William Vu
bab32d15f3
Address @wchen-r7's comments
2014-01-09 01:03:00 -06:00
William Vu
1c889beada
Add Rex::Proto::PJL and PoC modules
2014-01-09 01:03:00 -06:00
jvazquez-r7
4e581a35ac
Fix encoder architecture
2014-01-08 16:18:30 -06:00
jvazquez-r7
590547ebc7
Modify title to avoid versions
2014-01-07 13:01:10 -06:00
Joe Vennix
c34af35230
Add wrt100 to the description and title.
...
* The wrt110 and wrt100 share the same firmware, and are both vulnerable to this
bug.
2014-01-07 10:26:15 -06:00
Tod Beardsley
c0a82ec091
Avoid specific versions in module names
...
They tend to be a lie and give people the idea that only that version is
vulnerable.
2014-01-06 13:47:24 -06:00
sinn3r
1cdfbfeed5
Land #2820 - vTigerCRM SOAP AddEmailAttachment Arbitrary File Upload
2014-01-06 10:36:02 -06:00
Tod Beardsley
cd38f1ec5d
Minor touchups to recent modules.
2014-01-03 13:39:14 -06:00
William Vu
2d25781cf0
Land #2804 for real (thanks, @jvazquez-r7!)
...
It was the wrong time to mess with my workflow.
2014-01-02 16:39:02 -06:00
William Vu
67a796021d
Land #2804 , IBM Forms Viewer 4.0 exploit
2014-01-02 16:10:02 -06:00
jvazquez-r7
eaeb457d5e
Fix disclosure date and newline as pointed by @wvu-r7
2014-01-02 16:08:44 -06:00
jvazquez-r7
3f0ee081d9
Beautify description
2014-01-02 15:37:58 -06:00
jvazquez-r7
d5e196707d
Include Msf::Post::Windows::Error
2014-01-02 13:41:37 -06:00
jvazquez-r7
ec8d24c376
Update against upstream
2014-01-02 12:55:46 -06:00
jvazquez-r7
3bccaa407f
Beautify use of Regexp
2014-01-02 12:54:54 -06:00
jvazquez-r7
90158b9932
Land #2791 , @morisson's support to remote dns resolution on sap_router_portscanner
2014-01-02 12:19:50 -06:00
jvazquez-r7
f75782bc2f
Use RHOST, RPORT for the SAPROUTER options
2014-01-02 12:18:54 -06:00
jvazquez-r7
1b893a5c26
Add module for CVE-2013-3214, CVE-2013-3215
2014-01-02 11:25:52 -06:00
William Vu
d291cd92d7
Land #2817 , icofx_bof random things
2014-01-01 22:01:48 -06:00
Tod Beardsley
b8e17c2d8e
Don't use Pcap.lookupaddrs any more
2014-01-01 18:50:15 -06:00
jvazquez-r7
b4439a263b
Make things random
2013-12-31 16:06:25 -06:00
sinn3r
184bd1e0b2
Land #2815 - Change gsub hardtabs
2013-12-31 15:58:21 -06:00
jvazquez-r7
2252a037a5
Fix disclosure date
2013-12-31 14:51:43 -06:00
jvazquez-r7
3775b6ce91
Add module for CVE-2013-4988
2013-12-31 14:43:45 -06:00
jvazquez-r7
841f67d392
Make adobe_reader_u3d also compliant
2013-12-31 11:07:31 -06:00
jvazquez-r7
7f9f4ba4db
Make gsubs compliant with the new indentation standard
2013-12-31 11:06:53 -06:00
bmerinofe
832b0455f1
Class constants and Regex added
2013-12-31 03:20:12 +01:00
William Vu
80a1e85235
Add :config => false to sysax_ssh_username
2013-12-30 18:13:49 -06:00
William Vu
619e6aac68
Land #2812 , missing :config => false fix
2013-12-30 18:07:33 -06:00
David Maloney
c3fd657bde
Missing config false flag
...
the sshexec exploit was missing the flag
that tells net:ssh to not use the user's
local config . This can cuase ugly problem
MSP-9262
2013-12-30 14:28:15 -06:00
jvazquez-r7
4366d4da20
Delete comma
2013-12-30 11:45:52 -06:00
jvazquez-r7
54a6a4aafa
Land #2807 , @todb-r7's armory support for bitcoin_jaker
2013-12-30 11:44:51 -06:00
bmerinofe
e3d918a8a3
Applying changes
2013-12-30 01:49:13 +01:00
Tod Beardsley
88cf1e4843
Default false KILL_PROCESSES for bitcoin_jacker
...
I seem to able to read associated wallet files while these processes are
running with the greatest of ease. Maybe there was a file locking
concern, but I haven't run into it. Feel free to avoid landing this
particular commit if you disagree.
2013-12-29 14:12:00 -06:00
Tod Beardsley
5e0c7e4741
DRY up bitcoin_jacker.rb, support Armory
...
Also, make the process killing optional.
2013-12-29 13:07:43 -06:00
TabAssassin
9384a466c1
Retab bitcoin_jacker.rb
2013-12-29 10:59:15 -06:00
Tod Beardsley
6fcd12e36c
Refactor for clearer syntax and variables
...
This was done on a barely configured Windows machine, so mind the tabs.
2013-12-29 10:15:48 -06:00
Tod Beardsley
ef73ca537f
First, clean up the original a little
2013-12-28 18:57:04 -06:00
sinn3r
f2335b5145
Land #2792 - SSO/Mimikatz module overwrites password with N/A
2013-12-27 17:25:44 -06:00
jvazquez-r7
57d60c66f9
Add masqform version as comment
2013-12-27 10:59:23 -06:00
jvazquez-r7
341e3c0370
Use rexml
2013-12-27 10:55:36 -06:00
jvazquez-r7
ee35f9ac30
Add module for zdi-13-274
2013-12-27 10:20:44 -06:00
Tod Beardsley
d6a63433a6
Space at EOL
2013-12-26 10:37:18 -06:00
Tod Beardsley
5ce862a5b5
Add OSVDB
2013-12-26 10:33:46 -06:00
Tod Beardsley
c34a5f3758
Unacronym the title on Poison Ivy C&C
2013-12-26 10:30:30 -06:00
Tod Beardsley
47765a1c4f
Fix chargen probe title, comment on the CVE
2013-12-26 10:29:11 -06:00
Tod Beardsley
056661e5dd
No at-signs in names please.
2013-12-26 10:26:01 -06:00
jvazquez-r7
b02e21a1d3
Land #2779 , @wchen-r7's mod to raise Msf::OptionValidateError when PORTS is invalid
2013-12-26 09:27:27 -06:00
sinn3r
78db7429d0
Turns out the latest Safari is still vulnerable.
...
The version check is currently disabled because turns out the latest
Safari (6.1.1) is still vulnerable - I can still loot it in plain
text.
2013-12-24 19:27:45 -06:00
sinn3r
a26e12b746
Updates descriiption and improves regex for safari_lastsession.rb
...
This updates two things for the safari_lastsession post module:
1. The description is updated: More information is added to describe
how Safari would end up storing the Gmail credential in the last
session state, and what it means to you as an attacker.
2. Regex update for the domain to search for: Before the module starts
extract the session data, it needs to know which domain to extract from.
Originally I only added mail.google.com, but turns out the sensitive info
can be found in accounts.google.com, so I added that one.
2013-12-24 14:00:55 -06:00