RageLtMan 8aef054dfd SCTP Sessions
With the introduction of SCTP socket support in Rex::Socket via
https://github.com/rapid7/rex-socket/pull/56, Framework can utilize
this protocol for session transports similarly to  TCP as it is a
stream-wise transport.

Implement bind and reverse handlers for the new socket type.
Implement example bind and reverse payloads using socat copying
from the initial udp sessions implementation.

Testing:
  Rudimentary bind session test against local Libvirt Linux VM

Next steps:
  Implement the language-level payloads for the interpreters common
to POSIX environments supporting SCTP.
  Implement meterpreter transports for SCTP in Python, PHP, Mettle,
and Java modalities (Windows doesn't support it without carrying
its own usermode protocol library).
2023-02-08 21:47:28 -05:00
2021-08-09 12:16:12 -05:00
2023-01-23 10:03:32 -06:00
2018-10-21 22:34:19 +02:00
2021-11-05 15:14:19 +00:00
2023-02-08 21:47:28 -05:00
2023-02-08 21:47:28 -05:00
2017-07-12 08:00:29 -05:00
2022-09-20 16:31:54 -04:00
2018-10-21 22:30:01 +02:00
2013-11-27 16:04:41 +10:00
2014-10-08 10:55:40 -05:00
2014-09-18 15:24:21 -05:00
2017-09-07 02:35:56 -05:00
2022-10-29 15:56:49 +01:00
2020-01-18 18:45:37 -06:00
2022-12-08 14:59:58 -06:00
2023-02-07 17:21:16 -06:00
2023-02-02 11:10:06 -05:00
2021-04-16 01:59:22 +01:00
2020-12-07 10:31:45 +00:00
2021-01-18 14:21:54 +00:00
2020-12-07 10:31:45 +00:00

Metasploit Maintainability Test Coverage Docker Pulls

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from: https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html

You can find documentation on Metasploit and how to use it at: https://docs.metasploit.com/

Information about setting up a development environment can be found at: https://docs.metasploit.com/docs/development/get-started/setting-up-a-metasploit-development-environment.html

Our bug and feature request tracker can be found at: https://github.com/rapid7/metasploit-framework/issues

New bugs and feature requests should be directed to: https://r-7.co/MSF-BUGv1

API documentation for writing modules can be found at: https://docs.metasploit.com/api/

Questions and suggestions can be sent to: Freenode IRC channel or e-mail the metasploit-hackers mailing list

Installing

Generally, you should use the free installer, which contains all of the dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading Metasploit Unleashed, the great community resources, or take a look at the Using Metasploit page on the documentation website.

Contributing

See the Dev Environment Setup guide on GitHub, which will walk you through the whole process from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more information, see Contributing.

S
Description
Metasploit Framework
Readme Multiple Licenses 1.6 GiB
Languages
Ruby 95%
PowerShell 2.7%
C 1.2%
Python 0.4%
HTML 0.2%
Other 0.1%