jvazquez-r7
|
d47994e009
|
Update modules to use the new generic CMDstager mixin
|
2014-06-27 08:34:55 -04:00 |
jvazquez-r7
|
7ced5927d8
|
Use One CMDStagermixin
|
2014-06-27 08:34:55 -04:00 |
Spencer McIntyre
|
ae25c300e5
|
Initial attempt to unify the command stagers.
|
2014-06-27 08:34:55 -04:00 |
sinn3r
|
a60dfdaacb
|
Land #3471 - HP AutoPass License Server File Upload
|
2014-06-26 14:34:32 -05:00 |
sinn3r
|
ce5d3b12e7
|
Land #3403 - MS13-097 Registry Symlink IE Sandbox Escape
|
2014-06-26 13:48:28 -05:00 |
sinn3r
|
0b6f7e4483
|
Land #3404 - MS14-009 .NET Deployment Service IE Sandbox Escape
|
2014-06-26 11:45:47 -05:00 |
Joshua Smith
|
3ed7050b67
|
Lands 3420 after wrapping most lines at 80
|
2014-06-24 17:37:43 -05:00 |
Joshua Smith
|
3fe162a8b1
|
wraps most lines at 80
|
2014-06-24 17:36:10 -05:00 |
jvazquez-r7
|
267642aa4b
|
Fix description
|
2014-06-23 09:20:47 -05:00 |
jvazquez-r7
|
cc3c06440f
|
Add module for ZDI-14-195, HP AutoPass License Traversal
|
2014-06-23 09:19:56 -05:00 |
jvazquez-r7
|
a081beacc2
|
Use Gem::Version for string versions comparison
|
2014-06-20 09:44:29 -05:00 |
OJ
|
5879ca3340
|
Merge branch 'upstream/master' into meatballs x64_injection
|
2014-06-18 10:24:33 +10:00 |
Joshua Smith
|
bab1e30557
|
Land #3460, Ericom AccessNow Server BOF exploit
|
2014-06-17 19:10:34 -05:00 |
Joshua Smith
|
9af9d2f5c2
|
slight cleanup
|
2014-06-17 19:08:31 -05:00 |
jvazquez-r7
|
1133332702
|
Finish module
|
2014-06-17 15:01:35 -05:00 |
jvazquez-r7
|
8f8af0e93a
|
Add draft version
|
2014-06-17 14:21:49 -05:00 |
Christian Mehlmauer
|
03fa858089
|
Added newline at EOF
|
2014-06-17 21:05:00 +02:00 |
Christian Mehlmauer
|
8e1949f3c8
|
Added newline at EOF
|
2014-06-17 21:03:18 +02:00 |
jvazquez-r7
|
2fe7593559
|
Land #3433, @TecR0c's exploit for Easy File Management Web Server
|
2014-06-13 09:54:12 -05:00 |
William Vu
|
cb91b2b094
|
Fix broken table indent (s/Ident/Indent/ hash key)
|
2014-06-12 13:41:44 -05:00 |
HD Moore
|
d5b32e31f8
|
Fix a typo where platform was 'windows' not 'win'
This was reported by dracu on freenode
|
2014-06-11 15:10:33 -05:00 |
jvazquez-r7
|
34f98ddc50
|
Do minor cleanup
|
2014-06-11 09:20:22 -05:00 |
TecR0c
|
b27b00afbb
|
Added target 4.0 and cleaned up exploit
|
2014-06-11 06:22:47 -07:00 |
TecR0c
|
f1382af018
|
Added target 4.0 and cleaned up exploit
|
2014-06-11 06:20:49 -07:00 |
jvazquez-r7
|
a554b25855
|
Use EXITFUNC
|
2014-06-10 09:51:06 -05:00 |
TecR0c
|
3d33a82c1c
|
Changed to unless
|
2014-06-09 09:31:14 -07:00 |
TecR0c
|
1252eea4b9
|
Changed to unless
|
2014-06-09 09:26:03 -07:00 |
TecR0c
|
52d26f290f
|
Added check in exploit func
|
2014-06-09 03:23:14 -07:00 |
TecR0c
|
8ecafbc49e
|
Easy File Management Web Server v5.3 Stack Buffer Overflow
|
2014-06-08 04:21:14 -07:00 |
Brendan Coles
|
6bef6edb81
|
Update efs_easychatserver_username.rb
Add targets for versions 2.0 to 3.1.
Add install path detection for junk size calculation.
Add version detection for auto targeting.
|
2014-06-08 06:36:18 +10:00 |
Meatballs
|
bf1a665259
|
Land #2657, Dynamic generation of windows service executable functions
Allows a user to specify non service executables as EXE::Template as
long as the file has enough size to store the payload.
|
2014-06-07 13:28:20 +01:00 |
jvazquez-r7
|
079fe8622a
|
Add module for ZDI-14-136
|
2014-06-04 10:29:33 -05:00 |
jvazquez-r7
|
43699b1dfb
|
Don't clean env variable before using it
|
2014-06-03 09:56:19 -05:00 |
jvazquez-r7
|
b8a2cf776b
|
Do test
|
2014-06-03 09:52:01 -05:00 |
jvazquez-r7
|
05ed2340dc
|
Use powershell
|
2014-06-03 09:29:04 -05:00 |
jvazquez-r7
|
f918bcc631
|
Use powershell instead of mshta
|
2014-06-03 09:01:56 -05:00 |
jvazquez-r7
|
9574a327f8
|
use the new check also in exploit()
|
2014-06-02 14:38:33 -05:00 |
jvazquez-r7
|
3c38c0d87c
|
Dont be confident about string comparision
|
2014-06-02 14:37:29 -05:00 |
jvazquez-r7
|
d0241cf4c1
|
Add check method
|
2014-06-02 08:14:40 -05:00 |
jvazquez-r7
|
31af8ef07b
|
Check .NET version
|
2014-06-01 20:58:08 -05:00 |
Meatballs
|
3c5fae3706
|
Use correct include
|
2014-06-01 11:51:06 +01:00 |
Meatballs
|
4801a7fca0
|
Allow x86->x64 injection
|
2014-06-01 11:50:13 +01:00 |
jvazquez-r7
|
3ae4a16717
|
Clean environment variables
|
2014-05-30 12:21:23 -05:00 |
jvazquez-r7
|
b99b577705
|
Clean environment variable
|
2014-05-30 12:20:00 -05:00 |
jvazquez-r7
|
b27a95c008
|
Delete unused code
|
2014-05-30 12:08:55 -05:00 |
jvazquez-r7
|
e215bd6e39
|
Delete unnecessary code and use get_env
|
2014-05-30 12:07:59 -05:00 |
jvazquez-r7
|
1dbd36a3dd
|
Check for the .NET dfsvc and use %windir%
|
2014-05-30 09:02:43 -05:00 |
jvazquez-r7
|
ffbcbe8cc1
|
Use cmd_psh_payload
|
2014-05-29 18:12:18 -05:00 |
jvazquez-r7
|
03889ed31f
|
Use cmd_psh_payload
|
2014-05-29 18:11:22 -05:00 |
jvazquez-r7
|
e145298c13
|
Add module for CVE-2014-0257
|
2014-05-29 11:45:19 -05:00 |