Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 1 You must be signed in to fork a gist
  • Save AlbertoCoding/743f0edecb36ccc93eef541bcbdea652 to your computer and use it in GitHub Desktop.
Save AlbertoCoding/743f0edecb36ccc93eef541bcbdea652 to your computer and use it in GitHub Desktop.
GSOC 2018 - Alberto Rafael Rodríguez Iglesias - METASPLOIT
- Post-exploitation interface module to make it easy for anyone anywhere -
This project was aimed to create a post-exploitation interface, which I called pseudo-shell, that could involve many of the post-exploitation common tasks
or discoveries that anyone usually need to do when they are in restrictive environments or different architectures (in Linux).
The main idea is to be in a pseudo-shell that can emulate perfectly the functioning of a native Linux shell, even when you don't count on most of the Linux commands.
In that way everyone will have available an easy post-exploitation experience.
I followed a method of using the most native Linux commands as possible in order to cover as many actions and extract as much information as possible too.
Although it was hard in many cases to find an appropriate approach for that issue I could finally integrate all this work into the already existing libraries
providing them with a very highlighting and alternative option for those cases where the usual way does not work.
These contributions where usually made in terms of:
new functions to the metasploit post-exploitation libraries, post-exploitation attack modules, a pseudo-shell module for post-exploitation interaction
and commands for the new pseudo-shell created.
I delivered all my work through the Github platform and I used a big single Pull Request (PR) that gives track of all my commits, change logs and comments done to the
code submitted.
You can find the Pull Request of all my work submitted during the Google Summer of Code (GSOC) 2018 in the following link:
https://github.com/rapid7/metasploit-framework/pull/10119
The official Metasploit Framework repository can be found here: https://github.com/rapid7/metasploit-framework
There is still work to be done in this post-exploitation interface that unfortunately could not be covered during the GSoC period and I am commited to continue
the development of this platform after the GSoC.
Summarizing, I am extremely satisfied with the experience promoted by Google that introduced me to the Open Source world with such a great project as Metasploit.
Thank you very much!
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment