sinn3r
2260e4b471
Switch to manual payload selection, because we don't auto-detect
2012-12-07 11:07:11 -06:00
sinn3r
c08ee695a9
Merge branch 'splunk_upload_app_exec_cleanup' of git://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-splunk_upload_app_exec_cleanup
2012-12-07 10:46:28 -06:00
sinn3r
fafdcbaae1
Vuln discovered by Rich.
...
See: https://twitter.com/webstersprodigy/status/277087755073380353
2012-12-07 10:42:45 -06:00
jvazquez-r7
e5cc950fe1
fix identation
2012-12-07 11:57:11 +01:00
jvazquez-r7
133ad04452
Cleanup of #1062
2012-12-07 11:55:48 +01:00
sinn3r
c66777d028
Merge branch 'command' of git://github.com/R3dy/metasploit-framework into R3dy-command
2012-12-06 16:08:04 -06:00
Royce Davis
205276c38f
Update modules/auxiliary/admin/smb/psexec_command.rb
...
Fixed static path to Windows directory. This causes problems with directory is 'WINNT' for example.
2012-12-06 16:03:44 -06:00
sinn3r
bf47eaaa41
Remove code that's commented out. Clearly not needed anymore.
2012-12-06 12:57:41 -06:00
sinn3r
0ea5c781c1
Tabs and spaces don't mix
2012-12-06 12:53:22 -06:00
sinn3r
37f9cff25a
Merge branch 'ibm_director_cim_dllinject' of git://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-ibm_director_cim_dllinject
2012-12-06 12:36:48 -06:00
jvazquez-r7
fd20998f40
using the primer callback as pointed by egypt
2012-12-06 18:59:46 +01:00
sinn3r
817a7749c1
Merge branch 'ibm_director_cim_dllinject' of git://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-ibm_director_cim_dllinject
2012-12-06 11:35:09 -06:00
jvazquez-r7
8e21d9e235
fix source_address param
2012-12-06 18:34:22 +01:00
sinn3r
1fb05c0baf
Merge branch 'ibm_director_cim_dllinject' of git://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-ibm_director_cim_dllinject
2012-12-06 11:34:19 -06:00
Tod Beardsley
215017e17c
Merge remote branch 'wchen-r7/better_tectia_ssh'
2012-12-06 11:01:36 -06:00
sinn3r
06927345e5
If message becomes nil, we should force a to_s for the regex
...
next_message can be nil sometimes if packet is nil (see net/ssh's
poll_message source)
2012-12-06 10:44:16 -06:00
jvazquez-r7
fc8b08f10f
trailing comma
2012-12-06 17:32:58 +01:00
jvazquez-r7
532afc2919
Added module for CVE-2009-0880
2012-12-06 16:43:07 +01:00
HD Moore
5e44987271
Really fix this by resetting schema cache
2012-12-06 06:33:46 -08:00
HD Moore
a5b3be6dfa
Fix a conflicting rename that breaks ActiveRecord
2012-12-06 06:14:49 -08:00
HD Moore
087b2c39ae
Whitespace cleanup only
2012-12-06 06:13:53 -08:00
jvazquez-r7
6d3d4c1d84
Added support for FileDropper
2012-12-06 12:03:17 +01:00
sinn3r
18f4df0a38
Fix weird indent prob
2012-12-06 03:58:16 -06:00
sinn3r
a90ed82413
Correct CVE format
2012-12-06 03:57:46 -06:00
sinn3r
2b96c4e2a5
Add Kingcope's MySQL 'Stuxnet' technique exploit
...
Because why not. One more trick to a pentest + coverage = better.
2012-12-06 03:56:23 -06:00
sinn3r
530332b176
Apply evil-e's fix when port isn't 22
...
See #1130
2012-12-05 21:42:53 -06:00
sinn3r
32c5f12912
Hmm, I should change the target name
2012-12-05 21:38:31 -06:00
sinn3r
d3c1fa842a
Lots of improvements
...
Keyboard-interactive method isn't required to exploit Tectia SSH.
So this update will just go straight to password method. There's
also improvements for the check() method: Not only does it check
the SSH version (banner), it will also check and see if the server
is using password method to auth.
2012-12-05 21:34:33 -06:00
sinn3r
49999a56ea
Added CVE & vendor advisory information
2012-12-05 10:13:44 -06:00
jvazquez-r7
dd1d60293c
Merge branch 'indesign_server' of https://github.com/h0ng10/metasploit-framework into h0ng10-indesign_server
2012-12-05 15:27:25 +01:00
Hans-Martin Münch
aebbf62917
Merge pull request #1 from jvazquez-r7/indesign_macosx
...
Support for MacOS X
2012-12-05 03:24:09 -08:00
jvazquez-r7
232eb7bf2d
Final cleanup plus name change
2012-12-05 00:32:42 +01:00
jvazquez-r7
9cff72af72
Merge branch 'loggedin_users' of https://github.com/R3dy/metasploit-framework into R3dy-loggedin_users
2012-12-05 00:31:24 +01:00
sinn3r
86cbb672fc
Merge branch 'psexec_command_fix' of git://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-psexec_command_fix
2012-12-04 15:56:54 -06:00
sinn3r
353ea7bab7
Merge branch 'patch-4' of git://github.com/mubix/metasploit-framework into mubix-patch-4
2012-12-04 15:56:20 -06:00
sinn3r
b85919266d
Merge branch 'master' of github.com:rapid7/metasploit-framework
2012-12-04 15:55:08 -06:00
jvazquez-r7
3dada00f43
fix typo accor ding to redmine 7550
2012-12-04 22:37:08 +01:00
Rob Fuller
5e9a5268cd
remove .inspect debug code
...
cosmetic change
2012-12-04 16:24:15 -05:00
jvazquez-r7
2cca857f6f
added support for Mac OS X
2012-12-04 22:04:21 +01:00
jvazquez-r7
9d8f0f94f6
added support for Mac OS X
2012-12-04 22:03:58 +01:00
jvazquez-r7
5548bebb16
embeding payload on the c# script
2012-12-04 17:44:55 +01:00
sinn3r
e6c6133c90
must be password authentication
2012-12-04 09:56:51 -06:00
sinn3r
2467183c4f
"Appears" is better
...
"Appears" is a more accureate way describing how much we think the
host is vulnerable.
2012-12-04 09:28:05 -06:00
sinn3r
b5e7009283
Since we have included Tcp for check(), we don't need to reg rhost
2012-12-04 09:25:24 -06:00
sinn3r
3c59c2d5c0
This extra space must die.
2012-12-03 21:09:07 -06:00
sinn3r
211a1674f5
Add kingcope's Tectia SSH 0day
2012-12-03 21:07:32 -06:00
h0ng10
752907d5f0
exploit for OSVDB-87548
2012-12-03 19:01:40 -05:00
jvazquez-r7
3f3bdb8473
my editor...
2012-12-03 21:45:26 +01:00
jvazquez-r7
8a9ad4253a
comment about the original discoverer updated
2012-12-03 21:44:35 +01:00
jvazquez-r7
2cb824d62d
Added module for CVE-2012-5357
2012-12-03 20:12:02 +01:00