Skip to content

Commit 1782ae1

Browse files
committed
Fix up links within Wiki site to make them relative links where possible
1 parent 6043d0f commit 1782ae1

34 files changed

+72
-72
lines changed

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Contributing to Metasploit
22
Thank you for your interest in making Metasploit -- and therefore, the
3-
world -- a better place! Before you get started, please review our [Code of Conduct](https://docs.metasploit.com/docs/code-of-conduct.html). This helps us ensure our community is positive and supportive for everyone involved.
3+
world -- a better place! Before you get started, please review our [Code of Conduct](./CODE_OF_CONDUCT.md). This helps us ensure our community is positive and supportive for everyone involved.
44

55
## Code Free Contributions
66
Before we get into the details of contributing code, you should know there are multiple ways you can add to Metasploit without any coding experience:

docs/metasploit-framework.wiki/API.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
View the latest API docs at:
22

3-
[https://rapid7.github.io/metasploit-framework/api/](https://rapid7.github.io/metasploit-framework/api/)
3+
[https://docs.metasploit.com/api/](https://docs.metasploit.com/api/)

docs/metasploit-framework.wiki/Committer-Rights.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
The term "Metasploit Committers" describes people who have direct write access to the [Rapid7 Metasploit-Framework fork](https://github.com/rapid7/metasploit-framework). These are the people who can land changes to this main fork of the Framework. However, it is not necessary to have committer rights in order to contribute to Metasploit. Much of our code comes from non-committers.
44

5-
We encourage anyone to fork the Metasploit project, make changes, fix bugs, and notify the core committers about those changes via [Pull Requests](http://github.com/rapid7/metasploit-framework/pulls). The process for getting started is most comprehensively documented in the [Metasploit Development Environment](https://docs.metasploit.com/docs/development/get-started/setting-up-a-metasploit-development-environment.html) setup guide.
5+
We encourage anyone to fork the Metasploit project, make changes, fix bugs, and notify the core committers about those changes via [Pull Requests](http://github.com/rapid7/metasploit-framework/pulls). The process for getting started is most comprehensively documented in the [[Metasploit Development Environment|./dev/Setting-Up-a-Metasploit-Development-Environment.md]] setup guide.
66

77
Metasploit committers are a mix of [Rapid7](http://rapid7.com) employees and outside contributors. Anyone can become a contributor, with the following expectations:
88

@@ -24,7 +24,7 @@ If you reject a pull request, be clear in the pull request why it was rejected,
2424

2525
Even if someone else approves of a pull request, and it is shown to be broken later, then it is still your responsibility to correct it. Make every effort to get a fix or revert in as soon as possible, whether you wrote the code, landed it, or approved it. Blame is shared equally.
2626

27-
A list of committer public keys [is here](https://docs.metasploit.com/docs/development/maintainers/committer-keys.html).
27+
A list of committer public keys [[is here|./Committer-Keys.md]].
2828

2929
# How to Gain Commit Rights
3030

@@ -45,7 +45,7 @@ Breaches of trust in terms of malicious or malformed code, or the demonstration
4545

4646
# Useful Links for Committers
4747

48-
* [http://r-7.co/MSF-DEV](https://docs.metasploit.com/docs/development/get-started/setting-up-a-metasploit-development-environment.html) is pretty much required reading.
48+
* [[Setting Up a Metasploit Development Environment|./dev/Setting-Up-a-Metasploit-Development-Environment.md]] is pretty much required reading.
4949
* So is [CONTRIBUTING.md](https://github.com/rapid7/metasploit-framework/blob/master/CONTRIBUTING.md)
5050
* Check out the Apache Software Foundation's [Guide for Committers](https://www.apache.org/dev/committers). It's illuminating.
5151
* [Producing Open Source Software](http://www.producingoss.com/gl/) by Ken Fogel is a must-read.

docs/metasploit-framework.wiki/Creating-Your-First-PR.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,13 @@ whilst also avoiding some common pitfalls and learning how some of our systems w
66

77
## Initial Steps and Important Notes
88
The rest of this guide assumes you have already followed the steps at [Setting Up A Developer Environment](https://r-7.co/MSF-DEV) in order to get
9-
a fork of Metasploit set up and ready to run, and that you have added in your SSH keys
10-
(see [Adding a New SSH Key To Your GitHub Account](https://docs.github.com/en/authentication/connecting-to-github-with-ssh/adding-a-new-ssh-key-to-your-github-account)),
9+
a fork of Metasploit set up and ready to run, and that you have added in your SSH keys
10+
(see [Adding a New SSH Key To Your GitHub Account](https://docs.github.com/en/authentication/connecting-to-github-with-ssh/adding-a-new-ssh-key-to-your-github-account)),
1111
set up Ruby and optionally the PostgreSQL database, and done any custom shortcuts you wish to configure.
1212

1313
## Getting the Latest Version of Metasploit Framework
1414
Before making any new contributions, you will want to sure you are running the latest version of Metasploit Framework.
15-
To do this run `git checkout master && git fetch upstream && git pull`, where `upstream` is the branch connected to the
15+
To do this run `git checkout master && git fetch upstream && git pull`, where `upstream` is the branch connected to the
1616
Rapid7 remote, aka Rapid7's copy of the code. You can verify that `upstream` is set correctly by running `git remote get-url upstream`
1717
and verifying it is set to `[email protected]:rapid7/metasploit-framework.git`.
1818

@@ -51,13 +51,13 @@ done when the code is ready to be landed into Metasploit Framework to help make
5151

5252
## Checking for Code Errors
5353
Before code can be accepted into Metasploit Framework, it must also pass our RuboCop and MsfTidy rules. These help ensure that
54-
all contributors are committing code that follows a common set of standards. To check if your code meets our RuboCop standards,
54+
all contributors are committing code that follows a common set of standards. To check if your code meets our RuboCop standards,
5555
from the root of wherever you cloned your fork of Metasploit Framework to on disk, run `rubocop <path to your module from current directory>`.
5656

5757
Specifying the `-a` parameter will ask RuboCop to check your module and if possible fix any issues that RuboCop is able to fix.
58-
In this case the command would be `rubocop -a <path to your module from current directory>`. It is encouraged to keep running
59-
this command and fixing any issues that come up until RuboCop no longer comes back with any errors to report. Once this is
60-
complete, run `git add <file>` followed by `git commit -m "RuboCop Fixes"`. You can change the commit message if you
58+
In this case the command would be `rubocop -a <path to your module from current directory>`. It is encouraged to keep running
59+
this command and fixing any issues that come up until RuboCop no longer comes back with any errors to report. Once this is
60+
complete, run `git add <file>` followed by `git commit -m "RuboCop Fixes"`. You can change the commit message if you
6161
want, but it should mention RuboCop as it helps maintainers know what the commit is related to.
6262

6363
As a good practice rule, you should always separate your commits that contain RuboCop changes from those that contain non-RuboCop related changes.
@@ -71,8 +71,8 @@ against your module code (if applicable), using `tools/dev/msftidy.rb <path to m
7171
if your module passed the tests. Try and fix any errors mentioned here.
7272

7373
## Writing Documentation
74-
The next step to do, if you are writing a module, is to write the documentation for the module. You can find some information
75-
on how to write module documentation at [Writing Module Documentation](https://docs.metasploit.com/docs/development/quality/writing-module-documentation.html).
74+
The next step to do, if you are writing a module, is to write the documentation for the module. You can find some information
75+
on how to write module documentation at [[Writing Module Documentation|./Writing-Module-Documentation.md]].
7676

7777
In general when writing documentation you will want to search for a similar documentation file under the `documentation`
7878
folder located in the root of the Metasploit fork. You can then copy one of these files and use it as the basis for writing
@@ -91,15 +91,15 @@ these may be okay to ignore depending on the context. A good example is if a lin
9191
safely ignored.
9292

9393
## Submitting Your Changes and Opening a PR
94-
Once you have gone through all of the steps above you should be ready to submit your PR. To submit your PR, first check which
95-
branch points to your copy of the code. If you have followed the setup guide, it should be `origin`. You can double check this
94+
Once you have gone through all of the steps above you should be ready to submit your PR. To submit your PR, first check which
95+
branch points to your copy of the code. If you have followed the setup guide, it should be `origin`. You can double check this
9696
branch's remote URL using `git remote get-url origin`. It should look something like `[email protected]:gwillcox-r7/metasploit-framework`
9797
with `gwillcox-r7` substituted for your username.
9898

99-
Assuming the `origin` branch is in fact pointing to your copy of the code, run `git push origin local-branch:remote-branch`
100-
and replace `local-branch` with the branch locally where your code changes are located, and `remote-branch` with what
101-
you want this branch to be called on the remote repository, aka `origin` which will be your fork on GitHub.com. In most
102-
cases you will want these two names to be the same to avoid confusion, but its good to know this syntax should you
99+
Assuming the `origin` branch is in fact pointing to your copy of the code, run `git push origin local-branch:remote-branch`
100+
and replace `local-branch` with the branch locally where your code changes are located, and `remote-branch` with what
101+
you want this branch to be called on the remote repository, aka `origin` which will be your fork on GitHub.com. In most
102+
cases you will want these two names to be the same to avoid confusion, but its good to know this syntax should you
103103
start working with more complex situations. Note that if the branch pointing to your copy of the code is not named `origin`,
104104
replace the word `origin` in the command above with the name of the branch that does point to your copy of the code.
105105

@@ -114,10 +114,10 @@ Compressing objects: 100% (8/8), done.
114114
Writing objects: 100% (8/8), 1.55 KiB | 1.55 MiB/s, done.
115115
Total 8 (delta 7), reused 0 (delta 0), pack-reused 0
116116
remote: Resolving deltas: 100% (7/7), completed with 7 local objects.
117-
remote:
117+
remote:
118118
remote: Create a pull request for 'update_mssql_lib_parameters' on GitHub by visiting:
119119
remote: https://github.com/gwillcox-r7/metasploit-framework/pull/new/update_mssql_lib_parameters
120-
remote:
120+
remote:
121121
To github.com:gwillcox-r7/metasploit-framework
122122
* [new branch] update_mssql_lib_parameters -> update_mssql_lib_parameters
123123
```

docs/metasploit-framework.wiki/Get-Started-Writing-an-Exploit.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,9 @@ The Metasploit Framework has seven different rankings to indicate how reliable a
2727

2828
## Template
2929

30-
If you have read this far, we think you are pretty impressive because it's a lot to digest. You are probably wondering why we haven't had a single line of code to share in the writeup. Well, as you recall, exploit development is mostly about your reversing skills. If you have all that, we shouldn't be telling you how to write an exploit. What we've done so far is hopefully get your mindset dialed-in correctly about what it means to become a Metasploit exploit developer for the security community; the rest is more about how to use our mixins to build that exploit. Well, there are A LOT of mixins, so it's impossible to go over all of them in a single page, so you must either read the [API documentation](https://rapid7.github.io/metasploit-framework/api/), existing [code examples](https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits), or look for more wiki pages we've written to cover specific mixins.
30+
If you have read this far, we think you are pretty impressive because it's a lot to digest. You are probably wondering why we haven't had a single line of code to share in the writeup. Well, as you recall, exploit development is mostly about your reversing skills. If you have all that, we shouldn't be telling you how to write an exploit. What we've done so far is hopefully get your mindset dialed-in correctly about what it means to become a Metasploit exploit developer for the security community; the rest is more about how to use our mixins to build that exploit. Well, there are A LOT of mixins, so it's impossible to go over all of them in a single page, so you must either read the [API documentation](https://docs.metasploit.com/api/), existing [code examples](https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits), or look for more wiki pages we've written to cover specific mixins.
3131

32-
For example, if you're looking for a writeup about how to interact with an HTTP server, you might be interested in: [How to send an HTTP Request Using HTTPClient](https://docs.metasploit.com/docs/development/developing-modules/libraries/http/how-to-send-an-http-request-using-httpclient.html). If you're interested in browser exploit writing, definitely check out: [How to write a browser exploit using BrowserExploitServer](https://docs.metasploit.com/docs/development/developing-modules/libraries/http/how-to-write-a-browser-exploit-using-browserexploitserver.html), etc.
32+
For example, if you're looking for a writeup about how to interact with an HTTP server, you might be interested in: [[How to send an HTTP Request Using HTTPClient|./How-to-write-a-browser-exploit-using-HttpServer.md]]. If you're interested in browser exploit writing, definitely check out: [[How to write a browser exploit using BrowserExploitServer|./How-to-write-a-browser-exploit-using-BrowserExploitServer.md]], etc.
3333

3434
But of course, to begin, you most likely need a template to work with, and here it is. We'll also explain how to fill out the required fields:
3535

docs/metasploit-framework.wiki/Hashes-and-Password-Cracking.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Intro
22

3-
This article will discuss the various libraries, dependencies, and functionality built in to metasploit for dealing with password hashes, and cracking them. In general, this will not cover storing credentials in the database, which can be read about [here](https://docs.metasploit.com/docs/development/developing-modules/guides/scanners/creating-metasploit-framework-loginscanners.html#the-scan-block). Metasploit currently support cracking passwords with [John the Ripper](https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/analyze) and [hashcat](https://github.com/rapid7/metasploit-framework/pull/11695).
3+
This article will discuss the various libraries, dependencies, and functionality built in to metasploit for dealing with password hashes, and cracking them. In general, this will not cover storing credentials in the database, which can be read about [[here|./Creating-Metasploit-Framework-LoginScanners.md]]. Metasploit currently support cracking passwords with [John the Ripper](https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/analyze) and [hashcat](https://github.com/rapid7/metasploit-framework/pull/11695).
44

55
# Hashes
66

docs/metasploit-framework.wiki/Home.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
Welcome to Metasploit-land. Are you a Metasploit user who wants to get started or get better at hacking stuff (that you have permission to hack)? The quickest way to get started is to [download the Metasploit nightly installers](https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html). This will give you access to both the free, open-source Metasploit Framework and a free trial of Metasploit Pro.
1+
Welcome to Metasploit-land. Are you a Metasploit user who wants to get started or get better at hacking stuff (that you have permission to hack)? The quickest way to get started is to [[download the Metasploit nightly installers|./Nightly-Installers.md]]. This will give you access to both the free, open-source Metasploit Framework and a free trial of Metasploit Pro.
22

33
If you're using [Kali Linux](https://kali.org/), Metasploit is already pre-installed. See the [Kali documentation](https://kali.org/docs/tools/starting-metasploit-framework-in-kali/) for how to get started using Metasploit in Kali Linux.
44

5-
Are you anxious to get your [Metasploit Development Environment](https://docs.metasploit.com/docs/development/get-started/setting-up-a-metasploit-development-environment.html) set up so you can start [[Landing Pull Requests]] and contributing excellent exploit code? If so, you're in the right place. If you're an exploit developer, you will want to review our [[Guidelines for Accepting Modules and Enhancements]] to find out what we expect when we see pull requests for new Metasploit modules. No idea what you should start working on? Check out the guidelines for [[contributing to Metasploit]], and dive into [[Setting Up a Metasploit Development Environment]].
5+
Are you anxious to get your [[Metasploit Development Environment|./dev/Setting-Up-a-Metasploit-Development-Environment.md]] set up so you can start [[Landing Pull Requests]] and contributing excellent exploit code? If so, you're in the right place. If you're an exploit developer, you will want to review our [[Guidelines for Accepting Modules and Enhancements]] to find out what we expect when we see pull requests for new Metasploit modules. No idea what you should start working on? Check out the guidelines for [[contributing to Metasploit]], and dive into [[Setting Up a Metasploit Development Environment]].
66

77
# Getting Started #
88

docs/metasploit-framework.wiki/How-to-Apply-to-GSoC.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Review all of the [student guide](https://google.github.io/gsocguides/student/)
2626

2727
A listed `idea` is a seed for GSoC students to expand on and propose how to design and implement a solution. You can start by investigating the code base and how existing users interaction with `msfconsole` functionality. Think through scenarios on how a user might want to interact with the proposed idea.
2828

29-
A place to get started with contributing to Metasploit is [here](https://github.com/rapid7/metasploit-framework/blob/master/CONTRIBUTING.md) and expanded on [here](https://docs.metasploit.com/docs/development/get-started/contributing-to-metasploit.html#framework-bugs-and-features).
29+
A place to get started with contributing to Metasploit is [here](https://github.com/rapid7/metasploit-framework/blob/master/CONTRIBUTING.md) and expanded on [[here|./Contributing-to-Metasploit.md]].
3030

3131
GSoC mentors tend to look for those items that have a chance of making development and usage easier or improving the overall performance of a certain area, however by starting with understanding the most common contribution pattern you can get familiar with the codebase and also the mindset of users. This will help you in creating a proposal with the end user in mind.
3232

0 commit comments

Comments
 (0)