Commit Graph

36182 Commits (1fe8bc9cea4a838c9cdde8227ed414180c793f0c)

Author SHA1 Message Date
Jon Hart 3c92b109d7
Don't wait for motd when testing for auth 2015-11-02 10:49:48 -08:00
Jon Hart a4c260f7be
Simplify docs 2015-11-02 09:51:40 -08:00
Jon Hart 0dc6f6605b
Remove errant options print 2015-11-02 09:48:48 -08:00
Jon Hart 6c0034fba6
get_once for negotiation and trailing motd_lines
This feels hacky.
2015-11-02 09:32:54 -08:00
Jon Hart a120dd1ea9
Return nil when no motd lines 2015-11-02 09:18:10 -08:00
Jon Hart 962cf77873
Not all modules have comments 2015-11-02 09:14:41 -08:00
Jon Hart 4effd3aa81
Handle case where motd comes after negotiation 2015-11-02 09:12:57 -08:00
James Lee 1f73bbe7ca
Remove obsolete files in data/gui/ 2015-11-02 10:44:47 -06:00
nixawk 6c16d2a1ca caidao's exploit module 2015-11-02 08:54:18 +00:00
Brent Cook dba18110fd
Land #6175, require meterpreter_options with stageless python 2015-10-31 10:26:00 -05:00
void-in f629f98fdc Resolve 6174, require meterpreter_options 2015-10-31 18:47:22 +05:00
William Vu 6a01efa394 Deprecate psexec_psh 2015-10-30 17:41:58 -05:00
Brent Cook 7f19d95ad8
Land #6146, add show_mount command (initially for windows meterpreter sessions) 2015-10-30 17:37:30 -05:00
Brent Cook ec1682ebd9
update payload size cache 2015-10-30 17:35:05 -05:00
Brent Cook cb403b8a36
Land #6077, initial python meterpreter module support 2015-10-30 17:29:05 -05:00
Brent Cook d7af7c3511
Land #6120, stageless python meterpreter 2015-10-30 17:27:33 -05:00
Brent Cook fb7d5e569a update to metasploit-payloads 1.0.16 2015-10-30 17:27:09 -05:00
Brent Cook be23da1c1f Merge branch 'upstream-master' into land-6120-python-stageless 2015-10-30 17:26:26 -05:00
Brent Cook cddbcc52ab
Land #6171, update to metasploit 4.11.5 2015-10-30 17:09:57 -05:00
Brent Cook 4a52b62275 bump to 4.11.5, update a few other gems 2015-10-30 17:08:29 -05:00
Louis Sato 78416724f8
Land #6167, fix deprecation warning + expiration
adobe flash player buffer overlow deprecation warning replacement
and expiration extended
2015-10-30 15:49:40 -05:00
Louis Sato 2bd792f693
remove .rb file extension 2015-10-30 15:26:45 -05:00
Jon Hart 15a9bccb2f
Use correct order for help ... 2015-10-30 13:17:15 -07:00
Jon Hart d18b6ff9cd
More doc, error handling 2015-10-30 13:13:44 -07:00
Jon Hart ff1d0709e0
vprint if the thing isn't rsync 2015-10-30 12:39:06 -07:00
Jon Hart c54f034f62
Correct help feature 2015-10-30 12:34:34 -07:00
Jon Hart 377017a2d5 Include module name in advanced options output 2015-10-30 11:54:44 -07:00
Jon Hart 0091a05fa6 Add 'advanced' and 'options' commands to mirror 'info' 2015-10-30 11:54:40 -07:00
Jon Hart 6bfa6095c6 Add 'show info'; just calls 'info' 2015-10-30 11:54:35 -07:00
William Vu f8a39ecc21
Land #6145, better RPC exception handling 2015-10-30 13:25:52 -05:00
wchen-r7 db0518dd3c Bump jsobfu to 0.3.0 2015-10-30 13:06:53 -05:00
Jon Hart eb99aaa216
Print out modules before building/reporting table 2015-10-30 09:49:07 -07:00
Jon Hart 86b48490f0
Merge branch 'master' into poc/rsunk 2015-10-30 09:42:41 -07:00
Samuel Huckins f064fec0f1
Bumped version to 4.11.5
MSP-13377
2015-10-30 09:37:00 -05:00
wchen-r7 82e600a53a Suggest the correct replacement for the deprecated module
The deprecated module has been suggesting the wrong replacement,
it should be exploits/multi/browser/adobe_flash_pixel_bender_bof.rb
2015-10-29 16:24:29 -05:00
Louis Sato 57304a30a8
Land #6139, remove bad ref links 2015-10-29 16:00:43 -05:00
wchen-r7 95920b7ff6 Bring back more working links 2015-10-29 15:57:16 -05:00
wchen-r7 da52c36687 Put back some links 2015-10-29 15:48:47 -05:00
Louis Sato da7c4ecac4
Land #6141, update description, authors, and references for zpanel_information_disclosure_rce 2015-10-29 13:50:27 -05:00
wchen-r7 4e20b8f369 Fix #5875, Add report_vuln for Msf::Exploit::CheckCode::Vulnerable
Msf::Exploit::CheckCode::Vulnerable requires the module to be
explicit, as in actually triggering the bug and get a vulnerable
response, therefore it should be appropriate to use report_vuln
to report it.

Other vuln check codes (such as Appears, or Detected, etc) will
not call report_vuln, because it's not explicit enough.
2015-10-29 13:22:59 -05:00
nixawk faf9be811a delete caidao_php_backdoor_exec from exploits 2015-10-29 02:18:30 +00:00
nixawk 5d8ccd297e Fix References / Exploit -> Auxiliary 2015-10-29 02:15:20 +00:00
OJ c5643e52ff Add support for the show_mount command (windows) 2015-10-29 07:28:33 +10:00
wchen-r7 93df45eff1
Land #6138, Land joomla plugin com_realestatemanager Error Based SQLi 2015-10-28 13:36:14 -05:00
wchen-r7 09b79414ee Report hash 2015-10-28 13:33:00 -05:00
Brent Cook 466536041f
Land #6143, treat powershell and shell the same for RPC read/write 2015-10-28 11:57:48 -05:00
Louis Sato 657a5481dc
fix rpc session conditional to allow powershell read/write 2015-10-28 11:49:32 -05:00
nixawk bc02993567 chinese caidao php backdoor command execution 2015-10-28 16:43:58 +00:00
wchen-r7 1805774b16 Resolve #6020, Better RPC exception handling
Resolve #6020. Avoid trying to rescue RuntimeError.
2015-10-28 11:16:44 -05:00
wchen-r7 e7d6493311 Replace links 2015-10-28 10:45:02 -05:00