bbb41c39b8
The current logic times out every packet almost immediately, making it possible for almost any non-trivial meterpreter session to receive duplicate packets. This causes problems especially with any interactions that involve passing resource handles or pointers back and forth between MSF and meterpreter, since meterpreter can be told to operate on freed pointers, double-closes, etc. This probably fixes tons of heisenbugs, including #3798. To reproduce this, I enabled all debug messages in meterpreter to slow it down, then ran this RC script with a reverse TCP meterpreter, after linking in the test modules: (cd modules/post ln -s ../../test/modules/post/test) die.rc: use exploit/multi/handler set payload windows/meterpreter/reverse_tcp set lhost 192.168.43.1 exploit -j sleep 5 use post/test/services set SESSION 1 run |
||
---|---|---|
app | ||
config | ||
data | ||
db | ||
documentation | ||
external | ||
features | ||
lib | ||
modules | ||
plugins | ||
script | ||
scripts | ||
spec | ||
test | ||
tools | ||
.gitignore | ||
.gitmodules | ||
.mailmap | ||
.rspec | ||
.rubocop.yml | ||
.ruby-gemset | ||
.ruby-version | ||
.simplecov | ||
.travis.yml | ||
.yardopts | ||
CONTRIBUTING.md | ||
COPYING | ||
Gemfile | ||
Gemfile.local.example | ||
Gemfile.lock | ||
HACKING | ||
LICENSE | ||
README.md | ||
Rakefile | ||
metasploit-framework-db.gemspec | ||
metasploit-framework-full.gemspec | ||
metasploit-framework-pcap.gemspec | ||
metasploit-framework.gemspec | ||
msfbinscan | ||
msfcli | ||
msfconsole | ||
msfd | ||
msfelfscan | ||
msfencode | ||
msfmachscan | ||
msfpayload | ||
msfpescan | ||
msfrop | ||
msfrpc | ||
msfrpcd | ||
msfupdate | ||
msfvenom |
README.md
Metasploit
The Metasploit Framework is released under a BSD-style license. See COPYING for more details.
The latest version of this software is available from https://metasploit.com/
Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework
API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api
Questions and suggestions can be sent to: https://lists.sourceforge.net/lists/listinfo/metasploit-hackers
Installing
Generally, you should use the free installer which contains all dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.
Using Metasploit
Metasploit can do all sorts of things. The first thing you'll want to do
is start msfconsole
, but after that, you'll probably be best served by
reading Metasploit Unleashed, the great community
resources, or the wiki.
Contributing
See the Dev Environment Setup guide on GitHub which will walk you through the whole process starting from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more info, see Contributing.