- 原文: https://github.com/rapid7/metasploit-framework/wiki
- 譯者: 王一航 & Google 2018-05-14
- 校對: 王一航 2018-05-14
- 說明:
- 本篇文章為目錄贸街,文章中鏈接在未翻譯狀態(tài)時會指向原始鏈接,文章在翻譯完成之后則會在文章標題前添加【已翻譯】字樣盆繁,并且文章指向的鏈接會修改為簡書的鏈接。
- 不保證按照順序進行翻譯。
你是否渴望得到配置你的 Metasploit 開發(fā)環(huán)境症副,開始發(fā)起 GitHub Pull Request 并且提供精彩的漏洞利用代碼暂论?如果是這樣,那么你來對地方了椿浓!
你是一個 Metasploit 的使用者嗎疆液?并且想像電影中演繹的破解東西 (首先保證你經過授權) 嗎挠进?
最快開始的方法是下載 Metasploit 二進制安裝包。這將會給你訪問所有 Metasploit 版本的權限:
- 自由拆座,開放源代碼的 Metasploit Framewrok 免費社區(qū)版本
- Metasploit Pro 的試用版本仙蛉。
如果你正在使用 Kali Linux笋敞,那么 Metasploit 已經在你的系統(tǒng)中預先安裝,請查看 Kali 文檔 來獲取如何在 Kali Linux 中使用 Metasploit 的詳情信息荠瘪。
如果你是一個 Exploit 開發(fā)者夯巷,你或許想要查看我們的 可接受模塊以及增強指南(譯者注:Guidelines for Accepting Modules and Enhancements) ,在這個文檔中你會找到:當我們看到關于新的 Metasploit 模塊的 Pull Request 的時候所有我們期望看到的東西哀墓。(譯者注:Pull Request的規(guī)格和標準鞭莽,融入一個社區(qū)當然要遵守社區(qū)既定的規(guī)則)
如果你對于你想要做什么沒有什么想法的話,你也可以參考這個指南:為 Metasploit 做出貢獻麸祷,然后就可以著手 配置 Metasploit 開發(fā)環(huán)境
開始
- 【已翻譯】搭建開發(fā)環(huán)境
- 【已翻譯】使用 Metasploit(譯者注:本文中僅提供了一些學習資料鏈接澎怒,以及如何解決數據庫出錯的問題)
- 【已翻譯】使用 Git
- Reporting a Bug
貢獻代碼
- Contributing to Metasploit
- Creating Metasploit Framework LoginScanners
- Guidelines for Accepting Modules and Enhancements
- Common Metasploit Module Coding Mistakes
- 【已翻譯】代碼風格小建議
- Committer Rights
- Landing Pull Requests
Metasploit 開發(fā)
- 【已翻譯】為什么選擇 Ruby?
- 【已翻譯】代碼風格小建議
- How to get started with writing an exploit
- How to get started with writing an auxiliary module
- How to get started with writing a post module
- How to get started with writing a Meterpreter script
- Loading External Modules
- 【已翻譯】漏洞利用程序評級
- Metasploit module reference identifiers
- How to check Microsoft patch levels for your exploit
- How to clean up files using FileDropper
- How to deprecate a Metasploit module
- How to do reporting or store data in module development
- How to log in Metasploit
- How to obfuscate JavaScript in Metasploit
- How to parse an HTTP response
- How to Send an HTTP Request Using HTTPClient
- How to send an HTTP request using Rex::Proto::Http::Client
- How to use command stagers
- How to use datastore options
- How to use Msf::Auxiliary::AuthBrute to write a bruteforcer
- How to use PhpEXE to exploit an arbitrary file upload bug
- How to use Powershell in an exploit
- How to use Railgun for Windows post exploitation
- How to Use the FILEFORMAT mixin to create a file format exploit
- How to use the Msf::Exploit::Remote::Tcp mixin
- How to use the Seh mixin to exploit an exception handler
- How to use WbemExec for a write privilege attack on Windows
- How to write a browser exploit using BrowserExploitServer
- How to write a browser exploit using HttpServer
- How to write a check() method
- How to write a HTTP LoginScanner Module
- How to write a module using HttpServer and HttpClient
- How to zip files with Rex::Zip::Archive
- Oracle Usage
- Rex Layout
Metasploit Payloads(譯者注:有時候被翻譯為“攻擊載荷”)
- 【已翻譯】How Payloads Work
- Merging Metasploit Payload Gem Updates
- Meterpreter Configuration
- Meterpreter HTTP Communication
- Meterpreter Paranoid Mode
- Meterpreter Reliable Network Communication
- Meterpreter Sleep Control
- Meterpreter Stageless Mode
- Meterpreter Timeout Control
- Meterpreter Transport Control
- Meterpreter Unicode Support
- Payload UUID
- Python Extension
- The ins and outs of HTTP and HTTPS communications in Meterpreter and Metasploit Stagers
其他 Metasploit 相關的資源
- Downloads by Version
- Evading Anti Virus
- 【已翻譯】Metasploit module 的正確打開方式
- 【已翻譯】如何在 Metasploit 中使用反彈 Shell
- Information About Unmet Browser Exploit Requirements
- 【已翻譯】如何使用 msfvenom
- How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow)
- What does my Rex::Proto::SMB Error mean?