James Lee
99aa78a371
Tab complete LHOST based on RHOST if it is set
2012-07-20 23:10:22 -06:00
James Lee
c1cf71c4e9
Remove debugging load()
2012-07-18 11:02:21 -06:00
sinn3r
f4547527a8
Merge branch 'omg-post-exploits' of https://github.com/jlee-r7/metasploit-framework
2012-07-17 17:43:40 -05:00
James Lee
6b0196eccc
Add a require for File in Common
2012-07-17 15:48:06 -06:00
HD Moore
c887e0aaff
Re-add AFP changes due to mangled merge
2012-07-17 00:42:49 -05:00
HD Moore
b6d05c77ca
No, really. Bump
2012-07-17 00:36:19 -05:00
HD Moore
f62e0b1cca
AFP fixes and JTR typo fix
2012-07-16 21:45:45 -05:00
HD Moore
7e50f91d59
Bump
2012-07-16 21:02:40 -05:00
HD Moore
bc2edeace2
Cleanup AFP module output
2012-07-16 21:02:40 -05:00
James Lee
efe478f847
Merge branch 'master' into omg-post-exploits
2012-07-16 09:20:23 -06:00
James Lee
7091d1c65b
Add an exploit for sock_sendpage
...
Unfortunately, adds a dep on bionic for runtime compilation.
Gets ring0, sets the (res)uid to 0 and jumps to the payload. Still some
payload issues because linux stagers don't mprotect(2) the buffer they
read(2) into. Single payloads work fine, though.
Also cleans up and improves local exploits' ability to compile C.
[SEERM #3038 ]
2012-07-15 20:29:48 -06:00
HD Moore
4509c11916
Fingerprint dd-wrt even when auth is required
2012-07-15 21:21:13 -05:00
HD Moore
f111ae097e
Bail early if the user did not configure an injection parameter
2012-07-15 21:14:39 -05:00
HD Moore
0230ef60f6
Cosmetic
2012-07-15 15:46:54 -05:00
HD Moore
d6c6a3d0c5
Correct an issue with payload recalc during iteration
2012-07-15 15:45:25 -05:00
HD Moore
2254086dbe
Replace event handler with a straightforward filter
2012-07-11 03:00:44 -05:00
HD Moore
430351fe79
Better handle of module cache when db_connect is run manually
2012-07-10 23:56:48 -05:00
HD Moore
a7d1a61af2
Handle non-failure module exits as well
2012-07-10 19:55:43 -05:00
HD Moore
64e8956319
More small tweaks to import/export of attempts
2012-07-10 00:18:06 -05:00
HD Moore
25fee46020
Quick typo fix
2012-07-09 23:31:53 -05:00
HD Moore
6c977535d0
Fix up attempt/detail import/export structure
2012-07-09 22:47:05 -05:00
HD Moore
bfde053cf4
Correct a flaw in vuln_attempt/vuln_detail import
2012-07-09 22:28:42 -05:00
m m
36d27242c7
allow reverse tcp with proxies
2012-07-09 23:05:09 +02:00
James Lee
8d9186748f
Fix logic fail
2012-07-08 20:46:37 -06:00
James Lee
c82037d85b
Add an xxd decoder
2012-07-08 20:45:25 -06:00
James Lee
6d6b4bfa92
Merge remote branch 'rapid7/master' into omg-post-exploits
2012-07-08 17:32:39 -06:00
HD Moore
f75edc0ca1
Correct fix for older PG support, thanks to Patrick Fitzgerald
2012-07-08 10:16:51 -05:00
HD Moore
4199b67879
Prevent an exception from breaking the sql cache
2012-07-07 17:30:31 -05:00
HD Moore
1d5b7a1a69
Fix an issue with PG's handling of group by on distinct
2012-07-07 17:27:11 -05:00
HD Moore
b102d869d7
Switch module search to the SQL backend. Fixes #565
2012-07-05 19:34:05 -07:00
HD Moore
d266dc6031
Revert what looks like an errant debug mode
2012-07-03 20:32:19 -05:00
HD Moore
64364e3f16
Handle failed reloads in a nicer way
2012-07-03 19:49:44 -05:00
HD Moore
4f9106b2e5
Reverse this back now that the bins are updated
2012-07-02 00:02:21 -05:00
sinn3r
d7d21f1bda
Merge branch 'patch-3' of https://github.com/mubix/metasploit-framework into mubix-patch-3
2012-07-01 19:42:49 -05:00
Rob Fuller
7298840478
Fix match on User-Agent for HTTPS
2012-07-01 21:32:29 -03:00
Rob Fuller
58dd2af998
Fix match on User-Agent for HTTP
2012-07-01 21:30:31 -03:00
RageLtMan
18e8285322
Fix up rev_http handler
2012-07-01 10:46:13 -04:00
HD Moore
12a6d67be4
Add support for user-agent and server control
2012-06-30 21:01:08 -07:00
HD Moore
9204a5b124
Move the db skip into the "web" console driver. FIXRM #7031
2012-06-29 10:46:15 -05:00
HD Moore
1627720166
Skip module loads/db connect for existing framework sessions
2012-06-29 01:03:13 -05:00
HD Moore
d656e3185f
Mark all libraries as defaulting to 8-bit strings
2012-06-29 00:18:28 -05:00
sinn3r
0e55141fd9
Rename counts to count
2012-06-28 11:43:33 -05:00
sinn3r
5092152949
Fix the broken reload_modules method
...
When using the reload_all command, the framework will trigger an
'undefined method module_history' error, because we're missing
an accessor.
Also, even though reload_modules returns "counts". That actually
returns a hash instead of a real count of modules... the return
value is also never actually used anywhere. But to make this
part not broken, we return the actual count.
2012-06-28 11:39:14 -05:00
sinn3r
807142e988
'Size' may not exist in certain PDF structure.
...
This is a fix for issues related to:
'undefined method `[]' for nil:NilClass'
It is possible that a PDF may not have the 'Size' xref, and people
are running into the 'undefined method'[]' for NilClass' exception.
Because the pdf parser always assumes there is a Size field,
so it uses a match() function to find the value for Size, which
can be nil.
See the following bug report for example:
https://dev.metasploit.com/redmine/issues/7014
2012-06-26 16:09:13 -05:00
James Lee
b04170b283
Unbreak loadpath
...
HD's vuln-info merge broke add_module_path by removing an argument.
2012-06-25 16:37:16 -06:00
HD Moore
4dbdadfa3d
Merge pull request #523 from alexmaloteaux/fixmsfvenom
...
Fix msfvenom to correctly generate elf binaries for bsd and solaris platform
2012-06-25 11:55:49 -07:00
HD Moore
3d0628debf
Handle unreachable errors better
2012-06-25 03:29:30 -05:00
HD Moore
584e0dbd98
Load console config AFTER module path initialization
2012-06-25 01:16:35 -05:00
HD Moore
1989f0ab46
IE 10/Win8 detection support
2012-06-25 00:36:04 -05:00
HD Moore
348a0b8f6e
Merge branch 'master' into feature/vuln-info
2012-06-24 23:00:13 -05:00