Commit Graph

45448 Commits (bb8fd45cb2639940f632765a5d4ac0fdad6a641b)

Author SHA1 Message Date
Brent Cook eaca91cad7
Land #9572, add bind_named_pipe tests 2018-02-16 20:47:24 -06:00
Jeffrey Martin 0acc5fed20
add missing payload tests for bind_named_pipe 2018-02-16 18:05:45 -06:00
Brent Cook 4a631714f5
Land #9571, specify a python encoding for the claymore DoS module 2018-02-16 16:39:34 -06:00
Brent Cook 4fc4b77a8b
Land #9570, properly handle when there is no stat callback specified on upload 2018-02-16 16:39:06 -06:00
Brent Cook ac7fe99a2b specify a python encoding for the module 2018-02-16 16:17:52 -06:00
Brent Cook bd2af0143a properly handle when there is no stat callback specified on upload 2018-02-16 16:14:09 -06:00
Brent Cook 289277c613
Land #9516, Support Bash-Style Continuation Lines 2018-02-16 10:53:58 -06:00
Brent Cook 242f2d3117
Land #9512, Add Claymore Dual GPU Miner<= 10.5 DoS module 2018-02-16 10:46:48 -06:00
Christian Mehlmauer d19ee7a403
docker error workaround 2018-02-16 17:39:20 +01:00
RageLtMan 354eb4092a Reverse TCP x64 RC4 via max3raza's rc4_x64 asm
To round out the work done by mihi for x86 stages back in the day,
this PR provides x64 Windows stage encryption in RC4 via assembly
written/modified by max3raza during adjacent work on DNS tunneled
transport.

Stage encryption differs from encoding in that there is no decoder
stub or key materiel carried with the stage which can be used by
defensive systems to decode and identify the contents. Persistence
payloads, oob-delivered stage0, and other contexts benefit heavily
from this as their subsequent stage is difficult to detect/identify,
and the chance of accidental execution of the wrong payload/stage
is drastically reduced if separate keys are in play for individual
targets - acquiring the wrong stage will result in decryption
failure and prevent further execution.

For historical context, all of the RC4 stagers implement in-place
decryption via stage0 for the contents of stage1 using the provided
passphrase converted to a key and embedded in stage0 as part of the
payload.

Testing:
  In-house testing with Max - we got sessions, loaded extensions.

Notes:
  All credit for the work goes to Max3raza - big ups for getting
this knocked out.
2018-02-16 05:15:05 -05:00
Brent Cook 6734e532f5
Land #9562, avoid an error with aux module command dispatcher 2018-02-15 17:46:58 -06:00
Brent Cook a197997aca avoid chinese finger trap logic, put it all on one side 2018-02-15 17:45:09 -06:00
Brent Cook 25d2b551d8
Land #9539, add bind_named_pipe transport to Windows meterpreter 2018-02-15 17:39:32 -06:00
Brent Cook d28f6888b2 bump payloads, include bind_named_pipe support 2018-02-15 17:37:33 -06:00
Wei Chen b533ec6019
Land #9509, Ulterius Server < v1.9.5.0 Directory Traversal
Land #9509
2018-02-15 16:34:31 -06:00
Wei Chen 949b474a0a Avoid target_uri.path
It doesn't look like target_uri.path is suitable for this scenario,
because it causes our input to be modified and hard to use.
2018-02-15 16:31:09 -06:00
Brent Cook 38b03fdfff Merge branch 'upstream-master' into land-9539- 2018-02-15 16:22:13 -06:00
Wei Chen 5467f4c97e Add header 2018-02-15 16:19:54 -06:00
Quentin Kaiser e86169c217 Clean up Telnet IAC negotation and xplain obscure hex bytes. 2018-02-15 23:08:17 +01:00
Brent Cook c4c864f391
Land #9558, Fix #9417, map timeout exp to a var for telnet_encrypt_overflow 2018-02-15 15:54:23 -06:00
Brent Cook 2d3aef9031
Land #9533, Add output file support to the vulns command 2018-02-15 15:52:25 -06:00
Brent Cook 67dc579fd3
update magic numbers 2018-02-15 15:10:26 -06:00
Brent Cook ae684c1002
Land #9564, honoring retry counts for x86/64 Windows reverse_tcp payloads 2018-02-15 14:37:23 -06:00
Brent Cook 93450b87dd use common retry options for UDP 2018-02-15 14:36:21 -06:00
Wei Chen 6fe8691528 Fix #9090, honoring retry counts for x86/64 payloads
Fix #9090
2018-02-15 13:52:34 -06:00
Brent Cook 0f656d6b5b
Land #9563: improve memory usage on meterpreter file upload 2018-02-15 12:07:19 -06:00
Brent Cook 5b88f27e2b
Land #9560, Fix undef method 'gsub' in bavision_cam_login 2018-02-15 11:36:45 -06:00
a1exdandy 7e03bf838b Fix src_size view 2018-02-15 17:44:41 +05:00
a1exdandy a0c473f29e Upload memory usage optimization
Optimize xor_bytes memory usage, use small buffer for upload,
add verbosity
2018-02-15 17:05:22 +05:00
Daniel Teixeira 651ddbb7eb
Disk Savvy Server Buffer Overflow 2018-02-15 10:09:07 +00:00
RageLtMan 177e1321ae Aux command dispatcher in exploit ctx with action
The Auxiliary command dispatcher checks modules for passive actions
expecting them to have included Msf::Module::HasActions mixin. The
mixin is included in post and aux modules already, but not in
exploits. When the aux dispatcher handles an exploit module, it
may get upset along the lines of:
```
[-] Error while running command exploit: undefined method 'passive'
for #<Msf::Modules::M...3::MetasploitModule:0x0000000d83de0428>
Did you mean?  passive?

Call stack:
/opt/metasploit4/msf4/lib/msf/ui/console/command_dispatcher/
auxiliary.rb:106:in `cmd_run'
```

Avoid this mess by having the conditional which checks the methods
included by that mixin depend on the module having included the
mixin in the first place.

Testing:
  In local fork (hence the lineno) it seems to fix the problem.
  The problem condition and fix should be independently tested
upstream.
2018-02-15 04:20:09 -05:00
Daniel Teixeira 630e9dd0de
Verification steps update 2018-02-14 20:40:32 +00:00
Daniel Teixeira 929027ab96
Disk Savvy Server Buffer Overflow 2018-02-14 20:35:32 +00:00
Daniel Teixeira 07763ccd6a
Disk Savvy Server Buffer Overflow Documentation 2018-02-14 20:35:03 +00:00
Brent Cook d5ab7b127b
Land #9557, add back udp_probe for now 2018-02-14 11:24:21 -06:00
Wei Chen 9a293cd30e Fix #8120, Fix undef method 'gsub' in bavision_cam_login
Fix #8120
2018-02-14 11:03:03 -06:00
Wei Chen ef948ccc38 Fix #9417, map timeout exp to a var for telnet_encrypt_overflow
Fix #9417
2018-02-14 09:19:28 -06:00
HD Moore 7cfc17860d udp_probe is necessary for pivot scans 2018-02-14 08:45:46 -06:00
HD Moore ef13f01820 Remove actually deprecated modules 2018-02-14 08:43:20 -06:00
HD Moore 234f5a316b Revert "Remove old deprecated modules"
This reverts commit a2c5cc0ffb.
2018-02-14 08:42:44 -06:00
Jacob Robles 9611bfdd01
Land #9547, Delete meterpreter scripts, imporve spelling 2018-02-14 02:24:07 -06:00
Spencer McIntyre 5063415b79
Land #9552, add private_type for stored tomcat pw
Fixes #9513
2018-02-13 19:25:27 -05:00
Quentin Kaiser 5fbeb74f0c Remove osx platform and fix date. 2018-02-13 23:57:53 +01:00
Quentin Kaiser 0259e794ba OSGi console remote command execution. 2018-02-13 23:38:18 +01:00
Jeffrey Martin 3811665b69
Land #7699, Add UDP handlers and payloads (redux) 2018-02-13 14:50:09 -06:00
Jeffrey Martin f5768e7ced
gate session reported when using bind udp
While this method here is somewhat noisy on the network it eliminates
a poor user experience when the handler is started but the payload is
not yet running on the target.

When a target is sent a udp packet and it is not rejected push down
an initial "echo syn" command that will respond with output.  This
allows framework to be aware that the payload is what is running on
the server port instead of assuming a non-existent target is a valid
session.
2018-02-13 14:44:57 -06:00
Jeffrey Martin d56111a33c
update cache sizes from new tests 2018-02-13 14:34:21 -06:00
Wei Chen fbeba8bfd2 Fix #9513, Add private_type to be able to store password for Tomcat
If there is no :private_type, the create_credential method in
Metasploit::Credential::Creation will quietly skip the password,
which makes it look like a bug when the user is trying to view
the password from the creds command.

Fix #9513
2018-02-13 14:31:56 -06:00
Jeffrey Martin b80445e448
add missing payload tests 2018-02-13 14:20:43 -06:00
Jeffrey Martin 2221779ddd
update package namespaces 2018-02-13 13:33:36 -06:00