Tim W
ee6f83c281
match newfs_apfs regex
2018-04-10 14:45:14 +08:00
Brent Cook
c525bc3c0a
Land #9848 , handle 'check' command on modules that do not implement it
2018-04-09 22:27:21 -05:00
Aaron Soto
b83edc0ff6
Land #9845 Remove temp file after cmd execution
2018-04-09 15:40:19 -05:00
Aaron Soto
be18930f12
Cleaned up output, only querying for %WINDIR% if necessary
2018-04-09 15:27:50 -05:00
Matthew Kienow
251ee7a9e0
Land #9849 , remove dlog filling framework.log
2018-04-09 15:12:19 -04:00
William Vu
e17a788ab5
Remove stray dlog filling framework.log
2018-04-09 13:58:10 -05:00
William Vu
924a336287
Fix unsupported check_simple method for modules
2018-04-09 13:43:22 -05:00
Auxilus
c07f2f1a09
Update run_as.rb
2018-04-09 21:24:16 +05:30
Auxilus
c34b796f13
Remove temp file from dist after cmd execution
...
https://github.com/rapid7/metasploit-framework/issues/9830
2018-04-09 20:14:01 +05:30
Brent Cook
7b85edfde5
Land #9822 , Fix backgrounded aggressive exploits
2018-04-09 09:36:12 -05:00
h00die
a473dd04a8
Land #9813 , Add etcd library and version scanner
2018-04-08 07:05:31 -04:00
William Vu
5676b73b1e
Land #9839 , rex-text 0.2.17
2018-04-08 02:37:02 -05:00
William Vu
c8da88b21a
Update rex-text to 0.2.17
2018-04-08 02:35:15 -05:00
Brent Cook
07c9be5130
Land #9812 , Add Msf::Post::Linux::Kernel lib
2018-04-08 00:40:03 -05:00
Brent Cook
6c8ea2d883
also be sure to load executable modules if they don't have #!
2018-04-07 21:15:51 -05:00
Brent Cook
28ebe9d102
sanity check that external modules start with #! before executing
2018-04-07 16:31:34 -05:00
Brent Cook
07524f3829
Land #9834 , add Python UDP channel support
2018-04-07 14:36:32 -05:00
Brent Cook
b55eb9b8f2
bump payloads, add Python UDP channel support
...
This pulls in Python UDP channel support from
https://github.com/rapid7/metasploit-payloads/pull/276
2018-04-07 14:21:30 -05:00
Brent Cook
df6de5b1c3
remove self-evident rspec
2018-04-07 13:00:19 -05:00
Brent Cook
6fb6570f99
delete old feature detection code from exploit base
...
This deletes some old code that apparently has been broken and somewhat unused for many years.
The 'derived_implementor?' method for modules relies on the debug output from Ruby in order to tell of a class implements a method, but the regex it used didn't work properly with any modern Ruby version until 2.5.x. This caused a random sleep to get inserted into certain payload staging operations, which actively breaks staging in certain scenarios (I'm not trying to address that here).
This also removes some ancient module feature detection code, which also is entirely unused today.
2018-04-07 12:47:42 -05:00
thecarterb
3f40f43609
Make final output more readable
2018-04-07 11:05:47 -04:00
Brent Cook
3aee44ca1a
Land #9828 , fix reverse HTTP/S listeners for the wildcard address
2018-04-06 16:06:51 -05:00
Dhiraj Mishra
201cdfb189
Handling execption by MSFTIDY
2018-04-06 22:54:21 +05:30
scriptjunkie
c303859c11
Fix #9827
2018-04-06 11:06:52 -05:00
Brendan Coles
800c471d24
Merge pull request #4 from jhart-r7/pr/fixup-9812
...
Add Post::Linux::Kernel uname helpers
2018-04-07 01:44:13 +10:00
Dhiraj Mishra
4e6afd49ed
Update browser_getprivateip.rb
2018-04-06 21:10:29 +05:30
Jon Hart
1cc16a55a8
Add other linux kernel post helpers
2018-04-06 08:28:53 -07:00
Brendan Coles
ba88118d7a
Update kernel_modules method to return Array
2018-04-06 15:02:43 +00:00
Dhiraj Mishra
f6cfcefbae
Some tweaks suggested by bcoles.
2018-04-06 17:44:43 +05:30
Dhiraj Mishra
582eb2e61c
Create browser_getprivateip.rb
2018-04-06 14:42:57 +05:30
William Vu
7cc82a14b6
Update exploit driver with correct method
2018-04-05 18:56:19 -05:00
William Vu
17ed88b766
Fix backgrounded aggressive exploits
...
Any exploit that includes an aggressive stance is aggressive, regardless
of whether or not it has passive components.
This fix should prevent known-aggressive exploits from backgrounding.
2018-04-05 18:34:36 -05:00
Brent Cook
81c78a51c2
Land #9794 , Added support for regional dialects
2018-04-05 12:56:07 -05:00
Brendan Coles
499b0a857f
Add kernel_modules method
2018-04-05 05:25:36 +00:00
Brent Cook
e3fa9c3702
Land #9817 , load all the deps for msfvenom
...
Merge remote-tracking branch 'upstream/pr/9817' into upstream-master
2018-04-04 17:39:28 -05:00
Jeffrey Martin
3dacec1982
Load all deps when needed in help cause we have to
2018-04-04 17:36:08 -05:00
Adam Cammack
b4683b5f85
Land #9815 , Fix deleting non-existent workspace
2018-04-04 14:19:47 -05:00
Jon Hart
bc81cfad1f
Fix error handling when trying to delete non-existent workspace
2018-04-04 11:40:21 -07:00
Jon Hart
63aabc00f1
etcd rubocop style
2018-04-04 11:01:38 -07:00
Jon Hart
b9dbf1a6f3
Fix formatting error in etcd open_key_scanner
2018-04-04 10:59:38 -07:00
Jon Hart
c96bdf4ea1
Add etcd version scanner docs
2018-04-04 10:58:55 -07:00
Jon Hart
a8c76638d3
Rename
2018-04-04 10:54:20 -07:00
Jon Hart
518e17118a
Add DisclosureDate
2018-04-04 10:52:47 -07:00
Jon Hart
a6c31aceb2
Refactor common etc capabilities; add separate version scanner
2018-04-04 10:48:27 -07:00
Brendan Coles
6d92c319f8
Add Msf::Post::Linux::Kernel lib
2018-04-04 17:13:49 +00:00
Chris Higgins
1fa40bfe3b
Land #8539 , ProcessMaker Plugin Upload exploit
2018-04-03 20:52:17 -05:00
bwatters-r7
0faf2f4e04
Land # 8007, Added NTDSgrab module to metasploit.
...
Merge branch 'land-8007' into upstream-master
2018-04-03 15:56:37 -05:00
bwatters-r7
d9039d43ef
Land #9734 , Remove unwanted 'pop RAX' from windows/x64/reverse_(win)http
2018-04-03 14:23:41 -05:00
bwatters-r7
e17be05e6a
Land #9595 , Add post module RID Hijacking on Windows
2018-04-03 14:12:34 -05:00
Brent Cook
1424019411
update docs
2018-04-03 13:52:02 -05:00