Go to file
James Lee 20cc2fa38d Make Windows postgres_payload more generic
* Adds Exploit::EXE to windows/postgres/postgres_payload. This gives us
  the ability to use generate_payload_dll() which generates a generic dll
  that spawns rundll32 and runs the shellcode in that process. This is
  basically what the linux version accomplishes by compiling the .so on
  the fly. On major advantage of this is that the resulting DLL will
  work on pretty much any version of postgres

* Adds Exploit::FileDropper to windows version as well. This gives us
  the ability to delete the dll via the resulting session, which works
  because the template dll contains code to shove the shellcode into a
  new rundll32 process and exit, thus leaving the file closed after
  Postgres calls FreeLibrary.

* Adds pre-auth fingerprints for 9.1.5 and 9.1.6 on Ubuntu and 9.2.1 on
  Windows

* Adds a check method to both Windows and Linux versions that simply
  makes sure that the given credentials work against the target service.

* Replaces the version-specific lo_create method with a generic
  technique that works on both 9.x and 8.x

* Fixes a bug when targeting 9.x; "language C" in the UDF creation query
  gets downcased and subsequently causes postgres to error out before
  opening the DLL

* Cleans up lots of rdoc in Exploit::Postgres
2012-12-22 00:30:09 -06:00
data Cleanup of #1062 2012-12-07 11:55:48 +01:00
documentation Change file header comment to new format 2012-10-08 21:30:42 -05:00
external Cleanup of #1062 2012-12-07 11:55:48 +01:00
lib Make Windows postgres_payload more generic 2012-12-22 00:30:09 -06:00
modules Make Windows postgres_payload more generic 2012-12-22 00:30:09 -06:00
plugins Makes some small changes based on bperry's feedback 2012-11-27 00:31:31 -06:00
scripts Switc smart mgirate to post mod as it should be 2012-10-31 17:03:49 -05:00
spec Merge remote branch 'origin/bug/fix-double-slashes' 2012-12-17 13:29:19 -06:00
test Move specs from test/tests/ into spec/ 2012-10-17 14:48:53 -05:00
tools Remove return 2012-12-14 11:07:41 -06:00
.gitignore Add simplecov for code coverage 2012-11-06 16:30:41 -06:00
.rspec Fix missed rename when adding fastlib under directory 2012-10-08 16:14:37 -05:00
.travis.yml Last commit should make 1.8.7 specs pass 2012-11-20 19:45:28 -06:00
CONTRIBUTING.md Update CONTRIBUTING.md 2012-11-19 11:20:40 -06:00
COPYING Committing Egypt's README updates 2012-05-30 10:42:52 -05:00
Gemfile Upgrade rspec to 2.12 2012-12-12 15:36:06 -06:00
Gemfile.lock Upgrade rspec to 2.12 2012-12-12 15:36:06 -06:00
HACKING Correct typos 2012-10-06 02:24:30 -05:00
README.md Merge branch 'feature/contributing' of https://github.com/todb-r7/metasploit-framework into todb-r7-feature/contributing 2012-11-13 21:44:42 +01:00
Rakefile Disambiguate with parens 2012-10-18 12:46:08 -05:00
THIRD-PARTY.md Adding carrierwave to metasploit's gemcache. 2012-06-12 14:47:50 -05:00
armitage
msfbinscan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfcli Fix module reloading 2012-10-04 16:32:12 -05:00
msfconsole Touchups to msfconsole command parsing 2012-09-20 13:40:01 -05:00
msfd Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfelfscan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfencode Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfgui Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfmachscan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfpayload Merge the commandline options with the payload's datastore 2012-07-16 16:07:54 -05:00
msfpescan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfrop Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfrpc Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfrpcd Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfupdate Fixes a pro bug with updating 2012-11-30 16:51:03 -06:00
msfvenom Allow 'x64' and 'x86_64' for backcompat 2012-10-17 11:03:42 -05:00

README.md

Metasploit Build Status Code Climate

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from http://metasploit.com/

Bug tracking and development information can be found at: https://dev.metasploit.com/redmine/projects/framework/

The public GitHub source repository can be found at: https://github.com/rapid7/metasploit-framework

Questions and suggestions can be sent to: msfdev(at)metasploit.com

The framework mailing list is the place to discuss features and ask for help. To subscribe, visit the following web page: https://mail.metasploit.com/mailman/listinfo/framework

The mailing list archives are available from: https://mail.metasploit.com/pipermail/framework/

Installing

Generally, you should use the installer which contains all dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading some of the great tutorials online:

Contributing

See the Dev Environment Setup guide on GitHub which will walk you through the whole process starting from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more info, see Contributing.