0500

    Fix script handling

commit fa363dfe965382a9f89ff404398e38e8f164c11a
Author: RageLtMan <rageltman@sempervictus.com>
Date:   Tue Jan 24 17:31:09 2012 -0500

    added Msf::Post::Windows::Powershell, reworked post module to use mixin

commit e078d15b5464ff47ce616334d8cb1aa84a00df33
Author: RageLtMan <rageltman@sempervictus.com>
Date:   Mon Jan 23 13:42:35 2012 -0500

    vprint_good change

commit 355f8bb19a62d974c5c89079dd26dd4cbb756c0a
Author: RageLtMan <rageltman@sempervictus.com>
Date:   Mon Jan 23 12:50:51 2012 -0500

    exec powershell module

commit 5f9509444953f25352c994f90cae8a168878f7ea
Author: RageLtMan <rageltman@sempervictus.com>
Date:   Mon Jan 23 12:45:41 2012 -0500

    powershell encoder support - Redmine Feature #6049
2012-05-21 14:48:16 -05:00
data Merge pull request #401 from rsmudge/armitage 2012-05-20 20:01:12 -07:00
documentation Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
external Merge pull request #401 from rsmudge/armitage 2012-05-20 20:01:12 -07:00
lib PowerShell post module download and exec 2012-05-21 14:48:16 -05:00
modules PowerShell post module download and exec 2012-05-21 14:48:16 -05:00
plugins Adding aczid's minimal exploit configurator 2012-05-18 17:24:18 -05:00
scripts PowerShell post module download and exec 2012-05-21 14:48:16 -05:00
spec Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
test Don't do getpid checks if it's not implemented 2012-05-17 17:01:34 -06:00
tools Squashed commit of the following: 2012-04-19 18:27:18 -06:00
.gitignore Update javapayload and java meterpreter 2012-04-04 09:56:07 -06:00
Gemfile Require pg >=0.13 2012-04-22 21:49:15 -06:00
HACKING Updating HACKING to point developers to GitHub 2011-11-10 20:37:15 -06:00
README Touching README, mostly to test commits 2012-05-21 09:22:47 -05:00
armitage pass commandline arguments through to armitage.jar, fixes #3519 2011-01-13 16:04:42 +00:00
msfbinscan Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
msfcli Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
msfconsole Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
msfd Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
msfelfscan Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
msfencode Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
msfgui Try to load msgpack first, if it's not there, bail 2012-03-02 12:20:29 -06:00
msfmachscan Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
msfpayload Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
msfpescan Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
msfrop Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
msfrpc Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
msfrpcd Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
msfupdate msftidy pass on msf* 2011-10-23 12:04:41 +00:00
msfvenom Landing sempervictus's Powershell features 2012-05-18 16:39:49 -05:00

README

Copyright (C) 2006-2012, Rapid7 LLC
All rights reserved.

Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:

    * Redistributions of source code must retain the above copyright notice,
	  this list of conditions and the following disclaimer.

    * Redistributions in binary form must reproduce the above copyright notice,
	  this list of conditions and the following disclaimer in the documentation
	  and/or other materials provided with the distribution.

    * Neither the name of Rapid7 LLC nor the names of its contributors
	  may be used to endorse or promote products derived from this software
	  without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

================================================================================

The Metasploit Framework is provided under the 3-clause BSD license above.

The copyright on this package is held by Rapid7 LLC.

This license does not apply to the following components:
 - The Bit-Struct library located under lib/bit-struct
 - The OpenSSL library embedded into the Meterpreter payload binaries and the
   corresponding header files in the source tree
 - The Packet Sniffer SDK (MicroOLAP) library embedded into the Meterpreter
   Sniffer extension. HD Moore has a single-seat developer license.
 - The modified TightVNC binaries and their associated source code.
 - The Byakugan plugin located under external/source/byakugan
 - The Metasm library located under lib/metasm
 - The PcapRub library located under external/pcaprub
 - The Rabal library located under lib/rabal
 - The PacketFu library located under lib/packetfu
 - The Ruby-Lorcon library located under external/ruby-lorcon
 - The SNMP library located under lib/snmp
 - The Zip library located under lib/zip
 - The SSHKey library located under lib/sshkey

The latest version of this software is available from http://metasploit.com/

Bug tracking and development information can be found at:
 https://dev.metasploit.com/redmine/projects/framework/

The public GitHub source repository can be found at:
 https://github.com/rapid7/metasploit-framework

Questions and suggestions can be sent to:
 msfdev[at]metasploit.com

The framework mailing list is the place to discuss features and ask for help.
To subscribe, visit the following web page:
 https://mail.metasploit.com/mailman/listinfo/framework

The e-mail archives are available from:
 https://mail.metasploit.com/pipermail/framework/