automatic module_metadata_base.json update

4.x
Metasploit 2018-12-17 07:19:54 -08:00
parent 76ec4781a3
commit 0313716e09
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 38 additions and 1 deletions

View File

@ -66577,7 +66577,7 @@
"Windows",
"Linux"
],
"mod_time": "2018-11-16 12:18:28 +0000",
"mod_time": "2018-12-14 13:08:50 +0000",
"path": "/modules/exploits/multi/http/struts2_namespace_ognl.rb",
"is_install_path": true,
"ref_name": "multi/http/struts2_namespace_ognl",
@ -115823,6 +115823,43 @@
"notes": {
}
},
"exploit_windows/local/persistence_service": {
"name": "Windows Persistent Service Installer",
"full_name": "exploit/windows/local/persistence_service",
"rank": 600,
"disclosure_date": "2018-10-20",
"type": "exploit",
"author": [
"Green-m <greenm.xxoo@gmail.com>"
],
"description": "This Module will generate and upload an executable to a remote host, next will make it a persistent service.\n It will create a new service which will start the payload whenever the service is running. Admin or system\n privilege is required.",
"references": [
"URL-https://github.com/rapid7/metasploit-framework/blob/master/external/source/metsvc/src/metsvc.cpp"
],
"is_server": true,
"is_client": false,
"platform": "Windows",
"arch": "",
"rport": null,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"Windows"
],
"mod_time": "2018-12-17 07:00:23 +0000",
"path": "/modules/exploits/windows/local/persistence_service.rb",
"is_install_path": true,
"ref_name": "windows/local/persistence_service",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"exploit_windows/local/powershell_cmd_upgrade": {
"name": "Windows Command Shell Upgrade (Powershell)",
"full_name": "exploit/windows/local/powershell_cmd_upgrade",