Tod Beardsley
3c73133a44
Fixing up mysql module text
2012-06-13 13:59:58 -05:00
Tod Beardsley
ca8769d725
Whitespace on mysql module.
2012-06-13 13:59:38 -05:00
HD Moore
26e72b4061
Enforce a timeout in the ssh handshake (avoid hangs in some cases)
2012-06-12 15:20:25 -05:00
HD Moore
5922ec1f7a
Permissions
2012-06-12 15:20:25 -05:00
Steve Tornio
efbaff8b37
add osvdb ref
2012-06-11 22:47:30 -05:00
HD Moore
59f591ac46
Adds jcran's MySQL bruteforce and dump module for CVE-2012-2122
2012-06-11 01:42:06 -05:00
Tod Beardsley
34be642f84
msftidy found EOL spaces on new modules
2012-06-06 10:42:10 -05:00
sinn3r
698e2eab68
Fix nil res when vprints
2012-06-06 09:53:19 -05:00
sinn3r
462a91b005
Massive whitespace destruction
...
Remove tabs at the end of the line
2012-06-06 00:44:38 -05:00
sinn3r
3f0431cf51
Massive whitespace destruction
...
Remove whitespace found at the end of the line
2012-06-06 00:36:17 -05:00
sinn3r
c30af98b53
Massive whitespace destruction
...
Remove all the lines that have nothing but whitespace
2012-06-06 00:22:36 -05:00
sinn3r
37846c0de2
Handle get_once return value correctly
2012-06-05 15:40:49 -05:00
sinn3r
b6f591718a
Change recv to get_once
2012-06-05 15:40:20 -05:00
sinn3r
bc91135808
Correct description
2012-06-05 15:32:41 -05:00
sinn3r
19e187e88e
Correct the description
2012-06-05 15:08:43 -05:00
sinn3r
28511cf666
Title change, use get_once instead of recv. Add a reference.
2012-06-05 15:06:05 -05:00
sinn3r
1c99119ecd
Remove the version key, and correct spacing
2012-06-05 13:53:11 -05:00
sinn3r
8f5759ac13
Move these SCADA modules to SCADA folder
2012-06-05 13:50:53 -05:00
sinn3r
215e0e48a0
Fix Modbus version scanner's format
2012-06-05 11:47:44 -05:00
sinn3r
50243a9679
Add Metasploit license disclaimer since it has a MSF_LICENSE
2012-06-05 11:36:45 -05:00
sinn3r
30ceb98d87
Merge branch 'modbus-auxil' of https://github.com/esmnemon/metasploit-framework into esmnemon-modbus-auxil
2012-06-05 11:35:10 -05:00
sinn3r
b282901b08
Correct emails for aux and exploit modules
2012-06-04 21:58:01 -05:00
sinn3r
0fcc53b0a2
Handle nil for get_once
2012-06-04 15:31:10 -05:00
sinn3r
a071d2805e
Fix the rest of possible nil res bugs I've found
2012-06-04 14:56:27 -05:00
sinn3r
01803c4a33
Fix possible nil res. Bug #6939 . Part 1.
2012-06-04 13:11:47 -05:00
Steve Tornio
0759c3b75c
Adding swtornio's OSVDB ref
...
Watch the trailing commas, that wangs up Ruby 1.8.7 and prior.
Squashed commit of the following:
commit c00363993a726cd0c87fbaee769c44f680feff72
Author: Tod Beardsley <todb@metasploit.com>
Date: Mon Jun 4 09:33:18 2012 -0500
Removing trailing comma
commit 594cae0cab60ba0493a6c50a001cd6885f05522b
Author: Steve Tornio <swtornio@gmail.com>
Date: Mon Jun 4 09:10:36 2012 -0500
add osvdb ref
2012-06-04 09:34:28 -05:00
Christian Mehlmauer
3752c10ccf
Adding FireFart's RPORT(80) cleanup
...
This was tested by creating a resource script to load every changed
module and displaying the options, like so:
````
use auxiliary/admin/2wire/xslt_password_reset
show options
use auxiliary/admin/http/contentkeeper_fileaccess
show options
````
...etc. This was run in both the master branch and FireFart's branch
while spooling out the results of msfconsole, then diffing those
results. All modules loaded successfully, and there were no changes to
the option sets, so it looks like a successful fix.
Thanks FireFart!
Squashed commit of the following:
commit 7c1eea53fe3743f59402e445cf34fab84cf5a4b7
Author: Christian Mehlmauer <FireFart@gmail.com>
Date: Fri May 25 22:09:42 2012 +0200
Cleanup Opt::RPORT(80) since it is already registered by Msf::Exploit::Remote::HttpClient
2012-06-02 09:53:19 -05:00
David Maloney
92dafd4d17
Bringin in new version of pcanywhere_login
2012-06-01 11:15:12 -05:00
David Maloney
933949a6b0
trying to work around wierd git issue
2012-06-01 11:13:28 -05:00
David Maloney
28bf017ca9
Fix nil responses
2012-05-31 23:12:17 -05:00
HD Moore
2ad17299e2
Handle cisco devices better with ssh logins
2012-05-31 14:59:24 -05:00
David Maloney
e93a6ddf83
Adds thelightcosine's pcanywhere module
...
Adds PCAnywhere bruteforce capabilities
Squashed commit of the following:
commit 5354fd849f0c009c534d7ce18369382dd56de550
Author: David Maloney <DMaloney@rapid7.com>
Date: Thu May 31 14:35:23 2012 -0500
Add explicit pack to encrypted header
commit 7911dd309a94df2729c8247c3817cf5de6b99aad
Author: David Maloney <DMaloney@rapid7.com>
Date: Thu May 31 13:11:19 2012 -0500
adds pcanywhere_login module
2012-05-31 14:46:26 -05:00
sinn3r
4d94eeb79d
Merge pull request #430 from wchen-r7/s40_traversal
...
Add s40 dir traversal vuln
2012-05-31 02:46:53 -07:00
sinn3r
a19583624e
Add s40 dir traversal vuln
...
I can't believe I stayed up all night, and this is all I could find.
2012-05-31 04:43:57 -05:00
David Maloney
9e7acf3a57
left debug statement in module
2012-05-29 20:23:56 -05:00
esmnemon
c00222b4c2
Added one modbus-scanner and one modbus-client aux-module SCADA
2012-05-29 20:34:33 +02:00
David Maloney
df85e4f586
Remove trailing comma
2012-05-21 16:28:02 -05:00
David Maloney
17943c7a48
Makes it so we don't ever use local config files for Net::SSH
...
Also makes sure that the :config =>false option keeps
Net:SSH from meddling with knowns_hosts too
2012-05-21 16:09:08 -05:00
David Maloney
c386e1ce31
Add an option to the schemadump modules to not display output to the
...
screen
2012-05-21 16:09:07 -05:00
RageLtMan
77f95df1e9
Banner encoding fix when running against dd-wrt on ruby 1.9.3
2012-05-21 14:50:57 -05:00
Tod Beardsley
7a78c99c5e
Adding credit to original PoC guy for RuggedCom
...
Just added and commented. It'd be nice to have a real spot for this kind
of credit, because it comes up a lot and it's hard to parse out in a
machine way who 'wrote' the module and who came up with the exploit.
2012-05-16 13:47:15 -05:00
Tod Beardsley
4ee24f7e42
Adding Justin's CCTV module.
2012-05-15 08:03:39 -05:00
sinn3r
84269f399b
Correct EDB reference
2012-05-14 15:10:21 -05:00
sinn3r
f4a446a6c1
Add module CVE-2011-4404
2012-05-14 15:08:43 -05:00
sinn3r
79a590ccf7
Merge pull request #380 from wchen-r7/bmerinofe-telnet_ruggedcom
...
Modified version of pull request #379 - RuggedCom Telnet Password Generator by bmerinofe
2012-05-13 11:13:27 -07:00
sinn3r
15fbb1e86c
This the modified version of pull request #379 . Changes include:
...
* Add more references
* Update description
* MSF license disclaimer
* Remove the to() function. Instead it's in run_host()
* Put 'info' in the :proof key
* Remove ::Exception handling, so we can see the original that's also logged in framework.log
2012-05-13 04:09:17 -05:00
Tod Beardsley
86500aad47
Author is always singular.
2012-05-08 08:47:52 -05:00
sinn3r
91a8ff2766
Use print_good when SQL injection is found
2012-05-08 01:30:13 -05:00
sinn3r
fa9d23d839
When a blind SQL injection, it's a good thing (for the attacker), so we should use print_good
2012-05-08 01:26:39 -05:00
sinn3r
9c3d2355b1
Allow this module to be more verbose for future debugging
2012-05-04 15:47:30 -05:00