Jon Hart
691ed2cf14
More cleanup
...
Don't validate checksums by default until they are better understood
Handle the unknowns a bit better
Make checksum failures more obvious why it failed
2015-01-12 13:08:12 -08:00
Jon Hart
97f5cbdf08
Add initial Airport ACPP login scanner
2015-01-12 13:08:12 -08:00
Jon Hart
fba6945e9a
Doc payload oddness. Add more checksum tests
2015-01-12 13:08:12 -08:00
Jon Hart
54eab4ea3d
Checksum validation, more tests
2015-01-12 13:08:12 -08:00
Jon Hart
7e4dd4e55b
Add ACPP decoding capabilities
2015-01-12 13:08:12 -08:00
Jon Hart
2af82ac987
Some preliminary Apple Airport admin protocol (ACPP?) support
2015-01-12 13:08:11 -08:00
David Maloney
6dad66c04c
add Date header support to SMTP deliver
...
the SMTP mixin now supports the Date header.
The user can supply a a value for the Date Header
or else it will automatically use the current local
DateTime. This will help alleviate certain issues
caused by servers setting this field for the cliebnt incorrectly
MSP-9390
2015-01-12 11:18:07 -06:00
sinn3r
7876401419
Land #4476 - Lexmark MarkVision Enterprise Arbitrary File Upload
2015-01-12 10:44:23 -06:00
sinn3r
34bbc5be90
print error message about limitation
2015-01-11 20:12:40 -06:00
Jon Hart
c8f5026fd2
Land #4565 , @FireFart's improvement to the msftidy check for bad msf URLs
2015-01-10 11:10:37 -08:00
root
52b929c5ca
Fix https://github.com/m7x/metasploit-framework/pull/1#issuecomment-69454590
2015-01-10 14:15:53 +00:00
sinn3r
46d1616994
Hello ARCH_X86_64
2015-01-10 06:16:22 -06:00
m7x
ce89d39753
Merge pull request #1 from jhart-r7/landing-4503-jhart
...
Ruby/Metasploit style cleanup of McAfee hashdump module
2015-01-10 12:06:19 +00:00
jvazquez-r7
49f04faf3f
Land #4065 , @fozavci's Cisco CUCDM auxiliary modules
2015-01-10 01:11:45 -06:00
jvazquez-r7
05d364180b
Beautify descriptions
2015-01-10 01:10:08 -06:00
jvazquez-r7
a2d479a894
Refactor run method
2015-01-10 01:06:56 -06:00
jvazquez-r7
cf9d7d583e
Do first code cleanup
2015-01-10 00:51:31 -06:00
jvazquez-r7
000d7dd1eb
Minor beautification
2015-01-10 00:32:10 -06:00
jvazquez-r7
1d0e9a2dca
Use snake_case filename
2015-01-10 00:29:28 -06:00
jvazquez-r7
070e833d46
Use snake_case filename
2015-01-10 00:28:01 -06:00
jvazquez-r7
59d602f37d
Refactor cisco_cucdm_callforward
2015-01-10 00:27:31 -06:00
jvazquez-r7
511a7f8cca
send_request_cgi already URI encodes
2015-01-10 00:06:26 -06:00
jvazquez-r7
5d8167dca6
Beautify description
2015-01-10 00:02:42 -06:00
jvazquez-r7
9fb4cfb442
Do First callforward cleanup
2015-01-10 00:00:27 -06:00
jvazquez-r7
f7af0d9cf0
Test landing #4065 into up to date branch
2015-01-09 23:40:16 -06:00
jvazquez-r7
bedbffa377
Land #3700 , @ringt fix for oracle_login
...
* Avoid retrying logins when connection cannot be stablished
2015-01-09 22:59:32 -06:00
jvazquez-r7
38c36b49fb
Report when nothing is rescued
2015-01-09 22:58:19 -06:00
Jon Hart
5c12f9da75
More cleanup
...
Handle multiple versions
Better print_
Actually extract
2015-01-09 18:01:17 -08:00
sinn3r
3c8be9e36d
Just x86
2015-01-09 19:12:51 -06:00
sinn3r
7e1b8a1c83
Not needed anymore
2015-01-09 19:05:44 -06:00
sinn3r
c79589509c
Old comment
2015-01-09 19:04:50 -06:00
sinn3r
74e8e057dd
Use RDL
2015-01-09 19:02:08 -06:00
Brent Cook
6d2bc23a7f
Land #4567 - OJ kills metcli.exe
2015-01-09 17:27:55 -06:00
OJ
dfdf99c8f4
Remove metcli
...
The metcli.exe binary doesn't get used any more and the source was removed
from Meterpreter ages ago. No point in having it in the repo any more.
2015-01-10 09:21:44 +10:00
OJ
09d91c9a0c
Land #4564 - Update to latest meterpreter bins
2015-01-10 09:11:08 +10:00
Brent Cook
ce87b126c1
Update to the latest meterpreter_bins
...
This removes checked-in sniffer extension in favor of the gem-packaged version.
It also pulls in the changes for verifying #4411
2015-01-09 16:57:10 -06:00
Christian Mehlmauer
56c1f74d70
modify msftidy regex
2015-01-09 22:07:21 +01:00
Christian Mehlmauer
d4d1a53533
fix invalid url
2015-01-09 21:57:52 +01:00
Christian Mehlmauer
fd2307680d
Land #4550 , wp-symposium file upload
2015-01-09 21:55:02 +01:00
Jon Hart
35fd17c4f1
Cleanup style
2015-01-09 11:00:25 -08:00
jvazquez-r7
3d20ea822e
Land #2156 , @veritysr exploit for MySQL FILE privilege abuse on Windows
...
* By uploading payload to All Users startup folder
2015-01-09 12:22:09 -06:00
jvazquez-r7
d65ed54e0c
Check STARTUP_FOLDER option
2015-01-09 12:21:01 -06:00
jvazquez-r7
2c633e403e
Do code cleanup
2015-01-09 12:07:59 -06:00
jvazquez-r7
d52e9d4e21
Fix metadata again
2015-01-09 11:20:00 -06:00
jvazquez-r7
9dbf163fe7
Do minor style fixes
2015-01-09 11:17:16 -06:00
jvazquez-r7
8f09e0c20c
Fix metadata by copying the mysql_mof data
2015-01-09 11:15:32 -06:00
jvazquez-r7
da6496fee1
Test landing #2156 into up to date branch
2015-01-09 11:04:47 -06:00
sinn3r
ee5c249c89
Add EDB reference
2015-01-09 00:19:12 -06:00
sinn3r
75de792558
Add a basic check
2015-01-09 00:03:39 -06:00
sinn3r
fce564cde2
Meh, not the debug build. Should be the release build.
2015-01-08 22:06:07 -06:00