Commit Graph

48281 Commits (c89d8f8fb7ef1f3ad540ed72429a482e59a98958)

Author SHA1 Message Date
Matthew Kienow 81f1555439
Rename module, exploits multiple printer models 2018-08-23 15:23:40 -04:00
Matthew Kienow df18e354e1
Add bind_busybox_telnetd payload, misc cleanup 2018-08-23 15:23:39 -04:00
Matthew Kienow c0c3e12c74
WIP - hp officejet pro exploit, enhance PJL lib 2018-08-23 14:53:54 -04:00
James Barnett 724e0dcaf3
Add ability to connect to saved data services 2018-08-22 17:16:27 -05:00
William Vu 9b3e0d8306 Add additional root tags for GPP XML
Finally ran through all the samples and cross-referenced with MS14-025.

https://msdn.microsoft.com/en-us/library/cc232650.aspx
https://support.microsoft.com/en-us/help/2962486/ms14-025-vulnerability-in-group-policy-preferences-could-allow-elevati
2018-08-22 16:48:33 -05:00
William Vu 2891255549 Clarify what is being imported currently
Since the parser is focused on creds.
2018-08-22 15:53:19 -05:00
Metasploit 520ed188e6
automatic module_metadata_base.json update 2018-08-22 12:58:40 -07:00
William Vu 36e35d116d
Land #10510, full disclosure for CVE-2018-15473 2018-08-22 14:51:05 -05:00
William Vu 578d2375d7 Add full disclosure for CVE-2018-15473 2018-08-22 14:49:13 -05:00
William Vu 1e4eb0eae0 Revert report_note, since it added nothing
A bit of misunderstanding. We're in agreement that loot was enough.
2018-08-22 14:34:09 -05:00
William Vu 6fa04950ee Store parsed GPP data as a note
And refactor slightly.
2018-08-22 14:19:50 -05:00
William Vu b1c633faf6 Add Group Policy Preferences support to db_import
And take the Jaden Smith approach, as @busterb quipped to me. :)

This one's a little weird, since you normally import scans into
Metasploit, but now that creds are first-class in the database, it makes
more sense to be able to import them.

Currently, your alternatives are post/windows/gather/credentials/gpp,
which requires a session, and auxiliary/scanner/smb/smb_enum_gpp, which
requires a network scan.
2018-08-21 23:44:39 -05:00
James Barnett 68aca395a4
Remove debug logging 2018-08-21 15:06:30 -05:00
James Barnett 57243106f7
Connect to the default database on startup 2018-08-21 14:29:20 -05:00
James Barnett b6401dbe56
Add db_save command 2018-08-21 11:10:43 -05:00
Wei Chen 080ba15179 Another boo-boo 2018-08-21 08:55:14 -05:00
Wei Chen b899839c53 Oops I made boo-boos 2018-08-21 08:53:43 -05:00
Wei Chen 2780ae6ba9 Update false negatives 2018-08-21 08:50:26 -05:00
Jacob Robles fd6880d0d0
Add Foxit Reader UAF Module and Docs 2018-08-21 08:21:51 -05:00
William Vu 682b0863be
Land #10500, stack trace fix for jobs -K 2018-08-20 22:27:31 -05:00
William Vu 321f2b8746 Improve file operations
Hmm, why did I not use File.write before? Oh well, fixed.
2018-08-20 22:25:19 -05:00
Green-m 808e2f2e25 Fix issue #10499 2018-08-21 03:08:14 +00:00
Green-m edb85614ff Make code cleaner 2018-08-21 03:05:44 +00:00
Metasploit 230433cf79
automatic module_metadata_base.json update 2018-08-20 17:36:50 -07:00
William Vu 2fe6bd0e98
Land #10498, module doc for ssh_enumusers 2018-08-20 19:30:29 -05:00
William Vu 06582a00a0 Add module doc for ssh_enumusers
And update description in module.
2018-08-20 19:26:51 -05:00
asoto-r7 bc3b317963
Land #10449, Implementation of download/upload file in reverse shell 2018-08-20 19:10:26 -05:00
asoto-r7 4aee3a4ae2
Land #10448, Implementation of CTRL+C to send SIGINT signal 2018-08-20 18:14:29 -05:00
Wei Chen ad0291e552 Update false negatives 2018-08-20 18:08:19 -05:00
Metasploit b003fc0273
automatic module_metadata_base.json update 2018-08-20 15:37:28 -07:00
Brent Cook 11fee8fa2c
Land #10471, Import target DefaultOptions into the datastore 2018-08-20 17:30:27 -05:00
Metasploit 4dac915a35
automatic module_metadata_base.json update 2018-08-20 15:29:45 -07:00
Brent Cook 9ba40cdc9e
Land #10497, Add Lumpy Space password, whatever. 2018-08-20 17:19:02 -05:00
Brent Cook d1b8846f12
Land #10479, Add CVE-2018-15473 to ssh_enumusers 2018-08-20 17:14:58 -05:00
William Vu 819b8504e2 Add a little better randomization 2018-08-20 17:10:14 -05:00
Tod Beardsley feb4b78227
Add Lumpy Space Princess's password
http://adventuretime.wikia.com/wiki/Trouble_in_Lumpy_Space
2018-08-20 16:28:21 -05:00
Tod Beardsley 10d5f32b92 None of these should be executable 2018-08-20 16:25:34 -05:00
William Vu b38a442bb0 Refactor once more with feeling
Also flesh out malformed-packet auth method. Let's not be lazy here. :-)
2018-08-20 16:25:32 -05:00
Wei Chen 01ad152067 Update false negatives on post auth information 2018-08-20 16:05:58 -05:00
Metasploit bf94a33a7b
automatic module_metadata_base.json update 2018-08-20 14:01:33 -07:00
Brent Cook 484c340520
Land #10491, fix error generating PPC NOPS 2018-08-20 15:54:17 -05:00
Brent Cook e8af2dd67c bool params are truthy, don't cast to a string 2018-08-20 15:53:49 -05:00
Brent Cook fb2d3bfd4a
Land #10492, show help when no argument is provided to `show` 2018-08-20 15:46:29 -05:00
Brent Cook 627fa786a5
Land #10493, update help for show and search commands 2018-08-20 15:45:22 -05:00
Wei Chen 3d0d8f7773 Update false negatives on post auth information 2018-08-20 15:43:07 -05:00
James Barnett 3fadc64fb2 Don't set the workspace to default if it is already set 2018-08-20 14:35:06 -05:00
Auxilus 8869604143
update help for show and search 2018-08-21 00:17:57 +05:30
Auxilus e8c0638092
Update modules.rb 2018-08-20 23:36:57 +05:30
Auxilus 0e594266e9
show help when no argument is provided to `show` 2018-08-20 23:32:34 +05:30
Auxilus 7c3810bbff
fix match error in ppc simple nop generator
before changes:
```
msf5 nop(ppc/simple) > generate 10
[-] Sled generation failed: undefined method `match' for true:TrueClass.
```

After changes
```
msf5 nop(ppc/simple) > generate 10
buf =
"\x7c\xf6\xc2\x15\x7c\xf6\xc2\x15"
```
2018-08-20 23:16:32 +05:30