Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add new Untitled Goose Game inspired logo #12430

Merged
merged 2 commits into from Oct 8, 2019

Conversation

@0xGilda
Copy link
Contributor

0xGilda commented Oct 8, 2019

Inspired by https://twitter.com/http_error_418/status/1181341361573941248
Adds a wonderful honkin goose to the metasploit start screen.

Verification

List the steps needed to make sure this thing works

  • Start MSFLOGO=data/logos/honk.txt ./msfconsole
  • Verify that the wonderful goose is displayed correctly
Inspired by an @IanColdwater tweet.
@0xGilda

This comment has been minimized.

Copy link
Contributor Author

0xGilda commented Oct 8, 2019

image
How it displays in msfconsole

@bwatters-r7

This comment has been minimized.

Copy link
Contributor

bwatters-r7 commented Oct 8, 2019

@Jenkins test this please
Sanity tests failing on previously bound port.... not because of this PR

[-] Handler failed to bind to 192.168.15.71:30002
[-] Handler failed to bind to 0.0.0.0:30002
[-] Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:30002).
@acammack-r7

This comment has been minimized.

Copy link
Contributor

acammack-r7 commented Oct 8, 2019

To ensure the proper ANSI sequences that will work on Windows are generated, we prefer banner submissions to use the substitution sequences here like in the red and bold heart banner

@0xGilda

This comment has been minimized.

Copy link
Contributor Author

0xGilda commented Oct 8, 2019

To ensure the proper ANSI sequences that will work on Windows are generated, we prefer banner submissions to use the substitution sequences here like in the red and bold heart banner

This has been fixed, thanks for the heads up.

@wvu-r7 wvu-r7 self-assigned this Oct 8, 2019
@wvu-r7

This comment has been minimized.

Copy link
Contributor

wvu-r7 commented Oct 8, 2019

Honk

wvu@kharak:/rapid7/metasploit-framework:master$ MSFLOGO=data/logos/honk.txt ./msfconsole

                                   ___          ____
                               ,-""   `.      < HONK >
                             ,'  _   e )`-._ /  ----
                            /  ,' `-._<.===-'
                           /  /
                          /  ;
              _          /   ;
 (`._    _.-"" ""--..__,'    |
 <_  `-""                     \
  <`-                          :
   (__   <__.                  ;
     `-.   '-.__.      _.'    /
        \      `-.__,-'    _,'
         `._    ,    /__,-'
            ""._\__,'< <____
                 | |  `----.`.
                 | |        \ `.
                 ; |___      \-``
                 \   --<
                  `.`.<
                    `-'



       =[ metasploit v5.0.53-dev-1a831573bc               ]
+ -- --=[ 1932 exploits - 1079 auxiliary - 331 post       ]
+ -- --=[ 556 payloads - 45 encoders - 10 nops            ]
+ -- --=[ 7 evasion                                       ]

msf5 >
wvu-r7 added a commit to wvu-r7/metasploit-framework that referenced this pull request Oct 8, 2019
@wvu-r7 wvu-r7 merged commit 0b95acf into rapid7:master Oct 8, 2019
3 checks passed
3 checks passed
Metasploit Automation - Sanity Test Execution Successfully completed all tests.
Details
Metasploit Automation - Test Execution Successfully completed all tests.
Details
continuous-integration/travis-ci/pr The Travis CI build passed
Details
@wvu-r7

This comment has been minimized.

Copy link
Contributor

wvu-r7 commented Oct 8, 2019

Release Notes

This adds a goose to the included startup banners for msfconsole.

msjenkins-r7 added a commit that referenced this pull request Oct 8, 2019
@0xGilda 0xGilda deleted the 0xGilda:honk branch Oct 8, 2019
@busterb

This comment has been minimized.

Copy link
Member

busterb commented Oct 8, 2019

I appreciate that this was your first github PR ever @0xGilda, nice start!

fengjixuchui added a commit to fengjixuchui/metasploit-framework that referenced this pull request Oct 9, 2019
Land rapid7#12430, there's a goose in my MSF
@0xGilda

This comment has been minimized.

Copy link
Contributor Author

0xGilda commented Oct 9, 2019

(on this account) but thanks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
6 participants
You can’t perform that action at this time.