Commit Graph

51022 Commits (180c395aa3f988b874227be79930e855a529d5bc)

Author SHA1 Message Date
Brent Cook 180c395aa3 just print the error, but don't give specific advice 2019-03-15 07:18:48 -05:00
Brent Cook 3027df6ab3 final tweaks 2019-03-14 06:47:58 -05:00
Brent Cook 2a906a2a32 be even clearer 2019-03-14 06:31:54 -05:00
Brent Cook e1e13d964d give better specific instructions where bundler versions are stepping on each other 2019-03-14 06:27:37 -05:00
Brent Cook c197a0d019 actually show why bundler failed to load 2019-03-12 11:33:34 -05:00
Brent Cook 1bf93ab1bc
Land #11061, allow the possibilty of empty string values for datastore options in msf5 2019-03-08 09:27:50 -06:00
Metasploit 0b39b6efc7
automatic module_metadata_base.json update 2019-03-07 16:25:17 -08:00
Brent Cook 7c97ca6a8e
Land #11535, add deregister_http_client_options 2019-03-07 18:16:14 -06:00
Metasploit 6b6069e907
automatic module_metadata_base.json update 2019-03-07 10:34:08 -08:00
Wei Chen cf19a711fd
Land #11427, Add Fortinet SSL VPN Bruteforce Login Utility 2019-03-07 12:25:41 -06:00
Metasploit 1588928b44
Bump version of framework to 5.0.11 2019-03-07 10:06:39 -08:00
Brent Cook 656ef8f970
Land #11533, Fix credential reporting service lookups 2019-03-06 20:13:41 -06:00
Brent Cook 3670dd8067
Land #11521, add RMI support for UnicastRef2 responses 2019-03-06 20:05:33 -06:00
Metasploit 76de3b12a7
automatic module_metadata_base.json update 2019-03-06 18:02:18 -08:00
Brent Cook 468679f907
Land #11092, Add FreeBSD 8.3 / 9.0 Intel SYSRET Privilege Escalation module 2019-03-06 19:50:08 -06:00
Brent Cook 9ca5ac294d
Land #10012, Add an Android module to run payloads with su on a rooted device 2019-03-06 19:46:33 -06:00
Brent Cook 433af12942 add deregister_http_client_options 2019-03-06 19:37:56 -06:00
Brent Cook 841c07a42c restore rescue for now 2019-03-06 19:35:12 -06:00
Metasploit 15c58db3be
automatic module_metadata_base.json update 2019-03-06 16:00:53 -08:00
Brent Cook 7347db65a6
Land #11534, fix module title for sonicwall_xmlrpc_rce 2019-03-06 17:44:39 -06:00
Brent Cook eb15c457fe
Land #11524, remove some unused bits from modules 2019-03-06 17:43:20 -06:00
Brent Cook 8b251934ab remove mixin, just register the options 2019-03-06 17:42:27 -06:00
Brent Cook d923e1fb84
Land #11523, remove unneded RHOST reregister in scanners 2019-03-06 17:35:54 -06:00
Patrick Webster d67bfdfea4
Fix module heading and typo
The newline in the name breaks the msfconsole output
2019-03-07 10:29:15 +11:00
Brent Cook 4f08d1e864 Fix credential reporting service lookups.
Noted by @actuated, auxiliary/scanner/ipmi/ipmi_dumphashes was displaying an error when run against an IPMI endpoint that had a common hash. This was due to the services lookup in the database not extracting the first element of the results array.

```
[-] Auxiliary failed: NoMethodError undefined method `id' for #<Array:0x000055615614b970>
[-] Call stack:
[-]   /home/bcook/projects/metasploit-framework/lib/metasploit/framework/data_service/proxy/credential_data_proxy.rb:27:in `block (2 levels) in create_cracked_credential'
[-]   /home/bcook/.rvm/gems/ruby-2.6.1@metasploit-framework/gems/activerecord-4.2.11/lib/active_record/relation/delegation.rb:46:in `each'
[-]   /home/bcook/.rvm/gems/ruby-2.6.1@metasploit-framework/gems/activerecord-4.2.11/lib/active_record/relation/delegation.rb:46:in `each'
[-]   /home/bcook/projects/metasploit-framework/lib/metasploit/framework/data_service/proxy/credential_data_proxy.rb:25:in `block in create_cracked_credential'
[-]   /home/bcook/projects/metasploit-framework/lib/metasploit/framework/data_service/proxy/core.rb:166:in `data_service_operation'
[-]   /home/bcook/projects/metasploit-framework/lib/metasploit/framework/data_service/proxy/credential_data_proxy.rb:15:in `create_cracked_credential'
[-]   /home/bcook/projects/metasploit-framework/lib/msf/core/auxiliary/report.rb:26:in `create_cracked_credential'
[-]   /home/bcook/projects/metasploit-framework/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb:317:in `report_cracked_cred'
[-]   /home/bcook/projects/metasploit-framework/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb:244:in `block (2 levels) in run_host'
[-]   /home/bcook/projects/metasploit-framework/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb:237:in `each'
[-]   /home/bcook/projects/metasploit-framework/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb:237:in `block in run_host'
[-]   /home/bcook/projects/metasploit-framework/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb💯in `each'
[-]   /home/bcook/projects/metasploit-framework/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb💯in `run_host'
[-]   /home/bcook/projects/metasploit-framework/lib/msf/core/auxiliary/scanner.rb:111:in `block (2 levels) in run'
[-]   /home/bcook/projects/metasploit-framework/lib/msf/core/thread_manager.rb:106:in `block in spawn'
[*] Auxiliary module execution completed
```
2019-03-06 17:08:34 -06:00
Aaron Soto 789e2d57b4
Land #11532, Cleanup changes from DB Manager for Payloads 2019-03-06 13:39:42 -06:00
Matthew Kienow f873d94c10
Check that DB is active before looking up payload 2019-03-06 14:22:32 -05:00
Matthew Kienow 6bcdda4bd1
Add entry to autoload RemotePayloadDataService 2019-03-06 13:41:08 -05:00
Matthew Kienow 63c1903032
Remove empty file 2019-03-06 13:11:34 -05:00
Matthew Kienow a749b86730
Add missing ActiveRecord connection block 2019-03-06 13:07:35 -05:00
Matthew Kienow b658cf5d76
Use data_service_operation block to perform work 2019-03-06 12:11:27 -05:00
Metasploit 6d42964728
automatic module_metadata_base.json update 2019-03-05 23:49:34 -08:00
William Vu 50f89321a0
Land #11419, systemd user service persistence 2019-03-06 01:39:58 -06:00
William Vu ebb80ae4f0 Fix copypasta error 2019-03-06 00:48:05 -06:00
William Vu a6782cbee4 Update module doc with my testing notes 2019-03-06 00:47:12 -06:00
William Vu 31ba073009 Add per-target SHELLPATH defaults 2019-03-06 00:07:17 -06:00
William Vu 77af9eca5c Update module doc 2019-03-05 23:20:53 -06:00
William Vu c539951311 Clean up method 2019-03-05 23:17:34 -06:00
Metasploit 75efee5593
automatic module_metadata_base.json update 2019-03-05 20:09:46 -08:00
William Vu 715409496e
Fix #11210, imperva_securesphere_exec options 2019-03-05 22:01:24 -06:00
Metasploit 83929a5133
automatic module_metadata_base.json update 2019-03-05 20:00:36 -08:00
William Vu 4e31f53ca2 Fix required USERNAME and PASSWORD
Somehow I forgot to commit this? Strange.
2019-03-05 21:57:42 -06:00
William Vu c48dec7331
Land #11210, imperva_securesphere_exec exploit 2019-03-05 21:52:13 -06:00
Metasploit fe4b517e18
automatic module_metadata_base.json update 2019-03-05 19:38:44 -08:00
William Vu 4e76eeceb7 Clean up module 2019-03-05 21:37:55 -06:00
William Vu 108e90ca38
Land #11527, .rubocop.yml TargetRubyVersion update
And TrailingCommaInArrayLiteral fixes in my modules. :(
2019-03-05 21:29:47 -06:00
Metasploit edb94e9ef5
automatic module_metadata_base.json update 2019-03-05 19:17:20 -08:00
William Vu 6ff18828c0
Land #11481, Drupal SA-CORE-2019-003/CVE-2019-6340 2019-03-05 21:09:06 -06:00
William Vu 1f5695de07 Fix TrailingCommaInArrayLiteral in my modules 2019-03-05 21:02:39 -06:00
William Vu a378dff8a9 Update .rubocop.yml TargetRubyVersion to 2.4
2.3 is EOL at the end of this month.
2019-03-05 21:01:33 -06:00