Commit Graph

24452 Commits (8a175f50cd86137d0c77d9f89e86bc489e9adbfa)

Author SHA1 Message Date
Matteo Malvica e8a7a7e76f
first commit 2018-06-13 21:29:09 +02:00
James Barnett 71651a33f6
Update jtr modules to use remote data store 2018-06-13 12:09:58 -05:00
bwatters-r7 1cd76eb833
Land #10148, Add New Module - Badpdf
Merge branch 'land-10148' into upstream-master
2018-06-12 17:19:32 -05:00
William Vu 14da99bb3d Fix missing RequestError in a few post modules
Should be Rex::Post::Meterpreter::RequestError.
2018-06-12 17:11:29 -05:00
rmdavy 477d709ff6
Code Improvements
Ran module through rubocop
2018-06-12 22:55:38 +01:00
bwatters-r7 29f4870fa0
Land #10101, Add glibc 'realpath()' Privilege Escalation exploit 2018-06-12 16:41:07 -05:00
bwatters-r7 06b3fdce49
Update reliability because of failures 2018-06-12 16:39:41 -05:00
William Vu c3c6bc19da
Land #10059, CVE-2018-1111 exploit 2018-06-12 15:02:06 -05:00
William Vu f4bb00b9a5 Remove stray PayloadType outside Compat 2018-06-12 14:59:29 -05:00
Tim W 0c891e972f
Land #10066, implement AudioOutput api from channel 2018-06-11 16:20:11 +08:00
Tim W 57e3bbdba4 update payload cached sizes 2018-06-11 16:19:58 +08:00
Dhiraj Mishra b44265fcb2
Minor tweaks
Suggestion's made by bcoles
2018-06-11 13:25:02 +05:30
rmdavy 6b58163fde
Code Improvement
Added further code improvement suggested by bcoles
2018-06-11 08:06:02 +01:00
Brendan Coles 645c890888
Land #10157, Add IconFile path to .URL files generated with MultiDrop 2018-06-11 03:07:21 +00:00
rmdavy f10b2b12d4
Implemented changes suggested by bcoles 2018-06-10 22:18:17 +01:00
rmdavy 22538bfd63
Fixed Minor Code Error & Removed Spaces 2018-06-10 21:53:40 +01:00
rmdavy f4334828d0
Minor Improvement
URL File Creation also supports IconFile - this has now been added
2018-06-09 17:46:27 +01:00
rmdavy 5e630b34e1
Minor Update
Removed some Spaces at EOL
2018-06-09 17:03:32 +01:00
rmdavy 5ca538541a
Code Improvements
Code improvements as suggested by bcoles.
2018-06-09 16:44:37 +01:00
rmdavy f9c74419bb
Minor Code Update
Improved injection and Minor Code Improvement
2018-06-09 12:24:33 +01:00
Dhiraj Mishra 51823b1d3d
Spaces at EOL 2018-06-09 15:58:11 +05:30
Dhiraj Mishra d3a18b2ce9
Some tweak
Thanks bcloes 😎
2018-06-09 12:15:21 +05:30
Dhiraj Mishra 76588aed09
Error at disclosure date format 2018-06-09 12:03:41 +05:30
Dhiraj Mishra f1d29e730f
Spaces at EOL 2018-06-09 11:53:21 +05:30
Dhiraj Mishra 6e8412fa73
CVE-2018-11646 - Webkit+ 2018-06-09 11:43:47 +05:30
Tim W 9abf438428
Land #10118, cleanup OSX local exploit modules 2018-06-08 14:57:09 +08:00
Tim W 641ffca98c use base_dir 2018-06-08 14:53:21 +08:00
rmdavy 7e0c8d279f
Minor Code Update 2018-06-07 21:16:41 +01:00
rmdavy ab80eadc3f
Minor Code Improvement 2018-06-07 21:06:47 +01:00
rmdavy 98507b2e51
Update badpdf.rb 2018-06-07 19:08:51 +01:00
rmdavy aba05275ae
BadPDF Generator
Generated PDF files which contain a UNC link back to listener, can be used to capture NetNTLM hashes.
2018-06-07 16:40:57 +01:00
rmdavy 16fcaa3d00
Delete badpdf.rb 2018-06-07 16:38:57 +01:00
rmdavy c790537bb2
BadPDF Generator 2018-06-07 16:38:22 +01:00
Aaron Soto f53d2a14df
Land #10067, Added `auxiliary/fileformat/odt_badodt` 2018-06-06 11:27:23 -05:00
Aaron Soto 20e773498f
Moved to `auxiliary/fileformat/odt_badodt` and updated docs 2018-06-06 11:27:07 -05:00
Aaron Soto 61074d1220
Land #10115, Added module `auxiliary/fileformat/multidrop` 2018-06-05 16:30:30 -05:00
Aaron Soto c94263c915
Create 'fileformat' and move 'auxiliary/multidrop' to 'auxiliary/fileformat/multidrop' 2018-06-05 16:27:57 -05:00
Jacob Robles 3b2889cd77
Land #10106, Add the scanner/smb/impacket/wmiexec module 2018-06-05 08:33:34 -05:00
rmdavy 59873ba81a
Updated Authors 2018-06-04 23:03:00 +01:00
rmdavy 4fcbb5d03d
Minor Code Updates
Minor Code Updates as per recommendations by Aaron Soto
2018-06-04 19:20:37 +01:00
Chris Higgins 78bcd57694
Land #10092, Cleanup linux/local/recvmmsg_priv_esc 2018-06-04 10:32:35 -05:00
Brendan Coles e1d69d6307 Cleanup pSnuffle 2018-06-04 15:27:20 +00:00
Brendan Coles 3bcc329c07 Add HID discoveryd command_blink_on Unauthenticated RCE exploit 2018-06-03 05:41:10 +00:00
Brent Cook 61a98b94b6
Land #9528, WebKit apple safari trident exploit (CVE-2016-4657) 2018-06-02 21:52:52 -05:00
phra e9db949418
refactor: replace last string with hash 2018-06-01 16:59:38 +02:00
phra ae3e8dab78
chore: update references 2018-06-01 16:58:26 +02:00
phra 5649dd0598
refactor: use Hash.to_json instead of strings 2018-06-01 16:57:57 +02:00
rmdavy 061bb84a5a
Updated Code
Updated code with suggestions provided by bcoles
2018-06-01 11:13:40 +01:00
Aaron Soto 2bf5e26bfe
Removed `Deprecated` include from `udp_probe` 2018-05-31 14:32:31 -05:00
Aaron Soto 918705d510
Removed deprecated modules: `epmp1000_cmd_exec` and `cambium_snmp_loot` 2018-05-31 14:31:58 -05:00
Brendan Coles 9c14bddd93 Cleanup OSX local exploit modules 2018-05-31 12:26:33 +00:00
Aaron Soto 829e1c306a
Land #10102, SOCKS5 updates for BIND, parsing specs, refactoring 2018-05-30 16:15:53 -05:00
Adam Cammack 5e968529bf
Land #9976, Store non-nil linux enum_network loot 2018-05-30 15:33:39 -05:00
Adam Cammack 435f965418
Use #include? over Regexps with plain strings 2018-05-30 15:32:04 -05:00
bwatters-r7 1e57aa5a57
Land #9777, Slui File Handler Hijack LPE 2018-05-30 15:22:12 -05:00
rmdavy 51a9fc4c55
Multidrop
Multidrop is a single module which can be used to create *.scf, *.url, *.lnk and desktop.ini files which contain a SMB/UNC link to a listener ready to capture NetNTLM hashes
2018-05-30 17:36:11 +01:00
Tim W c0841ef0bf set default payload 2018-05-30 18:04:22 +08:00
Tim W 2ec7f11b90 add binary 2018-05-30 18:02:17 +08:00
Brent Cook e69c51132d
Land #10083, Add Msf::Post::OSX::Priv mixin 2018-05-29 23:01:36 -05:00
Pedro Ribeiro d77ee20fc7
Add fix for 7.3.0 2018-05-30 00:59:11 +03:00
Pedro Ribeiro f1663afd53
Change patch level of vulnerable versions 2018-05-30 00:37:29 +03:00
Aaron Soto c8b2fc8a35
Land #9701, Flexense HTTP Server DoS exploit 2018-05-29 16:19:59 -05:00
Aaron Soto 026b22d061
Refined packet sizes and counts, improved error messages 2018-05-29 16:09:27 -05:00
Pedro Ribeiro 476030bbd6
Fix grep with proper Base64 support; IBM bug! 2018-05-29 18:49:52 +03:00
Pedro Ribeiro a3c7ac830f
Fix typo in rand 2018-05-29 18:40:50 +03:00
actuated b0d8e93e79 Added Teradata ODBC Login and SQL modules and documentation 2018-05-29 10:12:43 -05:00
Pedro Ribeiro ac5718d24c
Fix whitespace 2018-05-29 15:02:36 +03:00
Pedro Ribeiro 809982b430
Make changes requested by bcoles 2018-05-29 14:48:57 +03:00
Pedro Ribeiro 56dd07639f
add vuln versions 2018-05-28 17:37:58 +03:00
Pedro Ribeiro aaaa9c7508
Fix warnings from travis 2018-05-28 17:18:52 +03:00
Pedro Ribeiro e126681814
Changed disclosure date 2018-05-28 17:08:48 +03:00
Pedro Ribeiro cfb7d4c2fe
Add github url 2018-05-28 16:53:54 +03:00
Pedro Ribeiro 7db8183bc7
Create file for CVE-2018-1418 2018-05-28 16:39:10 +03:00
Spencer McIntyre 7ac8af03d2 Remove the LD_PRELOAD hook for proxychains 2018-05-27 17:12:06 -04:00
Spencer McIntyre 28d15a113f Add the secretsdump impacket module and docs 2018-05-27 17:09:59 -04:00
Spencer McIntyre 9fab2316c5 Add the wmiexec impacket module and documentation 2018-05-27 16:24:56 -04:00
Brendan Coles 0af5d44c42 Add glibc 'realpath()' Privilege Escalation exploit 2018-05-26 21:25:59 +00:00
Spencer McIntyre c85cc9ad9e Refactor SOCKS5 TcpRelay and add packet tests 2018-05-26 13:46:00 -04:00
Spencer McIntyre 49341fc87d Add credential authentication support to socks5 2018-05-25 20:14:03 -04:00
Spencer McIntyre 9b5ae34896 Drop udp associate support and cleanup logging 2018-05-25 20:14:03 -04:00
Spencer McIntyre 6859856101 Refactor the socks5 code into multiple files 2018-05-25 20:14:03 -04:00
Spencer McIntyre 04bec0bdf0 Progress on the socks5 proxy module 2018-05-25 20:14:02 -04:00
Ege Balcı 3ab7526786
Name & description Change
Exploit::CheckCode changed to Unknown as suggested.
2018-05-25 20:22:51 +03:00
Brent Cook fad5a99c7d
fix incorrect disclosure date 2018-05-25 02:59:08 -05:00
Brendan Coles 4df01da49a Add GTFOBins 2018-05-25 04:20:25 +00:00
Brendan Coles 651fb69585 Cleanup linux/local/recvmmsg_priv_esc module 2018-05-24 17:56:07 +00:00
Auxilus 72fb51f877
add extra check for failed command outputs 2018-05-24 20:47:06 +05:30
rmdavy affa0bdc6f
Minor Update
Removed Unused Comment
2018-05-24 13:45:08 +01:00
rmdavy 7143f04ea7
Add files via upload
Updated to use recommended method of creating zip files
2018-05-24 09:53:53 +01:00
rmdavy 04a27e0221
Delete thumbnail.png
Moved folder location
2018-05-24 09:37:45 +01:00
rmdavy 81c4e9f7b9
Delete styles.xml
Moved folder location
2018-05-24 09:37:31 +01:00
rmdavy 73bfe1c9ab
Delete settings.xml
Moved folder location
2018-05-24 09:37:18 +01:00
rmdavy 247904746c
Delete meta.xml
Moved folder location
2018-05-24 09:37:04 +01:00
rmdavy f9bda873d2
Delete manifest.xml
Moved folder location
2018-05-24 09:36:55 +01:00
rmdavy 5002eae655
Delete manifest.rdf
Moved folder location
2018-05-24 09:36:45 +01:00
rmdavy 02afeb3e29
Delete content.xml
Moved folder location
2018-05-24 09:36:35 +01:00
Brent Cook 86a5b951aa
Land #9990, add SOCKS5 proxy support 2018-05-23 17:31:09 -05:00
Brent Cook bc5c7a15e5 remove single-entry OptEnum from module, since there is only one possible TECHNIQUE 2018-05-23 13:44:53 -05:00
bwatters-r7 77403479f5
code cleanup 2018-05-23 12:53:48 -05:00
gushmazuko 3ef6f82894
Update bypassuac_sluihijack.rb 2018-05-23 12:25:49 +02:00
Jan Rude 567e2dbc7e
Update telpho10_credential_dump.rb
Current version still vulnerable, developer ignores mails. It seems like this is going to be a 'won´t fix'
2018-05-23 09:32:41 +02:00
Aaron Soto 72efe66403
Refactored for better logging, IPv6 support, and prep for auth 2018-05-22 18:57:00 -05:00
Brendan Coles 45481f26b6 Add Msf::Post::OSX::Priv mixin 2018-05-22 22:25:39 +00:00
James Barnett 0472b9df3f
Land #10024, Fix find_or_create_* methods for remote data service
This PR updates the find_or_create_* methods associated with each model to
no longer just proxy to the report_* model. It now performs a lookup through
the DataProxy and returns the found object if it exists, or creates a new
record if needed.
2018-05-22 17:08:46 -05:00
Brendan Coles 15e472637a
Land #10070, Fix cleanup in exploits/osx/local/rootpipe_entitlements 2018-05-22 21:52:24 +00:00
Brendan Coles b14e354b25
Land #10048, Make shell and meterpreter sessions consistent with cmd_exec 2018-05-22 21:26:47 +00:00
bwatters-r7 40d5f46277
Lad #10017, D-Link DSL-2750B Unauthenticated OS Command Injection
Merge branch 'land-10017' into upstream-master
2018-05-22 10:54:33 -05:00
lucyoa 6cc1a8dcbd
Rubocop fixes 2018-05-22 10:34:05 -04:00
Matthew Kienow 4ecc1ff551
Modify loots, notes and services search methods
Modify loots and services method signatures. Remove workspace as a
positional argument, move into opts hash argument and update callers.
Made host search for these models more uniform. Update find_or_create
methods to handle difference in opts between find and report
operations.
2018-05-21 17:37:51 -04:00
phra 6d4ad57beb
refactor: use Rex built-in encoders 2018-05-21 22:14:39 +02:00
bwatters-r7 75562e2bbc
Land #10044, Fix is_system? in Msf::Post::Windows::Priv for non-English
Merge branch 'land-10044' into upstream-master
2018-05-21 14:24:26 -05:00
Kevin Kirsche 93e9c96a1c Adjust link / name ordering to be alphabetical by key (not sorted by value) 2018-05-21 14:42:13 -04:00
Tim W 88ab836e15
Land #9987, AF_PACKET chocobo_root exploit 2018-05-21 17:05:53 +08:00
Tim W 9e9dff8b6a fix file cleanup on failed exploitation 2018-05-21 16:47:09 +08:00
Tim W cd0161ada2 fix gcc for shell_reverse_tcp payloads on ubuntu 2018-05-21 16:46:42 +08:00
lucyoa 6ae55aadd4
Fixing documentation, improving exploits code 2018-05-20 12:55:46 -04:00
Brendan Coles aa033bf5c1 Fix cleanup 2018-05-20 16:19:25 +00:00
Kevin Kirsche c665a32eb9 Add privileged and fix PayloadType hash style 2018-05-19 19:06:50 -04:00
rmdavy ef229111c8
Delete readme.txt 2018-05-19 16:58:45 +01:00
rmdavy 5d3c95e51b
Create badodt 2018-05-19 16:58:14 +01:00
rmdavy a0d8f70dee
Create readme.txt 2018-05-19 16:57:40 +01:00
rmdavy 077a7c7c9e
Delete test.txt 2018-05-19 16:57:07 +01:00
rmdavy 018a8a3060
Create test.txt 2018-05-19 16:56:49 +01:00
rmdavy 622bc272fb
Delete odt 2018-05-19 16:56:30 +01:00
rmdavy b293ddfe5d
Create odt 2018-05-19 16:56:10 +01:00
phra c9ab44234a
refactor: remove predefined cmd stager flavor, increase linemax 2018-05-19 15:55:11 +02:00
phra d239fb17db
refactor: update code as requested 2018-05-19 15:50:10 +02:00
Kevin Kirsche d9d226376c Fix missing comma 2018-05-19 09:23:23 -04:00
Kevin Kirsche 4bf259e767 Add github and EDB ID number 2018-05-19 09:04:18 -04:00
Kevin Kirsche b0f556639f Change rand text length and remove disable nops 2018-05-19 09:02:00 -04:00
phra 8a1cb1e560
fix: fix indentation 2018-05-19 03:27:35 +02:00
phra 5d37451dc8
fix: use print_error instead of puts 2018-05-19 03:26:49 +02:00
phra b010d23427
exploits: add CVE-2018-1000049 exploit module, fixes #10063 2018-05-19 03:10:06 +02:00
Clément Notin a8fcd9d275
Fix display of uid in post/windows/gather/win_privs
`inspect` is not necessary and triggers display of Unicode characters as "\x.." instead of printing their value.
As discussed in PR #10044
2018-05-19 01:35:19 +02:00
bwatters-r7 294b263159
Land #9966, Add Reliable Datagram Sockets (RDS) Privilege Escalation exploit
Merge branch 'land-9966' into upstream-master
2018-05-18 17:06:04 -05:00
Touhid M Shaikh 12457d14f7
vTiger CRM v6.3.0 (CVE:2015-6000,CVE:2016-1713)
an attacker may choose to upload a file containing PHP code and run this code by accessing the resulting PHP file.
2018-05-19 01:13:10 +05:30
Kevin Kirsche 6d0c6a7051 Randomize the starting letter 2018-05-18 15:14:40 -04:00
Kevin Kirsche 1efa5c4061 Move to PayloadType instead of Compat 2018-05-18 14:55:33 -04:00
Kevin Kirsche 599979be37 Add AKA and remove filename 2018-05-18 14:49:12 -04:00
Kevin Kirsche 0951aca881 Fix require that’s included by mixin 2018-05-18 13:31:20 -04:00
Kevin Kirsche 35ee1b5fa1 Use https instead of http in the comments 2018-05-18 13:10:47 -04:00
Kevin Kirsche 8f0242344d Fix style to use curly braces instead of pipes 2018-05-18 13:06:38 -04:00
Kevin Kirsche f1b9088609
Fix msf/core include requirement
```
modules/exploits/unix/dhcp/rhel_dhcp_client_command_injection.rb - [WARNING] Explicitly requiring/loading msf/core is not necessary
```

removes `require msf/core`
2018-05-18 13:04:55 -04:00
Kevin Kirsche 164f3ef48d Add CVE-2018-1111 exploit 2018-05-18 12:47:08 -04:00
Brent Cook 7af7587519
Land #9999, Optionally test empty group in cisco_ssl_vpn 2018-05-18 10:57:15 -05:00
Brent Cook 37f1e44a12
Land #10009, Add initial check support to external modules 2018-05-18 09:31:31 -05:00
Brendan Coles eb3733ffb4 unless 2018-05-17 17:42:55 +00:00
Brent Cook 520b8bc3c0 remove many duplicate code paths 2018-05-17 08:14:32 -05:00
Tim W a3879f0109
Land #9956, add module to extract wireless credentials on Android 2018-05-17 21:04:56 +08:00
Brent Cook 5c3cb097fb
Land #10047, remove invalid timeout argument on cmd_exec 2018-05-17 07:41:14 -05:00
Brent Cook 406f1fe165 fix #10046, remove invalid timeout argument on cmd_exec 2018-05-17 07:38:22 -05:00
Tim W 6594cbb5cc
Land #9947, AF_PACKET packet_set_ring exploit 2018-05-17 18:43:52 +08:00
Tim W dc227153c4 fix gcc on shell_reverse_tcp session 2018-05-17 18:43:27 +08:00
Aaron Soto c35c8e9c75
Update module name, per a good catch by @bcook 2018-05-16 13:55:45 -05:00
Tim W ce5b24eda0 fork early and cleanup files in module 2018-05-17 00:32:01 +08:00
Jacob Robles 999b895735
Land #9816, Add the scanner/smb/impacket/dcomexec module 2018-05-16 07:15:32 -05:00
William Vu eb0ac79143
Land #9975, local_exploit_suggester fixes 2018-05-16 06:48:02 -05:00
William Vu 739d58135f Move EXE generation in struts_code_exec_parameters 2018-05-16 06:15:40 -05:00
William Vu 6ec0272ff5
Land #8727, CVE-2017-9791 exploit 2018-05-16 05:41:26 -05:00
William Vu eaec1d7486 Clean up module 2018-05-16 05:39:17 -05:00
William Vu 436e414b93
Land #7815, CVE-2016-9299 exploit 2018-05-16 05:29:41 -05:00
William Vu 959cbde6eb Clean up module 2018-05-16 05:29:25 -05:00
William Vu 908857b563
Land #10036, reverse_bash_telnet_ssl fixes 2018-05-16 04:10:36 -05:00
William Vu 3810803276
Land #10035, awk payload improvements 2018-05-16 04:10:21 -05:00
William Vu 6723de2659
Land #10031, zsh payload improvements 2018-05-16 04:10:00 -05:00
William Vu c2c46586cd
Land #10030, reverse_ksh payload 2018-05-16 04:08:17 -05:00
William Vu 6abd0d068a Nix explicit return 2018-05-16 04:06:58 -05:00
Brendan Coles c5f980f633 GoodRanking 2018-05-16 02:38:19 +00:00
William Vu 3ea4548343 Fix PayloadType in reverse_bash_telnet_ssl
It should not be cmd_bash, since it doesn't rely on being in bash.
2018-05-15 20:50:30 -05:00
William Vu 49bfa3b707 Update CachedSize 2018-05-15 20:07:14 -05:00
William Vu a19c5f723b Improve bind_awk payload (credit @bcoles) 2018-05-15 20:01:57 -05:00
William Vu 5d229abf72 Improve reverse_awk payload (credit @bcoles) 2018-05-15 20:01:32 -05:00
William Vu cc35975164 Update CachedSize 2018-05-15 19:56:55 -05:00
William Vu 1100899ccb Change link to HTTPS 2018-05-15 19:56:42 -05:00
William Vu 3ccfc27096 Redirect stderr as well 2018-05-15 19:51:10 -05:00
William Vu 3f39475579 Update CachedSize 2018-05-15 19:42:39 -05:00
William Vu b58dc3bf5e Refactor zsh payloads
This also fixes an oversight where the payloads would fail outside zsh.
2018-05-15 19:26:19 -05:00
Brendan Coles 7ebe0d6dc5 Use sudo -l rather than sudo -l -l 2018-05-15 18:53:52 +00:00
WangYihang 49904e0377 Add an reverse shell payload by zsh through redirection operations 2018-05-15 22:43:37 +08:00
WangYihang 53844cb24a Add an reverse shell payload by ksh(the korn shell) 2018-05-15 22:36:47 +08:00
Auxilus 900480dd1a
check for root 2018-05-15 17:32:10 +05:30
Auxilus e1786d1ae0
Update sub_info.rb 2018-05-15 16:55:52 +05:30
Green-m 492be19aa0 Use && instead of and 2018-05-15 05:18:38 -04:00
Green-m a61d202586 Delete blank, fix typo and use single quote instead. 2018-05-15 04:27:36 -04:00
Green-m 03a7bb72af Add exploit module for apache hadoop unauthorized command execution 2018-05-15 03:47:20 -04:00
zerosum0x0 4a64401a58 fix ms17-010 similar to 4a56ecf3ae 2018-05-14 15:45:20 -06:00
Brendan Coles 17bd9aafb3 Add post/multi/recon/sudo_commands 2018-05-14 18:31:24 +00:00
Aaron Soto f5a43f2ed0
Land #9991, Remove need for temp file with xdebug_unauth_exec 2018-05-14 08:55:38 -05:00
lucyoa 8dd7a27f7b
Fixes according to code review 2018-05-14 05:46:23 -04:00
lucyoa f65361258b Adding vulnerable firmwares to description 2018-05-13 15:08:32 -04:00
lucyoa 382364a3ff
Adding documentation, improving description 2018-05-13 15:04:40 -04:00
lucyoa c3ad02121c
Exploit for D-Link DSL2750B OS Command Injection vulnerability 2018-05-13 13:58:35 -04:00
Tim W ed5f2bffa9
Land #9919, add libuser roothelper privilege escalation exploit 2018-05-12 17:11:21 +08:00
Tim W a8660e4042 make the PASSWORD option required 2018-05-12 17:10:21 +08:00
Adam Cammack b0e712e992
Add banner check exploit/linux/smtp/haraka 2018-05-11 12:45:32 -05:00
Adam Cammack 90f2fe545c
Add PEP8 whitespace to exploit/linux/smtp/haraka 2018-05-11 12:43:30 -05:00
Green-m 0ef0fae2b2 rm test code 2018-05-10 22:17:38 -04:00
Jacob Robles cc0fdee788
EmptyGroup advanced option, just in case... 2018-05-10 09:57:50 -05:00
Tim W 67c7a718db
Land #9868, fix post/osx/capture/keylog_recorder 2018-05-10 16:47:57 +08:00
Jacob Robles 9811de430c
Land #9878, Add MSF module for EDB 6768, Mantis <= v1.1.3 Post-auth RCE 2018-05-09 11:55:22 -05:00
Jacob Robles a1fed72423
store credential, use vprints 2018-05-09 11:50:07 -05:00
Jacob Robles 79a0610436
remove empty group 2018-05-09 11:11:03 -05:00
Hypnoze57 08b81a418f Customization of Golden Ticket Duration
- Post exploitation module updated
- Kiwi extention updated

Using mimikatz /startoffset and /endin params
Duration in hours, default already 10 years
2018-05-09 17:44:55 +02:00
miluxsec 5ed1bde65f Removed unused FileDropper include 2018-05-08 18:10:29 +02:00
miluxsec 5038098efb Remove need for writable directory when using xdebug exploit
By base64 encoding the exploit code and decoding it on the target the
need for writing a temporary file is removed.
See #9918
2018-05-07 22:11:21 +02:00
William Vu 0240c3f010
Land #9980, PAN-OS readSessionVarsFromFile exploit 2018-05-07 14:55:00 -05:00
Brent Cook 02849bcfd0
Land #9986, initial ruby_smb simple client integration 2018-05-07 14:02:22 -05:00
Jacob Robles a18459a14c
Fix indentation, documentation update 2018-05-07 09:22:21 -05:00
Touhid M Shaikh 235cac621f
playsms_CVE-2017-9101
playsms_CVE-2017-9101
2018-05-07 18:55:22 +05:30
Touhid M Shaikh 74793efdef
Delete playsms_uploadcsv_exec.rb 2018-05-07 18:54:35 +05:30
Touhid M Shaikh fefaa45a50
playsms_CVE-2017-9101
playsms_CVE-2017-9101
2018-05-07 18:53:07 +05:30
Jacob Robles 222b1fb27c
Land #9944, playsms_filename_exec.rb 2018-05-07 07:43:16 -05:00
Jacob Robles 601411fe7b
store credentials 2018-05-07 07:26:28 -05:00
Jacob Robles 4b8ceab522
Fix indentation, update documentation 2018-05-07 07:22:53 -05:00
Brendan Coles 5ae9b0185d Add AF_PACKET chocobo_root Privilege Escalation exploit 2018-05-07 07:11:07 +00:00
Green-m 24de2a3cd0 Merge branch 'master' into couchdb_cmd_exec 2018-05-07 02:53:13 -04:00
Brent Cook a4ecd43a8f remove unused constants 2018-05-07 00:24:38 -05:00
Jacob Robles 534d05ff44 simpleclient versions option 2018-05-07 00:24:38 -05:00
Jacob Robles ff202a5f5b Simpleclient/SMB2 support 2018-05-07 00:24:38 -05:00
HD Moore 2a211d99af Nuke base_directory after all, FileDropper does not like our path 2018-05-06 22:58:06 -05:00
HD Moore a9f9d61f1e Use the target_directory, not base 2018-05-06 22:56:59 -05:00
HD Moore cd48507aab Use FileDropper, switch to earlier target directory 2018-05-06 22:56:36 -05:00
HD Moore 1f7b13bea8 Additional module cleanup 2018-05-06 22:50:13 -05:00
HD Moore 3d172df0c4 MD5 of TID and cleanup if statement 2018-05-06 22:24:36 -05:00
HD Moore 68f2e08400 Swap to positive logic 2018-05-06 22:22:47 -05:00
HD Moore 9712215e66 Add Bugtraq ID 2018-05-06 22:21:13 -05:00
HD Moore 5d57e9db34 Remove unnecessary RHOST definition 2018-05-06 22:20:51 -05:00
Green-m 96a354ffc4 Merge branch 'couchdb_cmd_exec' of https://github.com/Green-m/metasploit-framework 2018-05-06 23:07:14 -04:00
Auxilus a612c4cc65
Update wireless_ap.rb 2018-05-06 17:37:12 +05:30
Auxilus 6bd31d7921
Update wireless_ap.rb 2018-05-06 17:33:20 +05:30
Auxilus f32fda6757
Update wireless_ap.rb 2018-05-06 16:52:18 +05:30
Tim W 3e949733e2 fix wpa_supplicant parsing 2018-05-06 19:11:35 +08:00
HD Moore 8141e949fc Note the runtimes 2018-05-05 18:34:11 -05:00
HD Moore e775a97ae2 Adds panos_readsessionvars exploit module 2018-05-05 15:41:17 -05:00
Tim W 5f01b6abc9
Land #9977, fix crash during x64 linux reverse_tcp stager retry 2018-05-05 17:13:00 +08:00
Brendan Coles 3aa7441e10 Update tested versions 2018-05-05 09:11:31 +00:00
Tim W 4216d06ffb fix #9963, update x64 linux reverse_tcp stager cached size 2018-05-05 16:30:45 +08:00
Brendan Coles 24af15b6e7 Update kernel version and system arch detection 2018-05-05 07:16:53 +00:00
Auxilus 40b6b97dbf
Update enum_network.rb 2018-05-05 10:56:55 +05:30
Auxilus ec55a631ef
Check if the data is nil before pasisng to store_loot
when I ran this module for linux/aarch64/meterpreter_reverse_tcp for payload running in termux, it was obvious that without root the commands will return error, It still created empty files in `.msf4/loot`

```
msf5 post(linux/gather/enum_network) > run
                                                                                                  
[*] Running module against localhost.localdomain
[*] Module running as /system/bin/sh: /usr/bin/whoami: not found
[+] Info:
[+]
[+]     Linux localhost 3.10.84-perf+ #1 SMP PREEMPT Tue Oct 24 01:07:25 CST 2017 aarch64 Android
[*] Collecting data...
[+] /system/bin/sh: /sbin/route: not found
[-] Failed to open file: /etc/ssh/sshd_config: core_channel_open: Operation failed: 1
[-] unable to get data for Network config
[+] Network config stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_735775.txt
[-] unable to get data for Route table                                                            
[+] Route table stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_599334.txt
[-] unable to get data for Firewall config
[+] Firewall config stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_790893.txt
[-] unable to get data for DNS config
[+] DNS config stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_867340.txt
[-] unable to get data for SSHD config                                                           
[+] SSHD config stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_900906.txt                                                                  [-] unable to get data for Host file
[+] Host file stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_179877.txt
[-] unable to get data for Active connections                                                     
[+] Active connections stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_656035.txt                                                           [-] unable to get data for Wireless information
[+] Wireless information stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_168144.txt
[-] unable to get data for Listening ports                                                        
[+] Listening ports stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_999548.txt                                                              [-] unable to get data for If-Up/If-Down
[+] If-Up/If-Down stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_860869.txt
[*] Post module execution completed                                                               
msf5 post(linux/gather/enum_network) >
```
2018-05-05 10:52:08 +05:30
Brendan Coles cb29b4cf7a Update Local Exploit Suggester - Fix #9974 2018-05-05 04:41:58 +00:00
Aaron Soto 2cd0d3d90a
Rudamentary SOCKS5 functionality, CONNECT, IPv4, non-DNS only 2018-05-04 14:44:03 -05:00
Touhid M Shaikh 71d6841471
updated
indentation and fix CVE
2018-05-04 21:33:07 +05:30
Touhid M Shaikh aa69fc9e77
updated
print_status to vprint_status
2018-05-04 21:13:26 +05:30
Touhid M Shaikh e824f0f8b0
updated
added CVE, URL and done randomizing content
2018-05-04 21:00:04 +05:30
William Vu 88f09dc302 Update a few stragglers in Drupalgeddon 2
1. I added a missed header and YARD to the Drupal mixin.
2. I decided to match discovered versions more liberally.
2018-05-03 18:35:25 -05:00
William Vu 728d7bc065 Fix #9876, second round of Drupalgeddon 2 updates
Thanks to a reviewer for noticing my drupal_unpatched? method was
tri-state because of an unrefactored return. Oops! :)
2018-05-03 17:38:32 -05:00
bwatters-r7 ce5be387c4
Land #8795, Added CVE-2016-0040 Windows Privilege Escalation
Merge branch 'land-8795' into upstream-master
2018-05-03 16:33:53 -05:00
bwatters-r7 96b892a546
Make Rubocop happy 2018-05-03 11:30:05 -05:00
Brendan Coles 3a688451b6 Add Reliable Datagram Sockets (RDS) Privilege Escalation 2018-05-03 12:51:21 +00:00
Tim W 50300426ca
fix feedback from code review 2018-05-03 18:28:14 +08:00
Borja Merino 916dfa56fe Add author name to the wlan_probe_request post-exploitation module 2018-05-03 11:41:09 +02:00
Auxilus 02920728a4
Update sub_info.rb 2018-05-03 02:51:39 +05:30
Auxilus 7a47e2aa25
Update sub_info.rb 2018-05-02 22:02:09 +05:30
Auxilus bd92d189f4
Update sub_info.rb 2018-05-02 21:48:01 +05:30
Auxilus e87116a5c1
Minor fixes 2018-05-02 20:51:30 +05:30
Auxilus 1c89bd80d9
Update sub_info.rb 2018-05-02 20:44:21 +05:30
Auxilus c6df12dccb
Add android post module to extract subscriber info 2018-05-02 20:41:54 +05:30
Auxilus 98d81476f7
Fix get_password for pwds with `"`, `=` etc 2018-05-02 19:09:36 +05:30
Auxilus fa727f5394
Update wireless_ap.rb 2018-05-02 18:22:00 +05:30
Jacob Robles d6cf32fad8
Land #9821, osCommerce 2.3.4.1 - Remote Code Execution 2018-05-02 07:29:15 -05:00
Jacob Robles fc2c42f725
Land #9960, fix continuation warnings in payloads 2018-05-02 06:28:17 -05:00
Auxilus 773e06b3ca
Update wireless_ap.rb 2018-05-02 01:28:15 +05:30
Auxilus 2817ff25cb
Update wireless_ap.rb 2018-05-02 00:00:34 +05:30
Auxilus 614de11a9c
Update wireless_ap.rb 2018-05-02 00:00:05 +05:30
Auxilus 9b00a5cffb
store loot 2018-05-01 23:10:29 +05:30
Auxilus 29467c2e37
Stylize the output 2018-05-01 22:58:17 +05:30
BennyHusted c62fc79537 Fixed typo in description. 2018-05-01 11:37:33 -04:00
BennyHusted 89d6ded805 Removing the Nagios enum module, adding description 2018-05-01 11:35:45 -04:00
Jacob Robles 4a56ecf3ae
psexec native upload argument 2018-05-01 09:33:17 -05:00
Brent Cook 34f8a9a5ee fix continuation warnings in payloads 2018-05-01 04:57:42 -05:00
BennyHusted 4c8ad3ca9c Removing old exploit/docs 2018-04-30 22:26:37 -04:00
BennyHusted ad8bf6d8e3 Renamed exploit to electric boogaloo 2018-04-30 22:20:35 -04:00
Jeffrey Martin 28173222a8
Land #9881, cleanup psexec code 2018-04-30 18:39:36 -05:00
Brent Cook e29a53b7cb
Land #9951, Update linux/gather/enum_protections module 2018-04-30 16:52:30 -05:00
Brent Cook f3fa9af098 fixup osx sizes 2018-04-30 15:21:23 -05:00
Brent Cook 7e31c2cf76
Land #9942, IPv6 channel fixes for Python and Linux/macOS Meterpreters 2018-04-30 15:14:12 -05:00
Auxilus bc0cad43bc
Update wireless_ap.rb 2018-04-30 19:19:12 +05:30
Auxilus ca7afae730
Add wireless_ap post module for Android
This module displays all the saved wireless AP creds in the target device
2018-04-30 19:02:30 +05:30
Lars Sorenson 2ca05ee7c1 Remove explicit EDB url in favor of MSF autogenerated one
Use more appropriate Failwith errors for connection issues
Remove an unnecessary `to_s` call
Use the cookie kwarg for send_request_cgi over explicitly setting a header
2018-04-29 22:24:49 -04:00
Brendan Coles 3351a59efb Update linux/gather/enum_protections 2018-04-29 06:52:47 +00:00
Chris Long 9ae0acd489 Removing debug statement 2018-04-28 15:56:56 -07:00
Chris Long c7caac627b Replacing Import with Fiddle, adding fork compatibility for High Sierra 2018-04-28 15:53:23 -07:00
Brendan Coles f7504dd9d5 Add AF_PACKET packet_set_ring Privilege Escalation exploit 2018-04-28 01:40:17 +00:00
Aaron Soto c4bca03fea
Land #9908, msfd_rce_remote and msfd_rce_browser 2018-04-27 18:54:17 -05:00
Aaron Soto 82fc4aba64
Land #9918, XDebug Unauthenticated OS command execution 2018-04-27 17:08:58 -05:00
Touhid M Shaikh ce099aea76
playsms_filename_exec.rb
PlaySMS sendfromfile.php Authenticated "Filename" Field Code Execution
2018-04-28 01:15:52 +05:30
Brent Cook 8fd7448e48
bump payloads, ipv6 channel fixes 2018-04-27 14:18:54 -05:00
caleBot b932988866 more fixes 2018-04-27 11:43:32 -06:00
caleBot 2dda26606e updated based on feedback from r7 2018-04-27 11:23:17 -06:00
Auxilus d29bc920c1 print o/p to new line 2018-04-27 20:58:25 +05:30
Auxilus 912970ad3b change vprint to print for printing o/p in psexec_command 2018-04-27 20:47:21 +05:30
Auxilus 0374de5e0d change vprint to print for printing o/p 2018-04-27 10:49:04 +05:30
Auxilus 25cf8d175a report command execution o/p 2018-04-27 08:43:30 +05:30
Brent Cook 79d8f5e86c
autofilter = false means skip, which is reverse of intuition 2018-04-26 17:20:55 -05:00
BennyHusted 1806c247f1 Fixing tabbed spaces, version number in documentation 2018-04-26 18:15:39 -04:00
caleBot a2ae4bcfb0 initial commit for nagios post module 2018-04-26 16:06:29 -06:00
root b547e6282e Adding print statement to run the corresponding post module 2018-04-26 17:55:31 -04:00
root 37a32c2726 Adding module for Nagios XI remote root exploit.
See http://blog.redactedsec.net/exploits/2018/04/26/nagios.html for
more information.
2018-04-26 17:42:10 -04:00
Jeffrey Martin 54aaf1f718
Land #9937, enable autofilter on tp-link camera exploit 2018-04-26 16:08:09 -05:00
Brent Cook 4789cdc596 enable autofilter on tp-link camera exploit 2018-04-26 14:56:39 -05:00
Brent Cook 0fa0358993
Land #9853, Update Linux sock_sendpage local exploit module 2018-04-26 14:30:51 -05:00
William Vu 873cbcee27 Fix #9876, minor updates to Drupalgeddon 2
1. Tested versions are already listed in the module doc, and we've
tested more than just 7.57 and 8.4.5 now. Removing a source of potential
inconsistency in the future.
2. No problem with ivars anymore. No idea what happened, but maybe I was
just too tired to code. Removing cleanup method.
2018-04-25 18:09:54 -05:00
Brent Cook f52e6a18a2
Land #9876, Drupalgeddon 2 2018-04-25 15:49:53 -05:00
William Vu b8eb7f2a86 Set target type instead of regexing names
We're no longer matching multiple targets like /In-Memory/ or /Dropper/,
so it makes sense to match on a specific value now.

Old matching in this commit: 1900aa2708.
2018-04-25 11:53:26 -05:00
Brent Cook 2cd0228db2
Land #9900, add base64 encoder for ruby 2018-04-25 04:06:50 -05:00
Brent Cook 4cba6d1df4 suggest a reason if we get no server response 2018-04-25 03:57:12 -05:00
William Vu 910e9337fb Use print_good for patch level check, oops 2018-04-24 23:21:22 -05:00
William Vu b7ac16038b Correct comment about PHP CLI (it's not our last!) 2018-04-24 23:18:51 -05:00
William Vu ec43801564 Add check for patch level in CHANGELOG.txt
Looks like 8.x has core/CHANGELOG.txt instead.
2018-04-24 23:12:33 -05:00
William Vu 2ff0e597a0 Add SA-CORE-2018-002 as an AKA ref
Makes sense to me. Even though it's technically the advisory.
2018-04-24 22:51:33 -05:00
Auxilus 382a7f8aa3 Merge https://github.com/rapid7/metasploit-framework into psexec_cleanup 2018-04-25 09:09:48 +05:30
William Vu 8bc1417c8c Use PHP_FUNC as a fallback in case assert() fails
Additionally drop a file in a writable directory in case CWD fails.
2018-04-24 22:29:27 -05:00
Auxilus cbfdaf23a0 updated for requested changes 2018-04-25 08:56:54 +05:30
William Vu 8ff4407ca6 Clarify version detection error message
This was supposed to imply that we couldn't configure the exploit for a
targetable version. Instead, it just read weirdly. I think it was
missing "to target" at the end. "Determine" is a much better word,
though, since we may be doing detection instead of mere configuration.
2018-04-24 20:51:51 -05:00
Auxilus e7ac2cd155 move report_auth to psexec module 2018-04-24 23:00:55 +05:30
Robin Stenvi c81ad8fec0 Changes after review 2018-04-24 18:33:27 +02:00
William Vu cfaca5baa3 Restore a return lost in the refactor :(
Also spiff up comments.
2018-04-24 11:25:55 -05:00
Auxilus 3353102dc1 fix opt dependencies 2018-04-24 21:55:09 +05:30
William Vu a0f16b4a66 Prefer print_warning for consistency 2018-04-24 11:17:19 -05:00
William Vu 7ef8b99480 Improve printing in ETERNALBLUE's verify_arch
Now shows the invalid arch instead of showing nothing.
2018-04-24 11:09:54 -05:00
William Vu b507391f1b Change back to vprint_status for the nth time
I really couldn't decide, especially once I got rid of CmdStager.

Also fully document the module options.
2018-04-24 04:23:52 -05:00
William Vu c8b6482ab0 Rewrite PHP targets to work with 7.x and 8.x
Win some, lose some. php -r spawns a new (obvious) command. :/

Check method and version detection also rewritten. :)
2018-04-24 03:38:05 -05:00
Brendan Coles ef5272cdc6 Update tested versions 2018-04-23 20:28:24 +00:00
Brendan Coles 00583caadf Add Libuser roothelper Privilege Escalation exploit 2018-04-23 17:49:11 +00:00
Wei Chen f9a804e7d8
Bring the PR up to date 2018-04-23 08:52:05 -05:00
h00die e197cb5759 add arch check 2018-04-22 08:30:32 -04:00
Robin Stenvi 60c6f970c1 Added base64 encoder for Ruby 2018-04-21 10:54:26 +02:00
William Vu 8be58d315c Stop being lazy about badchar analysis
Badchars apply to all targets.
2018-04-20 19:30:38 -05:00
William Vu 5be4526085 Merge remote-tracking branch 'upstream/master' into feature/drupal 2018-04-20 18:42:15 -05:00
bwatters-r7 1c92134606
Land #9756, Add lastore-daemon D-Bus Privilege Escalation exploit
Merge branch 'land-9756' into upstream-master
2018-04-20 15:45:37 -05:00
bwatters-r7 f12f6d54a5
Land #9862, Post-exploitation module for meterpreter (Windows) to send wireless probe requests
Merge branch 'land-9862' into upstream-master
2018-04-20 14:32:01 -05:00
bwatters-r7 37a844bef0
Land # 9247, Add ASUS infosvr Auth Bypass Command Execution exploit
Merge branch 'land-9247' into upstream-master
2018-04-20 11:24:47 -05:00
Sergey Gorbaty fb3857222a Java JMX Package Name Randomization 2018-04-19 10:10:56 -07:00
William Vu fcfe927b7a Add PHP dropper functionality and targets 2018-04-19 05:11:21 -05:00
William Vu 62aca93d8b Cache version detection and print only once
Oops. This is the problem with overloading methods.
2018-04-19 04:59:07 -05:00
William Vu 2670d06f99 Add in-memory PHP execution using assert() 2018-04-19 02:18:56 -05:00
William Vu 7a2cc991ff Refactor once more with feeling
Nested conditionals are the devil. Printing should be consistent now.
2018-04-18 23:59:14 -05:00
William Vu 3d116d721d Add version detection and automatic targeting
I also refactored error handling. Should be cleaner now.
2018-04-18 21:40:22 -05:00
William Vu 86ffbc753e Refactor clean URL handling and remove dead code 2018-04-18 19:56:42 -05:00
Tim W 1547a47026
Land #9784, add osx high sierra APFS password disclosure post module 2018-04-18 14:27:22 +08:00
Tim W 72cd97d3e4 minor documentation and comment tweaks 2018-04-18 14:22:32 +08:00
William Vu 1900aa2708 Refactor module and address review comments 2018-04-17 19:05:45 -05:00
Auxilus f0b9ea635a cleanup psexec code 2018-04-16 09:04:36 +05:30
Lars Sorenson 143fdde1f8 Flipped Safe and Appears in check 2018-04-15 12:10:10 -04:00
Brendan Coles a60f205ee0
Fix check return CheckCode and typos 2018-04-15 18:08:49 +10:00
Lars Sorenson 60ac89c336 Restructure some logic to make the flow more intuitive 2018-04-14 15:03:12 -04:00
Lars Sorenson 36c1bf5453 Remove a missed tab 2018-04-14 10:30:49 -04:00
Lars Sorenson 083f6936fd Update for @bcoles review
Refactor version checking to use Gem::Version
Change the title of the exploit to fit convention
Change print statements used in check to vprint
Change fail_with Failure for connection issues to be Unknown instead
	of NoAccess
Add CVE reference
Refactor how some nil checking is done for response for
	send_request_cgi
Text-wrap description to 80 chars
Remove unnecessary string interpolation for cookie in payload
	delivery
Change how the payload cradle is escaped and encoded; switch to HTTP
	POST for stealth
Remove nil check that is redundant and also typo'd to
2018-04-14 10:24:05 -04:00
Lars Sorenson 486ab7c776 Update for msftidy and contribution guidelines 2018-04-14 09:20:13 -04:00