8b3a0a0bb1
this test to include the CmdStager module, not the CmdStagerVbs class Before: ``` msf > loadpath test/modules Loaded 32 modules: 8 posts 12 auxiliarys 12 exploits ``` After: ``` msf > loadpath test/modules Loaded 33 modules: 8 posts 12 auxiliarys 13 exploits msf > use exploit/test/cmdweb msf exploit(cmdweb) > info Name: Command Stager Web Test Module: exploit/test/cmdweb Platform: Windows Privileged: Yes License: Metasploit Framework License (BSD) Rank: Manual Disclosed: 2010-02-03 Provided by: bannedit <bannedit@metasploit.com> Available targets: Id Name -- ---- 0 Automatic Targeting Basic options: Name Current Setting Required Description ---- --------------- -------- ----------- Proxies no A proxy chain of format type:host:port[,type:host:port][...] RHOST yes The target address RPORT 8080 yes The target port VHOST no HTTP server virtual host Payload information: Description: This module tests the command stager mixin against a shell.jsp application installed on an Apache Tomcat server. msf exploit(cmdweb) > set RHOST 127.0.0.1 RHOST => 127.0.0.1 msf exploit(cmdweb) > run [*] Started reverse handler on 127.0.0.1:4444 [*] Command Stager progress - 2.01% done (2046/101881 bytes) [*] Command Stager progress - 4.02% done (4092/101881 bytes) [*] Command Stager progress - 6.02% done (6138/101881 bytes) [*] Command Stager progress - 8.03% done (8184/101881 bytes) [*] Command Stager progress - 10.04% done (10230/101881 bytes) [*] Command Stager progress - 12.05% done (12276/101881 bytes) [*] Command Stager progress - 14.06% done (14322/101881 bytes) [*] Command Stager progress - 16.07% done (16368/101881 bytes) [*] Command Stager progress - 18.07% done (18414/101881 bytes) ... ``` |
||
---|---|---|
app | ||
config | ||
data | ||
db | ||
documentation | ||
external | ||
features | ||
lib | ||
modules | ||
plugins | ||
script | ||
scripts | ||
spec | ||
test | ||
tools | ||
.gitignore | ||
.gitmodules | ||
.mailmap | ||
.rspec | ||
.rubocop.yml | ||
.ruby-gemset | ||
.ruby-version | ||
.simplecov | ||
.travis.yml | ||
.yardopts | ||
CONTRIBUTING.md | ||
COPYING | ||
Gemfile | ||
Gemfile.local.example | ||
Gemfile.lock | ||
HACKING | ||
LICENSE | ||
README.md | ||
Rakefile | ||
metasploit-framework-db.gemspec | ||
metasploit-framework-full.gemspec | ||
metasploit-framework-pcap.gemspec | ||
metasploit-framework.gemspec | ||
msfbinscan | ||
msfcli | ||
msfconsole | ||
msfd | ||
msfelfscan | ||
msfencode | ||
msfmachscan | ||
msfpayload | ||
msfpescan | ||
msfrop | ||
msfrpc | ||
msfrpcd | ||
msfupdate | ||
msfvenom |
README.md
Metasploit
The Metasploit Framework is released under a BSD-style license. See COPYING for more details.
The latest version of this software is available from https://metasploit.com/
Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework
API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api
Questions and suggestions can be sent to: https://lists.sourceforge.net/lists/listinfo/metasploit-hackers
Installing
Generally, you should use the free installer which contains all dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.
Using Metasploit
Metasploit can do all sorts of things. The first thing you'll want to do
is start msfconsole
, but after that, you'll probably be best served by
reading Metasploit Unleashed, the great community
resources, or the wiki.
Contributing
See the Dev Environment Setup guide on GitHub which will walk you through the whole process starting from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more info, see Contributing.