OJ edcc423eea Lots more RDP mixin changes, and first pass of ruby exploit
This code is at the point where we SHOULD see a crash (given that the
payloads in use for kernel/user are both just As and Bs (deliberate at
this point).

Unforunately the exploit does not result in a crash. Things just keep
on going! I've looked at the difference in the traffic across the two
different exploits (py and rb) and what's clear is that the mixin is
doing a lot more work at the start.

Also, the mixin generates packets of smaller size in the way that it
encodes data (ie. it doesn't always use 2 bytes for a short value, it'll
use 1 instead if only 1 is required).

Pretty sure that the size issues aren't the problem, I think there's
something else in play. I'm at the point where diving into the RDP stuff
even more isn't inspiring so I'm hoping that opening this up to collab
will help us move forward.
2019-09-19 06:05:08 -05:00
2018-10-21 22:34:19 +02:00
2017-07-12 08:00:29 -05:00
2019-08-22 18:03:13 -05:00
2018-10-21 22:30:01 +02:00
2013-11-27 16:04:41 +10:00
2019-08-30 11:50:56 -05:00
2014-10-08 10:55:40 -05:00
2019-03-11 15:32:25 -05:00
2019-03-16 21:31:19 +01:00
2014-09-18 15:24:21 -05:00
2019-05-31 14:09:36 -05:00
2017-09-07 02:35:56 -05:00
2018-12-13 10:38:55 -06:00
2019-04-30 17:13:38 -05:00
2018-01-09 00:01:35 -06:00
2018-10-21 22:30:01 +02:00
2019-04-08 17:55:43 -05:00
2019-09-09 22:52:54 -05:00
2019-02-12 17:57:38 -05:00
2017-09-12 10:00:18 -03:00
2017-09-12 10:00:18 -03:00
2019-01-09 17:42:57 -05:00
2017-06-20 14:02:32 -05:00
2017-12-06 20:34:40 +01:00

Metasploit Build Status Code Climate Docker Pulls

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from: https://metasploit.com

Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework

New bugs and feature requests should be directed to: https://r-7.co/MSF-BUGv1

API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api

Questions and suggestions can be sent to: Freenode IRC channel or e-mail the metasploit-hackers mailing list

Installing

Generally, you should use the free installer, which contains all of the dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading Metasploit Unleashed, the great community resources, or the wiki.

Contributing

See the Dev Environment Setup guide on GitHub, which will walk you through the whole process from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more information, see Contributing.

S
Description
Metasploit Framework
Readme Multiple Licenses 1.6 GiB
Languages
Ruby 95%
PowerShell 2.7%
C 1.2%
Python 0.4%
HTML 0.2%
Other 0.1%