Commit Graph

337 Commits (7dacf20fca0990a0789fbb1a9e45a4691a7d7db9)

Author SHA1 Message Date
David Maloney 5e6620f2cf
add yard doc and lexical sorting
lexical sort methods and add missing YARD docs
2016-01-08 14:36:21 -06:00
David Maloney 536378e023
move datastore kill check to kill method
move the datastore check for datatstore['KILL']
into the actual kill method for sake of DRYness
2016-01-08 14:31:42 -06:00
David Maloney 9716b97e1c
split up the migration efforts
move admin and suer migrations into
seperate methods for enhanced readability
and maintainability
2016-01-08 14:26:39 -06:00
David Maloney ad50f9a047
move default targets to constants
cleanup the way the target lists get populated
to use constants and be a little cleaner and dryer
2016-01-08 14:03:30 -06:00
Josh 4e99c873c8 Fix issue when target_pid == current_pid 2016-01-06 19:58:07 -06:00
Josh 60c506d7fb Replace error handling methods 2016-01-06 18:53:54 -06:00
Josh 0de69a9d40 Add post Windows privilege based migrate 2015-12-27 19:26:21 -06:00
Louis Sato 55b3e10390
Land #6258, smart_migrate enhancement 2015-11-24 11:30:29 -06:00
Louis Sato 493e476a43
Land #6243, check nil for sock.read 2015-11-23 11:15:51 -06:00
sammbertram f1675f9ae4 Minor enhancement to smart_migrate
Adding a check to see if the user is currently already migrated to the "explorer.exe" and "winlogon.exe" processes prior to attempting migration.
2015-11-19 13:30:12 +00:00
wchen-r7 17a1f2ee8a Fix #6242, Check nil for sock.read
Fix #6242
2015-11-16 14:24:46 -06:00
David Maloney a1ab8f1dc7
added Session info display to module output
output from the mssql_local_auth_bypass module
is now prefixed with the Session id and address
of the target host so it is explicitly clear
where it is performing each action

MS-706
2015-11-16 12:13:26 -06:00
Brent Cook 0784370b98 more typo and whitespace fixes 2015-10-20 13:09:17 -05:00
Rob Fuller 2f1406e1c8 fix typo
not sure how this got in there
2015-10-20 13:48:00 -04:00
Stuart 853d822992 Merge pull request #1 from bcook-r7/land-5380-pageantjacker
update pageantjacker to run as part of extapi
2015-09-23 09:45:53 +01:00
Stuart Morgan cdd39f52b1 Merge branch 'master' of https://github.com/rapid7/metasploit-framework into pageant_extension 2015-09-21 14:34:56 +02:00
Brent Cook 61e7e1d094 update pageantjacker to run as part of extapi 2015-09-20 20:25:00 -05:00
HD Moore a2d5511e39
Land #5379, new post modules to load into powershell sessions 2015-08-26 17:11:40 -05:00
benpturner 8800d89424 Updated to reflect HD's comments on indents and name of local script. 2015-08-16 10:47:20 +01:00
Stuart Morgan ee7c418ca8 Rubocop and msftidy-ied :-) 2015-08-14 17:19:07 +01:00
Stuart Morgan 02a58d459b Merge remote-tracking branch 'upstream/master' into pageant_extension 2015-08-14 17:05:38 +01:00
Stuart Morgan e2b6c11a3e Update 2015-08-14 16:24:52 +01:00
Tod Beardsley a342a9db10
Another sticky keys ref, from @carnal0wnage 2015-07-29 12:32:38 -05:00
Tod Beardsley 8043e5a88e
Add a reference to the sticky keys exploit 2015-07-29 12:31:43 -05:00
Tod Beardsley ee66cadde2
Don't use bullet points in descriptions
They never render correctly in anything other than a text editor.

modules/post/windows/manage/sticky_keys.rb first landed in #5760,
Sticky Keys post module
2015-07-29 12:29:09 -05:00
William Vu 4dd2c31b44
Land #5760, Sticky Keys post module 2015-07-23 17:12:31 -05:00
William Vu 06ed7ba574 Add a comma 2015-07-23 17:12:17 -05:00
OJ ebdbb179ce Last of the style fixes 2015-07-24 08:09:25 +10:00
OJ db7fadfc36 Fix indentation 2015-07-24 08:08:01 +10:00
OJ 616e1ddd68 Change enum to action, a couple of tidies 2015-07-24 08:01:58 +10:00
OJ e60f590f09 Add DisplaySwitch.exe support with WINDOWS+P
As per @mubix's request.
2015-07-24 07:20:31 +10:00
OJ 1dd765d6e6 Remove trailing spaces 2015-07-23 13:17:34 +10:00
OJ 0f2692f24f Fix up silly mistake with `fail_with` 2015-07-23 13:14:35 +10:00
OJ 691b13ebd8 Add the sticky_keys module 2015-07-23 12:53:47 +10:00
wchen-r7 425a9dc266 credit OJ 2015-07-17 13:47:17 -05:00
wchen-r7 663bcbe53b Avoid checking these system process names 2015-07-17 13:46:02 -05:00
OJ e1b1db9f88 Fix stupid typo 2015-07-16 23:03:49 +10:00
OJ 986463e489 Fix killav post module, handle errors, better output 2015-07-16 11:35:01 +10:00
Marc-Andre Meloche 2735c035b5 fixed issues as requested.
fixed.
2015-07-15 20:36:19 -04:00
Marc-Andre Meloche 579fb5fb1f Fixed
Fixed
2015-07-15 20:09:42 -04:00
Marc-Andre Meloche c762e9e8d6 Fixed as requested.
I added the possibility to read from file, instead of modifying the module each time.
2015-07-15 20:02:18 -04:00
Marc-Andre Meloche 7520bc9a8a Exported Killav into a post-exploitation module
I was unsure if this was the place to send the update.
2015-07-15 14:04:37 -04:00
g0tmi1k 6dcc9b7dab More inconsistencies 2015-06-12 21:59:15 +01:00
g0tmi1k a53ca53a6a Fix inconstancy - multi/handler 2015-06-12 21:23:51 +01:00
RageLtMan f575fb8df9 Merge branch 'feature-merge_psh_updates_201505'
Conflicts:
	lib/msf/core/post/windows/powershell.rb

Rename upload_script_via_psh to stage_psh_env within post PSH lib.
Perform the same rename within load_script post module.
2015-05-29 03:42:25 -04:00
benpturner e06f47b2bd Updates load_script to have support for folders and to include the stager process in the mixin module for other post mods 2015-05-25 15:48:27 +01:00
RageLtMan 23b69a0c22 license update 2015-05-21 00:32:31 -04:00
RageLtMan 6d9f6c9715 retab exec_powershell.rb 2015-05-20 19:08:50 -04:00
RageLtMan 27e12754fe Import Powershell libraries and sample post module
Sync critical functionality from Rex and Msf namespaces dealing
with encoding and processing of powershell script for exploit
or post namespaces.

Import Post module. Primarily adds a psh_exec method which will be
replaced in the next PR with @benpturner's work integrated into
the Post module namespace.

Provide a sample metasploit windows post module to show the
execution pipeline - entire subs process can be removed and the
module reduced to a psh_exec(datastore['SCRIPT']).

This commit is designed to provide sync between the SVIT fork and
upstream. Pending commits to be based on this work will provide
access to .NET compiler in the Post namespace to be used for
dynamic persistent payload creation on target and the import of
@benpturner's work.
2015-05-20 18:18:51 -04:00
benpturner cdea522c3e Use the Rex::Powershell::Command function to encode the stream 2015-05-20 10:34:54 +01:00