Merge branch 'master' into fix_misc_loot_bugs

GSoC/Meterpreter_Web_Console
James Barnett 2019-01-14 11:15:06 -06:00
commit 3f9c0e160a
No known key found for this signature in database
GPG Key ID: 647983861A4EC5EA
94 changed files with 94 additions and 94 deletions

View File

@ -64,7 +64,6 @@ wwebb-r7 <wwebb-r7@github> <William_Webb@rapid7.com>
bannedit <bannedit@github> David Rude <bannedit0@gmail.com> bannedit <bannedit@github> David Rude <bannedit0@gmail.com>
bcoles <bcoles@github> bcoles <bcoles@gmail.com> bcoles <bcoles@github> bcoles <bcoles@gmail.com>
bcoles <bcoles@github> Brendan Coles <bcoles@gmail.com>
bokojan <bokojan@github> parzamendi-r7 <peter_arzamendi@rapid7.com> bokojan <bokojan@github> parzamendi-r7 <peter_arzamendi@rapid7.com>
brandonprry <brandonprry@github> <bperry@brandons-mbp.attlocal.net> brandonprry <brandonprry@github> <bperry@brandons-mbp.attlocal.net>
brandonprry <brandonprry@github> Brandon Perry <bperry@bperry-rapid7.(none)> brandonprry <brandonprry@github> Brandon Perry <bperry@bperry-rapid7.(none)>

View File

@ -22,4 +22,4 @@ xMMMMMMMMMd ,0MMMMMMMMMMK;
%red 'oOWMMMMMMMMo%clr +:+ %red 'oOWMMMMMMMMo%clr +:+
%red .,cdkO0K;%clr :+: :+: %red .,cdkO0K;%clr :+: :+:
:::::::+: :::::::+:
%whiMetasploit%clr %yelUnder Construction%clr %whiMetasploit%clr

View File

@ -18,6 +18,7 @@ class Msf::Author
'amaloteaux' => 'alex_maloteaux' + 0x40.chr + 'metasploit.com', 'amaloteaux' => 'alex_maloteaux' + 0x40.chr + 'metasploit.com',
'aushack' => 'patrick' + 0x40.chr + 'osisecurity.com.au', 'aushack' => 'patrick' + 0x40.chr + 'osisecurity.com.au',
'bannedit' => 'bannedit' + 0x40.chr + 'metasploit.com', 'bannedit' => 'bannedit' + 0x40.chr + 'metasploit.com',
'bcoles' => 'bcoles' + 0x40.chr + 'gmail.com',
'Carlos Perez' => 'carlos_perez' + 0x40.chr + 'darkoperator.com', 'Carlos Perez' => 'carlos_perez' + 0x40.chr + 'darkoperator.com',
'cazz' => 'bmc' + 0x40.chr + 'shmoo.com', 'cazz' => 'bmc' + 0x40.chr + 'shmoo.com',
'CG' => 'cg' + 0x40.chr + 'carnal0wnage.com', 'CG' => 'cg' + 0x40.chr + 'carnal0wnage.com',

View File

@ -33,8 +33,8 @@ module EventServlet
def self.report_event def self.report_event
lambda { lambda {
warden.authenticate!
begin begin
warden.authenticate!
job = lambda { |opts| get_db.report_event(opts) } job = lambda { |opts| get_db.report_event(opts) }
exec_report_job(request, &job) exec_report_job(request, &job)
rescue => e rescue => e

View File

@ -34,7 +34,7 @@ module HostServlet
data = data.first if is_single_object?(data, sanitized_params) data = data.first if is_single_object?(data, sanitized_params)
set_json_data_response(response: data, includes: includes) set_json_data_response(response: data, includes: includes)
rescue => e rescue => e
print_error_and_create_response(error: e, message: 'There was an error getting hosts:', code: 500) print_error_and_create_response(error: e, message: 'There was an error retrieving hosts:', code: 500)
end end
} }
end end

View File

@ -18,8 +18,8 @@ module MsfServlet
def self.get_msf_version def self.get_msf_version
lambda { lambda {
warden.authenticate!
begin begin
warden.authenticate!
set_json_data_response(response: { metasploit_version: Metasploit::Framework::VERSION }) set_json_data_response(response: { metasploit_version: Metasploit::Framework::VERSION })
rescue => e rescue => e
print_error_and_create_response(error: e, message: 'There was an error retrieving the version:', code: 500) print_error_and_create_response(error: e, message: 'There was an error retrieving the version:', code: 500)

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Auxiliary
This module has been tested successfully with ScadaBR This module has been tested successfully with ScadaBR
versions 1.0 CE and 0.9 on Windows and Ubuntu systems. versions 1.0 CE and 0.9 on Windows and Ubuntu systems.
}, },
'Author' => 'Brendan Coles <bcoles[at]gmail.com>', 'Author' => 'bcoles',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => ['URL', 'http://www.scadabr.com.br/?q=node/1375'], 'References' => ['URL', 'http://www.scadabr.com.br/?q=node/1375'],
'Targets' => [[ 'Automatic', {} ]], 'Targets' => [[ 'Automatic', {} ]],

View File

@ -104,7 +104,7 @@ class MetasploitModule < Msf::Auxiliary
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY']) output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])
# Report output # Report output
print_good("Command completed successfuly!") print_good("Command completed successfully!")
print_status("Output for \"#{datastore['COMMAND']}\":\n") print_status("Output for \"#{datastore['COMMAND']}\":\n")
print_line("#{output}\n") print_line("#{output}\n")
report_note( report_note(

View File

@ -72,7 +72,7 @@ class MetasploitModule < Msf::Auxiliary
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY']) output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])
unless output.nil? unless output.nil?
print_good("Command completed successfuly!") print_good("Command completed successfully!")
print_status("Output for \"#{datastore['COMMAND']}\":\n") print_status("Output for \"#{datastore['COMMAND']}\":\n")
print_line("#{output}\n") print_line("#{output}\n")
report_note( report_note(

View File

@ -39,14 +39,14 @@ class MetasploitModule < Msf::Auxiliary
end end
def run def run
if datastore['PDFINJECT'].to_s.end_with?('.pdf') && datastore['FILENAME'].to_s.end_with?('.pdf') if datastore['PDFINJECT'].nil? && datastore['FILENAME'].nil?
print_error 'Please configure either FILENAME or PDFINJECT' print_error 'Please configure either FILENAME or PDFINJECT'
elsif !datastore['PDFINJECT'].nil? && datastore['PDFINJECT'].to_s.end_with?('.pdf') elsif !datastore['PDFINJECT'].nil? && datastore['PDFINJECT'].to_s.end_with?('.pdf')
injectpdf injectpdf
elsif !datastore['FILENAME'].nil? && datastore['FILENAME'].to_s.end_with?('.pdf') elsif !datastore['FILENAME'].nil? && datastore['FILENAME'].to_s.end_with?('.pdf')
createpdf createpdf
else else
print_error 'FILENAME or PDFINJECT must end with '.pdf' file extension' print_error "FILENAME or PDFINJECT must end with '.pdf' file extension"
end end
end end

View File

@ -14,7 +14,7 @@ class MetasploitModule < Msf::Auxiliary
This module retrieves SIP and IAX2 user extensions and credentials from This module retrieves SIP and IAX2 user extensions and credentials from
Asterisk Call Manager service. Valid manager credentials are required. Asterisk Call Manager service. Valid manager credentials are required.
}, },
'Author' => 'Brendan Coles <bcoles[at]gmail.com>', 'Author' => 'bcoles',
'References' => 'References' =>
[ [
['URL', 'http://www.asterisk.name/sip1.html'], ['URL', 'http://www.asterisk.name/sip1.html'],

View File

@ -21,7 +21,7 @@ class MetasploitModule < Msf::Auxiliary
Note: All tokens expire after 30 minutes of inactivity by default. Note: All tokens expire after 30 minutes of inactivity by default.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>', 'Author' => 'bcoles',
'References' => 'References' =>
[ [
['URL', 'https://doliforge.org/tracker/?func=detail&aid=1212&group_id=144'], ['URL', 'https://doliforge.org/tracker/?func=detail&aid=1212&group_id=144'],

View File

@ -33,7 +33,7 @@ class MetasploitModule < Msf::Auxiliary
and extract the author's name from the document metadata. and extract the author's name from the document metadata.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>')) 'Author' => 'bcoles'))
register_options( register_options(
[ [
OptString.new('URL', [ false, 'The target URL', '' ]), OptString.new('URL', [ false, 'The target URL', '' ]),

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Auxiliary
to become unresponsive until the server completes the request. to become unresponsive until the server completes the request.
}, },
'Platform' => 'win', 'Platform' => 'win',
'Author' => [ 'Brendan Coles <bcoles[at]gmail.com>' ], 'Author' => [ 'bcoles' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [

View File

@ -18,7 +18,7 @@ class MetasploitModule < Msf::Auxiliary
This module has been tested successfully on TeamTalk versions This module has been tested successfully on TeamTalk versions
5.2.2.4885 and 5.2.3.4893. 5.2.2.4885 and 5.2.3.4893.
}, },
'Author' => 'Brendan Coles <bcoles[at]gmail.com>', 'Author' => 'bcoles',
'References' => 'References' =>
[ [
# Protocol documentation # Protocol documentation

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Auxiliary
'Author' => 'Author' =>
[ [
'Pedro Ribeiro <pedrib[at]gmail.com>', # Discovery and exploit 'Pedro Ribeiro <pedrib[at]gmail.com>', # Discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>' # metasploit module 'bcoles' # metasploit module
], ],
'References' => 'References' =>
[ [

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Auxiliary
[ [
['URL', 'http://news.netwinsite.com:8119/webnews?cmd=body&item=34896&group=netwin.surgemail'], ['URL', 'http://news.netwinsite.com:8119/webnews?cmd=body&item=34896&group=netwin.surgemail'],
], ],
'Author' => 'Brendan Coles <bcoles[at]gmail.com>', 'Author' => 'bcoles',
'DisclosureDate' => 'Jun 16 2017')) 'DisclosureDate' => 'Jun 16 2017'))
register_options [ Opt::RPORT(9080) ] register_options [ Opt::RPORT(9080) ]
deregister_options 'RHOST' deregister_options 'RHOST'

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Auxiliary
'Author' => 'Author' =>
[ [
'R-73eN', # Vulnerability Discovery 'R-73eN', # Vulnerability Discovery
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit module 'bcoles' # Metasploit module
], ],
'References' => 'References' =>
[ [

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Auxiliary
but does not support AUTHINFO GENERIC or AUTHINFO SASL but does not support AUTHINFO GENERIC or AUTHINFO SASL
authentication methods. authentication methods.
}, },
'Author' => 'Brendan Coles <bcoles[at]gmail.com>', 'Author' => 'bcoles',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => [ [ 'CVE', '1999-0502' ], # Weak password 'References' => [ [ 'CVE', '1999-0502' ], # Weak password
[ 'URL', 'https://tools.ietf.org/html/rfc3977' ], [ 'URL', 'https://tools.ietf.org/html/rfc3977' ],

View File

@ -14,7 +14,7 @@ class MetasploitModule < Msf::Auxiliary
Discover information from Web Services Dynamic Discovery (WS-Discovery) Discover information from Web Services Dynamic Discovery (WS-Discovery)
enabled systems. enabled systems.
}, },
'Author' => 'Brendan Coles <bcoles[at]gmail.com>', 'Author' => 'bcoles',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [

View File

@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'Mike Baucom', 'Allen Harper', 'J. Rach', # Initial discovery by Tangible Security 'Mike Baucom', 'Allen Harper', 'J. Rach', # Initial discovery by Tangible Security
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'Payload' => 'Payload' =>
{ {

View File

@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'Paul Davies (UHF-Satcom)', # Initial vulnerability discovery and PoC 'Paul Davies (UHF-Satcom)', # Initial vulnerability discovery and PoC
'Andrew Tierney (Pen Test Partners)', # Independent vulnerability discovery and PoC 'Andrew Tierney (Pen Test Partners)', # Independent vulnerability discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Platform' => 'linux', 'Platform' => 'linux',

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>
[ [
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit 'bcoles' # Discovery and exploit
], ],
'References' => 'References' =>
[ [

View File

@ -32,7 +32,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'Ivan Huertas', # Discovery and PoC 'Ivan Huertas', # Discovery and PoC
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Arch' => ARCH_CMD, 'Arch' => ARCH_CMD,
'Author' => 'Author' =>
[ [
'Brendan Coles <bcoles[at]gmail.com>', # Discovery and exploit 'bcoles', # Discovery and exploit
], ],
'References' => 'References' =>
[ [

View File

@ -21,7 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>
[ [
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit 'bcoles' # Discovery and exploit
], ],
'References' => 'References' =>
[ [

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'Author' => 'Author' =>
[ [
'Brendan Coles <bcoles[at]gmail.com>', # Discovery and exploit 'bcoles', # Discovery and exploit
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Privileged' => false, 'Privileged' => false,

View File

@ -34,7 +34,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' => 'Author' =>
[ [
'Tavis Ormandy', # Discovery and C exploit 'Tavis Ormandy', # Discovery and C exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Apr 14 2015', 'DisclosureDate' => 'Apr 14 2015',
'Platform' => [ 'linux' ], 'Platform' => [ 'linux' ],

View File

@ -41,7 +41,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' => 'Author' =>
[ [
'rebel', # Discovery and chocobo_root.c exploit 'rebel', # Discovery and chocobo_root.c exploit
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Aug 12 2016', 'DisclosureDate' => 'Aug 12 2016',
'Platform' => [ 'linux' ], 'Platform' => [ 'linux' ],

View File

@ -47,7 +47,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' => 'Author' =>
[ [
'Andrey Konovalov', # Discovery and C exploit 'Andrey Konovalov', # Discovery and C exploit
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Mar 29 2017', 'DisclosureDate' => 'Mar 29 2017',
'Platform' => [ 'linux' ], 'Platform' => [ 'linux' ],

View File

@ -40,7 +40,7 @@ class MetasploitModule < Msf::Exploit::Local
'Stéphane Graber', # Independent discovery, PoC and patch 'Stéphane Graber', # Independent discovery, PoC and patch
'Tavis Ormandy', # Independent discovery and C exploit 'Tavis Ormandy', # Independent discovery and C exploit
'Ricardo F. Teixeira', # shell exploit 'Ricardo F. Teixeira', # shell exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Mar 31 2015', 'DisclosureDate' => 'Mar 31 2015',
'Platform' => [ 'linux' ], 'Platform' => [ 'linux' ],

View File

@ -47,7 +47,7 @@ class MetasploitModule < Msf::Exploit::Local
'zx2c4', # "I Can't Read and I Won't Race You Either" exploit 'zx2c4', # "I Can't Read and I Won't Race You Either" exploit
'Marco Ivaldi', # raptor_ldaudit and raptor_ldaudit2 exploits 'Marco Ivaldi', # raptor_ldaudit and raptor_ldaudit2 exploits
'Todor Donev', # libmemusage.so exploit 'Todor Donev', # libmemusage.so exploit
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Oct 18 2010', 'DisclosureDate' => 'Oct 18 2010',
'Platform' => 'linux', 'Platform' => 'linux',

View File

@ -48,7 +48,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' => 'Author' =>
[ [
'Tavis Ormandy', # Discovery and exploit 'Tavis Ormandy', # Discovery and exploit
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Oct 18 2010', 'DisclosureDate' => 'Oct 18 2010',
'Platform' => 'linux', 'Platform' => 'linux',

View File

@ -34,7 +34,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' => 'Author' =>
[ [
'halfdog', # Discovery and RationalLove.c exploit 'halfdog', # Discovery and RationalLove.c exploit
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Jan 16 2018', 'DisclosureDate' => 'Jan 16 2018',
'Platform' => [ 'linux' ], 'Platform' => [ 'linux' ],

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Local
[ [
'Ryan Beisner', # Discovery and PoC 'Ryan Beisner', # Discovery and PoC
'David Ames (@thedac)', # Discovery and PoC 'David Ames (@thedac)', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Apr 13 2017', 'DisclosureDate' => 'Apr 13 2017',
'Platform' => [ 'linux' ], 'Platform' => [ 'linux' ],

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' => 'Author' =>
[ [
"King's Way", # Discovery and exploit "King's Way", # Discovery and exploit
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Feb 2 2016', 'DisclosureDate' => 'Feb 2 2016',
'References' => 'References' =>

View File

@ -49,7 +49,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' => 'Author' =>
[ [
'Qualys', # Discovery and C exploit 'Qualys', # Discovery and C exploit
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Jul 24 2015', 'DisclosureDate' => 'Jul 24 2015',
'Platform' => [ 'linux' ], 'Platform' => [ 'linux' ],

View File

@ -36,7 +36,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' => 'Author' =>
[ [
'Denis Andzakovic', # Discovery and exploit 'Denis Andzakovic', # Discovery and exploit
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Jul 26 2018', 'DisclosureDate' => 'Jul 26 2018',
'References' => 'References' =>

View File

@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' => 'Author' =>
[ [
'Dan Rosenberg', # Discovery and C exploit 'Dan Rosenberg', # Discovery and C exploit
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Oct 20 2010', 'DisclosureDate' => 'Oct 20 2010',
'Platform' => [ 'linux' ], 'Platform' => [ 'linux' ],

View File

@ -43,7 +43,7 @@ class MetasploitModule < Msf::Exploit::Local
[ [
'Andrey Konovalov', # Discovery and C exploit 'Andrey Konovalov', # Discovery and C exploit
'h00die', # Metasploit module 'h00die', # Metasploit module
'Brendan Coles' # Metasploit module 'bcoles' # Metasploit module
], ],
'DisclosureDate' => 'Aug 10 2017', 'DisclosureDate' => 'Aug 10 2017',
'Platform' => [ 'linux' ], 'Platform' => [ 'linux' ],

View File

@ -39,7 +39,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' => 'Author' =>
[ [
'Jann Horn', # Discovery and PoC 'Jann Horn', # Discovery and PoC
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'May 22 2017', 'DisclosureDate' => 'May 22 2017',
'Platform' => 'linux', 'Platform' => 'linux',

View File

@ -28,7 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'Friedrich Postelstorfer', # Initial public disclosure and Python exploit 'Friedrich Postelstorfer', # Initial public disclosure and Python exploit
'jduck', # Independent discovery and C exploit 'jduck', # Independent discovery and C exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Platform' => 'unix', 'Platform' => 'unix',

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'Ricky "HeadlessZeke" Lawshae', # Discovery 'Ricky "HeadlessZeke" Lawshae', # Discovery
'coldfusion39', # VertXploit 'coldfusion39', # VertXploit
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Platform' => 'linux', 'Platform' => 'linux',

View File

@ -25,7 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'Zenofex', # Initial vulnerability discovery and PoC 'Zenofex', # Initial vulnerability discovery and PoC
'0x00string', # Initial vulnerability discovery and PoC '0x00string', # Initial vulnerability discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Platform' => 'linux', 'Platform' => 'linux',

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'steelo <knownsteelo[at]gmail.com>', # Vulnerability Discovery & Python Exploit 'steelo <knownsteelo[at]gmail.com>', # Vulnerability Discovery & Python Exploit
'hdm', # Metasploit Module 'hdm', # Metasploit Module
'Brendan Coles <bcoles[at]gmail.com>', # Check logic 'bcoles', # Check logic
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>

View File

@ -19,7 +19,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => [ 'Author' => [
'Stephane Chazelas', # Vulnerability discovery 'Stephane Chazelas', # Vulnerability discovery
'lcamtuf', # CVE-2014-6278 'lcamtuf', # CVE-2014-6278
'Brendan Coles <bcoles[at]gmail.com>' # msf 'bcoles' # msf
], ],
'References' => [ 'References' => [
[ 'CVE', '2014-6271' ], [ 'CVE', '2014-6271' ],

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>
[ [
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit 'bcoles' # Discovery and exploit
], ],
'References' => 'References' =>
[ [

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>
[ [
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit 'bcoles' # Discovery and exploit
], ],
'References' => 'References' =>
[ [

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'AkaStep', # Discovery 'AkaStep', # Discovery
'Brendan Coles <bcoles[at]gmail.com>' # metasploit exploit 'bcoles' # metasploit exploit
], ],
'References' => 'References' =>
[ [

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
}, },
'Author' => 'Author' =>
[ [
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'DefaultOptions' => 'DefaultOptions' =>

View File

@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'SecuriTeam', # Discovery and exploit 'SecuriTeam', # Discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit 'bcoles', # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -19,7 +19,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>
[ [
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit 'bcoles' # Discovery and exploit
], ],
'References' => 'References' =>
[ [

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
the web interface. the web interface.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>', 'Author' => 'bcoles',
'References' => 'References' =>
[ [
['OSVDB', '99199'], ['OSVDB', '99199'],

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
and version 3.2.0 on Debian Linux 8. and version 3.2.0 on Debian Linux 8.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>', 'Author' => 'bcoles',
'References' => 'References' =>
[ [
['URL', 'http://wiki.processmaker.com/3.0/Plugin_Development'] ['URL', 'http://wiki.processmaker.com/3.0/Plugin_Development']

View File

@ -21,7 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>
[ [
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit 'bcoles' # Discovery and exploit
], ],
'References' => 'References' =>
[ [

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Local
[ [
'Daniel Lawson', # Discovery and exploit 'Daniel Lawson', # Discovery and exploit
'Romain Trouve', # Discovery and exploit 'Romain Trouve', # Discovery and exploit
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Sep 23 2016', 'DisclosureDate' => 'Sep 23 2016',
'Platform' => %w(linux solaris), 'Platform' => %w(linux solaris),

View File

@ -41,7 +41,7 @@ class MetasploitModule < Msf::Exploit::Local
'Narendra Shinde', # Discovery and exploit 'Narendra Shinde', # Discovery and exploit
'Raptor - 0xdea', # Modified exploit for cron 'Raptor - 0xdea', # Modified exploit for cron
'Aaron Ringo', # Metasploit module 'Aaron Ringo', # Metasploit module
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit module 'bcoles' # Metasploit module
], ],
'DisclosureDate' => 'Oct 25 2018', 'DisclosureDate' => 'Oct 25 2018',
'References' => 'References' =>

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
4.14 on Windows 7 SP1. 4.14 on Windows 7 SP1.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>', 'Author' => 'bcoles',
'References' => 'References' =>
[ [
[ 'URL', 'https://help.rapid7.com/metasploit/Content/api/rpc/overview.html' ], [ 'URL', 'https://help.rapid7.com/metasploit/Content/api/rpc/overview.html' ],

View File

@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Local
[ [
'cenobyte', # Discovery and exploit 'cenobyte', # Discovery and exploit
'Tim Brown', # Independent discovery 'Tim Brown', # Independent discovery
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -25,7 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'David Odell', # Discovery 'David Odell', # Discovery
'Mor!p3r', # PoC 'Mor!p3r', # PoC
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -53,7 +53,7 @@ class MetasploitModule < Msf::Exploit::Local
[ [
'Shadow Brokers', # exploit 'Shadow Brokers', # exploit
'Hacker Fantastic', # dtappgather-poc.sh 'Hacker Fantastic', # dtappgather-poc.sh
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Apr 24 2017', 'DisclosureDate' => 'Apr 24 2017',
'Privileged' => true, 'Privileged' => true,

View File

@ -51,7 +51,7 @@ class MetasploitModule < Msf::Exploit::Local
[ [
'iDefense', # Discovery 'iDefense', # Discovery
'Marco Ivaldi', # Exploit 'Marco Ivaldi', # Exploit
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Oct 11 2006', 'DisclosureDate' => 'Oct 11 2006',
'Privileged' => true, 'Privileged' => true,

View File

@ -57,7 +57,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' => 'Author' =>
[ [
'Qualys Corporation', # Stack Clash technique and Solaris_rsh.c exploit 'Qualys Corporation', # Stack Clash technique and Solaris_rsh.c exploit
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'DisclosureDate' => 'Jun 19 2017', 'DisclosureDate' => 'Jun 19 2017',
'Privileged' => true, 'Privileged' => true,

View File

@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'Bradley Austin (steponequit)', # Initial discovery and exploit 'Bradley Austin (steponequit)', # Initial discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit 'bcoles', # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -38,7 +38,7 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'Leandro Barragan', # Discovery and PoC 'Leandro Barragan', # Discovery and PoC
'Guido Leo', # Discovery and PoC 'Guido Leo', # Discovery and PoC
'Brendan Coles', # Metasploit 'bcoles', # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -28,7 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'David Odell', # Discovery 'David Odell', # Discovery
'Mor!p3r', # PoC 'Mor!p3r', # PoC
'Brendan Coles' # Metasploit 'bcoles' # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'Benjamin Harris', # Discovery and exploit 'Benjamin Harris', # Discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'x-hayben21', # Discovery and PoC 'x-hayben21', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'Pichaya Morimoto', # Discovery and PoC 'Pichaya Morimoto', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -25,7 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'drone', # Discovery and PoC 'drone', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit module 'bcoles' # Metasploit module
], ],
'References' => 'References' =>
[ [

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Braeden Thomas', # Initial discovery + Piwik PoC 'Braeden Thomas', # Initial discovery + Piwik PoC
'Gjoko Krstic <gjoko[at]zeroscience.mk>', # OpenEMR PoC 'Gjoko Krstic <gjoko[at]zeroscience.mk>', # OpenEMR PoC
'Halim Cruzito', # zonPHP PoC 'Halim Cruzito', # zonPHP PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'EgiX', # Discovery 'EgiX', # Discovery
'Brendan Coles <bcoles[at]gmail.com>' # msf exploit 'bcoles' # msf exploit
], ],
'References' => 'References' =>
[ [

View File

@ -21,7 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'AkaStep', # Discovery and PoC 'AkaStep', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # msf exploit 'bcoles' # msf exploit
], ],
'References' => 'References' =>
[ [

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'Fady Mohammed Osman', # Discovery and Exploit 'Fady Mohammed Osman', # Discovery and Exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'vinicius777[at]gmail.com', # Auth bypass discovery and PoC, kinda 'vinicius777[at]gmail.com', # Auth bypass discovery and PoC, kinda
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
and 2.13 RC1 on CentOS. and 2.13 RC1 on CentOS.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>', 'Author' => 'bcoles',
'References' => 'References' =>
[ [
['URL', 'http://www.vicidial.org/VICIDIALmantis/view.php?id=1016'] ['URL', 'http://www.vicidial.org/VICIDIALmantis/view.php?id=1016']

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>
[ [
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -28,7 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'Author' => 'Author' =>
[ [
'Brendan Coles <bcoles[at]gmail.com>', # Discovery and exploit 'bcoles', # Discovery and exploit
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Privileged' => true, 'Privileged' => true,

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'mr_me <steven[at]srcincite.io>', # vulnerability discovery and exploit 'mr_me <steven[at]srcincite.io>', # vulnerability discovery and exploit
'Brendan Coles <bcoles [at] gmail.com>', # hidden hta tricks! 'bcoles', # hidden hta tricks!
'sinn3r' # help with msf foo! 'sinn3r' # help with msf foo!
], ],
'References' => 'References' =>

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'RjRjh Hack3r', # Original discovery and exploit 'RjRjh Hack3r', # Original discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>' # msf exploit 'bcoles' # msf exploit
], ],
'References' => 'References' =>
[ [

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'Serge Gorbunov', # Initial discovery 'Serge Gorbunov', # Initial discovery
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit 'bcoles', # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -136,7 +136,7 @@ class MetasploitModule < Msf::Exploit::Remote
payload_url = "" payload_url = ""
@payload_path = "" @payload_path = ""
if res and res.code == 200 and res.body =~ /"Key":"RadUAG_success","Value":true/ if res and res.code == 200 and res.body =~ /"Key":"RadUAG_success","Value":true/
print_good("Payload uploaded successfuly") print_good("Payload uploaded successfully")
else else
print_error("Payload upload failed") print_error("Payload upload failed")
return return

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'LSO <lso[at]hushmail.com>', # original metasploit 'LSO <lso[at]hushmail.com>', # original metasploit
'Brendan Coles <bcoles[at]gmail.com>' # metasploit 'bcoles' # metasploit
], ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'References' => 'References' =>

View File

@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'AkaStep', # Initial discovery 'AkaStep', # Initial discovery
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit 'bcoles', # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -33,7 +33,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'Gjoko Krstic(LiquidWorm) <gjoko[at]zeroscience.mk>', # Discovery and exploit 'Gjoko Krstic(LiquidWorm) <gjoko[at]zeroscience.mk>', # Discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit 'bcoles', # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'sztivi', # Discovery 'sztivi', # Discovery
'Chris Lyne', # Python PoC (@lynerc) 'Chris Lyne', # Python PoC (@lynerc)
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'sztivi', # Discovery 'sztivi', # Discovery
'Chris Lyne', # Python PoC (@lynerc) 'Chris Lyne', # Python PoC (@lynerc)
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit 'bcoles' # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -33,7 +33,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'Mohamed Shetta <mshetta[at]live.com>', # Initial discovery and PoC 'Mohamed Shetta <mshetta[at]live.com>', # Initial discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit 'bcoles', # Metasploit
], ],
'References' => 'References' =>
[ [

View File

@ -19,7 +19,7 @@ module MetasploitModule
'Name' => 'Unix Command Shell, Reverse TCP (via Python)', 'Name' => 'Unix Command Shell, Reverse TCP (via Python)',
'Version' => '$Revision: 1 $', 'Version' => '$Revision: 1 $',
'Description' => 'Connect back and create a command shell via Python', 'Description' => 'Connect back and create a command shell via Python',
'Author' => 'Brendan Coles <bcoles[at]gmail.com>', 'Author' => 'bcoles',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Platform' => 'unix', 'Platform' => 'unix',
'Arch' => ARCH_CMD, 'Arch' => ARCH_CMD,

View File

@ -85,7 +85,7 @@ EOS
ring0_code = ring0_code =
#"\xcc" + #"\xcc" +
# save registers -- necessary for successfuly recovery # save registers -- necessary for successful recovery
"\x60" + "\x60" +
# get EPROCESS from ETHREAD # get EPROCESS from ETHREAD
"\x64\xa1\x24\x01\x00\x00" + "\x64\xa1\x24\x01\x00\x00" +

View File

@ -103,7 +103,7 @@ class MetasploitModule < Msf::Post
if !recovery_key.nil? if !recovery_key.nil?
recovery_key = recovery_key[1] recovery_key = recovery_key[1]
id_key_tmp = id_key_tmp[1] id_key_tmp = id_key_tmp[1]
print_good("Recovery key generated successfuly : #{recovery_key}") print_good("Recovery key generated successfully : #{recovery_key}")
else else
print_error('Recovery Key generation failed') print_error('Recovery Key generation failed')
print_status('No recovery key can be used') print_status('No recovery key can be used')

View File

@ -16,7 +16,7 @@ class MetasploitModule < Msf::Post
files in Microsoft Plus! 98 and Windows Me. files in Microsoft Plus! 98 and Windows Me.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => ['Brendan Coles <bcoles[at]gmail.com>'], 'Author' => ['bcoles'],
'References' => 'References' =>
[ [
['CVE', '2001-0152'], ['CVE', '2001-0152'],

View File

@ -16,7 +16,7 @@ class MetasploitModule < Msf::Post
FTP client for Windows. FTP client for Windows.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Brendan Coles <bcoles[at]gmail.com>' ], 'Author' => [ 'bcoles' ],
'Platform' => [ 'win' ], 'Platform' => [ 'win' ],
'SessionTypes' => [ 'meterpreter' ] 'SessionTypes' => [ 'meterpreter' ]
)) ))

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Post
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Author' => [
'Joe Giron', # Discovery and PoC (@theonlyevil1) 'Joe Giron', # Discovery and PoC (@theonlyevil1)
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit 'bcoles', # Metasploit
'sinn3r' # shell session support 'sinn3r' # shell session support
], ],
'References' => 'References' =>