This document summarizes new features and improvements in the Metasploit framework, including over 1200 pull requests and 7500 commits added since September 2014. Key additions include 358 new modules, 20 modules for local privilege escalation, exploits targeting antivirus products and SOHO routers, improved SMB and Kerberos support, and enhancements to payloads such as interactive Powershell and UUID tracking.
1 of 67
Download to read offline
More Related Content
Shiny
1. New Shiny in the
Metasploit Framework
Derbycon 2015 Edition
1
42. UUID Tracking
Embed Universally Unique ID in payloads
Makes a payload identifiable
Track which EXE got this session
Generate unique machine ID for each session
Makes a machine identifiable
Track whether weve popped this box before
42
43. Paranoid Mode
Set a real TLS cert for payload handlers
Verify it from Meterpreter side
Bail if were being MitMd
Whitelist UUIDs in the handler
Dont start sessions for
things that arent a payload
43
45. Runtime Transport Control
reverse_tcp vs reverse_http vs reverse_https
Bind
tcp://:8000/
IPv6
tcp6://fe80::82e6:50ff:fe08:2e50:8000?en0
HTTP(S)
https://1.2.3.4/<generated URI>
45