Metasploit
c9d7b7ac0a
automatic module_metadata_base.json update
2018-08-23 17:02:58 -07:00
Wei Chen
2193dd662d
Land #10504 , add Foxit Reader UAF Module and Docs
2018-08-23 18:56:07 -05:00
Shelby Pace
5f9432ed6a
added rca to cloudme doc
2018-08-23 16:12:13 -05:00
Matthew Kienow
7a534707ab
Add note about unauthenticated telnetd service
2018-08-23 16:16:47 -04:00
Matthew Kienow
ecc6c473d8
Add note about unauthenticated telnetd service
2018-08-23 15:50:41 -04:00
Jacob Robles
7ceae8df58
Remove '.exe' from share name
2018-08-23 14:38:46 -05:00
Matthew Kienow
56433c8ed2
Functional decomposition refactor and cleanup
2018-08-23 15:23:42 -04:00
Matthew Kienow
961769c346
Fix SNMP Null class comparison
2018-08-23 15:23:42 -04:00
Matthew Kienow
9c05f14a70
Modify SNMP null and error handling
2018-08-23 15:23:42 -04:00
Matthew Kienow
934bb38a44
Omit parentheses for no argument method calls
2018-08-23 15:23:41 -04:00
Matthew Kienow
81ec723f5b
Add test for PJL fsdownload from string data
2018-08-23 15:23:41 -04:00
Matthew Kienow
ee6bf7a77c
Fix documentation markdown table format
2018-08-23 15:23:41 -04:00
Matthew Kienow
c5958c6e38
Restore original rport value
2018-08-23 15:23:41 -04:00
Matthew Kienow
70a0b9b1be
Remove payload RequiredCmd and reformat info
2018-08-23 15:23:41 -04:00
Matthew Kienow
18712c25cd
Add uname to module documentation scenario
2018-08-23 15:23:41 -04:00
Matthew Kienow
dafa62dec4
Use string interpolation over concatenation
2018-08-23 15:23:40 -04:00
Matthew Kienow
7c03454a0b
Remove unnecessary explicit msf/core require
2018-08-23 15:23:40 -04:00
Matthew Kienow
77b77287cc
Add module and payload documentation
2018-08-23 15:23:40 -04:00
Matthew Kienow
b1a308f3ae
Remove final debug output
2018-08-23 15:23:40 -04:00
Matthew Kienow
e21ea4180f
Clean up module and payload
...
Update module info, remove intermediate ARCH_ARMLE target, simply
options and add cleanup command so that the payload kills telnetd
2018-08-23 15:23:40 -04:00
Matthew Kienow
81f1555439
Rename module, exploits multiple printer models
2018-08-23 15:23:40 -04:00
Matthew Kienow
df18e354e1
Add bind_busybox_telnetd payload, misc cleanup
2018-08-23 15:23:39 -04:00
Matthew Kienow
c0c3e12c74
WIP - hp officejet pro exploit, enhance PJL lib
2018-08-23 14:53:54 -04:00
William Vu
9b3e0d8306
Add additional root tags for GPP XML
...
Finally ran through all the samples and cross-referenced with MS14-025.
https://msdn.microsoft.com/en-us/library/cc232650.aspx
https://support.microsoft.com/en-us/help/2962486/ms14-025-vulnerability-in-group-policy-preferences-could-allow-elevati
2018-08-22 16:48:33 -05:00
William Vu
2891255549
Clarify what is being imported currently
...
Since the parser is focused on creds.
2018-08-22 15:53:19 -05:00
Metasploit
520ed188e6
automatic module_metadata_base.json update
2018-08-22 12:58:40 -07:00
William Vu
36e35d116d
Land #10510 , full disclosure for CVE-2018-15473
2018-08-22 14:51:05 -05:00
William Vu
578d2375d7
Add full disclosure for CVE-2018-15473
2018-08-22 14:49:13 -05:00
William Vu
1e4eb0eae0
Revert report_note, since it added nothing
...
A bit of misunderstanding. We're in agreement that loot was enough.
2018-08-22 14:34:09 -05:00
William Vu
6fa04950ee
Store parsed GPP data as a note
...
And refactor slightly.
2018-08-22 14:19:50 -05:00
William Vu
b1c633faf6
Add Group Policy Preferences support to db_import
...
And take the Jaden Smith approach, as @busterb quipped to me. :)
This one's a little weird, since you normally import scans into
Metasploit, but now that creds are first-class in the database, it makes
more sense to be able to import them.
Currently, your alternatives are post/windows/gather/credentials/gpp,
which requires a session, and auxiliary/scanner/smb/smb_enum_gpp, which
requires a network scan.
2018-08-21 23:44:39 -05:00
Wei Chen
080ba15179
Another boo-boo
2018-08-21 08:55:14 -05:00
Wei Chen
b899839c53
Oops I made boo-boos
2018-08-21 08:53:43 -05:00
Wei Chen
2780ae6ba9
Update false negatives
2018-08-21 08:50:26 -05:00
Jacob Robles
fd6880d0d0
Add Foxit Reader UAF Module and Docs
2018-08-21 08:21:51 -05:00
William Vu
682b0863be
Land #10500 , stack trace fix for jobs -K
2018-08-20 22:27:31 -05:00
William Vu
321f2b8746
Improve file operations
...
Hmm, why did I not use File.write before? Oh well, fixed.
2018-08-20 22:25:19 -05:00
Green-m
808e2f2e25
Fix issue #10499
2018-08-21 03:08:14 +00:00
Green-m
edb85614ff
Make code cleaner
2018-08-21 03:05:44 +00:00
Metasploit
230433cf79
automatic module_metadata_base.json update
2018-08-20 17:36:50 -07:00
William Vu
2fe6bd0e98
Land #10498 , module doc for ssh_enumusers
2018-08-20 19:30:29 -05:00
William Vu
06582a00a0
Add module doc for ssh_enumusers
...
And update description in module.
2018-08-20 19:26:51 -05:00
asoto-r7
bc3b317963
Land #10449 , Implementation of download/upload file in reverse shell
2018-08-20 19:10:26 -05:00
asoto-r7
4aee3a4ae2
Land #10448 , Implementation of CTRL+C to send SIGINT signal
2018-08-20 18:14:29 -05:00
Wei Chen
ad0291e552
Update false negatives
2018-08-20 18:08:19 -05:00
Metasploit
b003fc0273
automatic module_metadata_base.json update
2018-08-20 15:37:28 -07:00
Brent Cook
11fee8fa2c
Land #10471 , Import target DefaultOptions into the datastore
2018-08-20 17:30:27 -05:00
Metasploit
4dac915a35
automatic module_metadata_base.json update
2018-08-20 15:29:45 -07:00
Brent Cook
9ba40cdc9e
Land #10497 , Add Lumpy Space password, whatever.
2018-08-20 17:19:02 -05:00
Brent Cook
d1b8846f12
Land #10479 , Add CVE-2018-15473 to ssh_enumusers
2018-08-20 17:14:58 -05:00