Metasploit Framework
 
 
 
 
 
 
Go to file
Ruslaideemin d91b412661 adobe_flash_sps.rb - resource_uri vs get_resource
resource_uri will randomize the returned uri unless
datastore['URIPATH"] is set.

get_resource will return the currently used reosurce_uri

Since the incorrect type is used, this exploit is completely broken.

Tested fix with both URIPATH set to / and unset, and it works after
redirect.
2013-06-11 07:13:02 +10:00
config Add some friendlier defaults to database.yml 2013-04-19 15:43:25 -05:00
data Land #1927 - Add common passwords from xato.net 2013-06-07 15:24:09 -05:00
db was missing a nil check 2013-06-04 14:21:07 -05:00
documentation Update Gemfile to metasploit_data_models 0.6.1 2013-03-07 14:22:35 -06:00
external Land #1947, remove JavaPayload source 2013-06-12 11:17:23 -05:00
lib Restore file_create 2013-06-13 16:42:18 -05:00
modules adobe_flash_sps.rb - resource_uri vs get_resource 2013-06-11 07:13:02 +10:00
plugins Uses raw-xml-v2 Nexpose export for Nexpose import as this adds device-id 2013-06-11 18:37:02 -05:00
scripts Updated example syntax to correctly identify filename 2013-06-04 10:26:00 -07:00
spec Rspec: Ensure PacketFu is actually still available 2013-06-10 16:02:50 -05:00
test Landing #1862 - Remove inline unit tests 2013-05-23 22:19:29 -05:00
tools msftidy cleanup 2013-04-12 21:39:11 +02:00
.gitignore Add new rvm control files to ignores 2013-05-07 08:32:21 -05:00
.mailmap Alphabetized .mailmap 2013-04-15 15:40:26 -05:00
.rspec Fix missed rename when adding fastlib under directory 2012-10-08 16:14:37 -05:00
.simplecov Better Rubymine compatibility for .simplecov 2013-01-18 11:12:16 -06:00
.travis.yml Configure travis-ci to use database for rake spec 2013-03-15 08:48:20 -05:00
.yardopts Merge pull request #1563 from rapid7/bug/yard-guard 2013-03-07 17:35:03 -06:00
CONTRIBUTING.md Add a note about hooking msftidy 2013-05-28 10:44:23 -05:00
COPYING Replace THIRD_PARTY with machine-readable LICENSE 2013-01-08 13:38:18 -06:00
Gemfile Add Gemfile entry for PacketFu 2013-06-10 14:18:05 -05:00
Gemfile.lock Add Gemfile entry for PacketFu 2013-06-10 14:18:05 -05:00
HACKING Adding bundler step to HACKING 2013-04-05 10:18:58 -05:00
LICENSE Fix typo 2013-04-23 15:39:02 -05:00
README.md Merge branch 'feature/contributing' of https://github.com/todb-r7/metasploit-framework into todb-r7-feature/contributing 2012-11-13 21:44:42 +01:00
Rakefile Update to metasploit_data_models 0.11.0 2013-05-09 13:25:26 -05:00
msfbinscan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfcli Fix module reloading 2012-10-04 16:32:12 -05:00
msfconsole Fully deprecates msfupdate over SVN 2013-03-14 15:21:33 -05:00
msfd Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfelfscan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfencode Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfmachscan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfpayload Fix hard vs soft tabs 2013-05-13 20:44:51 -05:00
msfpescan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfrop Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfrpc Remove unused option. 2013-03-25 20:47:18 -05:00
msfrpcd Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfupdate Automatically update gems after running msfupdate 2013-04-05 09:42:15 -05:00
msfvenom msfvenom and exe-small fmt bug fix 2013-05-16 21:13:45 +01:00

README.md

Metasploit Build Status Code Climate

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from http://metasploit.com/

Bug tracking and development information can be found at: https://dev.metasploit.com/redmine/projects/framework/

The public GitHub source repository can be found at: https://github.com/rapid7/metasploit-framework

Questions and suggestions can be sent to: msfdev(at)metasploit.com

The framework mailing list is the place to discuss features and ask for help. To subscribe, visit the following web page: https://mail.metasploit.com/mailman/listinfo/framework

The mailing list archives are available from: https://mail.metasploit.com/pipermail/framework/

Installing

Generally, you should use the installer which contains all dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading some of the great tutorials online:

Contributing

See the Dev Environment Setup guide on GitHub which will walk you through the whole process starting from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more info, see Contributing.