Commit Graph

45985 Commits (30276eb11c513621cff7ca42bf90929a34c09b51)

Author SHA1 Message Date
Tim W ee6f83c281 match newfs_apfs regex 2018-04-10 14:45:14 +08:00
Brent Cook c525bc3c0a
Land #9848, handle 'check' command on modules that do not implement it 2018-04-09 22:27:21 -05:00
Aaron Soto b83edc0ff6
Land #9845 Remove temp file after cmd execution 2018-04-09 15:40:19 -05:00
Aaron Soto be18930f12
Cleaned up output, only querying for %WINDIR% if necessary 2018-04-09 15:27:50 -05:00
Matthew Kienow 251ee7a9e0
Land #9849, remove dlog filling framework.log 2018-04-09 15:12:19 -04:00
William Vu e17a788ab5 Remove stray dlog filling framework.log 2018-04-09 13:58:10 -05:00
William Vu 924a336287 Fix unsupported check_simple method for modules 2018-04-09 13:43:22 -05:00
Auxilus c07f2f1a09
Update run_as.rb 2018-04-09 21:24:16 +05:30
Auxilus c34b796f13
Remove temp file from dist after cmd execution
https://github.com/rapid7/metasploit-framework/issues/9830
2018-04-09 20:14:01 +05:30
Brent Cook 7b85edfde5
Land #9822, Fix backgrounded aggressive exploits 2018-04-09 09:36:12 -05:00
h00die a473dd04a8
Land #9813, Add etcd library and version scanner 2018-04-08 07:05:31 -04:00
William Vu 5676b73b1e
Land #9839, rex-text 0.2.17 2018-04-08 02:37:02 -05:00
William Vu c8da88b21a Update rex-text to 0.2.17 2018-04-08 02:35:15 -05:00
Brent Cook 07c9be5130
Land #9812, Add Msf::Post::Linux::Kernel lib 2018-04-08 00:40:03 -05:00
Brent Cook 6c8ea2d883 also be sure to load executable modules if they don't have #! 2018-04-07 21:15:51 -05:00
Brent Cook 28ebe9d102 sanity check that external modules start with #! before executing 2018-04-07 16:31:34 -05:00
Brent Cook 07524f3829
Land #9834, add Python UDP channel support 2018-04-07 14:36:32 -05:00
Brent Cook b55eb9b8f2 bump payloads, add Python UDP channel support
This pulls in Python UDP channel support from
https://github.com/rapid7/metasploit-payloads/pull/276
2018-04-07 14:21:30 -05:00
Brent Cook df6de5b1c3 remove self-evident rspec 2018-04-07 13:00:19 -05:00
Brent Cook 6fb6570f99 delete old feature detection code from exploit base
This deletes some old code that apparently has been broken and somewhat unused for many years.

The 'derived_implementor?' method for modules relies on the debug output from Ruby in order to tell of a class implements a method, but the regex it used didn't work properly with any modern Ruby version until 2.5.x. This caused a random sleep to get inserted into certain payload staging operations, which actively breaks staging in certain scenarios (I'm not trying to address that here).

This also removes some ancient module feature detection code, which also is entirely unused today.
2018-04-07 12:47:42 -05:00
thecarterb 3f40f43609 Make final output more readable 2018-04-07 11:05:47 -04:00
Brent Cook 3aee44ca1a
Land #9828, fix reverse HTTP/S listeners for the wildcard address 2018-04-06 16:06:51 -05:00
Dhiraj Mishra 201cdfb189
Handling execption by MSFTIDY 2018-04-06 22:54:21 +05:30
scriptjunkie c303859c11 Fix #9827 2018-04-06 11:06:52 -05:00
Brendan Coles 800c471d24
Merge pull request #4 from jhart-r7/pr/fixup-9812
Add Post::Linux::Kernel uname helpers
2018-04-07 01:44:13 +10:00
Dhiraj Mishra 4e6afd49ed
Update browser_getprivateip.rb 2018-04-06 21:10:29 +05:30
Jon Hart 1cc16a55a8
Add other linux kernel post helpers 2018-04-06 08:28:53 -07:00
Brendan Coles ba88118d7a Update kernel_modules method to return Array 2018-04-06 15:02:43 +00:00
Dhiraj Mishra f6cfcefbae
Some tweaks suggested by bcoles. 2018-04-06 17:44:43 +05:30
Dhiraj Mishra 582eb2e61c
Create browser_getprivateip.rb 2018-04-06 14:42:57 +05:30
William Vu 7cc82a14b6 Update exploit driver with correct method 2018-04-05 18:56:19 -05:00
William Vu 17ed88b766 Fix backgrounded aggressive exploits
Any exploit that includes an aggressive stance is aggressive, regardless
of whether or not it has passive components.

This fix should prevent known-aggressive exploits from backgrounding.
2018-04-05 18:34:36 -05:00
Brent Cook 81c78a51c2
Land #9794, Added support for regional dialects 2018-04-05 12:56:07 -05:00
Brendan Coles 499b0a857f Add kernel_modules method 2018-04-05 05:25:36 +00:00
Brent Cook e3fa9c3702
Land #9817, load all the deps for msfvenom
Merge remote-tracking branch 'upstream/pr/9817' into upstream-master
2018-04-04 17:39:28 -05:00
Jeffrey Martin 3dacec1982
Load all deps when needed in help cause we have to 2018-04-04 17:36:08 -05:00
Adam Cammack b4683b5f85
Land #9815, Fix deleting non-existent workspace 2018-04-04 14:19:47 -05:00
Jon Hart bc81cfad1f
Fix error handling when trying to delete non-existent workspace 2018-04-04 11:40:21 -07:00
Jon Hart 63aabc00f1
etcd rubocop style 2018-04-04 11:01:38 -07:00
Jon Hart b9dbf1a6f3
Fix formatting error in etcd open_key_scanner 2018-04-04 10:59:38 -07:00
Jon Hart c96bdf4ea1
Add etcd version scanner docs 2018-04-04 10:58:55 -07:00
Jon Hart a8c76638d3
Rename 2018-04-04 10:54:20 -07:00
Jon Hart 518e17118a
Add DisclosureDate 2018-04-04 10:52:47 -07:00
Jon Hart a6c31aceb2
Refactor common etc capabilities; add separate version scanner 2018-04-04 10:48:27 -07:00
Brendan Coles 6d92c319f8 Add Msf::Post::Linux::Kernel lib 2018-04-04 17:13:49 +00:00
Chris Higgins 1fa40bfe3b
Land #8539, ProcessMaker Plugin Upload exploit 2018-04-03 20:52:17 -05:00
bwatters-r7 0faf2f4e04
Land # 8007, Added NTDSgrab module to metasploit.
Merge branch 'land-8007' into upstream-master
2018-04-03 15:56:37 -05:00
bwatters-r7 d9039d43ef
Land #9734, Remove unwanted 'pop RAX' from windows/x64/reverse_(win)http 2018-04-03 14:23:41 -05:00
bwatters-r7 e17be05e6a
Land #9595, Add post module RID Hijacking on Windows 2018-04-03 14:12:34 -05:00
Brent Cook 1424019411 update docs 2018-04-03 13:52:02 -05:00