Commit Graph

29325 Commits (d311059e75b7be8f0a832a15546808f398cad5f1)

Author SHA1 Message Date
sinn3r d311059e75 Fix DYNAMIC_BASE templates 2014-12-11 20:44:03 -06:00
Jon Hart 24dbc28521
Land #4356 2014-12-11 09:03:18 -08:00
Tod Beardsley 0eea9a02a1
Land #3144, psexec refactoring 2014-12-10 17:30:39 -06:00
Marc Wickenden 245b76477e Fix issue with execution of perl due to gsub not matching across newlines 2014-12-10 21:38:04 +00:00
Spencer McIntyre 86ae104580
Land #4325, consistent mssql module names 2014-12-09 21:52:05 -05:00
sinn3r 87c83cbb1d Another round of name corrections 2014-12-09 20:16:24 -06:00
sinn3r 2d1bc9b039
Land #4346 - Msfvenom should pass the datastore to encoders too 2014-12-09 19:41:19 -06:00
Samuel Huckins 776bad9033
Lands #4342, update to metasploit-credential 2014-12-09 18:33:30 -06:00
David Maloney 703f6128e6
update lock file 2014-12-09 15:37:40 -06:00
Spencer McIntyre d74a8f6c41 Include the datastore options for the encoder too 2014-12-09 16:32:41 -05:00
HD Moore 176296681a
Fix heartbleed cert parsing, lands #4338, closes #4309 2014-12-09 14:58:27 -06:00
Tod Beardsley ec53498aca
Land #4333 with URL pointer, ty @wchen-r7
Long live msfvenom!

People who have a bug or complaint about msfencode or msfpayload should
be pointed at http://r-7.co/msfvenom-2015

See #4326 (and close it?)
2014-12-09 13:17:11 -06:00
Tod Beardsley 3bc40b8fe4
Add a link to PR #4333 in the message
That way, people can see why this is if they care to.

While we have a link to the blog post at http://r-7.co/msfvenom-2015 , I
fear that by the time spring of 2015 rolls around, we'll be on a
different blogging platform and the link may be busted. I'm certain
we'll still be on GitHub then, though.
2014-12-09 13:04:35 -06:00
sinn3r c670bb72df
Land #4337 - Fix prompt coloring on Windows 2014-12-09 11:53:35 -06:00
David Maloney 7d37756e64
pull latest version of Metasploit-Credential
fixes multi-threaded handling of uniqueness validations
around credential objects

MSP-11757
2014-12-09 11:39:24 -06:00
Brent Cook 5f2de2eae6
Land #4329, zeroSteiner's error messages for python meterpreter 2014-12-09 11:16:41 -06:00
Spencer McIntyre 0ee20561d4 Remove file exists check from stdapi_fs_delete_file 2014-12-09 11:03:57 -06:00
Spencer McIntyre 42710cc32e Error messages for the python meterpreter 2014-12-09 11:03:57 -06:00
sinn3r bb8dfdb15f Ensure consistency for mssql modules 2014-12-09 10:28:45 -06:00
Christian Mehlmauer 916503390d
use get_data 2014-12-08 22:49:02 +01:00
Christian Mehlmauer fb9724e89d
fix heartbleed cert parsing, fix #4309 2014-12-08 21:58:38 +01:00
Luke Imhoff 5f730277cf
Fix prompt coloring on Windows
MSP-11669

Set output stream for RbReadline (rl_outstream) to the
Rex::Ui::Text::Output::Stdio, which will use translate the ANSI color
escapes to set_color calls in Windows.
2014-12-08 14:31:00 -06:00
William Vu 4a47f0fd28
Land #4334, @todb-r7's cosmetic fixes 2014-12-08 12:03:32 -06:00
Tod Beardsley 909971e0bf
Margins on description, PowerShell not Powershell 2014-12-08 10:57:49 -06:00
Tod Beardsley 80dc781625
Email over E-mail
While I believe "e-mail" is the actually correct spelling, we tend to
say "email" everywhere else. See:

````
todb@mazikeen:~/git/rapid7/metasploit-framework$ grep -ri "print.*email"
modules/ | wc -l
19
[ruby-2.1.5@metasploit-framework](fixup-grammar)
todb@mazikeen:~/git/rapid7/metasploit-framework$ grep -ri
"print.*e-mail" modules/ | wc -l
1
````
2014-12-08 10:55:26 -06:00
sinn3r d8da4700ea Deprecate msfpayload and msfencode
See #4326, but it does not close it.
2014-12-08 10:49:12 -06:00
Christian Mehlmauer 738fc78883
Land #4220, outlook gather post module 2014-12-07 22:41:28 +01:00
jvazquez-r7 37fbe963b5
Land #3729, @us3r777's Jboss deploymentfilerepository refactoring 2014-12-06 21:51:27 -06:00
jvazquez-r7 54705eee48 Fix option parsing 2014-12-06 21:50:54 -06:00
jvazquez-r7 19effa7eb9 Fix feedback's review 2014-12-06 21:47:55 -06:00
jvazquez-r7 21742b6469 Test #3729 2014-12-06 21:20:52 -06:00
wez3 e7503bf69f Merge pull request #2 from FireFart/outlook_fix
Outlook fix
2014-12-06 12:08:06 +01:00
Christian Mehlmauer cc63d435c7
another whitespace 2014-12-06 09:32:22 +01:00
William Vu 1cc6dc61cd
Land #4286, rm documentation
Moved to GitHub.
2014-12-05 17:52:45 -06:00
Christian Mehlmauer f0a47f98bc
final formatting 2014-12-06 00:38:05 +01:00
Christian Mehlmauer f1f743804e
more formatting 2014-12-06 00:31:38 +01:00
Christian Mehlmauer 9187a409ec
outlook post module fixes 2014-12-06 00:28:44 +01:00
Jon Hart 39790a95a0
Land #4313, @wchen-r7's fix for #4304 2014-12-05 15:08:35 -08:00
Jon Hart da92e4705c
Land #4319, @wchen-r7's fix for #4307 2014-12-05 12:08:39 -08:00
William Vu 2f98a46241
Land #4314, @todb-r7's module cleanup 2014-12-05 14:05:09 -06:00
William Vu 38d1b21eba
Land #4303, Travis build blacklist
gh-pages, metakitty
2014-12-05 14:03:38 -06:00
Tod Beardsley 0431720a07
Land #4294, msfconsole speedups on module load
Related to #4257 and #4195 vaguely, and possibly even #4147.
2014-12-05 13:45:11 -06:00
sinn3r 4b06334455 Minor title change for mssql_enum_domain_accounts_sqli
We don't really do "-" for naming

Kind of stands up on a list
2014-12-05 11:42:08 -06:00
sinn3r abf199f924 Remove junk code 2014-12-05 11:01:34 -06:00
Jon Hart 85e0d72711
Land #4229, @tatehansen's module for CVE-2014-7992 2014-12-04 17:20:49 -08:00
Jon Hart f0cfcd4faf
Update dlsw_leak_capture name and print_
This makes it more obvious exactly what is being scanned for
2014-12-04 17:20:01 -08:00
sinn3r cfc1acfcae Fix #4307 - Check action for nil
Auxiiary modules already do this, but looks like we forgot to do the
same for post modules.

I also changed the error to allow "reason" in order to be more
informative about what the user should do.

Fix #4307
2014-12-04 17:07:59 -06:00
Tod Beardsley 9f42dbd51c
Land #4317 and #4306, fix netmask tomfoolery 2014-12-04 16:28:54 -06:00
Brent Cook 051d2f1c39
Land #4302, zeroSteiner's fix getuid for the python meterpreter 2014-12-04 16:11:55 -06:00
Jon Hart 743e9fca9d
Correctly set default SECRET 2014-12-04 14:06:22 -08:00