Meatballs
3d0dc1a19d
Rubocop
2015-01-27 16:34:52 +00:00
Meatballs
b7e9c69f72
Fix x64 injection
2015-01-27 16:34:06 +00:00
Meatballs
215a590940
Refactor and fixes for post module
2015-01-27 16:14:59 +00:00
Meatballs
ea25869312
Refactor to common module
2015-01-27 10:47:02 +00:00
Meatballs
93537765d0
Add TODO
2015-01-26 15:59:22 +00:00
Meatballs
5ae65a723f
Initial
2015-01-26 15:57:52 +00:00
sinn3r
d7375e84ea
Move modules/post/windows/escalate/net_runtime_modify.rb
...
This module was scheduled to be removed on 01/08/2015.
Please use exploit/windows/local/service_permissions instead.
2015-01-26 00:29:43 -06:00
sinn3r
f5916eba6d
Move modules/exploits/windows/misc/psh_web_delivery.rb
...
This module was scheduled to be removed on 10/23/2014.
Please use exploit/multi/script/web_delivery instead.
2015-01-26 00:28:40 -06:00
sinn3r
bbcc2eb07d
Move modules/exploits/windows/misc/pxecploit.rb
...
This module was scheduled to be removed on 10/31/2014.
Please use exploits/windows/local/pxeexploit instead.
2015-01-26 00:25:02 -06:00
jvazquez-r7
c6901caf39
Change module location
2015-01-24 10:14:46 -06:00
jvazquez-r7
23c9d4f0fb
Do final cleanup
2015-01-23 17:54:58 -06:00
jvazquez-r7
05e803f85b
Rewrite get_wifi_info
2015-01-23 17:50:52 -06:00
jvazquez-r7
fe61b274bd
Rewrite get_router_ssid
2015-01-23 17:38:55 -06:00
jvazquez-r7
abe9c85ad6
Rewrite get_router_dhcp_info
2015-01-23 17:37:20 -06:00
jvazquez-r7
70b6f94f14
Rewrite get_router_wan_info
2015-01-23 17:32:20 -06:00
jvazquez-r7
aeed72f726
Rewrite get_router_info
2015-01-23 17:29:12 -06:00
jvazquez-r7
26b17d5556
Clean get_router_mac_filter_info
2015-01-23 17:18:07 -06:00
jvazquez-r7
a63625ab51
Refactor response parsing
2015-01-23 17:09:01 -06:00
jvazquez-r7
c9a13bda2f
Do a first easy clean up
2015-01-23 16:37:55 -06:00
jvazquez-r7
dcf0d7f596
Make msftidy happy
2015-01-23 16:23:21 -06:00
jvazquez-r7
f83b87f611
Rebase #3019
2015-01-23 16:14:01 -06:00
sinn3r
f3a2d6663f
Fix #4616 and Fix #3798 - Correctly use OptRegexp
...
This patch fixes a problem with OptRegexp. The OptRegexp class is
always forcing the value to be converted to a string first, which
causes the EXCLUDE option in browser_autopwn to kick in and match
every found autopwn module, so it ignores all of them and you load
nothing (#4616 ).
It is important to understand that nil actually represents an option
not being set, which is a completely different behavior than having
an empty value (technically "" is still a value, and if there's a
value, it means the option is set). We need to watcher for these
scenarios.
I am restoring the #default method to avoid forcing a to_s, which should
fix the browser autopwn loading problem. And then I changed scraper.rb's
default value for datastore option PATTERN to a string, because still
fixes #3798 . The way I see it, #3798 is actually a module-specific issue.
Fix #4616
Fix #3798
2015-01-23 02:38:26 -06:00
William Vu
980a010e15
Land #4627 , explicit rubygems require fix
...
And a couple extraneous comma fixes.
2015-01-22 13:49:31 -06:00
Tod Beardsley
bd06b48b30
Extra commas.
2015-01-22 13:45:08 -06:00
Tod Beardsley
2e606cd097
Don't require rubygems
2015-01-22 13:44:58 -06:00
Jon Hart
e46395f592
Land #4596 , @pdeardorff-r7's memcached extractor
2015-01-22 08:00:19 -08:00
Jon Hart
1cdcd3ccfa
Use a more consistent format in Rex table and loot for memcache
2015-01-22 07:59:48 -08:00
Jon Hart
e7c21f3205
Land #4503 , @m7x's post module for extracting McAfee VSE hashes
2015-01-21 20:44:41 -08:00
Jon Hart
9cc58a8d69
Lastly, rename the file so that it is specific to McAfee VSE
2015-01-21 20:44:34 -08:00
Jon Hart
683a541064
Tighten up prints to make it specific to VSE, not McAfee in general
2015-01-21 20:33:54 -08:00
Jon Hart
52be3d80b7
Minor ruby style cleanup
2015-01-21 20:27:38 -08:00
Jon Hart
ceed293969
Remove unnecessary requires
2015-01-21 20:23:03 -08:00
jvazquez-r7
b61538e980
Land #4291 , @headlesszeke's module for ARRIS VAP2500 command execution
2015-01-21 20:52:31 -06:00
jvazquez-r7
33195caff2
Mark compatible payloads
2015-01-21 20:52:04 -06:00
jvazquez-r7
500d7159f1
Use PAYLOAD instead of CMD
2015-01-21 20:49:05 -06:00
jvazquez-r7
f37ac39b4c
Split exploit cmd vs exploit session
2015-01-21 20:46:37 -06:00
jvazquez-r7
e1d1ff17fd
Change failure code
2015-01-21 20:38:33 -06:00
jvazquez-r7
169052af5c
Use cookie option
2015-01-21 20:37:38 -06:00
Jon Hart
f73052710d
Correct recent msftidy change in outlook gather
2015-01-21 13:27:48 -08:00
Jon Hart
46a0ec8a68
Make timeout for Powershell scripts configurable
2015-01-21 13:24:43 -08:00
pdeardorff-r7
0d4d06fb83
Print table for all scans, add preview size option
2015-01-20 11:12:47 -08:00
Jon Hart
f1bf607386
Minor Ruby style cleanup
2015-01-20 08:47:47 -08:00
Jon Hart
ef89a3d323
Add protocol reference
2015-01-20 08:34:08 -08:00
Jon Hart
9c97824d5c
Move MAXKEYS to advanced
2015-01-20 08:28:49 -08:00
Jon Hart
9d430eb1d5
Use the simpler 'version' command to get the version
2015-01-20 08:16:22 -08:00
Jon Hart
6588f92206
Move rex connection errors to vprint since this is a Scanner
2015-01-20 08:11:09 -08:00
Jon Hart
10100df054
report_service
2015-01-20 08:09:35 -08:00
Jon Hart
b0bbce1190
Include peer in most prints
2015-01-20 08:00:02 -08:00
wez3
bd0a20a717
Update outlook.rb execute_script time_out
...
I have been using the script in real life cases which have bigger e-mailboxes then in the testing environment. Because of execute_script default time_out no results return, as the powershell scripts run longer then 15 seconds. Changed the timeout to 120.
2015-01-20 11:16:37 +01:00
jvazquez-r7
f7aaad1cf1
Delete some extraneous commas
2015-01-19 17:25:45 -06:00