forked from rapid7/metasploit-framework
-
Notifications
You must be signed in to change notification settings - Fork 0
Exploit Ranking
Tod Beardsley edited this page Jul 24, 2013
·
12 revisions
As of Metasploit Framework version 3.3.2, every exploit module has been assigned a rank based on its potential impact to the target system. Support for using the new rankings to search, categorize, and prioritize exploits was added in version 3.3.3.
The ranking is implemented by adding a Rank
constant at the top of the class declaration in the module:
class Metasploit4 < Msf::Exploit
Rank = LowRanking
def initialize(info={})
...
end
...
end
The ranking values are one of the following, in descending order of reliability:
- ExcellentRanking
- GreatRanking
- GoodRanking
- NormalRanking
- AverageRanking
- LowRanking
- ManualRanking
The ranking methodology:
- ExcellentRanking - The exploit will never crash the service. This is the case for SQL Injection, CMD execution, RFI, LFI, etc. No typical memory corruption exploits should be given this ranking unless there are extraordinary circumstances (WMF Escape()).
- GreatRanking - The exploit has a default target AND either auto-detects the appropriate target or uses an application-specific return address AFTER a version check.
- GoodRanking - The exploit has a default target and it is the "common case" for this type of software (English, Windows XP for a desktop app, 2003 for server, etc).
- NormalRanking - The exploit is otherwise reliable, but depends on a specific version and can't (or doesn't) reliably autodetect.
- AverageRanking - The exploit is generally unreliable or difficult to exploit.
- LowRanking - The exploit is nearly impossible to exploit (or under 50%) for common platforms.
- ManualRanking - The exploit is unstable or difficult to exploit and is basically a DoS. This ranking is also used when the module has no use unless specifically configured by the user (e.g.: php_eval).
The ranking value is available the module Class object as well as instances:
modcls = framework.exploits["windows/browser/ie_createobject"]
modcls.rank # => 600
modcls.rank_to_s # => "excellent"
mod = modcls.new
mod.rank # => 600
mod.rank_to_s # => "excellent"
- Home Welcome to Metasploit!
- Using Metasploit A collection of useful links for penetration testers.
-
Setting Up a Metasploit Development Environment From
apt-get install
togit push
. - Landing Pull Requests Working with other people's contributions.
- Using Git All about Git and GitHub.
- Acceptance Guidelines What should your modules look like?
- Contributing to Metasploit Be a part of our open source community.