William Vu
|
fc9245fa66
|
Fix author names in a couple modules
It me.
|
2019-02-22 17:02:15 -06:00 |
Brendan Coles
|
24f807490f
|
revisionism
|
2019-01-10 19:19:14 +00:00 |
William Vu
|
4c036e70c1
|
Fix http://seclists.org links to https://
I have no idea how this happened in my own code. I was seeing https://.
|
2018-09-15 18:54:45 -05:00 |
William Vu
|
6df235062b
|
Land #10505, post-auth and default creds info
|
2018-08-24 18:08:15 -05:00 |
Matthew Kienow
|
ecc6c473d8
|
Add note about unauthenticated telnetd service
|
2018-08-23 15:50:41 -04:00 |
Matthew Kienow
|
56433c8ed2
|
Functional decomposition refactor and cleanup
|
2018-08-23 15:23:42 -04:00 |
Matthew Kienow
|
961769c346
|
Fix SNMP Null class comparison
|
2018-08-23 15:23:42 -04:00 |
Matthew Kienow
|
9c05f14a70
|
Modify SNMP null and error handling
|
2018-08-23 15:23:42 -04:00 |
Matthew Kienow
|
934bb38a44
|
Omit parentheses for no argument method calls
|
2018-08-23 15:23:41 -04:00 |
Matthew Kienow
|
c5958c6e38
|
Restore original rport value
|
2018-08-23 15:23:41 -04:00 |
Matthew Kienow
|
70a0b9b1be
|
Remove payload RequiredCmd and reformat info
|
2018-08-23 15:23:41 -04:00 |
Matthew Kienow
|
dafa62dec4
|
Use string interpolation over concatenation
|
2018-08-23 15:23:40 -04:00 |
Matthew Kienow
|
7c03454a0b
|
Remove unnecessary explicit msf/core require
|
2018-08-23 15:23:40 -04:00 |
Matthew Kienow
|
b1a308f3ae
|
Remove final debug output
|
2018-08-23 15:23:40 -04:00 |
Matthew Kienow
|
e21ea4180f
|
Clean up module and payload
Update module info, remove intermediate ARCH_ARMLE target, simply
options and add cleanup command so that the payload kills telnetd
|
2018-08-23 15:23:40 -04:00 |
Matthew Kienow
|
81f1555439
|
Rename module, exploits multiple printer models
|
2018-08-23 15:23:40 -04:00 |
Matthew Kienow
|
df18e354e1
|
Add bind_busybox_telnetd payload, misc cleanup
|
2018-08-23 15:23:39 -04:00 |
Matthew Kienow
|
c0c3e12c74
|
WIP - hp officejet pro exploit, enhance PJL lib
|
2018-08-23 14:53:54 -04:00 |
Wei Chen
|
d9fc99ec4a
|
Correct false negative post_auth? status
|
2018-08-09 23:34:03 -05:00 |
asoto-r7
|
1a3a4ef5e4
|
Revised 88 aux and exploit modules to add CVEs / references
|
2018-07-12 17:34:52 -05:00 |
Brendan Coles
|
3bcc329c07
|
Add HID discoveryd command_blink_on Unauthenticated RCE exploit
|
2018-06-03 05:41:10 +00:00 |
William Vu
|
436e414b93
|
Land #7815, CVE-2016-9299 exploit
|
2018-05-16 05:29:41 -05:00 |
William Vu
|
959cbde6eb
|
Clean up module
|
2018-05-16 05:29:25 -05:00 |
bwatters-r7
|
37a844bef0
|
Land # 9247, Add ASUS infosvr Auth Bypass Command Execution exploit
Merge branch 'land-9247' into upstream-master
|
2018-04-20 11:24:47 -05:00 |
Brendan Coles
|
d078ab8033
|
Use 'exit' CommandShellCleanupCommand
|
2018-02-06 13:36:36 +00:00 |
Brendan Coles
|
686689afc0
|
Rename asus_infosvr_exec to asus_infosvr_auth_bypass_exec
|
2018-02-02 07:53:50 +00:00 |
Brent Cook
|
c288dab338
|
fixup RHOST/RPORT expectations if only URI is set
|
2017-11-30 10:51:02 -06:00 |
Brent Cook
|
d689b33d7e
|
more error handling, deal with user error
|
2017-11-30 08:31:13 -06:00 |
Brent Cook
|
87e683c763
|
add back kill syscall for trap method
|
2017-11-30 08:12:15 -06:00 |
Brent Cook
|
a0e0e1db15
|
allow manual targeting, handle errors better
|
2017-11-30 07:51:12 -06:00 |
Brent Cook
|
eea72663b3
|
warn on method failure instead of error
|
2017-11-30 06:37:21 -06:00 |
Brent Cook
|
9f12b794da
|
cleanup comments
|
2017-11-30 06:37:04 -06:00 |
Brent Cook
|
5da34e8f2b
|
support RHOST/RPORT
|
2017-11-30 06:36:42 -06:00 |
Brent Cook
|
59580195b4
|
resurrect old methods, try all 3
|
2017-11-30 06:16:05 -06:00 |
Brendan Coles
|
f8ebd65449
|
Add ASUS infosvr Unauthenticated Command Execution exploit
|
2017-11-28 12:58:52 +00:00 |
Patrick Webster
|
2f6da89674
|
Change author name to nick.
|
2017-11-09 03:00:24 +11:00 |
h00die
|
5abdfe3e59
|
ueb9 style cleanup
|
2017-10-20 19:59:24 -04:00 |
caleBot
|
8f622a5003
|
Update ueb9_bpserverd.rb
|
2017-10-20 14:35:03 -06:00 |
caleBot
|
cce7bf3e19
|
Update ueb9_bpserverd.rb
|
2017-10-20 14:33:46 -06:00 |
caleBot
|
85152b5f1e
|
added check function
|
2017-10-20 14:28:52 -06:00 |
caleBot
|
16b6248943
|
Update ueb9_bpserverd.rb
|
2017-10-20 13:58:12 -06:00 |
caleBot
|
5c0bcd8f0a
|
Update ueb9_bpserverd.rb
|
2017-10-20 13:56:25 -06:00 |
caleBot
|
63e3892392
|
fixed issues identified by msftidy
|
2017-10-06 10:16:01 -06:00 |
caleBot
|
36610b185b
|
initial commit for UEB9 exploits - CVE-2017-12477, CVE-2017-12478
|
2017-10-06 09:38:33 -06:00 |
h00die
|
a40429158f
|
40% done
|
2017-08-28 20:17:58 -04:00 |
William Vu
|
4c285c0129
|
Land #8827, QNAP Transcode Server RCE
|
2017-08-22 23:07:01 -05:00 |
William Vu
|
d659cdc8f6
|
Convert quest_pmmasterd_bof to cmd_interact/find
|
2017-08-18 00:19:09 -05:00 |
Brendan Coles
|
ac976eee8e
|
Add author
|
2017-08-15 03:27:40 +00:00 |
Brendan Coles
|
0a374b1a88
|
Add QNAP Transcode Server Command Execution exploit module
|
2017-08-13 09:13:56 +00:00 |
Brent Cook
|
6300758c46
|
use https for metaploit.com links
|
2017-07-24 06:26:21 -07:00 |