h00die
c036c258a9
cve-2016-4557
2016-09-29 05:23:12 -04:00
h00die
7a108e2102
updated docs w/ error codes on failed attempts
2016-09-27 20:26:04 -04:00
h00die
35a2b3e59d
working panda
2016-09-27 20:15:17 -04:00
Pearce Barry
6382fffc75
Land #7326 , Linux Kernel Netfilter Privesc
2016-09-26 12:38:50 -05:00
h00die
23e5556a4c
binary drops work!
2016-09-24 21:31:00 -04:00
h00die
cba297644e
post to local conversion
2016-09-22 22:08:24 -04:00
h00die
3dff41c833
documentation update
2016-09-22 21:06:31 -04:00
Brendan
04f8f7a0ea
Land #7266 , Add Kaltura Remote PHP Code Execution
2016-09-21 17:14:49 -05:00
Mehmet Ince
fb00d1c556
Another minor grammer changes
2016-09-20 19:23:28 +03:00
Brendan
513d8a8163
Edit fail
2016-09-20 10:51:12 -05:00
Brendan
e1155fed77
Minor changes to grammar
2016-09-20 10:34:03 -05:00
Mehmet Ince
385428684f
Move module and docs under the exploit/linux/http folder
2016-09-20 12:45:23 +03:00
Mehmet Ince
0a58ada1da
Add missing steps and cite original wiki URL
2016-09-20 01:38:46 +03:00
h00die
4f85a1171f
reexploit and other docs and edits added
2016-09-18 08:51:27 -04:00
Mehmet Ince
d70cbf4ba7
Add documentation includes how to install Kaltura
2016-09-17 23:12:47 +03:00
h00die
1b7f706c6b
added doc note
2016-09-16 01:57:36 -04:00
h00die
2e42e0f091
first commit
2016-09-16 01:54:49 -04:00
William Vu
030e09c9c6
Land #7322 , drupal_drupageddon module docs
2016-09-16 00:40:18 -05:00
h00die
a9502bfe9e
drupageddon docs
2016-09-15 13:29:06 -04:00
William Webb
373655c41d
Land #7314 , Module documentation for exagrid_privkey
2016-09-14 20:41:25 -05:00
Jon Hart
18fa897644
Add initial at_persistence documentation
2016-09-14 16:06:15 -07:00
William Webb
01327f0265
Land #7245 , NetBSD mail.local privilege escalation module
2016-09-14 16:07:12 -05:00
h00die
10dc30fe2a
remove example line
2016-09-14 09:27:22 -04:00
h00die
117790caac
adding docs
2016-09-14 01:13:13 -04:00
h00die
82da4b5072
forgot to save docs
2016-08-26 20:02:20 -04:00
h00die
5dff01625d
working code
2016-08-25 21:32:25 -04:00
wchen-r7
0b73786e10
avoid bad filter
2016-08-22 11:47:39 -05:00
Jay Turla
1065b4cfe2
Linked the zip file
2016-08-23 00:33:04 +08:00
h00die
f2e2cb6a5e
cant transfer file
2016-08-21 19:42:29 -04:00
Jay Turla
139d431230
eliminate space
2016-08-20 04:17:22 +08:00
Jay Turla
51a2354fea
Add KB for multi/http/caidao_php_backdoor_exec
2016-08-20 04:12:31 +08:00
William Vu
2b6576b038
Land #7012 , Linux service persistence module
2016-08-17 22:45:35 -05:00
William Vu
c64d91457f
Land #7003 , cron/crontab persistence module
2016-08-17 22:45:16 -05:00
wchen-r7
8654baf3dd
Land #6880 , add a module for netcore/netdis udp 53413 backdoor
2016-08-08 15:43:34 -05:00
wchen-r7
89417304b0
Fix format for netcore_udp_53413_backdoor.md
2016-08-08 15:42:46 -05:00
William Webb
a48487578c
Land #7165 , Add documentation for juniper_backdoor, brocade_enable_login, and werkzeug_debug_rce
2016-08-01 15:46:20 -05:00
Brent Cook
abf435d6c2
Land #6960 , Auth bypass for Polycom HDX video endpoints
2016-08-01 14:02:50 -05:00
Brent Cook
5309f2e4fb
endpoints, not end points
2016-08-01 14:02:17 -05:00
Brent Cook
50c918f889
update documentation with verification
2016-08-01 13:59:00 -05:00
h00die
38138e66d2
adding docs for #4888 #5697 #6731
2016-07-29 23:11:57 -04:00
h00die
b2a521475a
adding sparse docs
2016-07-29 22:02:11 -04:00
Vex Woo
be65f2c4d3
add module doc
2016-07-26 20:26:22 -05:00
Brendan
4720d77c3a
Land #6965 , centreon useralias exec
2016-07-26 15:02:36 -07:00
Brendan
c21971cb4e
Added some info on problems encountered during testing.
2016-07-26 14:59:18 -07:00
h00die
5a9f2423c4
forgot python
2016-07-20 14:16:57 -04:00
h00die
56b1565955
updated docs for step by step install of software
2016-07-20 12:48:28 -04:00
wchen-r7
d0e1c67c18
Land #7026 , Add Action Pack render exploit CVE-2016-2098
2016-07-07 16:16:37 -05:00
wchen-r7
201750a31b
Add documentation for rails_actionpack_inline_exec
2016-07-07 16:15:51 -05:00
William Webb
d923a5d42d
typos in mod docs
2016-07-05 22:52:35 -05:00
William Webb
899ea558e3
added module doc for ms16_016_webdav
2016-07-05 22:12:35 -05:00
Brendan
70a79bb0e8
Land #7014 , Nagios remote root shell exploit
2016-07-01 08:17:38 -07:00
William Vu
d42d9f8557
Add module docs to appease the Thao god
2016-07-01 01:17:27 -05:00
Scott Lee Davis
c2b4e22b46
updated with discovered changes from k kali & documentation update changes requested.
2016-06-27 01:53:20 -04:00
h00die
1c20122648
fedora compatibility, added naming options
2016-06-25 08:43:55 -04:00
Scott Davis
5e1b7d8c0f
even more clean up.
2016-06-23 14:59:11 -07:00
Scott Davis
63d8787101
added back (new) usage examples for nodejs,java,ruby,php.
2016-06-23 14:56:46 -07:00
Tod Beardsley
ff741fbc35
Rename for docs
2016-06-23 14:53:49 -05:00
Tod Beardsley
92522138c5
Remove the RC files
2016-06-23 14:52:23 -05:00
Scott Lee Davis
fbd0bc4308
updated as per @egypt & @todb-r7 recommendations.
2016-06-23 11:41:54 -04:00
Scott Davis
47e4321424
CVE-2016-5641
2016-06-23 06:09:37 -07:00
h00die
a3b08418b9
fixed markdown
2016-06-22 20:32:51 -04:00
h00die
35e3fb3e2f
fixed markdown
2016-06-22 20:15:29 -04:00
h00die
bc293e2a8b
fixed bad markup
2016-06-22 20:10:25 -04:00
h00die
18a3bf5f62
service persistence
2016-06-22 19:22:18 -04:00
wchen-r7
de5152401a
Land #6992 , Add tiki calendar exec exploit
2016-06-22 11:18:14 -05:00
wchen-r7
8697d3d6fb
Update tiki_calendar_exec module and documentation
2016-06-22 11:17:45 -05:00
h00die
9cb57d78d7
updated check and docs that 14.2 may not be vuln
2016-06-21 16:48:09 -04:00
h00die
4b8f572976
cron persistence
2016-06-20 21:45:04 -04:00
h00die
6fe7698b13
follow redirect automatically
2016-06-19 20:24:54 -04:00
h00die
ddfd015310
functionalized calendar call, updated docs
2016-06-19 08:53:22 -04:00
h00die
1db10eec39
slight documentation update
2016-06-18 13:27:46 -04:00
h00die
3feff7533b
tiki calendar
2016-06-18 13:11:11 -04:00
Brendan Watters
9ea0b8f944
Land #6934 , Adds exploit for op5 configuration command execution
2016-06-16 14:36:10 -05:00
h00die
cfb034fa95
fixes all previously identified issues
2016-06-15 20:58:04 -04:00
wchen-r7
1d27538545
Missing a word
2016-06-14 14:15:28 -05:00
wchen-r7
a7c778b852
Update magento_unserialize.md
2016-06-14 11:15:25 -05:00
h00die
bd6eecf7b0
centreon useralias first add
2016-06-11 20:57:18 -04:00
wchen-r7
7cdadca79b
Land #6945 , Add struts_dmi_rest_exec exploit
2016-06-08 23:16:46 -05:00
wchen-r7
dff60d96c8
Add mod doc for struts_dmi_rest_exec and update struts_dmi_exec.md
2016-06-08 23:15:44 -05:00
Brendan Watters
c4aa99fdac
Land #6925 , ipfire proxy exec
2016-06-07 10:24:59 -05:00
Brendan Watters
7e84c808b2
Merge remote-tracking branch 'upstream/pr/6924' into dev
2016-06-07 09:24:25 -05:00
wchen-r7
b59d10d9c4
Land #6929 , Add HP Data Protector Encrypted Comms exploit
2016-06-06 22:45:53 -05:00
wchen-r7
d8d6ab3ae8
Add hp_dataprotector_encrypted_comms.md
2016-06-06 22:45:17 -05:00
wchen-r7
1dad9bf7fa
Correct module doc path for magento_unserialize.md
2016-06-02 17:12:39 -05:00
wchen-r7
184802d7d1
Add documentation for magento_unserialize
2016-06-02 17:10:26 -05:00
h00die
68d647edf1
Merge branch 'master' of https://github.com/rapid7/metasploit-framework into op5
2016-06-01 18:05:18 -04:00
h00die
52d5028548
op5 config exec
2016-06-01 15:07:31 -04:00
h00die
3163af603d
md fix
2016-05-30 10:25:49 -04:00
h00die
057947d7e8
ipfire proxy exec
2016-05-30 10:24:17 -04:00
h00die
9b5e3010ef
doc/module cleanup
2016-05-30 06:33:48 -04:00
h00die
df55f9a57c
first add of ipfire shellshock
2016-05-29 20:40:12 -04:00
Brent Cook
cf0176e68b
Land #6867 , Add Dell SonicWALL Scrutinizer 11.0.1 MethodDetail SQL Injection
2016-05-16 19:00:10 -05:00
Brent Cook
21d74a64fe
Land #6874 , Improve exploit for CVE-2016-0854
2016-05-14 11:08:17 -05:00
wchen-r7
9114e01ed9
update doc
2016-05-13 23:31:38 -05:00
Brent Cook
a940481f62
Land #6834 , Authorized FTP JCL exploit for z/OS
2016-05-13 21:29:45 -05:00
wchen-r7
3b5db26ff5
Fix #6872 , change upload action for CVE-2016-0854 exploit
...
This patch includes the following changes:
* Instead of the uploadFile action, this patch uses uploadImageCommon
to be able to support both Advantech WebAccess builds: 2014 and
2015.
* It uses an explicit check instead of the passive version check.
* It cleans up the malicious file after getting a session.
* Added module documentation to explain the differences between
different builds of Advantech WebAccess 8.0s, and 8.1.
Fix #6872
2016-05-13 19:47:18 -05:00
Bigendian Smalls
2d5cf6cfe4
Authorized FTP JCL exploit for z/OS
...
This exploit module allows a user with credentials to execute JCL on a
vulnerable mainframe system running z/OS and an appropriately configured
FTP server.
2016-05-12 14:46:31 -05:00
wchen-r7
756673fcd7
Fix another typo
2016-05-12 00:13:53 -05:00
wchen-r7
9d128cfd9f
Add Dell SonicWALL Scrutinizer 11.0.1 MethodDetail SQL Injection
2016-05-11 22:27:18 -05:00
wchen-r7
027855def4
Add module documentation for struts_dmi_exec
2016-05-02 15:43:34 -05:00
tdoan-r7
7e5fced46b
MS-1196 Minor edits to the kb for the web_delivery module
2016-03-22 12:26:55 -05:00
tdoan-r7
4c42a74d48
MS-1195 minor grammatical edits to psexec kb
2016-03-21 14:18:16 -05:00
wchen-r7
698f425821
Auto <hr>
2016-03-08 11:25:15 -06:00
wchen-r7
03eb568af7
Add --- to make sections to stand out more
2016-03-05 15:17:19 -06:00
wchen-r7
f4866fd5f0
Update template and web_delivery doc
2016-03-03 01:27:14 -06:00
wchen-r7
11964c5c1a
Add remote exploit demo and web_delivery doc
2016-03-02 19:52:11 -06:00
wchen-r7
eede7c9193
Link to WbemExec writeup
2016-03-02 11:05:33 -06:00
wchen-r7
e615e1072e
Update information about SMBv1
2016-03-02 10:51:45 -06:00
wchen-r7
d4c433e29f
Update psexec.md
2016-03-01 19:29:25 -06:00
wchen-r7
876a5b55f9
Update psexec.md
2016-03-01 19:06:40 -06:00
wchen-r7
f27d24fd60
Add module documentation for psexec
2016-03-01 18:52:47 -06:00
wchen-r7
99d593e9a0
missing an of
2016-03-01 15:11:29 -06:00
wchen-r7
552f2a148b
Add documentation for ms08_067_netapi
2016-03-01 15:09:30 -06:00
wchen-r7
3125c99e45
Remove this fake doc
2016-02-24 15:17:18 -06:00
wchen-r7
509a1e8de1
Add manual for demo purposes
2016-02-16 23:18:29 -06:00