Brent Cook
d316609fef
put extra columns under the -x flag
2016-02-18 15:36:43 -06:00
James Lee
adb175136e
Fix extra whitespace and unused vars in call
2016-02-18 15:18:29 -06:00
OJ
6d88c26474
Change title, and remove requires
2016-02-18 14:26:38 +10:00
OJ
2ae1e6df7d
Address concerns from @wvu-r7
2016-02-18 14:21:35 +10:00
OJ
2f4ec0af31
Add module for AppLocker bypass
...
This commit includes a new module that allows for payloads to be
uploaded and executed from disk while bypassing AppLocker in the
process. This module is useful for when you're attempting to generate
new shells on the target once you've already got a session. It is also
a handy way of switching between 32 and 64 bit sessions (in the case of
the InstallUtil technique).
The code is taken from Casey Smith's AppLocker bypass research (added in
the references), and includes just one technique at this point. This
technique uses the InstallUtil feature that comes with .NET. Other
techiques can be added at any time.
The code creates a C# file and uploads it to the target. The csc.exe
compiler is used to create a .NET assembly that contains an uninstaller
that gets invoked by InstallUtil behind the scenes. This function is
what contains the payload.
This was tested on Windows 7 x64. It supports running of both 32 and 64
bit payloads out of the box, and checks to make sure that .NET is
installed on the target as well as having a payload that is valid for
the machine (ie. don't run x64 on x86 OSes).
This appears to work fine with both staged and stageless payloads.
2016-02-18 13:46:32 +10:00
James Lee
28e6d8ef9e
Allow CIDR notation for the route command
2016-02-17 09:44:32 -06:00
James Lee
35e0a433ea
Make error output more useful
2016-02-16 14:45:00 -06:00
Brent Cook
1263a82d1e
update database.yml.example to be something reasonable
2016-02-16 09:12:34 -06:00
Brent Cook
95484c81fd
Land #6526 , fix browser exploit server spec
2016-02-15 16:23:04 -06:00
Brent Cook
1f58ad15ac
Browser::Exploit::Server needs to have vprint*
2016-02-15 16:21:24 -06:00
Brent Cook
3d1861b3f4
Land #6526 , integrate {peer} string into logging by default
2016-02-15 15:19:26 -06:00
Artem
c5469be59e
Add Android ringer change mode command
2016-02-15 15:07:48 -06:00
Brent Cook
2fddf333ed
add TLV entry
2016-02-15 15:04:15 -06:00
Artem
59bf850bb0
Update android.rb
...
Add request for Ringer Mode Changer
2016-02-15 14:59:15 -06:00
Brent Cook
4db2840af9
Land #6385 , add .apk template support for msfvenom
2016-02-15 14:27:08 -06:00
nixawk
7ca0255ea1
Module should not be marked executable
2016-02-15 12:57:43 +08:00
nixawk
f35230b908
add Linknat Vos Manager Traversal
2016-02-15 12:39:40 +08:00
Nicholas Starke
3416a24dda
Adding vprint_status for loot path
...
Adding a vprint_status to show users the loot
path as per a comment on the pull request.
2016-02-14 11:19:20 -06:00
Tim
5c92076a1e
more cleanup
2016-02-14 09:15:25 +00:00
Spencer McIntyre
c9c4f49aca
Add get_file method and parse the server response
2016-02-13 17:20:37 -05:00
RageLtMan
2b24e8363e
Fix nessus_family_list
...
The list must be iterated from the families key, or it will raise
a type error.
2016-02-13 15:36:04 -05:00
RageLtMan
95da031429
Remove vestigial conditional - thx Egypt
2016-02-13 14:45:25 -05:00
Metasploit
93cc7d58ba
Bump version of framework to 4.11.11
2016-02-12 15:38:50 -08:00
Kyle Gray
88e1124519
Land #6568 , fix for msfvenom symlink not working
...
In installer environments, $0 doesn't match __FILE__ because of the way the gem's binstub wrapper calls it.
2016-02-12 12:35:00 -06:00
James Lee
541e3972f0
No real reason for this check
...
And it breaks stuff when msfvenom is run as a symlink
2016-02-12 10:49:18 -06:00
wchen-r7
b2765a296f
Land #6547 , IBM Tivoli Storage Manager Fastback Denial of Service
2016-02-11 22:05:21 -06:00
wchen-r7
3121093898
Update metadata, plus other minor changes
2016-02-11 22:04:05 -06:00
William Vu
1ec87d6250
Land #6565 , top 100 Adobe passwords
2016-02-11 13:15:52 -06:00
nk
bc74ceb8c5
Handle errors when parsing interfaces.xml, add check for several locations
2016-02-11 15:56:58 +01:00
Tim
e738b5922d
fix play_youtube to work on Android
2016-02-11 07:16:40 +00:00
Tim
9791e66683
fix remove_lock to work with 4.3 devices
2016-02-11 07:10:05 +00:00
Brent Cook
e8cc818126
Land #6516 , allow Android meterpreter to launch activities
2016-02-10 23:22:29 -06:00
Brent Cook
ed5cf821b2
bump payloads to 1.1.0
2016-02-10 23:21:20 -06:00
Brent Cook
db19a7d9b3
Merge branch 'upstream-master'
2016-02-10 23:15:21 -06:00
Brent Cook
d22d51ffc5
Land #6480 , add Meterpreter message obfuscation
2016-02-10 22:58:01 -06:00
Brent Cook
ff1cb4a2a4
update payload sizes
2016-02-10 22:44:17 -06:00
Brent Cook
27ec6a861c
update gemfile.lock
2016-02-10 22:41:41 -06:00
OJ
4ac7c5e298
Updaed the gemspec to point to the new payloads gem
2016-02-11 14:36:17 +10:00
OJ
44eb2d6a80
Merge branch 'upstream/master' into default-xor
2016-02-11 14:30:18 +10:00
Jay Turla
aeb1d80e0d
Adding top 100 adobe passwords
2016-02-11 08:55:45 +08:00
Nicholas Starke
cdaa2a8c43
Adding Apache Karaf Command Execution Module
...
This module establishes an SSH session using default
credentials and then executes a user defined operating system
command. This is part of GitHub Issue #4358 .
2016-02-10 16:48:08 -06:00
Nicolas Devillers
8118198628
Add vprint of the exception message
2016-02-10 22:47:51 +01:00
nk
1637891ece
Add check for the uninstall location in vnc post module
2016-02-10 20:30:41 +01:00
Brent Cook
2386cb1344
Land #6527 , add support for importing Burp suite vuln exports
2016-02-10 13:19:21 -06:00
William Webb
c874699b82
removed ranking
2016-02-10 11:45:09 -06:00
William Webb
4c6cb03548
more build errors
2016-02-10 11:40:21 -06:00
William Webb
72f5a33804
addressed CI errors
2016-02-10 11:34:05 -06:00
Josh Hale
62dd82e653
Make fix easier to read
2016-02-10 11:24:45 -06:00
William Webb
51604fa24a
made necessary inheritance changes
2016-02-10 10:59:11 -06:00
William Vu
fc491ffa3e
Land #6555 , Content-Length fix for HP modules
2016-02-10 10:39:08 -06:00