RFC: Improved module category definition #14484
Replies: 3 comments 2 replies
-
I'd be in favor of moving "exploit" modules such as those in your example list into In 2020 we saw some modules that exploited vulnerabilities that didn't necessarily yield a shell (see SAP's RECON and Zerologon). From a technical perspective, if we go this path we should ensure that all module types have easy access to the same session handler capabilities that the current exploit modules have. In regards to the login modules that are under the |
Beta Was this translation helpful? Give feedback.
-
I like this in theory, but in practice, I find the definition of an |
Beta Was this translation helpful? Give feedback.
-
This is a complex problem and I think this discussion will come back over and over. I'm in favor of these proposed changes, but I'm sure there will be new modules that won't fit in any category, again. Maybe it is time to rethink the whole category concept to be more flexible. I was thinking of a flat model, based on tags for category, with capabilities added to each module according to its needs. This should be more granular than just
Additional custom tags could still be specified in the module metadata (info hash), and used for search purposes. This might not be the best way to do it, but I think a more flexible model that won't require moving modules around in |
Beta Was this translation helpful? Give feedback.
-
Problem:
Since modules are the primary entrypoint to expanding Metasploit Framework contributors are starting to offer utilities as modules. Some of these utilities to do not fit the standard categories of
exploit/post/auxiliary/payload/evasion
.Many of these modules end up defined as
auxiliary/scanner
orexploit
when in fact they do not necessarilyscan
orexploit
a vulnerability. Moreover these module tend to simply exercise intended function in services that provide access to execute code. In many cases the reasoning to decide where these modules will be placed is based on what is to be executed, or to be more precise, built inhandler
support.Some known modules that meet this
utility
:One concerning issue with the current location for these module is the misnomer that many are preforming an
exploit
. While many longer term users may consider this a detail they can simply gloss over when generating a report based on actions taken with Metasploit Framework, a less savvy stakeholder sent only a report that did includes details of these actions may be confused or even mislead by a finding and focus resources inefficiently.Potential solutions:
Define module classification more clearly
exploit
path for modules to things that take advantage of anexploit
handler
inclusion simplerrefactoring
handler
support to be a single library importutility
modules or second level category such asauxiliary/utility
&post/utility
Beta Was this translation helpful? Give feedback.
All reactions