summaryrefslogtreecommitdiff
path: root/security/msf
AgeCommit message (Collapse)AuthorFilesLines
2006-04-12Fixed pkglint warnings. Added a file to PERL_REPLACE. Bumped PKGREVISION.rillig2-691/+693
2005-10-19Update to metasploit 2.5adrianp4-46/+53
This is a maintenance release - all updates to 2.4 have been rolled into 2.5, along with some new exploits and minor features.
2005-08-08whitespace removaladrianp2-16/+16
2005-08-06Bump the PKGREVISIONs of all (638) packages that hardcode the locationsjlam1-2/+1
of Perl files to deal with the perl-5.8.7 update that moved all pkgsrc-installed Perl files into the "vendor" directories.
2005-08-03Add patch to address msfweb "refang" security updateadrianp3-9/+34
Bump to nb2 make pkglint happy
2005-07-16Get rid of USE_PERL5. The new way to express needing the Perl executablejlam1-2/+2
around at either build-time or at run-time is: USE_TOOLS+= perl # build-time USE_TOOLS+= perl:run # run-time Also remove some places where perl5/buildlink3.mk was being included by a package Makefile, but all that the package wanted was the Perl executable.
2005-07-02- The tarball has been updated but the version number not incremented, soadrianp3-6/+11
deal with this. - No official changelog in the tarball for what's changed - PLIST fixes - Looks like: Updated certificate for online updates Updated exploits notably Solaris LPD Command Execution Fixes for console interface
2005-05-23Removed trailing white-space.rillig1-5/+5
2005-05-17- Update to 2.4adrianp3-32/+100
> Some highlights in this release: > > - Previously unreleased exploits (20 others added since 2.3) > + Solaris KCMS Arbitary File Read > + Solaris snmpXdmid AddComponent Overflow > + Metasploit Framework Payload Handler > + Microsoft Message Queueing Service MSO5-017 > + Minishare 1.41 Buffer Overflow > > - Addition of the new SunRPC and XDR Perl API > + Allows for clean RPC exploit development > + Used by two new exploit modules (KCMS and snmpXdmid) > + Updated sadmind exploit uses the new API > > - Includes the new win32 PassiveX payload system > + Loads an arbitary ActiveX through Internet Explorer > + PassiveX payload loads the next stage over HTTP > + HTTP transport emulates a standard TCP connection > + Interact with cmd.exe, VNC, or Meterpreter over HTTP > + Uses Internet Explorer settings for proxy access > + Fully-functional on systems with Internet Explorer 6 > + Extensive documentation is available online: > * http://www.uninformed.org/?v=1&a=3&t=pdf > > - Stability improvements and numerous bugs fixes > + The msfweb interface is slightly less of a memory pig > + Many exploits have been updated and improved > + New external references added to the exploit modules > > - General improvements to the payload system > + Brand new "shelldemo" binary for the impurity stager > + Size reductions to win32_bind, win32_reverse, and others > + Can now make standalone executables with msfpayload > + Interact with metasploit payloads via payload_handler.pm
2005-04-11Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used.tv1-2/+1
2005-02-24Add RMD160 digests.agc1-1/+2
2005-01-14Upgrade to 2.3adrianp3-70/+469
- Complete overhaul of the Framework payload collection + Win32 ordinal-stagers are now included (92-byte reverse connect) + A handful of new sparc payloads have been added (sol, linux, bsd) + Reliability problems have been resolved in bsd, linux, and win32 + New udp-based linux shell stagers and shell payloads + New size-optimized Mac OS X encoders and payloads - Includes the win32 version of the Meterpreter + Dynamically load new features over the network w/o disk access + In-memory dll injection of the basic meterpreter shell + Current extensions include Fs, Process, Net, and Sys + Extensive documentation is available online: * http://metasploit.com/projects/Framework/docs/meterpreter.pdf - Complete rewrite of the 'msfweb' user interface + Generate and encode stand-alone shellcode from the web interface + The interface is skinnable and includes three different themes + Streaming HTTP is used to provide a 100% web-based shell + Ability to set advanced options in the web interface - Massive speed enhancements in msfconsole and msfweb + Snappier response and quicker load times on older systems + Optimizations made to various sort/search algorithms + Modules are no longer reloaded after each exploit - New exploits + Microsoft WINS Service Memory Overwrite (MS04-045) + Samba trans2open() Buffer Overflow (Mac OS X) + 4D WebSTAR FTP Server Buffer Overflow (Mac OS X) + Veritas Name Service Registration Buffer Overflow + AOL Instant Messenger 'goaway' Buffer Overflow + IPSwitch IMail IMAPD 'delete' Buffer Overflow + Seattle Labs Mail Server POP3 Buffer Overflow + UoW IMAPD Buffer Overflow (sparc, ia32) + IRIX lpdsched Remote Command Execution + CDE dtspcd Buffer Overflow (Solaris) + IIS 4.0 ism.dll HTR Buffer Overflow + IIS w3who.dll ISAPI Buffer Overflow
2004-10-19The Metasploit Framework is an advanced open-source platform for developing, adrianp5-0/+644
testing, and using exploit code. This release includes 18 exploits and 27 payloads; many of these exploits are either the only ones publicly available or just much more reliable than anything else out there. The Framework will run on any modern system that has a working Perl interpreter, the Windows installer includes a slimmed-down version of the Cygwin environment.