Go to file
Stephen Fewer c55e9af9ae Commit the updated APC injection stubs. fixes a nasty issue in some edge cases whereby when using APC injection for a process in another session then the current host process the injected APC can cause an access violation in kernel32 during a call the kernel32!CreateThread caused by the APC's host thread not having an initialized Activation Context inside its TEB. We now test for this and create a dummy ActivationContext entry to appease the kernel. This will both improve DLL injection reliability as well as meterpreter migration reliability.
git-svn-id: file:///home/svn/framework3/trunk@8786 4d416f70-5f16-0410-b530-b9f4589650da
2010-03-11 17:00:19 +00:00
data Add a new table 2010-03-11 03:02:13 +00:00
documentation Update list. 2010-02-13 15:40:05 +00:00
external Commit the updated APC injection stubs. fixes a nasty issue in some edge cases whereby when using APC injection for a process in another session then the current host process the injected APC can cause an access violation in kernel32 during a call the kernel32!CreateThread caused by the APC's host thread not having an initialized Activation Context inside its TEB. We now test for this and create a dummy ActivationContext entry to appease the kernel. This will both improve DLL injection reliability as well as meterpreter migration reliability. 2010-03-11 17:00:19 +00:00
lib store full name (which includes module type) instead of just the refname 2010-03-11 14:33:48 +00:00
modules Rename aurora module to the MSB naming convention 2010-03-11 05:49:45 +00:00
plugins Fix other occurrences of on_session_close not taking a second parameter. See #1075 2010-03-11 13:54:10 +00:00
scripts/meterpreter Updated script for new methods 2010-03-08 03:15:57 +00:00
test Handle a return() from a proc a bit more gracefully, add a test case 2009-12-28 19:44:14 +00:00
tools update metasm_shell to use super rex/ui readline fu 2010-02-13 06:10:37 +00:00
README Update the README for the modified VNC code. 2010-03-08 15:16:20 +00:00
msfcli Fixes #279, thanks jduck! 2009-04-03 12:54:58 +00:00
msfconsole allow multiple resource files on the command line 2010-02-02 23:13:42 +00:00
msfd Use [-] instead of [*] for error messages 2009-03-11 00:10:27 +00:00
msfelfscan handle invalid options, fixes 542 2009-11-29 23:47:03 +00:00
msfencode add support for WAR archives to msfencode, closes #774 2010-02-18 03:29:14 +00:00
msfgui See #502 and see #503. 2009-11-11 02:36:56 +00:00
msfmachscan handle invalid options, fixes 542 2009-11-29 23:47:03 +00:00
msfopcode Disable msfopcode until we update the server side 2009-11-09 00:15:14 +00:00
msfpayload whitespace adjustments 2010-02-18 03:27:29 +00:00
msfpescan handle invalid options, fixes 542 2009-11-29 23:47:03 +00:00
msfrpc Use [-] instead of [*] for error messages 2009-03-11 00:10:27 +00:00
msfrpcd fixes #587; add http xmlrpc support from Ryan Linn, invoke it with 'load xmlrpc ServerType=Web' or ./msfrpcd -t Web 2009-12-02 00:00:11 +00:00
msfweb See #502 and see #503. 2009-11-11 02:36:56 +00:00

README

Copyright (C) 2006-2010, Rapid7 LLC
All rights reserved.

Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:

    * Redistributions of source code must retain the above copyright notice,
	  this list of conditions and the following disclaimer.

    * Redistributions in binary form must reproduce the above copyright notice,
	  this list of conditions and the following disclaimer in the documentation
	  and/or other materials provided with the distribution.

    * Neither the name of Rapid7 LLC nor the names of its contributors
	  may be used to endorse or promote products derived from this software
	  without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

================================================================================

The Metasploit Framework is provided under the 3-clause BSD license above.

The copyright on this package is held by Rapid7 LLC.

This license does not apply to the following components:
 - The OpenSSL library embedded into the Meterpreter payload binaries and the
   corresponding header files in the source tree
 - The Packet Sniffer SDK (MicroOLAP) library embedded into the Meterpreter
   Sniffer extension. HD Moore has a single-seat developer license.
 - The vncdll.dll and vncdll.x64.dll binaries and their associated source code (modified TightVNC)
 - The icons used by msfweb that were not created by Metasploit
 - The Bit-Struct library located under lib/bit-struct
 - The Byakugan plugin located under external/source/byakugan
 - The Metasm library located under lib/metasm
 - The PcapRub library located under external/pcaprub
 - The Rabal library located under lib/rabal
 - The Racket library located under lib/racket
 - The Ruby-Lorcon library located under external/ruby-lorcon
 - The SNMP library located under lib/snmp
 - The Zip library located under lib/zip

The latest version of this software is available from http://metasploit.com/

Bug tracking and development information can be found at:
 http://www.metasploit.com/redmine/projects/framework/

Questions and suggestions can be sent to:
 msfdev[at]metasploit.com

The framework mailing list is the place to discuss features and ask for help.
To subscribe, visit the following web page:
 https://mail.metasploit.com/mailman/listinfo/framework

The archives are available from:
 https://mail.metasploit.com/pipermail/framework/