Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merge metasploit framework wiki into metasploit framework #16518

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
2496 commits
Select commit Hold shift + click to select a range
29b7247
Updated note to have formatting, changed name to title case, added a toc
tperry-r7 Jun 10, 2020
f8db178
Minor grammar fixes
tperry-r7 Jun 10, 2020
f450ba4
fixed spelling, added a toc, linked missing pages, updated list to us…
tperry-r7 Jun 10, 2020
b016ab2
Changed to title case,fixed some grammar, added a toc
tperry-r7 Jun 10, 2020
4dc438c
changed headings to level 2, added toc, changed to list
tperry-r7 Jun 11, 2020
9ec5a38
added toc, spelling fixes
tperry-r7 Jun 11, 2020
2b9fab6
Changed steps to headings, edited for brevity, fixed spelling and gra…
tperry-r7 Jun 11, 2020
1e85b57
Revert "delete obsolete 'Reporting-a-Bug'"
busterb Jun 12, 2020
f2b4dbe
Revert "remove unlinked Using-Metasploit page"
busterb Jun 12, 2020
26e3c93
Fixed two broken links
tperry-r7 Jun 12, 2020
855d6aa
Rewrite of how to report Metasploit Framework bugs
ccondon-r7 Jun 12, 2020
9f935cf
ed for clarity
ccondon-r7 Jun 13, 2020
a407f7d
Fix typos, more clarity edits.
ccondon-r7 Jun 13, 2020
adda7f6
clarity edits
ccondon-r7 Jun 13, 2020
208ddaf
Reinstating this page as it is linked from our home page and it looks…
gwillcox-r7 Jun 15, 2020
214f107
Sorry last change should have been named updating How to use exim_get…
gwillcox-r7 Jun 15, 2020
bcf7305
Reininstate Git Gotcha's with temporary content until I can fully res…
gwillcox-r7 Jun 15, 2020
7b77514
Destroyed Git Gotchas (markdown)
gwillcox-r7 Jun 15, 2020
4e6db46
change security email to proper one
ccondon-r7 Jun 15, 2020
1556513
Removing Git Gotchas from homepage as that page was old and wasn't re…
gwillcox-r7 Jun 15, 2020
8ea2d5d
Temporarily reinstate the Rex Zip Archive page
gwillcox-r7 Jun 15, 2020
61ca034
Destroyed How to zip files with Rex Zip Archive (markdown)
gwillcox-r7 Jun 15, 2020
76b35b8
Update the link on how to ZIP files with the link to "How to zip file…
gwillcox-r7 Jun 15, 2020
e72014e
Update broken to link to OJ's Meterpreter Internals video as the Vime…
gwillcox-r7 Jun 15, 2020
8e2074b
Update broken link to Kali's Starting Metasploit Framework in Kali wi…
gwillcox-r7 Jun 15, 2020
6762c77
Update one of the links so it is more apparent. Saying YOU without co…
gwillcox-r7 Jun 15, 2020
f15fd0f
Replacing MSDN blog link with an archive since as per usual MSDN like…
gwillcox-r7 Jun 15, 2020
68a6df6
Update msftidy.rb link since we moved the tool one level deeper under…
gwillcox-r7 Jun 15, 2020
0ec60da
Add missing https:// entries in front of some links, otherwise they w…
gwillcox-r7 Jun 15, 2020
84f9635
Fix a few links here, though tbh this entire section needs a relookin…
gwillcox-r7 Jun 15, 2020
c7f9285
Remove outdated link, update steps to reach the installation instruct…
gwillcox-r7 Jun 15, 2020
dde48de
Update Stack Buffer Overflow vs Stack Exhaustion link and associated …
gwillcox-r7 Jun 15, 2020
961b98e
Updated Msftidy (markdown)
gwillcox-r7 Jun 15, 2020
ebf1cbe
Make update to correct the file mode number and explain it a bit more.
gwillcox-r7 Jun 15, 2020
f04d16e
Update Kali links since now they don't use www.kali.org but rather ju…
gwillcox-r7 Jun 15, 2020
f231cbd
Update outdated link to point to old user's guide to better explain h…
gwillcox-r7 Jun 15, 2020
0ba8b69
Update Block API Hash link
gwillcox-r7 Jun 15, 2020
ec2b5a6
Add initial proposal for URL support
adfoster-r7 Jun 19, 2020
f930257
change 'OS X' to 'macOS' since it hasn't been called OS X for half a …
busterb Jul 3, 2020
6ce16fe
Fix up a few capitalization errors here and there
gwillcox-r7 Jul 15, 2020
60cb83c
add dynamic_82
h00die Jul 20, 2020
7a79343
fixes to dynamic_82
h00die Jul 21, 2020
50078ef
Woops looks like missed one URL when doing our edits to update links …
gwillcox-r7 Jul 31, 2020
3195835
Remove EXIM link
smcintyre-r7 Aug 3, 2020
d407afd
Destroyed How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Ove…
smcintyre-r7 Aug 3, 2020
5e91ee6
Created Metasploit 6.0 Release Notes (markdown)
smcintyre-r7 Aug 3, 2020
adcaae9
Updated Metasploit 6.0 Release Notes (markdown)
smcintyre-r7 Aug 3, 2020
32d3ca6
Destroyed Metasploit 6.0 Release Notes (markdown)
smcintyre-r7 Aug 3, 2020
8037a88
Updated Nightly Installers (markdown)
busterb Aug 6, 2020
fd08f83
Created Metasploit 6.0 Development Notes (markdown)
smcintyre-r7 Aug 6, 2020
1f3efe1
Update the initial announcement link
smcintyre-r7 Aug 6, 2020
9f3e596
Created Guidelines for Writing Module with SMB (markdown)
cdelafuente-r7 Aug 6, 2020
a28cb41
Make the title "modules" plural
smcintyre-r7 Aug 6, 2020
4dc8ba2
Link to the new SMB module guidelines
smcintyre-r7 Aug 6, 2020
94fa9ad
Adding a New Hash
h00die Aug 14, 2020
a94aad5
Updated Using ReflectiveDLL Injection (markdown)
gwillcox-r7 Aug 18, 2020
5bbe998
Okay now this should have the update to link to the new template we c…
gwillcox-r7 Aug 18, 2020
9e0373f
Updated Downloads by Version (textile)
pbarry-r7 Aug 19, 2020
738d086
Updated Downloads by Version (textile)
pbarry-r7 Aug 19, 2020
dbf7f8a
Updated Setting Up a Metasploit Development Environment (markdown)
gwillcox-r7 Sep 16, 2020
8afcb0f
Updated How to Send an HTTP Request Using HTTPClient (markdown)
wvu-r7 Sep 16, 2020
6e51ba2
Add initial copy of information about how to use Gemfile.local.exampl…
gwillcox-r7 Sep 23, 2020
0278976
add md5u
h00die Oct 10, 2020
a8f62c7
bold the fact the file must be executable
h00die Oct 18, 2020
ba95d59
Created SQL Injection (SQLi) Libraries (markdown)
h00die Oct 26, 2020
2cbfbd4
Updated SQL Injection (SQLi) Libraries (markdown)
h00die Oct 26, 2020
e727f42
add one column note
h00die Oct 27, 2020
80f6c95
Updated Downloads by Version (textile)
pbarry-r7 Oct 28, 2020
0f70fc7
Note the compatibility changes for Meterpreter
smcintyre-r7 Dec 17, 2020
e24273e
magic_quotes
h00die Jan 2, 2021
0db7d59
Remove vprint_debug - [v]print_debug is no longer used by the framework
bcoles Jan 29, 2021
84110ed
Document that modules must be marked as executable
adfoster-r7 Feb 2, 2021
a9a5b4d
Add note about loading Go/Python modules
adfoster-r7 Feb 2, 2021
a20d850
Add `moved_from`
acammack-r7 Feb 4, 2021
b4b77d0
Update the ysoserial java documentation
smcintyre-r7 Feb 9, 2021
6a4fe3f
add 2021 GSoC ideas page
jmartin-tech Feb 9, 2021
7d8a1cd
update for 2021 link
jmartin-tech Feb 9, 2021
0c1df63
add h00die's active auth retention idea
jmartin-tech Feb 18, 2021
d227dbc
add difficulty to open auth retention
jmartin-tech Feb 18, 2021
d1fef9e
Note info -d will show the relevant pull requests for a module
smcintyre-r7 Feb 22, 2021
017f95a
fix typo
jmartin-tech Feb 22, 2021
1208d30
Created Navigating Metasploit's Codebase (markdown)
gwillcox-r7 Mar 8, 2021
a049dd8
Updated Navigating Metasploit's Codebase (markdown)
gwillcox-r7 Mar 8, 2021
1dd5529
Updated Home (markdown)
gwillcox-r7 Mar 8, 2021
2208df0
Add link to TryHackMe room and also note the Offensive Security docum…
gwillcox-r7 Mar 8, 2021
f3ad052
Updated Using Metasploit (markdown)
gwillcox-r7 Mar 8, 2021
b137b74
add wiki page for `favorite`
space-r7 Mar 8, 2021
d6a2a2c
Update the documentation now that 14732 has been landed
smcintyre-r7 Mar 12, 2021
fae4657
Updated Generating `ysoserial` Java serialized objects (markdown)
space-r7 Mar 12, 2021
7b43458
Promote the Regenerating section to H2
smcintyre-r7 Mar 12, 2021
1d307c8
Fix a couple of minor typos
smcintyre-r7 Mar 16, 2021
fc88ee0
Updated GSoC How-to
jmartin-tech Mar 17, 2021
226fc66
Add a note on Python versions
smcintyre-r7 Apr 1, 2021
16c4a3d
Updated Downloads by Version (textile)
pbarry-r7 Apr 1, 2021
e379209
add smashery to committers
jmartin-tech Apr 19, 2021
9937b86
Updated How to write a browser exploit using BrowserExploitServer (ma…
wvu-r7 Apr 27, 2021
a51f70c
Adds documentation for the Cookie & CookieJar send_request_cgi functi…
agalway-r7 May 7, 2021
dc3a023
Updated How to Send an HTTP Request Using HttpClient (markdown)
adfoster-r7 May 14, 2021
b2bee33
Updated How to Send an HTTP Request Using HttpClient (markdown)
adfoster-r7 May 14, 2021
f96cea6
Updated How to get started with writing an auxiliary module (markdown)
smcintyre-r7 May 20, 2021
225f1d7
Updated Get Started Writing an Exploit (markdown)
smcintyre-r7 May 20, 2021
6688301
Created Metasploit Breaking Changes (markdown)
bwatters-r7 May 26, 2021
20abf44
Update the datastore options documentation
smcintyre-r7 Jun 4, 2021
1ec0c3c
Fix up some minor typos
smcintyre-r7 Jun 4, 2021
fe1c8f2
Fix typos and syntax
bcoles Jun 8, 2021
65fed5e
Note that CheckCode may return an optional description
bcoles Jun 8, 2021
3466298
Updated Definition of Module Reliability, Side Effects, and Stability…
dwelch-r7 Jun 11, 2021
8afa2e8
Updated Definition of Module Reliability, Side Effects, and Stability…
adfoster-r7 Jun 11, 2021
3b1ce61
Updated Definition of Module Reliability, Side Effects, and Stability…
adfoster-r7 Jun 11, 2021
b0eda8f
Updated Definition of Module Reliability, Side Effects, and Stability…
adfoster-r7 Jun 11, 2021
c62f89a
Updated Definition of Module Reliability, Side Effects, and Stability…
adfoster-r7 Jun 14, 2021
f973d9c
Updated Landing Pull Requests (markdown)
wvu-r7 Jun 24, 2021
36d8442
Update note about bundle install
wvu-r7 Jun 24, 2021
88f07e6
Once more, with feeling
wvu-r7 Jun 24, 2021
bdab06e
Add in clarification around SSH keys per various user's comments.
gwillcox-r7 Jun 30, 2021
b146b07
Updated Setting Up a Metasploit Development Environment (markdown)
gwillcox-r7 Jun 30, 2021
34aae6d
Updated Downloads by Version for 4.20.0 (textile)
jmartin-tech Aug 19, 2021
816126e
update postgres and fix link to framework
h00die Aug 22, 2021
f355fc6
Add examples of uri support
adfoster-r7 Aug 23, 2021
db8bc75
Add note on existing rhosts functionality
adfoster-r7 Aug 26, 2021
7883d99
Updated How to Send an HTTP Request Using HttpClient (markdown)
h00die Aug 27, 2021
6d3032a
Update for automated rubocopping
bwatters-r7 Aug 30, 2021
0aea67b
Updated Hashes and Password Cracking (markdown)
smcintyre-r7 Sep 2, 2021
70343a5
Fix broken link
adfoster-r7 Sep 4, 2021
6e3a1ed
Update link to be consistent
adfoster-r7 Sep 4, 2021
8a6c4d8
Remove dead link
adfoster-r7 Sep 4, 2021
6435efa
Rename file extension for consistency
adfoster-r7 Sep 5, 2021
4949c45
Update textile to markdown
adfoster-r7 Sep 5, 2021
6ff3266
Update textile to markdown
adfoster-r7 Sep 5, 2021
a69c908
Fix invalid links
adfoster-r7 Sep 5, 2021
d8a224e
Fix broken link
adfoster-r7 Sep 5, 2021
cb7a2e1
Created API (markdown)
adfoster-r7 Sep 6, 2021
28a7103
Updated API (markdown)
adfoster-r7 Sep 6, 2021
efafe49
Rename .Net Deserialization to Dot-Net-Deserialization
adfoster-r7 Sep 6, 2021
020d3b0
Remove summary/detail wrappers
adfoster-r7 Sep 6, 2021
6ce1402
Fix dead links
adfoster-r7 Sep 6, 2021
3762829
Fix dead links
adfoster-r7 Sep 6, 2021
7cba323
Use markdown link syntax
adfoster-r7 Sep 6, 2021
883866d
Fix markdown
adfoster-r7 Sep 6, 2021
98d7df3
Use kramdown flavored markdown instead of github flavored markdown
adfoster-r7 Sep 6, 2021
90e7793
Use relative markdown links instead of absolute
adfoster-r7 Sep 6, 2021
ba9605a
Fix Go formatting
adfoster-r7 Sep 6, 2021
63c6380
Cleanup markdown uses
adfoster-r7 Sep 6, 2021
63c59cc
Destroyed Rex Layout (markdown)
adfoster-r7 Sep 9, 2021
bd4d794
Remove dead link
adfoster-r7 Sep 9, 2021
477fc90
Consolidate label documentation
adfoster-r7 Sep 9, 2021
e923cc3
Rename
adfoster-r7 Sep 9, 2021
4c005eb
use archive links for 4.19.0
jmartin-tech Sep 16, 2021
9804cbe
Updated Using Metasploit (markdown)
adfoster-r7 Sep 20, 2021
c719907
Updated Creating Metasploit Framework LoginScanners (markdown)
smcintyre-r7 Sep 24, 2021
ebfbf71
Updated Creating Metasploit Framework LoginScanners (markdown)
smcintyre-r7 Sep 24, 2021
b6c40a8
Updated Using Metasploit (markdown)
adfoster-r7 Oct 1, 2021
03e13b6
Remove indentation
adfoster-r7 Nov 17, 2021
e89ead9
Clarify where IgnoreUnknownPayloads applies
wvu-r7 Nov 24, 2021
dd86595
Change NT:LM to NTLM
adfoster-r7 Dec 1, 2021
6efacd5
Update link directly to nightly installers
adfoster-r7 Dec 1, 2021
066087a
Updated Git cheatsheet (markdown)
adfoster-r7 Dec 2, 2021
2a73117
release version update for Pro 4.21.0
jmartin-tech Dec 9, 2021
01c2891
Created Sanitizing PCAPs (markdown)
h00die Dec 19, 2021
8c6cd41
Update exploit ranking info to be clearer to end users on the differe…
gwillcox-r7 Dec 21, 2021
9af9b42
Remove extra "or" from sentence
gwillcox-r7 Dec 21, 2021
af888f1
Align quote usage
adfoster-r7 Jan 7, 2022
6712b12
Align quote usage
adfoster-r7 Jan 7, 2022
e716631
Use spaces for characters
adfoster-r7 Jan 7, 2022
27f0624
Use ascii characters
adfoster-r7 Jan 7, 2022
cefe300
fix --no-log vs --nolog
h00die Jan 17, 2022
3a66a9a
Updated Hashes and Password Cracking (markdown)
h00die Jan 17, 2022
a468e15
Remove myself
wvu Jan 21, 2022
9396049
Add in note about our Rapid7 GitHub website so people can more easily…
gwillcox-r7 Jan 27, 2022
4cb0eb3
Updated Home (markdown)
gwillcox-r7 Jan 27, 2022
90f79b6
Updated How to use command stagers (markdown)
bcoles Jan 29, 2022
4a81d69
Updated How to use command stagers (markdown)
bcoles Jan 29, 2022
3cfbc7f
Fix broken link that lead to a weird French website and not the one w…
gwillcox-r7 Jan 30, 2022
0e808eb
Update ruby -v check to point to at least Ruby 3, since Ruby 2.5 is n…
Jan 30, 2022
b0e7f10
Remove documentation link, as it will be generated in the future
adfoster-r7 Feb 2, 2022
d4fec76
Additional notes on setting up windows
adfoster-r7 Feb 4, 2022
52c3d92
initial GSoC 2022 updates
jmartin-tech Feb 7, 2022
f245c9b
Updated 2017 Roadmap (markdown)
adfoster-r7 Feb 11, 2022
3b1d097
Testing if Mermaid is Supported
gwillcox-r7 Feb 23, 2022
cce49f0
Destroyed Mermaid Test Page (markdown)
gwillcox-r7 Feb 23, 2022
2605997
add some GSoC 2022 seeds
jmartin-tech Feb 24, 2022
ef8e008
Remove stale gitignore
adfoster-r7 Feb 28, 2022
1555bbb
Updated GSoC 2022 Project Ideas (markdown)
smcintyre-r7 Mar 3, 2022
1034c24
Updated GSoC 2022 Project Ideas (markdown)
smcintyre-r7 Mar 3, 2022
f5162ee
Adding self to mentor list
gwillcox-r7 Mar 8, 2022
349ee4d
add LDAP query idea
jmartin-tech Mar 8, 2022
dceedb1
Fix up some typos
gwillcox-r7 Mar 10, 2022
ee5a2a3
slack link
jmartin-tech Mar 10, 2022
397c7ee
add mime link
h00die Mar 13, 2022
cbd38a1
Updated How to Send an HTTP Request Using HttpClient (markdown)
h00die Mar 13, 2022
122de8d
Mention the dedicated #gsoc channel in Slack to fall in line with Goo…
gwillcox-r7 Mar 13, 2022
9496a65
Fix typos from last edit.
gwillcox-r7 Mar 13, 2022
71423a0
Updated How to Apply to GSoC (markdown)
gwillcox-r7 Mar 13, 2022
9d193bc
Add in Slack point of contact details and Slack link to make it easie…
gwillcox-r7 Mar 13, 2022
b49a3fe
Add in information about viewing past successful submissions, and lin…
gwillcox-r7 Mar 13, 2022
c162345
Add more clarity r.e contact methods for questions on ideas.
gwillcox-r7 Mar 13, 2022
6158c71
Updated GSoC 2022 Project Ideas (markdown)
gwillcox-r7 Mar 13, 2022
c758202
Updated GSoC 2022 Project Ideas (markdown)
gwillcox-r7 Mar 13, 2022
0bac866
Update contact methods to make it more explicit on preferred methods …
gwillcox-r7 Mar 13, 2022
58e8807
Update date format so its cleaner and more less fluff.
gwillcox-r7 Mar 13, 2022
08ee09a
Updated How to Apply to GSoC (markdown)
gwillcox-r7 Mar 13, 2022
bb35102
Update links
adfoster-r7 Mar 14, 2022
28b7ebf
Mention the ClaimsPrincipal gadget chain
smcintyre-r7 Mar 14, 2022
c9497ed
Add additional new lines
adfoster-r7 Mar 15, 2022
ef1e1e7
Updated Setting Up a Metasploit Development Environment (markdown)
adfoster-r7 Mar 30, 2022
0c63ddd
Updated Setting Up a Metasploit Development Environment (markdown)
adfoster-r7 Mar 30, 2022
4c1883e
Updated Setting Up a Metasploit Development Environment (markdown)
adfoster-r7 Mar 30, 2022
b2da562
Add initial boilerplate documentation
adfoster-r7 Apr 5, 2022
d70bd69
Rename file for consistency
adfoster-r7 Apr 6, 2022
f30fc33
Rename file for consistency
adfoster-r7 Apr 6, 2022
b611b60
Improve SEO
adfoster-r7 Apr 6, 2022
c64a191
Add in link to Metasploit Goliath Wiki Page
gwillcox-r7 Apr 6, 2022
f93d4a6
Add more detail to Data Visualization project to help users understan…
gwillcox-r7 Apr 6, 2022
1d24ed3
Note some important changes for 2022
gwillcox-r7 Apr 6, 2022
34bcf48
Updated How to Apply to GSoC (markdown)
jmartin-tech Apr 6, 2022
d81173f
Fix encoding
adfoster-r7 Apr 7, 2022
58e668f
Create Initial Copy of Pivoting Page
gwillcox-r7 Apr 7, 2022
1e3d60a
Updated Pivoting in Metasploit (markdown)
gwillcox-r7 Apr 7, 2022
acb155f
Redo documentation per review edits n suggestions and add in pivoting…
gwillcox-r7 Apr 8, 2022
e31c60c
Updated Pivoting in Metasploit (markdown)
gwillcox-r7 Apr 8, 2022
5358bb6
Updated How to Apply to GSoC (markdown)
gwillcox-r7 Apr 12, 2022
c6f97d8
Freenode is kinda old now and the channel is fairly dead now. Suggest…
gwillcox-r7 Apr 12, 2022
7e3825d
Document setg SessionTlvLogging
adfoster-r7 Apr 20, 2022
9c2c377
Add MeterpreterDebugBuild examples
adfoster-r7 Apr 20, 2022
f417dbd
Updated Meterpreter Debugging Meterpreter Sessions (markdown)
adfoster-r7 Apr 20, 2022
2f4a09c
Updated Meterpreter Debugging Meterpreter Sessions (markdown)
adfoster-r7 Apr 20, 2022
e733be7
Add separate pages for workflows and guides
adfoster-r7 Apr 21, 2022
3753c8b
Fix dead link
adfoster-r7 Apr 21, 2022
d79c56f
Fix dead link
adfoster-r7 Apr 21, 2022
2f265d6
Rename pages for clarity
adfoster-r7 Apr 21, 2022
8e3fd5a
Add initial kubernetes documentation
adfoster-r7 Apr 21, 2022
fc9e7b6
Post gather modules boilerplate
adfoster-r7 Apr 22, 2022
a20c281
Use wordlist for clarity
adfoster-r7 Apr 22, 2022
8f459e7
Add additional preamble to multiple guides
adfoster-r7 Apr 22, 2022
bad0907
Add HTTP preamble
adfoster-r7 Apr 22, 2022
08fc0a5
Add WinRM details
adfoster-r7 Apr 23, 2022
eb61076
Align lab details
adfoster-r7 Apr 23, 2022
f3f4536
Fix typo
adfoster-r7 Apr 23, 2022
d226369
Update deprecation notice
adfoster-r7 Apr 28, 2022
0facf90
Add deprecation notice
adfoster-r7 Apr 29, 2022
ee2d142
Add missing option name
adfoster-r7 Apr 29, 2022
fad601d
Update status for items under Related Open Tickets section.
gwillcox-r7 May 12, 2022
db1551e
Created Loading Test Modules (markdown)
gwillcox-r7 May 16, 2022
37f214b
Updated Meterpreter Debugging Meterpreter Sessions (markdown)
dwelch-r7 May 18, 2022
2cd2172
Update deprecation notice
adfoster-r7 May 18, 2022
4d2526a
Remove deprecation notice
adfoster-r7 May 18, 2022
6404557
Remove deprecation notice
adfoster-r7 May 18, 2022
b96cc47
Use shorthand generation flags
adfoster-r7 May 20, 2022
3663fbe
Put markdown files into new folder metasploit-framework.wiki in prepa…
adfoster-r7 May 20, 2022
b3c2175
Migrate docs from https://github.com/rapid7/metasploit-framework/wiki…
adfoster-r7 May 20, 2022
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
27 changes: 27 additions & 0 deletions metasploit-framework.wiki/2017-Roadmap-Review.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
# Metasploit's 2017 Roadmap Review

In 2017, we published our first open roadmap for Metasploit development. How did we do? For achievements:

* The Metasploit data model backend: we did a lot of design work on this, and got a couple of initial Proof-of-Concept project built. You can see a video of it here: <https://www.youtube.com/watch?v=hvuy6A-ie1g>. In the mean time, we started merging parts of the main development branch

* The first pass of external session handling landed with the metasploit-proxy project.

* Independent modules that run in isolation _did_ land, along with a hand full of new modules demonstrating the advantages of the design, including multi-language support.

* The ruby_smb project made a lot of progress, with support incorporated into several existing modules. Full client-side support is also available for testing now.

* Native iOS and macOS support landed, along with many new IoT and router exploits.

* Meterpreter shrank almost 4x thanks to the new cryptTLV packet obfuscation support, and the removal of OpenSSL.

Things we didn't quite finish:

* Metasploit's RESTful interface was not complete in 2017, so we will continue it into 2018.

* Session handling as a separate process was implemented with the <https://github.com/rapid7/metasploit-aggregator> project, but more work needs to be done to improve scalability and usability.

* Asynchronous session support remains on the drawing board.

* SOCKS5 support did not land, but Metasploit did gain a lot more support for running modules externally as separate processes, and gained initial support for running modules in Python.

* Modernized payload generation with new tools continues to be researched.
30 changes: 30 additions & 0 deletions metasploit-framework.wiki/2017-Roadmap.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
# Metasploit's 2017 Roadmap

Starting in 2017, we will provide an open roadmap for setting our goals for the year. The goals are based on many discussions we have had over the past year with users, developers, and customers. The intent is to provide focus for core developers and contributors alike, so that we can together work toward a common vision for how we want Metasploit to evolve.

This year, the themes for Metasploit are modularity, reusability, and reliability.

Metasploit has grown organically over the years into a very large project, combining thousands of modules, payloads, a database, session handling, user interaction and more into a single monolithic application. While the design has served us well, it has reached some limits for maintainability and agility. While we continue to refactor, improve, and reorganize Metasploit, large-scale improvements become increasingly difficult and highlight fragility in the overall system, due to its highly interdependent design.

We want to allow users to effortlessly contribute to the portions of Metasploit they are interested in, and be able to reuse code, both from inside and and outside of the project. Language and licensing constraints have presented barriers to users, both real and imagined. Python, Go, C# and other languages are dominating influences on the infosec community. We would like to be able to welcome more developers, researchers, and tooling into the Metasploit ecosystem, taking advantage of the best-in-breed and avoiding not-invented-here syndrome wherever possible.

In short, we want to develop reusable, modular, and reliable services to enable researchers, pen-testers, students, and red-teamers to work efficiently, have access to the latest technologies and techniques, and to continue to grow the Metasploit community.

## The roadmap

* The Metasploit data model backend should be separated into its own project. Plans include a data service that provides a RESTful interface, both an event-oriented and classic workspace-oriented view of incoming data, improved performance, and easy direct interoperability with other tools.

* Session handling should be able to operate independently of framework, allowing users to share sessions and allowing servers to be as performant, reliable, and light-weight as possible. We have already begun a project called 'metasploit-aggregator' which is a first generation of this design. Once this is complete, direct integration into other frameworks should also be possible.

* Metasploit should support asynchronous sessions. Many testers today use asynchronous frameworks like Empire to maintain light-weight persistence or a footholds into a network, then have to pivot to Meterpreter for interactive sessions. We would like to be able seamlessly support both modes of operation, including the ability to run post exploitation modules and modules over pivots asynchronously as well.

* Metasploit should support running exploit and auxiliary modules in an isolated mode. Plans are underway to support supporting an RPC-style module API to Metasploit framework, providing core services like payload and session handling, network routing, reporting and logging. Modules are run as child processes to Metasploit, and are only loaded into memory as-needed. Networking from a module point-of-view will be handled via SOCKS5 proxy support, hooking the child environment, or remote API calls, largely removing the need for specially-crafted socket objects or changes to 3rd-party protocol libraries. Modules, when written for the Metasploit API, could even be tested and used independently from the full Metasploit framework.

In addition to these primary goals, we'd also like to explore:

* *SMB 2.0* SMB 1.0 increasingly being disabled in many networks, making Metasploit modules using this protocol ineffective. We would like to implement at least server-side support for SMB 2.0, both for sharing files and for named pipe communications.
* *iOS and macOS support* The mettle and python meterpreter payloads will continue evolving to further support OS X and iOS, along with more post exploitation support.
* *Native Android support in Mettle* We began the work last year with mettle now supporting all of the basic operations for a Meterpreter implementation. We would like to continue adding Android post-exploitation capabilities to mettle as well.
* *Streamlining Windows Meterpreter* mettle soon will replace the original POSIX meterpreter, which will reduce the size of the Windows meterpreter. Switching from OpenSSL to native SChannel support will simplify and shrink Windows meterpreter, allowing to focus on what it supports best.
* *Router and IoT research* We would like to continue research and support for embedded device exploitation and first-class support for resource-constrained environments.
* *Modernizing payload generation* We are investigating being able to integrate with third-party toolchains for building assembly, C, .NET, Java, on the fly, making it easy for a user to acquire the and use the tools, while providing first-class support for many architectures and platforms.
3 changes: 3 additions & 0 deletions metasploit-framework.wiki/API.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
View the latest API docs at:

[https://rapid7.github.io/metasploit-framework/api/](https://rapid7.github.io/metasploit-framework/api/)
69 changes: 69 additions & 0 deletions metasploit-framework.wiki/Adding-Release-Notes-to-PRs.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,69 @@
Release notes inform our users about the stuff we're shipping in each release. By looking at our release notes, our users should be able to easily understand what's new, what's fixed, and what's changed in the release. Therefore, **all PRs, except for minor fixes and tweaks, must have release notes.**

To add a release note to a pull request, you'll need to add it as a comment, like so:

![Release Notes Example](https://i.imgur.com/dgzQxyD.png)

You'll need to tag the comment for inclusion in the release notes by using the `# Release Notes` heading. After you apply the release notes heading, you can enter the release notes text you want to use.

That's it! After you add the release notes text, we'll be able to extract them from the pull requests when we run our release notes script and compile them into a single document.

## Writing Release Notes

Okay, so now that you know how to add a release note, you're wondering what you're supposed to write.

Basically, a release note summarizes the pull request and describes the value of the fix/feature to the user. Each release note has a title, a PR number, and a brief description.

Here's an example of what a release note looks likes:

>The Beholder plugin automatically captures keystrokes, screenshots, and webcam snapshots from your active sessions. Run this plugin to collect data from your compromised targets every 30 seconds.

## Types of Release Notes

There are three types of release notes:
* [Enhancement](#release-notes-for-enhancements)
* [Fix](#release-notes-for-fixes)
* [Modules](#release-notes-for-modules)

### Release Notes for Enhancements

An enhancement indicates that an improvement or new feature has been added to the framework. Enhancements include things like auxiliary modules, post-exploitation modules, and new payloads.

When you write release notes for an enhancement, you should try to answer the following questions:

* What is the enhancement?
* Why is it valuable or important to users?
* How can they use it?

For example, the following is a release note for an enhancement:

> The new 'resolve' command enables you to perform DNS lookups with Meterpreter, without leaving the session to run additional modules. To resolve host names on the target, you can run the 'resolve' command followed by the host name. For example, in the Meterpreter prompt, you can type something like 'resolve rapid7.com' to view the host resolutions for Rapid7.

### Release Notes for Fixes

A fix is for an issue that caused a particular feature or functionality to not work the way it's expected to work. Basically, a defect indicates that something was broken, and we've fixed it.

When you write release notes for a fix, you should try to answer the following questions:

* What was broken?
* How was it fixed?
* Why is this important to users?

Here's an example for a fix:

> The email header contained duplicate date and subject headers, which caused email servers like AWS SES, to reject the emails. This fix removes the duplicate headers so that campaigns can send emails successfully.

### Release Notes for Modules

An exploit is a module that takes advantage of a vulnerability and provides some type of access to the target. We call out exploits explicitly because they're the hotness.

When you write release notes for an exploit, you should try to answer the following questions:

* What vulnerability is the module exploiting?
* What type of access can you achieve with the module?
* Do you need credentials to exploit the vulnerability?

And finally, here's an example for exploits:

> This module allows you to exploit HP Data Protector, a backup and recovery system, to remotely upload files to the file share. Versions 6.10, 6.10, and 6.20 are vulnerable. You don't need to authenticate to exploit this vulnerability.

52 changes: 52 additions & 0 deletions metasploit-framework.wiki/Assigning-Labels.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
Maintainers can assign labels to both issues and pull requests.

### Docs

Documentation changes, such as YARD markup, or README.md, or something along those lines.

### External

Touches something in /external, or the Gemfile, or something like that.

### Heartbleed

Has to do with heartbleed. This will go away soon, but there are three outstanding still...

### Library

Touches something in /lib.

### Meterpreter

Has to do with Meterpreter, or depends on a Meterpreter change to land to work.

### Misc

Plugins and scripts, anything that's not otherwise defined.

### Module

Touches something in /modules

### Specs

Has specs (an rspec test)

### Newbie Friendly

Something that's pretty easy to test or tackle.

### attic

When we move something to the attic it means that what you submitted is a thing that we want but the circumstances were not quite right for landing it. Sometimes this is on us, and sometimes the contribution needs more work. We recognize that contributors work on the PRs they submit at their own pace. Take a look at the comments and review suggestions on your PR, and feel free to re-open it if and when you have time to work on it again. Don't think you'll be able to get it across the finish line? Find a community champion to do it for you.

### Needs unique branch

Your submitted a PR from your `master` branch.

Because of how GitHub tracks changes between branches and what got added in a particular PR, we don't accept contributions from the `master` branch of your fork. All branches are [required to be unique](https://github.com/rapid7/metasploit-framework/blob/master/CONTRIBUTING.md#code-contributions). If your PR is closed because of this, create a new branch with that code and we'll be happy to look at it again!
```
git checkout -b <BRANCH_NAME>
git push <your_fork_remote> <BRANCH_NAME>
```
This helps protect the process, ensure users are aware of commits on the branch being considered for merge, allows for a location for more commits to be offered without mingling with other contributor changes and allows contributors to make progress while a PR is still being reviewed.
Loading