Metasploit Framework
 
 
 
 
 
 
Go to file
Tod Beardsley b68396351a See #3941. This is a first attempt at supporting driving nmap via a metasploit module. It's a somewhat hefty checkin that includes the Nmap auxiliary mixin as well as an oracle login bruteforce module that uses it.
This definitely needs to be tested on Win32 before it can be called f i x e d, due to the differences between the nmap binaries and the way files are created and used.

Also, the oracle_login scanner could use another once-over for error handling -- don't rely on that yet.

Once this all works the way I expect, I'll document the procedure more thoroghly so people can take advantage.



git-svn-id: file:///home/svn/framework3/trunk@11948 4d416f70-5f16-0410-b530-b9f4589650da
2011-03-13 22:52:50 +00:00
data Fixed host import not working with remote connections. Increased auto-download wait time of generated payload via teaming server. Increased meterpreter command time out for teaming mode clients. 2011-03-12 06:00:32 +00:00
documentation prefer sdoc when it's installed. much prettier than rdoc 2011-02-23 22:13:53 +00:00
external Save window sizes and make formatting nicer. 2011-03-12 00:49:29 +00:00
lib See #3941. This is a first attempt at supporting driving nmap via a metasploit module. It's a somewhat hefty checkin that includes the Nmap auxiliary mixin as well as an oracle login bruteforce module that uses it. 2011-03-13 22:52:50 +00:00
modules See #3941. This is a first attempt at supporting driving nmap via a metasploit module. It's a somewhat hefty checkin that includes the Nmap auxiliary mixin as well as an oracle login bruteforce module that uses it. 2011-03-13 22:52:50 +00:00
plugins Fix wmap to test parameters, error inj. module as example 2011-02-22 04:27:40 +00:00
scripts make getgui default to english if language not in list of supported languages. 2011-02-19 16:08:42 +00:00
test call ruby directly 2011-03-09 03:39:28 +00:00
tools enable ntlmv2 and signing for smb client stack (pth implementation is coming), fixes #11678 and #152 2011-03-07 19:57:53 +00:00
HACKING Because msfweb doesn't really exist anymore. 2011-03-06 06:49:00 +00:00
README This updates the (C) for 2011, adds a CustomPrintPrefix option to set a unique prefix for a module and cleans up some post modules 2011-02-26 02:02:34 +00:00
armitage pass commandline arguments through to armitage.jar, fixes #3519 2011-01-13 16:04:42 +00:00
msfcli Fixes #1287 and #581 by having msfcli load msfconsole for exploits/auxiliary runs 2010-10-17 05:16:57 +00:00
msfconsole add a commandline switch for loading plugins at startup 2011-02-13 22:19:43 +00:00
msfd more cleanups 2010-05-03 17:13:09 +00:00
msfelfscan more cleanups 2010-05-03 17:13:09 +00:00
msfencode Fixes #3712, Do not keep looping on ENOENT or EINVAL 2011-02-15 23:34:26 +00:00
msfgui use javaw for windows, remove platform-specific comment 2010-10-24 00:57:50 +00:00
msfmachscan more cleanups 2010-05-03 17:13:09 +00:00
msfopcode more cleanups 2010-05-03 17:13:09 +00:00
msfpayload add some stderr to prevent pipe inside exe file, thanks to Total_Meltdown 2011-03-11 00:53:45 +00:00
msfpescan more cleanups 2010-05-03 17:13:09 +00:00
msfrpc performance: parse args before loading everything 2010-10-21 05:08:01 +00:00
msfrpcd Make -n option available to msfrpcd too. 2011-01-17 22:37:12 +00:00
msfupdate Add a wait mode 2010-10-19 08:22:44 +00:00

README

Copyright (C) 2006-2011, Rapid7 LLC
All rights reserved.

Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:

    * Redistributions of source code must retain the above copyright notice,
	  this list of conditions and the following disclaimer.

    * Redistributions in binary form must reproduce the above copyright notice,
	  this list of conditions and the following disclaimer in the documentation
	  and/or other materials provided with the distribution.

    * Neither the name of Rapid7 LLC nor the names of its contributors
	  may be used to endorse or promote products derived from this software
	  without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

================================================================================

The Metasploit Framework is provided under the 3-clause BSD license above.

The copyright on this package is held by Rapid7 LLC.

This license does not apply to the following components:
 - The OpenSSL library embedded into the Meterpreter payload binaries and the
   corresponding header files in the source tree
 - The Packet Sniffer SDK (MicroOLAP) library embedded into the Meterpreter
   Sniffer extension. HD Moore has a single-seat developer license.
 - The modified TightVNC binaries and their associated source code.
 - The Bit-Struct library located under lib/bit-struct
 - The Byakugan plugin located under external/source/byakugan
 - The Metasm library located under lib/metasm
 - The PcapRub library located under external/pcaprub
 - The Rabal library located under lib/rabal
 - The Racket library located under lib/racket
 - The PacketFu library located under lib/packetfu
 - The Ruby-Lorcon library located under external/ruby-lorcon
 - The SNMP library located under lib/snmp
 - The Zip library located under lib/zip

The latest version of this software is available from http://metasploit.com/

Bug tracking and development information can be found at:
 http://www.metasploit.com/redmine/projects/framework/

Questions and suggestions can be sent to:
 msfdev[at]metasploit.com

The framework mailing list is the place to discuss features and ask for help.
To subscribe, visit the following web page:
 https://mail.metasploit.com/mailman/listinfo/framework

The archives are available from:
 https://mail.metasploit.com/pipermail/framework/