automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console 5.0.5
Metasploit 2019-02-07 07:42:09 -08:00
parent 4e3faf6735
commit 0e8b52fd35
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 104 additions and 2 deletions

View File

@ -45136,6 +45136,7 @@
"qwertyoruiop",
"siguza",
"tihmstar",
"benjamin-42",
"timwr"
],
"description": "This module exploits a UAF vulnerability in WebKit's JavaScriptCore library.",
@ -45151,7 +45152,9 @@
"URL-https://www.blackhat.com/docs/eu-16/materials/eu-16-Bazaliy-Mobile-Espionage-in-the-Wild-Pegasus-and-Nation-State-Level-Attacks.pdf",
"URL-https://github.com/Siguza/PhoenixNonce",
"URL-https://jndok.github.io/2016/10/04/pegasus-writeup/",
"URL-https://sektioneins.de/en/blog/16-09-02-pegasus-ios-kernel-vulnerability-explained.html"
"URL-https://sektioneins.de/en/blog/16-09-02-pegasus-ios-kernel-vulnerability-explained.html",
"URL-https://github.com/benjamin-42/Trident",
"URL-http://blog.tihmstar.net/2018/01/modern-post-exploitation-techniques.html"
],
"is_server": false,
"is_client": true,
@ -45167,7 +45170,7 @@
"targets": [
"Automatic"
],
"mod_time": "2018-05-30 18:04:22 +0000",
"mod_time": "2018-10-16 14:59:27 +0000",
"path": "/modules/exploits/apple_ios/browser/webkit_trident.rb",
"is_install_path": true,
"ref_name": "apple_ios/browser/webkit_trident",
@ -129032,6 +129035,105 @@
"notes": {
}
},
"payload_apple_ios/armle/meterpreter_reverse_http": {
"name": "Apple_iOS Meterpreter, Reverse HTTP Inline",
"full_name": "payload/apple_ios/armle/meterpreter_reverse_http",
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"Adam Cammack <adam_cammack@rapid7.com>",
"Brent Cook <brent_cook@rapid7.com>",
"timwr"
],
"description": "Run the Meterpreter / Mettle server payload (stageless)",
"references": [
],
"is_server": false,
"is_client": false,
"platform": "Apple_iOS",
"arch": "armle",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2019-02-07 09:33:36 +0000",
"path": "/modules/payloads/singles/apple_ios/armle/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "apple_ios/armle/meterpreter_reverse_http",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"payload_apple_ios/armle/meterpreter_reverse_https": {
"name": "Apple_iOS Meterpreter, Reverse HTTPS Inline",
"full_name": "payload/apple_ios/armle/meterpreter_reverse_https",
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"Adam Cammack <adam_cammack@rapid7.com>",
"Brent Cook <brent_cook@rapid7.com>",
"timwr"
],
"description": "Run the Meterpreter / Mettle server payload (stageless)",
"references": [
],
"is_server": false,
"is_client": false,
"platform": "Apple_iOS",
"arch": "armle",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2019-02-07 09:33:36 +0000",
"path": "/modules/payloads/singles/apple_ios/armle/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "apple_ios/armle/meterpreter_reverse_https",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"payload_apple_ios/armle/meterpreter_reverse_tcp": {
"name": "Apple_iOS Meterpreter, Reverse TCP Inline",
"full_name": "payload/apple_ios/armle/meterpreter_reverse_tcp",
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"Adam Cammack <adam_cammack@rapid7.com>",
"Brent Cook <brent_cook@rapid7.com>",
"timwr"
],
"description": "Run the Meterpreter / Mettle server payload (stageless)",
"references": [
],
"is_server": false,
"is_client": false,
"platform": "Apple_iOS",
"arch": "armle",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2019-02-07 09:33:36 +0000",
"path": "/modules/payloads/singles/apple_ios/armle/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "apple_ios/armle/meterpreter_reverse_tcp",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"payload_bsd/sparc/shell_bind_tcp": {
"name": "BSD Command Shell, Bind TCP Inline",
"full_name": "payload/bsd/sparc/shell_bind_tcp",