metasploit-framework/dev/bh/blog.txt

34 lines
1.9 KiB
Plaintext

Blog entry, Stardate April, 2005
We have recently been on a new shellcode kick, but this time it's not about
making them smaller. We're currently working on building very power new
post-exploitation shellcode and toolkits, and a very powerful unified API
to expose their functionality. This will allow us to diverge from precanned
payloads, allowing users to quickly build power and portable post-exploitation
tools. We've have built strongly upon our Windows DLL injection, and are
working on extending similar functionality to the land of Unix. We're also
working hard on the next version of Metasploit, which follows this same
philosophy of emedability and extensablity, allowing users to build their own
tools on top of our framework. Our previous work was all about exploit
frameworks. Our new approach we are really building more of a hacker tool
framework, allowing very strong automation and customization.
ignore this.....
With Metasploit 3.0 on the horizon, we've been working hard on design and
building components to take a very different focus. Currently Metasploit 2
is very much an end user tool, and doing anything custom isn't so elegant.
The approach we are taking in Metasploit 3, is "Metasploit as a library". We
are working very hard on writing post-exploitation suites for different
platforms, and then building a unified API that they all adhere to. This will
allow you to directly script remote hosts, proxying file operations, network
communications, and transparent channelized communication. The new system is
being designed to be threadsafe to a high degree, forcing us to rethink and
redesign many of our tools and protocols. Our new system is design to allow
you to do things like run 10 exploits concurrently, all "pivoting" through
a host you previously owned. Along with this new feature set, we are still
concentrating on keeping things off disk, all in-memory injection, etc.