-
Notifications
You must be signed in to change notification settings - Fork 0
Guidelines for Accepting Modules and Enhancements
Because the Metasploit Framework has many tens of thousands of users who rely on daily, consistent, and error-free updates, the core Metasploit developers have adopted a fairly high bar in order to consider pull requests for new Framework functionality and new Metasploit modules. We are of course very excited to accept modules and enhancements from the community, so in order to encourage open and transparent development, this document outlines the general guidelines that developers should adhere to. Doing so maximizes the chances that your work will be merged into the official Metasploit distribution packages.
Most open source community support for Metasploit comes in the form of Metasploit modules. The following should be considered for acceptance, but note that these guidelines are typically phrased as "shoulds," not "musts," since there are always exceptions to the norm -- especially when it comes to novel new attacks and techniques.
Modules should pass msftidy.rb and adhere to the HACKING guidelines. Both are distributed with Metasploit. See Style Tips for some information on how to take some of the headache out of whitespace issues.
Modules should have a clear and obvious goal: Exploits should result in a shell. Post modules should result in privilege escalation or loot. Auxiliary modules are an "Everything else" category, but should be limited to some well-defined task -- usually, information gathering to enable an exploit or a post.
Modules should not launch other modules, given the complexity of setting multiple payloads. Such actions are are usually automation tasks for an external UI.
Denial of Service modules should be asymmetric, and at least have some interesting feature. If it's comparable to a synflood, it shouldn't be included. If it's comparable to Baliwicked, it should be included. Modules that hover the line, such as slowloris, may be included with some justification.
Modules should be able to function as expected with minimal configuration. Defaults should be sensible and usually correct. Modules should not depend on exact timing, uncontrollable heap states, system DLLs, etc. All memory addresses (ie. a JMP ESP, or a ROP gadget) should be part of the metadata under 'Targets', and documented (what instructions it points to, and what DLL). If the exploit is against a specific hardware (ie. routers, PLCs, etc), or against a software that's not free (and no trial/demo available), please remember to submit a binary packet capture (pcap-formatted) along with the module that demonstrates the exploit actually works.
Please don't use the alphanum encoder as a way to avoid BadChar analysis. Modules which set the EncoderType
field in the payload as a way to avoid doing real BadChar analysis will be rejected. These modules are nearly always unreliable in the real world.
Exploit ranking definitions can be found on the Exploit Ranking page.
Exploit modules should implement a check()
function when this is trivial to do so. Versions exposed through banners or network protocols should always result in a check()
routine when a patch is available that changes this version.
If a module (auxiliary or post) obtains some sort of information from the victim machine, it should store that data using one (or more) of the following methods:
-
store_loot()
: Used to store both stolen files (both text and binary) and "screencaps" of commands such as aps -ef
andifconfig
. The file itself need not be of forensic-level integrity -- they may be parsed by a post module to extract only the relevant information for a penetration tester. -
report_auth_info()
: Used to store working credentials that are immediately reusable by another module. For example, a module dumping the local SMB hashes would use this, as would a module which reads username:password combinations for a specific host and service. Specifically, merely "likely" usernames and passwords should usestore_loot()
instead. -
report_vuln()
: Auxiliary and post modules that exercise a particular vulnerability shouldreport_vuln()
upon success. Note that exploit modules automaticallyreport_vuln()
as part of opening a session (there is no need to call it especially). -
report_note()
: Modules should make an effort to avoidreport_note()
when one of the above methods would be a better fit, but there are often cases where "loot" or "cred" or "vuln" classifications are not immediately appropriate.report_note()
calls should always set a OID-style dotted:type
, such asdomain.hosts
, so other modules may easily find them in the database.
Modules should take advantage of the normal Metasploit APIs. For example, they should not attempt to create their own TCP sockets or application protocols with native Ruby, they should mediate sockets through Rex
and Rex::Proto
methods instead. This ensures compatibility with the full set of framework features, such as pivoting and proxy chaining.
Web application attacks are generally uninteresting (SQLi, XSS, CSRF), unless the module can reliably result in a shell or exercise some kind of useful information leak. Even in that case, the module should "just work," as above.
Web application attacks should be limited only to popular, widely deployed applications. For example, a SQLi module against a popular CMS that results in a shell on the CMS machine would be welcome. A module that causes a private Facebook profile to become public would not (Facebook has exactly one deployed instance).
Web application attacks should implement an HttpFingerprint constant.
Modules should only list targets that you actually tested the exploit on -- avoid assuming it works on a specific system if it has never been tested on it. Comments above the target entry indicating additional information about a given target (language pack, patch level, etc) greatly assist other developers in creating additional targets and improving your module.
Modules can exercise unpatched and undisclosed vulnerabilities. However, Rapid7 is happy to assist with the disclosure process by following the Rapid7 policy. This policy provides a fixed 90-day window from when the vendor is contacted until the exploit is released. All vulnerabilities found by Rapid7 staff follow this process. The submitter will receive full credit for the vulnerability and the resulting exploit module regardless of how disclosure is handled.
Generally, new functionality to the Metasploit Framework should start life as a plugin. If the functionality becomes useful and popular, we can integrate it more closely, add RPC API exposure, etc., but it should be well-tested by the community before then.
Automating a series of discrete functions is generally /not/ the responsibility of the framework. Automation should be accomplished through the API (see Metasploit Community/Express/Pro, MSFGUI, and Armiage). Past efforts with in-framework automation prove this out. Components such as db_autopwn
and browser_autopwn
rarely did what users expected, and configuring these tools became a nightmare through increasingly complex sets of options and arguments. Automating the framework is easy and should stay easy, but the automation itself should live in resource scripts and other external frontends to the framework itself.
Console functionality should have a focus on exploit and security tool development, with the exploit developer as the typical user. End users should be pointed to an interface such as the Community Edition or MSFGUI and should not expect much in terms of user-friendliness from the console. The console should be considered a debug mode for Metasploit and as close to bare-metal functionality as possible.
External tools, such msfpayload
and msfvenom
, are designed to make exploit development easier and exercise specific techniques. We will continue to accept tools of this nature for inclusion into the framework, but these should be accompanied by documentation, how-to tutorials for quick start, and other helpful text.
- Home Welcome to Metasploit!
- Using Metasploit A collection of useful links for penetration testers.
-
Setting Up a Metasploit Development Environment From
apt-get install
togit push
. - Landing Pull Requests Working with other people's contributions.
- Using Git All about Git and GitHub.
- Acceptance Guidelines What should your modules look like?
- Contributing to Metasploit Be a part of our open source community.