Commit Graph

1444 Commits (e716c24f2d6d0765c43abdfceb739d34b71dfeb2)

Author SHA1 Message Date
Brent Cook eab31eba4a update to latest mettle with dylib support 2019-02-07 09:33:36 -06:00
Brent Cook 5fc7167beb Merge remote-tracking branch 'upstream/master' into land-10812- 2019-02-07 09:31:02 -06:00
Brent Cook e0f597f25f
fix license URL 2019-02-07 08:18:04 -06:00
Brent Cook cb6d7fa210
Land #11165, Fix intermittent problem with native osx stager 2019-02-06 22:39:07 -06:00
Brent Cook 4a344093a4 bump payloads 2019-02-06 22:32:24 -06:00
bwatters 239cce53ea
Land #11039, Add linux x64 ipv6 reverse shell
Merge branch 'land-11039' into upstream-master
2019-02-01 16:21:24 -06:00
Jeffrey Martin 5a63e629e4
update payload sizes for mettle 0.5.4 2019-01-31 00:12:45 -06:00
bwatters 6c9a5b3fea
Update Cache Sizes 2019-01-28 15:53:19 -06:00
Brendan Coles 24f807490f revisionism 2019-01-10 19:19:14 +00:00
bwatters 9e109c7e7c
Update cache size 2018-12-28 16:08:15 -06:00
Tim W 58aebb6dec fix #11133, sleep to avoid the second stage being read too early 2018-12-24 19:26:10 +08:00
Jeffrey Martin bf4bb0a5b9
bump metasploit-payloads gem
Update metasploit-payloads gem to 1.3.57 to pick up
fix for Python Meterpreter PTY Leak from rapid7/metasploit-payloads#319
2018-12-19 18:19:24 -06:00
Wei Chen f7eb3452be
Land #11083, set user agent in Windows reverse_http(s) stagers 2018-12-19 11:38:12 -06:00
LouDnl 2a69fffa6b
fix for ReverseTcp error
Update vax shell_reverse_tcp.rb to fix ReverseTcp NameError
Error:
/opt/metasploit-framework/embedded/framework/modules/payloads/singles/bsd/vax/shell_reverse_tcp.rb:24:in `initialize': uninitialized constant Msf::Handler::ReverseTcp (NameError)

After adding this line the error dissapeared for me and I was able to run msfconsole again.
2018-12-17 19:28:07 +01:00
epi cb3ea8dfed Remove binding.pry from bind payload.
In response to
https://github.com/rapid7/metasploit-framework/pull/11039#discussion_r241890477.
2018-12-14 16:32:19 -06:00
Brent Cook 0ce05f0c07 update payload sizes 2018-12-08 06:24:02 -06:00
Brent Cook 0345c8f66c update mettle payloads
This is a large update to mettle payloads including:

 * Adds globbing support to the `ls` command (https://github.com/rapid7/mettle/pull/139)
 * Fixes crashes on iOS platforms when cryptTLV is enabled (https://github.com/rapid7/mettle/pull/142)
 * Fixes display of the OS version on macOS and iOS (https://github.com/rapid7/mettle/pull/143)
 * Fixes the local port handling for pivoted client network connections (https://github.com/rapid7/mettle/pull/144)
 * Fixes an unaligned memory access in TLV packet handling, needed for some CPUs (https://github.com/rapid7/mettle/pull/145)
 * Fixes some compatibility issues building on Solaris (https://github.com/rapid7/mettle/pull/147)
 * Updated libpcap, mbedtls, and libcurl to the latest versions (https://github.com/rapid7/mettle/pull/146)
2018-12-06 21:16:41 -06:00
epi c3a40d3752 Remove trailing whitespace at EOL. 2018-12-06 20:18:21 -06:00
epi 392ad18dba Implement reverse_ipv6 shellcode via metasm in lib.
Per the linked request
    https://github.com/rapid7/metasploit-framework/pull/11039#issuecomment-443915955
Rewrote previous version of payload module to make use of metasm for
more reusable shellcode.
2018-12-06 20:10:07 -06:00
epi f728b46a80 WIP on add-linux-x64-ipv6-bind-shell: 87fa3af6b9 Implement shellcode via metasm in lib. 2018-12-06 16:23:20 -06:00
epi 87fa3af6b9 Implement shellcode via metasm in lib.
Per the linked request
    https://github.com/rapid7/metasploit-framework/pull/11039#issuecomment-443915955
Rewrote previous payload module to make use of metasm for more reusable
shellcode.
2018-12-05 06:14:31 -06:00
epi 8cece2cf54 Add Linux x86_64 IPv6 Inline Bind Shell
Implements inline x86_64 Linux bourne bind shell over IPv6.
2018-12-01 07:39:38 -06:00
epi 5058afb615 Fixed lport and scopeid offsets.
Offsets for scopeid and lport were incorrect in the previous commit.
Updated offsets to the correct values.  Confirmed by viewing the connect
syscall values with strace.
2018-11-29 05:42:54 -06:00
epi 947f5ffbf3 Add Linux x86_64 IPv6 Inline Reverse Shell
Implements inline x86_64 Linux reverse bourne shell over IPv6.
2018-11-28 21:58:12 -06:00
David Yates e706e2b58d
Remove harmful default command to execute 2018-11-21 11:09:13 +02:00
bwatters-r7 4ac9fe5c9f
Land #10834, For real this time
Merge branch 'land-10834' into upstream-master
2018-11-02 14:35:00 -05:00
bwatters-r7 15cc699071
Land #10834, messagebox payload for x64
Merge branch 'land-10834' into upstream-master
2018-11-02 14:17:59 -05:00
Brent Cook 1d81f3764f
Land #10700, Add Morris worm fingerd exploit and VAX reverse shell 2018-11-02 11:16:46 -05:00
pasta 6752bdd536 space's purge 2018-11-02 11:27:53 -03:00
pasta a7bb211c20 add OptEnum to filter icon type 2018-10-30 20:30:49 -03:00
pasta 3fb047c0f1 29 rubocop's issues fixed 2018-10-30 19:47:28 -03:00
pasta c8740a1b0f deleted spaces at EOL 2018-10-30 15:09:39 -03:00
pasta 4960e1b8c8 modification to accomplish the guideline and license changed to GPL 2018-10-29 14:11:21 -03:00
William Vu 8459aad215 Prefer aobleq over incl/cmpl/bleq in payload 2018-10-22 18:32:37 -05:00
William Vu 8f2df4864c Add 4.3BSD VAX reverse command shell payload 2018-10-22 18:32:37 -05:00
Jeffrey Martin 380aaf7889
bump payloads gem 2018-10-22 18:20:45 -05:00
pasta 8d9bd33222 new version using Metasm 2018-10-22 16:36:04 -03:00
pasta 3a02e9e80f First release, messagebox payload for x64 2018-10-19 16:39:41 -03:00
Tim W 4653cbdda1 add macho mixin 2018-10-10 20:27:56 +08:00
Tim W f2ebdd4cdf add apple_ios/armle/meterpreter/reverse_tcp 2018-10-10 17:39:51 +08:00
bwatters-r7 e32abe9d45
Update Payload cached sizes 2018-09-20 17:26:15 -05:00
Brent Cook cb07ba2b6c
Land #10516, Add brace expansion encoder and update ${IFS} encoder 2018-08-25 22:23:07 -05:00
William Vu 318ff95dbd Remove trailing whitespace from netcat payloads
This has been bugging me for so long.
2018-08-23 21:33:58 -05:00
Matthew Kienow 70a0b9b1be
Remove payload RequiredCmd and reformat info 2018-08-23 15:23:41 -04:00
Matthew Kienow e21ea4180f
Clean up module and payload
Update module info, remove intermediate ARCH_ARMLE target, simply
options and add cleanup command so that the payload kills telnetd
2018-08-23 15:23:40 -04:00
Matthew Kienow df18e354e1
Add bind_busybox_telnetd payload, misc cleanup 2018-08-23 15:23:39 -04:00
Adam Cammack d2ed78570a
Land #10364, Handle nil for shell_reverse_tcp_ipv6
This makes things like `msfvenom --list-options` or `info` when options
are not set work.
2018-07-23 14:02:14 -05:00
William Vu 086af80509 Specify address family in shell_reverse_tcp_ipv6 2018-07-23 13:39:40 -05:00
bwatters-r7 0c906ed8d3
Update cached payload sizes 2018-07-19 17:58:45 -05:00
bwatters-r7 658267849b
deconflict the method names in mix-ins 2018-07-19 17:01:40 -05:00