Joshua Smith
|
312f117262
|
updates file read to close file more quickly
|
2014-03-21 14:53:15 -04:00 |
Spencer McIntyre
|
aa26405c23
|
Cleanup an expression and avoid fail_with
|
2014-03-20 17:33:09 -04:00 |
Spencer McIntyre
|
74398c4b6e
|
Allow using a single URI and/or a list of URIs
|
2014-03-20 09:54:02 -04:00 |
Joshua Smith
|
a8d919feb0
|
use TARGET_URI if given, otherwise TARGET_URIS_FILE
|
2014-03-19 23:32:04 -05:00 |
Spencer McIntyre
|
12e4e0e36d
|
Return whether result is nil or not.
|
2014-02-28 10:17:37 -05:00 |
Spencer McIntyre
|
dfa91310c2
|
Support checking a single URI for ntlm information.
|
2014-02-28 08:47:29 -05:00 |
William Vu
|
1a053909dc
|
Land #3044, chargen_probe reported service fix
|
2014-02-27 14:33:06 -06:00 |
sinn3r
|
f531d61255
|
Land #3036 - Total Video Player buffer overflow
|
2014-02-27 14:28:53 -06:00 |
sinn3r
|
7625dc4880
|
Fix syntax error due to the missing ,
|
2014-02-27 14:25:52 -06:00 |
sinn3r
|
49ded452a9
|
Add OSVDB reference
|
2014-02-27 14:22:56 -06:00 |
sinn3r
|
e72250f08f
|
Rename Total Video Player module
The filename shouldn't include the version, because the exploit should
be able to target multiple versions if it has to.
|
2014-02-27 14:20:26 -06:00 |
sinn3r
|
93ec12af43
|
Land #3035 - GE Proficy CIMPLICITY gefebt.exe Remote Code Execution
|
2014-02-27 14:13:28 -06:00 |
jgor
|
8be33f42fe
|
Define service as udp
|
2014-02-27 12:53:29 -06:00 |
Fr330wn4g3
|
63f74bddae
|
2° update total_video_player_131_ini_bof
|
2014-02-27 16:41:35 +01:00 |
David Maloney
|
d358fe5f94
|
Merge branch 'payload_defaults'
|
2014-02-26 10:28:46 -06:00 |
jvazquez-r7
|
bfdefdb338
|
Land #3023, @m-1-k-3's module for Linksys WRT120N bof reset password
|
2014-02-26 09:36:14 -06:00 |
jvazquez-r7
|
6ba26bf743
|
Use normalize_uri
|
2014-02-26 09:35:42 -06:00 |
jvazquez-r7
|
582372ec3e
|
Do minor cleanup
|
2014-02-26 09:32:11 -06:00 |
jvazquez-r7
|
0531abb691
|
Land #3026, @ribeirux DoS module for CVE-2014-0050
|
2014-02-26 08:53:55 -06:00 |
jvazquez-r7
|
449d0d63d1
|
Do small clean up
|
2014-02-26 08:52:51 -06:00 |
Michael Messner
|
b79197b8ab
|
feedback included, cleanup, login check
|
2014-02-26 13:44:36 +01:00 |
Fr330wn4g3
|
b81642d8ad
|
Update total_video_player_131_ini_bof
|
2014-02-26 11:37:04 +01:00 |
jvazquez-r7
|
75cac284f5
|
Land #3037, @wchen-r7's rspec fix
|
2014-02-25 16:44:56 -06:00 |
sinn3r
|
8be99fc299
|
Fix payload_generator.format_payload rspec
The platform should match.
|
2014-02-25 16:37:21 -06:00 |
Fr330wn4g3
|
a7cacec0c3
|
Add module for EDB 29799
|
2014-02-25 23:07:28 +01:00 |
David Maloney
|
f229932d16
|
Merge branch 'master' of github.com:rapid7/metasploit-framework
|
2014-02-25 15:56:24 -06:00 |
David Maloney
|
f51cbfffb8
|
minor fix to payload generator
was passing platform string instead of the
platform lsit when formatting the payload
|
2014-02-25 15:51:06 -06:00 |
jvazquez-r7
|
96ffb1db47
|
Delete extra comma
|
2014-02-25 15:29:46 -06:00 |
jvazquez-r7
|
cb18639b66
|
Add small fixes and clean up
|
2014-02-25 15:25:01 -06:00 |
jvazquez-r7
|
1d4b2ea60d
|
Add module for ZDI-14-015
|
2014-02-25 15:07:09 -06:00 |
William Vu
|
63bbe7bef2
|
Land #3034, 302 redirect for http_basic
|
2014-02-25 13:54:58 -06:00 |
William Vu
|
4cc91095de
|
Fix minor formatting issues
|
2014-02-25 13:48:37 -06:00 |
jvazquez-r7
|
a45c8c2b4a
|
Land #3029, @xistence Symantec endpoint exploit
|
2014-02-25 07:59:35 -06:00 |
jvazquez-r7
|
bfe0fdb776
|
Move module
|
2014-02-25 07:58:00 -06:00 |
xistence
|
ab167baf56
|
Added randomness instead of payload and xxe keywords
|
2014-02-25 15:23:10 +07:00 |
jvazquez-r7
|
4908d80d6c
|
Clean up module
|
2014-02-24 16:00:54 -06:00 |
kn0
|
6783e31c67
|
Used the builtin send_redirect method in Msf::Exploit::Remote::HttpServer instead of creating a redirect inline
|
2014-02-24 15:59:49 -06:00 |
sinn3r
|
72da8299a5
|
Land #3025 - Auto LHOST for reverse shells
|
2014-02-24 15:53:43 -06:00 |
sinn3r
|
17f8cf900a
|
Add another condition to check if the payload name is a reverse shell
Only reverse shells need LHOST
|
2014-02-24 15:37:01 -06:00 |
sho-luv
|
47ae4b470a
|
added recommendations
|
2014-02-24 15:24:57 -06:00 |
ribeirux
|
ead7cbc692
|
Author and URI fixed
|
2014-02-24 22:20:34 +01:00 |
kn0
|
f1e71b709c
|
Added 301 Redirect option to Basic Auth module
|
2014-02-24 14:59:20 -06:00 |
William Vu
|
6f398f374e
|
Land #3032, inside_workspace_boundary? typo fix
|
2014-02-24 14:55:09 -06:00 |
James Lee
|
d2945b55c1
|
Fix typo
inside_workspace_boundary() -> inside_workspace_boundary?()
|
2014-02-24 14:46:08 -06:00 |
jvazquez-r7
|
e4a0578813
|
Land #3031, @wchen-r7's capitalization fix
|
2014-02-24 11:49:41 -06:00 |
sinn3r
|
a50b4e88be
|
Fix msftidy warning: Suspect capitalization in module title: 'encoder'
|
2014-02-24 11:25:46 -06:00 |
sinn3r
|
d0780cd1a2
|
Land #3010 - EXITFUNC as OptEnum
|
2014-02-24 11:07:10 -06:00 |
jvazquez-r7
|
c981bbeab9
|
Land #3011, @wchen-r7's fix for Dexter exploit
|
2014-02-24 10:53:10 -06:00 |
jvazquez-r7
|
b2d4048f50
|
Land #3027, @OJ's fix for ultraminihttp_bof
|
2014-02-24 10:50:08 -06:00 |
jvazquez-r7
|
c9f0885c54
|
Apply @jlee-r7's feedback
|
2014-02-24 10:49:13 -06:00 |