William Vu
ee55516e06
Allow lowercase HTTP in command strings
2017-05-10 15:17:20 -05:00
William Vu
0ce475dea3
Add WordPress 4.6 PHPMailer exploit
2017-05-10 15:17:20 -05:00
William Vu
3a45c2f321
Allow complete override of Host header
2017-05-10 15:17:20 -05:00
Michael Scherer
a3dc82d51c
Fix mispelling in meterpreter readme
2017-05-10 22:08:22 +02:00
William Vu
638320a848
Update rex-exploitation to 0.1.13
2017-05-10 15:07:21 -05:00
William Vu
b04a8821aa
Land #8366 , apache_range_dos should not be in WMAP
2017-05-10 15:03:04 -05:00
James Lee
d00685a802
Don't run a DoS during wmap scans
2017-05-10 14:41:24 -05:00
Brent Cook
42fd287038
remove debug
2017-05-10 13:04:12 -05:00
Christian Mehlmauer
23e97f4ea9
set LHOST in docker
2017-05-10 09:37:54 +02:00
Brendan Coles
42c7d64b28
Update style
2017-05-10 06:37:09 +00:00
Brent Cook
faf01ed5ef
Land #8353 , add aux scanner for Intel AMT digest bypass
2017-05-09 18:45:21 -05:00
Brent Cook
ad37f88a34
add module docs
2017-05-09 18:44:43 -05:00
Jeffrey Martin
04aa3f8daa
address save for aggregator connect details
2017-05-09 11:20:49 -05:00
James Lee
72388a957f
Land #8355 , IIS ScStoragePathFromUrl
...
See #8162
2017-05-09 11:06:01 -05:00
James Lee
10099e99c6
Land #8361 , update packetfu
2017-05-09 11:04:04 -05:00
James Lee
fd05cea033
Update packetfu and remove version lock
2017-05-09 11:03:32 -05:00
Zero_Chaos
9295a39c92
update packetfu dep now that 1.1.13 is released
...
Please use the release instead of the pre-release
2017-05-09 11:18:28 -04:00
Christian Mehlmauer
2b4ace9960
convert to "screaming snake"
2017-05-09 09:30:45 +02:00
OJ
2207891f0a
Land #8538 bump payloads for LURI and proxy fixes
2017-05-09 09:00:04 +10:00
Brent Cook
cf487cc90c
reverse_ncat_ssl is stable
2017-05-08 17:43:34 -05:00
Brent Cook
7f1e2e6c71
bump metasploit-payloads
2017-05-08 17:34:55 -05:00
Brendan Coles
32dafb06af
Replace NoTarget with NotVulnerable
2017-05-08 22:29:44 +00:00
Christian Mehlmauer
f70b402dd9
add comment
2017-05-09 00:17:00 +02:00
Brent Cook
96e3d61883
Land #8297 , add docs for energizer duo scanner and exploit
2017-05-08 17:14:36 -05:00
Brent Cook
86365c89d1
Land #8352 , style updates for lotus_domino_hashes
2017-05-08 17:11:44 -05:00
Christian Mehlmauer
806963359f
fix fail with condition
2017-05-08 23:47:48 +02:00
Brent Cook
630fa7cc17
Land #8356 , Windows Meterpreter bug fixes
...
Merge remote-tracking branch 'upstream/pr/8356' into upstream-master
2017-05-08 16:45:09 -05:00
Christian Mehlmauer
68f61f32ae
revert accidental test commit
2017-05-08 23:27:40 +02:00
Brent Cook
0bc9d9259d
meterpreter bugfixes
...
fixed stdapi_fs_mount_show to show full mapped drive path for Python
Meterpreter on Windows
Updated the Windows Meterpreter `getprivs` command to list all privileges
2017-05-08 16:26:32 -05:00
Christian Mehlmauer
f62ac6327d
add @rwhitcroft
2017-05-08 23:20:12 +02:00
Christian Mehlmauer
26373798fa
change rank
2017-05-08 23:07:12 +02:00
Christian Mehlmauer
962a31f879
change minimum length
2017-05-08 23:01:17 +02:00
Christian Mehlmauer
7dccb17834
auto extract values and implement brute forcing
2017-05-08 22:47:29 +02:00
Brent Cook
beea5e1a5c
use wfsdelay consistently
2017-05-08 15:34:09 -05:00
Adam Cammack
7bac1fc421
Land #8354 , Remove `.negative?` for older Rubies
2017-05-08 15:24:50 -05:00
Brent Cook
841f63ad20
make office_word_hta backward compat with older Rubies
2017-05-08 15:10:48 -05:00
Christian Mehlmauer
406a7f1ae2
Merge remote-tracking branch 'dmchell/dmchell-cve-2017-7269' into iis2
2017-05-08 21:51:51 +02:00
Brent Cook
fede672a81
further revise templates
2017-05-08 14:26:24 -05:00
HD Moore
f7ff840ef0
Add missing return, thanks bperry!
2017-05-08 14:08:59 -05:00
HD Moore
9392e48b72
Add a scanner for Intel AMT auth bypass (CVE-2017-5689)
2017-05-08 13:24:00 -05:00
Brent Cook
a2ce3743a2
move wait_status to a mixin
2017-05-08 12:23:27 -05:00
Brent Cook
f213482659
small fixe
2017-05-08 11:52:37 -05:00
William Vu
b794bfe5db
Land #8335 , rank fixes for the msftidy god
2017-05-07 21:20:33 -05:00
Bryan Chu
88bef00f61
Add more ranks, remove module warnings
...
../vmware_mount.rb
Rank = Excellent
Exploit uses check code for target availability,
the vulnerability does not require user action,
and the exploit uses privilege escalation to run
arbitrary executables
../movabletype_upgrade_exec.rb
Rank = ExcellentRanking
Exploit utilizes code injection,
has a check for availability
../uptime_file_upload_2.rb
Rank = ExcellentRanking
Exploit allows execution of arbitrary commands,
has a check for availability
../zpanel_information_disclosure_rce.rb
Rank = ExcellentRanking
Exploit allows remote code execution,
implements version check for pChart
../spip_connect_exec.rb
Rank = ExcellentRanking
Exploit utilizes code injection,
has a check for availability
../wp_optimizepress_upload.rb
Rank = ExcellentRanking
Exploit allows execution of arbitrary code,
has a check for availability
../wing_ftp_admin_exec.rb
Rank = ExcellentRanking
Exploit allows execution of arbitrary commands,
has a check for availability
../novell_mdm_lfi.rb
Rank = ExcellentRanking
Exploit allows execution of arbitrary code,
has a check for availability
../run_as.rb
Rank = ExcellentRanking
Exploit utilizes command injection,
checks system type, and does not require user action
2017-05-07 15:41:26 -04:00
Pearce Barry
af3f1fbc37
Land #8332 , Canprobe Module
2017-05-07 12:20:27 -05:00
Pearce Barry
1c099a3d14
Minor doc tweaks.
2017-05-07 12:13:57 -05:00
Pearce Barry
c05e7b3b58
Minor corrections and a tweak to appease msftidy.
2017-05-07 11:55:20 -05:00
Pearce Barry
e3d3fa8e45
Tweak internal description formatting.
2017-05-07 11:31:36 -05:00
Pearce Barry
b965bdcdae
Appease msftidy and Travis.
2017-05-07 11:19:32 -05:00
m0t
ab245b5042
added note to description
2017-05-07 13:56:50 +01:00