OJ
92e5931631
Land #5708 : Update to metasploit-payloads 1.0.7
2015-07-13 15:35:31 +10:00
Brent Cook
b782e3fc0f
update to metasploit-payloads 1.0.7
...
This includes a couple of transport fixes for posix meterpreter and some
robustness fixes when flushing reverse_tcp sockets.
2015-07-13 00:13:02 -05:00
OJ
4fc258ec0c
Remove duplicate entries, allow for output to file
...
This commit does a few tidies of code, as well as adds the ability to
write all the kiwi output to disk as well as to the console. We can't
yet add this stuff to the credential DB because it's tied to machine,
where the creds that come out of kiwi are often tied to domains.
This also removes duplicate creds from the output list, and gets rid of
the auth id stuff from the output too (not sure why it was useful
before).
2015-07-13 14:17:31 +10:00
wchen-r7
88a00b1ed8
We don't use MessagePack anymore
2015-07-12 14:45:46 -05:00
wchen-r7
e638d85f30
Merge branch 'upstream-master' into bapv2
2015-07-12 02:01:09 -05:00
wchen-r7
a7424c93a0
Update BES rspec
2015-07-12 01:26:43 -05:00
wchen-r7
8d40d30d47
Comemnt
2015-07-11 23:24:01 -05:00
wchen-r7
88357857a0
These datastore options don't need to set anymore
2015-07-11 23:22:05 -05:00
wchen-r7
eabf561a1f
Fix some BES rspec
2015-07-11 22:16:10 -05:00
wchen-r7
5a858d68a5
Add rspec for browser_profile_manager
2015-07-11 21:11:31 -05:00
wchen-r7
b2d723e4a3
Rspec
2015-07-11 19:13:20 -05:00
g0tmi1k
d795b2f831
Module cleanup
2015-07-11 19:40:21 +01:00
g0tmi1k
a4dc409c12
Add empty default vprint value
2015-07-11 19:38:27 +01:00
g0tmi1k
14d0d456f4
Fix FileZilla perm loot bug
2015-07-11 19:11:59 +01:00
g0tmi1k
c92d0d9df6
Fix FileZilla Server
2015-07-11 18:14:55 +01:00
wchen-r7
8bb7496f30
Land #5699 , lower the ranking for CVE-2015-5122
2015-07-11 02:08:17 -05:00
wchen-r7
f7ce6dcc9f
We agreed to Normal
2015-07-11 02:07:18 -05:00
wchen-r7
0ff7333090
Lower the ranking for CVE-2015-5122
...
As an initial release we forgot to lower it.
2015-07-11 02:05:56 -05:00
wchen-r7
1866ea0880
Land #5698 , Adobe Flash CVE-2015-5122 opaqueBackground
2015-07-11 01:38:43 -05:00
wchen-r7
1289ec8863
authors
2015-07-11 01:38:21 -05:00
wchen-r7
6eabe5d48c
Update description
2015-07-11 01:36:26 -05:00
wchen-r7
54fc712131
Update Win 8.1 checks
2015-07-11 01:33:23 -05:00
jvazquez-r7
6f0b9896e1
Update description
2015-07-11 00:56:18 -05:00
jvazquez-r7
115549ca75
Delete old check
2015-07-11 00:42:59 -05:00
jvazquez-r7
299978d0e2
Put again old exploiter
2015-07-11 00:36:32 -05:00
jvazquez-r7
63005a3b92
Add module for flash CVE-2015-5122
...
* Just a fast port for the exploit leaked
* Just tested on win7sp1 / IE11
2015-07-11 00:28:55 -05:00
wchen-r7
b1208e1337
Pending rspec
2015-07-11 00:16:48 -05:00
Brent Cook
7d55e86bdc
Land #5691 , bump to metasploit-payloads-1.0.6
2015-07-10 22:30:44 -05:00
Brent Cook
226137896e
updated cached payload sizes
2015-07-10 22:30:20 -05:00
jvazquez-r7
5a045677bc
Add waiting message
2015-07-10 18:48:46 -05:00
jvazquez-r7
8d52c265d9
Delete wfsdelay
2015-07-10 18:46:27 -05:00
jvazquez-r7
63e91fa50f
Add reference
2015-07-10 18:46:06 -05:00
jvazquez-r7
677cd97cc2
Update information
2015-07-10 18:39:11 -05:00
jvazquez-r7
6c6a778218
Modify arkeia_agent_exec title
2015-07-10 18:38:25 -05:00
jvazquez-r7
4995728459
Modify arkeia_agent_exec ranking
2015-07-10 18:37:24 -05:00
jvazquez-r7
858f63cdbf
Land #5693 , @xistence VNC Keyboard EXEC module
2015-07-10 18:35:44 -05:00
jvazquez-r7
1326a26be5
Do code cleanup
2015-07-10 18:35:13 -05:00
Brent Cook
8349a274ea
use and include git hash of Framework as part of the version
...
Because we do not always update the version number, multiple releases have
shown version string, which is not useful for helping debug issues, or for
knowing what features are enabled.
This adds the git hash or reads from a file a copy of the git hash (useful for
doing packaged builds without git) so that it is clear the origin of a
particular metasploit-framework version.
2015-07-10 18:03:37 -05:00
jvazquez-r7
917282a1f1
Fix ranking
2015-07-10 17:49:15 -05:00
jvazquez-r7
e063e26627
Land #5689 , @xistence's module for Western Digital Arkeia command injection
2015-07-10 17:11:35 -05:00
jvazquez-r7
bdd8b56336
fix comment
2015-07-10 16:28:20 -05:00
jvazquez-r7
95ae7d8cae
Fix length limitation
2015-07-10 16:24:49 -05:00
Mo Sadek
3347b90db7
Land #5676 , print_status with ms14_064
2015-07-10 14:40:49 -05:00
jvazquez-r7
29a497a616
Read header as 6 bytes
2015-07-10 14:25:57 -05:00
wchen-r7
c8c3e1a258
Fix rspec
2015-07-10 13:42:25 -05:00
wchen-r7
89aa00cfc4
Check job workspace
2015-07-10 13:09:42 -05:00
jvazquez-r7
bed3257a3f
Change default HTTP_DELAY
2015-07-10 12:50:26 -05:00
jvazquez-r7
c9d2ab58d3
Use HttpServer::HTML
...
* And make the exploit Aggressive
2015-07-10 12:48:21 -05:00
wchen-r7
086de2c030
Pass more options
2015-07-10 12:39:43 -05:00
wchen-r7
513dcf3574
We don't need these methods anymore
2015-07-10 12:12:53 -05:00