sinn3r
403ac1dc37
I would do anything for a cake.
2012-12-07 13:15:27 -06:00
sinn3r
9838a2c75f
This never works for us. Gonna ditch it.
2012-12-07 13:02:26 -06:00
HD Moore
69177105ab
Handle a null reply properly, small bug fix
2012-12-07 10:54:08 -08:00
David Maloney
c952ed0f87
Add test for raw format of packets
2012-12-07 12:51:53 -06:00
David Maloney
b707f8d13a
Packet specs now complete
...
82 tests for the packet lib
2012-12-07 12:32:34 -06:00
jvazquez-r7
b0be8dc4df
history exploit cleanup
2012-12-07 19:23:00 +01:00
sinn3r
38f2348c33
First changes
2012-12-07 11:27:09 -06:00
sinn3r
a872362a65
Merge branch 'maxthon3' of git://github.com/malerisch/metasploit-framework into maxthon
2012-12-07 11:17:15 -06:00
sinn3r
2260e4b471
Switch to manual payload selection, because we don't auto-detect
2012-12-07 11:07:11 -06:00
James Lee
8812285678
Move print of my_target.name to after nil check
...
Avoids
"Exception handling request: undefined method `name' for nil:NilClass"
when we don't have a target for the connecting browser.
[FixRM #7593 ]
2012-12-07 11:00:24 -06:00
sinn3r
c08ee695a9
Merge branch 'splunk_upload_app_exec_cleanup' of git://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-splunk_upload_app_exec_cleanup
2012-12-07 10:46:28 -06:00
sinn3r
fafdcbaae1
Vuln discovered by Rich.
...
See: https://twitter.com/webstersprodigy/status/277087755073380353
2012-12-07 10:42:45 -06:00
jvazquez-r7
e5cc950fe1
fix identation
2012-12-07 11:57:11 +01:00
jvazquez-r7
133ad04452
Cleanup of #1062
2012-12-07 11:55:48 +01:00
David Maloney
89c98ebd39
Finished tests for GroupTlv ftmp
2012-12-06 17:59:07 -06:00
Royce Davis
97c9dd0caf
Extra file got added by mistake, removed it
2012-12-06 16:31:28 -06:00
Royce Davis
600121c36a
Fixed issue involing static path to Windows directory
2012-12-06 16:28:59 -06:00
Royce Davis
4837ea38f5
Merge https://github.com/rapid7/metasploit-framework
2012-12-06 16:15:55 -06:00
sinn3r
c66777d028
Merge branch 'command' of git://github.com/R3dy/metasploit-framework into R3dy-command
2012-12-06 16:08:04 -06:00
Royce Davis
205276c38f
Update modules/auxiliary/admin/smb/psexec_command.rb
...
Fixed static path to Windows directory. This causes problems with directory is 'WINNT' for example.
2012-12-06 16:03:44 -06:00
sinn3r
bf47eaaa41
Remove code that's commented out. Clearly not needed anymore.
2012-12-06 12:57:41 -06:00
sinn3r
0ea5c781c1
Tabs and spaces don't mix
2012-12-06 12:53:22 -06:00
sinn3r
37f9cff25a
Merge branch 'ibm_director_cim_dllinject' of git://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-ibm_director_cim_dllinject
2012-12-06 12:36:48 -06:00
jvazquez-r7
fd20998f40
using the primer callback as pointed by egypt
2012-12-06 18:59:46 +01:00
sinn3r
817a7749c1
Merge branch 'ibm_director_cim_dllinject' of git://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-ibm_director_cim_dllinject
2012-12-06 11:35:09 -06:00
jvazquez-r7
8e21d9e235
fix source_address param
2012-12-06 18:34:22 +01:00
sinn3r
1fb05c0baf
Merge branch 'ibm_director_cim_dllinject' of git://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-ibm_director_cim_dllinject
2012-12-06 11:34:19 -06:00
Tod Beardsley
215017e17c
Merge remote branch 'wchen-r7/better_tectia_ssh'
2012-12-06 11:01:36 -06:00
sinn3r
06927345e5
If message becomes nil, we should force a to_s for the regex
...
next_message can be nil sometimes if packet is nil (see net/ssh's
poll_message source)
2012-12-06 10:44:16 -06:00
jvazquez-r7
fc8b08f10f
trailing comma
2012-12-06 17:32:58 +01:00
jvazquez-r7
532afc2919
Added module for CVE-2009-0880
2012-12-06 16:43:07 +01:00
HD Moore
5e44987271
Really fix this by resetting schema cache
2012-12-06 06:33:46 -08:00
HD Moore
a5b3be6dfa
Fix a conflicting rename that breaks ActiveRecord
2012-12-06 06:14:49 -08:00
HD Moore
087b2c39ae
Whitespace cleanup only
2012-12-06 06:13:53 -08:00
jvazquez-r7
6d3d4c1d84
Added support for FileDropper
2012-12-06 12:03:17 +01:00
sinn3r
18f4df0a38
Fix weird indent prob
2012-12-06 03:58:16 -06:00
sinn3r
a90ed82413
Correct CVE format
2012-12-06 03:57:46 -06:00
sinn3r
2b96c4e2a5
Add Kingcope's MySQL 'Stuxnet' technique exploit
...
Because why not. One more trick to a pentest + coverage = better.
2012-12-06 03:56:23 -06:00
sinn3r
530332b176
Apply evil-e's fix when port isn't 22
...
See #1130
2012-12-05 21:42:53 -06:00
sinn3r
32c5f12912
Hmm, I should change the target name
2012-12-05 21:38:31 -06:00
sinn3r
d3c1fa842a
Lots of improvements
...
Keyboard-interactive method isn't required to exploit Tectia SSH.
So this update will just go straight to password method. There's
also improvements for the check() method: Not only does it check
the SSH version (banner), it will also check and see if the server
is using password method to auth.
2012-12-05 21:34:33 -06:00
David Maloney
468f637efe
basics for adding tlvs to GroupTlv
2012-12-05 18:19:12 -06:00
David Maloney
5dcf573063
TLV tests down, on to GroupTlv
2012-12-05 17:55:28 -06:00
malerisch
5e28563e4e
Advisories URLs changed
2012-12-05 14:33:25 -08:00
David Maloney
391ff5bbb0
basic TLV method tests
2012-12-05 15:44:03 -06:00
David Maloney
b18f5b1875
Start with the duh stuff, responds_to
2012-12-05 14:39:29 -06:00
kernelsmith
11fec0bc07
adds rudimentary validity checking to pids for meterp kill
...
addresses redmine https://dev.metasploit.com/redmine/issues/7223 , but
may not be a truly encompassing solution. 'good bandaid' as egypt put
it
2012-12-05 13:17:33 -06:00
James Lee
bc7cd4b452
Loop through module sets like super used to do
...
... since super doesn't exist any more.
Also changes to using ModuleSet#[] inside ModuleManager#[] instead of
ModuleSet#create to mimic original behavior when ModuleManager was a
subclass of ModuleSet.
2012-12-05 12:59:35 -06:00
James Lee
d57c24dd5f
Use framework.payloads instead of modules
...
When we know the module we're creating is definitely a payload, don't
bother looking in the other module sets.
Also removes an exception message that gets ignored anyway because the
exception class has a hard-coded #to_s
2012-12-05 12:30:55 -06:00
sinn3r
49999a56ea
Added CVE & vendor advisory information
2012-12-05 10:13:44 -06:00