Commit Graph

18944 Commits (089a0064080d185d6b1f281ca499818f264fcc0f)

Author SHA1 Message Date
HD Moore a9e8ab785e
Land #6220, adds ATG client module 2015-11-17 13:31:17 -06:00
HD Moore e107ec2d17 Change fail to fail_with, fix typo 2015-11-17 13:30:46 -06:00
HD Moore 74f6ff7752 Rename to atg_client to match conventions 2015-11-17 12:59:37 -06:00
wchen-r7 f6fdabfd77
Land #6239, added Session info display to module output
MS-706
2015-11-16 18:10:58 -06:00
wchen-r7 f0da09090d
Land #6233, Konica Minolta FTP Utility 1.00 Directory Traversal 2015-11-16 13:55:29 -06:00
wchen-r7 740cacb4c0 Check nil 2015-11-16 13:54:36 -06:00
William Vu 24c41c9261
Land #6225, wall(1)/write(1) post module 2015-11-16 12:47:35 -06:00
David Maloney a1ab8f1dc7
added Session info display to module output
output from the mssql_local_auth_bypass module
is now prefixed with the Session id and address
of the target host so it is explicitly clear
where it is performing each action

MS-706
2015-11-16 12:13:26 -06:00
Jon Hart c914c7b22c
Completely remove SET_TIME 2015-11-13 12:28:23 -08:00
Jon Hart ab3ae675ff
Hide TIME option since SET_TIME is not implemented 2015-11-13 12:26:42 -08:00
Jon Hart ad22eb8444
More cleanup 2015-11-13 12:24:28 -08:00
Jon Hart 045bab052e
Add configurable timeout 2015-11-13 12:18:40 -08:00
Jon Hart 6e9afc38ee
print_good when we get something 2015-11-13 12:12:37 -08:00
Jon Hart 196a88c39a
Style nit 2015-11-13 12:06:00 -08:00
Jon Hart 38ca943219
Remove unneeded width arg 2015-11-13 11:49:50 -08:00
Jon Hart 4604f8cd83
Move cowsay to Rex::Text so that everyone can enjoy it ;) 2015-11-13 08:57:48 -08:00
William Vu 4401c6f1fd
Land #6178, rsync modules_list improvements 2015-11-13 10:46:24 -06:00
JT 44948a2ace Add konica_ftp_traversal.rb ( CVE-2015-7603 )
This module exploits a directory traversal vulnerability found in Konica Minolta FTP Utility 1.0. This vulnerability allows an attacker to download arbitrary files from the server by crafting a RETR command that includes file system traversal strings such as '..//
2015-11-13 07:51:42 +08:00
Louis Sato 9a0f0a7843
Land #6142, uptime refactor 2015-11-12 16:58:55 -06:00
wchen-r7 ee25cb88b5
Land #6196, vBulletin 5.1.2 Unserialize Code Execution 2015-11-12 14:38:39 -06:00
wchen-r7 6077617bfd rm res var name
the res variable isn't used
2015-11-12 14:37:47 -06:00
wchen-r7 199ed9ed25 Move vbulletin_unserialize.rb to exploits/multi/http/
According to @all3g, this works on Windows too, so we will move
this to multi/http.
2015-11-12 14:36:01 -06:00
William Vu e8dacf32fd
Land #6182, Heartbleed scanner improvements 2015-11-11 16:59:20 -06:00
William Vu ce3f9e2fab Fix minor style issues 2015-11-11 16:58:20 -06:00
Jon Hart 15cfa925c8
Document the cloud mess 2015-11-11 12:06:53 -08:00
Jon Hart a328675f77
Add simulated cowsay support to wall 2015-11-11 11:54:46 -08:00
wchen-r7 99607e6e4d
Land #6205, BisonWare BisonFTP Server Directory Traversal
CVE-2015-7602
2015-11-11 11:47:45 -06:00
wchen-r7 40bdd2bd01 Do module cleanup for auxiliary/scanner/ftp/bison_ftp_traversal 2015-11-11 11:46:37 -06:00
Jon Hart 8d21a91f3e
Add initial wall module 2015-11-11 09:15:32 -08:00
wchen-r7 c79a66be02
Land #6204, directory traversal for PCMan FTP server
CVE-2015-7601
2015-11-11 11:07:34 -06:00
wchen-r7 e6e5bde492 Do module cleanup for auxiliary/scanner/ftp/pcman_ftp_traversal 2015-11-11 11:06:54 -06:00
wchen-r7 7ad42c2ba1
Land #6216, remove duplicate keys for LoginScanner modules 2015-11-11 10:12:12 -06:00
JT 75a0472db8 Update bison_ftp_traversal.rb
made some changes
2015-11-11 14:01:39 +08:00
JT 4716e2e16b Update pcman_ftp_traversal.rb
made some changes
2015-11-11 14:00:04 +08:00
Jon Hart 0cfa67f58f
Stub out more of the set time, but disable it 2015-11-10 22:00:02 -08:00
Jon Hart c98ab1dad4
update SET_TANK_NAME opt to mention necessary opts 2015-11-10 21:49:40 -08:00
Jon Hart de570a1550
Improve output when setting tank names 2015-11-10 21:41:05 -08:00
Jon Hart 0762b9fa9b
Fix option formatting 2015-11-10 21:24:58 -08:00
Jon Hart 637e570b28
Add TLS-250 reference 2015-11-10 21:21:55 -08:00
Jon Hart e67057a5c9
Add great TLS-350 resource 2015-11-10 21:19:37 -08:00
Jon Hart 8dd6003cc2
Add several untested but likely OK TLS-350 commands 2015-11-10 21:18:27 -08:00
Jon Hart d00eba23f9
Update references 2015-11-10 21:02:37 -08:00
JT a0351133a6 Add more references to this exploit
Adding exploit-db doc about China Chopper webshell and details about this webshell in US-CERT.
2015-11-11 09:51:05 +08:00
William Vu 32faf7a8d4 Fix #6183, hard tabs fix 2015-11-10 16:48:03 -06:00
William Vu a9fe09497e Fix hard tabs
Mixing tabs and spaces? Seriously?
2015-11-10 16:47:29 -06:00
Jon Hart 143ac47484
Minor style cleanup 2015-11-10 14:47:12 -08:00
William Vu 8dc636507b
Land #6183, dns_srv_enum updates 2015-11-10 16:44:27 -06:00
William Vu e98570cbd1 Clean up module 2015-11-10 16:44:10 -06:00
Jon Hart dac7738f29
Clean up description; add more refs 2015-11-10 14:43:06 -08:00
Jon Hart 4f4e4c734a
Handle ATGs w/ > 10 tanks, more strict 2015-11-10 14:36:59 -08:00