jvazquez-r7
da2105787d
no rop versio of the exploit, metadata used, check and description fixed
2012-07-04 10:54:35 +02:00
HD Moore
d266dc6031
Revert what looks like an errant debug mode
2012-07-03 20:32:19 -05:00
HD Moore
64364e3f16
Handle failed reloads in a nicer way
2012-07-03 19:49:44 -05:00
jvazquez-r7
8bcc0ba440
Review of pull request #559
2012-07-03 23:49:47 +02:00
jvazquez-r7
600ca5b1dd
Added module for CVE-2012-0708
2012-07-03 19:03:58 +02:00
sinn3r
7cfb7c1915
Update description
2012-07-03 10:26:02 -05:00
sinn3r
77d6fe16f0
Merge branch 'Winlog-CVE-resource' of https://github.com/m-1-k-3/metasploit-framework into m-1-k-3-Winlog-CVE-resource
2012-07-02 16:04:02 -05:00
sinn3r
7262faac57
Correct a typo
2012-07-02 16:02:14 -05:00
sinn3r
fa0422c88a
Must respect the PlainText field to extract password info properly
2012-07-02 15:56:25 -05:00
sinn3r
e2a2789f78
Support Ruby 1.8 syntax. Thanks M M.
2012-07-02 14:15:14 -05:00
m-1-k-3
e06ca8e654
Winlog-CVE-resource
2012-07-02 20:33:15 +02:00
HD Moore
97854c4521
Merge pull request #556 from stephenfewer/master
...
ReflectiveLoader x64 compiler optimization edge case
2012-07-02 10:57:38 -07:00
Stephen Fewer
df7a093eb8
force the eip() function to never be inlined under x64 in order to avoid an error being introduced when some unexpected compiler flags are being used. Now the compiler flags used (/O1, /O2, ...) shouldnt pose any problem
2012-07-02 17:40:57 +01:00
jvazquez-r7
9d49052c52
hp_dataprotector_new_folder: added support for hpdp 6
2012-07-02 18:32:19 +02:00
efraintorres
4c68cdd584
Actions removed.
2012-07-02 10:57:32 -05:00
HD Moore
3bb7405b09
Only report auth if the username is not blank
2012-07-02 04:11:29 -05:00
HD Moore
4f9106b2e5
Reverse this back now that the bins are updated
2012-07-02 00:02:21 -05:00
HD Moore
c31f70cfb6
Switch to METERPRETER_UA as intended
2012-07-02 00:02:47 -05:00
sinn3r
d7d21f1bda
Merge branch 'patch-3' of https://github.com/mubix/metasploit-framework into mubix-patch-3
2012-07-01 19:42:49 -05:00
Rob Fuller
7298840478
Fix match on User-Agent for HTTPS
2012-07-01 21:32:29 -03:00
Rob Fuller
58dd2af998
Fix match on User-Agent for HTTP
2012-07-01 21:30:31 -03:00
sinn3r
1b02f17d52
Shamelessly add my name too, because I made a lot of changes.
2012-07-01 19:23:34 -05:00
sinn3r
c04cdfd517
Merge branch 'post_shell_setup' of https://github.com/wchen-r7/metasploit-framework into wchen-r7-post_shell_setup
2012-07-01 19:22:31 -05:00
sinn3r
e1c43c31bd
Title change
2012-07-01 16:43:25 -05:00
sinn3r
326230b34b
Don't need to print the xml path twice
2012-07-01 13:58:04 -05:00
sinn3r
fcf5e02708
Be aware of bad XML format
2012-07-01 13:50:43 -05:00
sinn3r
ac52b0cc9f
Filter out 'AdministratorPassword' and 'Password'
2012-07-01 13:45:12 -05:00
HD Moore
1c3b94d98c
Merge pull request #552 from sempervictus/rev_http_handler_fix
...
Fix up rev_http handler
2012-07-01 10:18:53 -07:00
RageLtMan
18e8285322
Fix up rev_http handler
2012-07-01 10:46:13 -04:00
sinn3r
61983b21b9
Add documentation about unattend.xml's specs
2012-07-01 04:15:11 -05:00
sinn3r
bf03995e30
Add veritysr's unattend.xml collector. See #548 .
2012-07-01 04:08:18 -05:00
HD Moore
12a6d67be4
Add support for user-agent and server control
2012-06-30 21:01:08 -07:00
HD Moore
27bdf78a5a
Add support for user-agent control
2012-06-30 23:00:08 -05:00
efraintorres
be666fde89
Full msftidy compliant
2012-06-30 22:08:10 -05:00
efraintorres
cad749d495
More formatting.
2012-06-30 21:21:56 -05:00
efraintorres
22b47e32fe
Fixed wrapping of module description
2012-06-30 21:12:01 -05:00
efraintorres
f8aacc3482
All fixes applied to wpad module.
2012-06-30 20:57:59 -05:00
sinn3r
a3d74f5b10
Correct dead milw0rm references
2012-06-30 16:50:04 -05:00
sinn3r
2874768539
Also add juan as author. And links to the vulnerable setup.
2012-06-30 13:12:13 -05:00
jvazquez-r7
5dbfb7b9aa
last cleanup
2012-06-30 14:18:25 +02:00
jvazquez-r7
19d476122b
versions affected corrected
2012-06-29 20:23:17 +02:00
jvazquez-r7
533111c6da
irfanview_jpeg2000_bof: review of pull req #543
2012-06-29 20:13:02 +02:00
sinn3r
196e1b7f70
Update title & description to match what ZDI has.
...
ZDI publishes a new advisory that's closer to what we actually
see in a debugger. So we update the reference, as well as the
description + title to better match up theirs.
2012-06-29 11:10:28 -05:00
sinn3r
19b6ebbfbf
Merge branch 'apple_quicktime_texml_zdi' of https://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-apple_quicktime_texml_zdi
2012-06-29 10:59:11 -05:00
sinn3r
0e87238e58
Space space
2012-06-29 10:56:12 -05:00
sinn3r
c656b26d50
Merge branch 'hpdp_new_folder_bof' of https://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-hpdp_new_folder_bof
2012-06-29 10:53:01 -05:00
jvazquez-r7
c79312547a
Added module for CVE-2012-0124
2012-06-29 17:50:21 +02:00
HD Moore
9204a5b124
Move the db skip into the "web" console driver. FIXRM #7031
2012-06-29 10:46:15 -05:00
jvazquez-r7
5efb459616
updated zdi reference
2012-06-29 16:36:11 +02:00
HD Moore
eb762b3653
Back out encoding change of empty string, done by comment
2012-06-29 01:07:58 -05:00