Quentin Kaiser
ef8601aa71
Bail early if we receive an unexpected response.
2018-12-18 19:42:26 +01:00
Quentin Kaiser
4ee7bdee6c
Merge branch 'consul_service_exec' of github.com:QKaiser/metasploit-framework into consul_service_exec
2018-12-18 19:33:51 +01:00
Quentin Kaiser
b3563b1bc2
Cleaner version of check function thanks to @bcoles.
2018-12-18 19:33:30 +01:00
Brendan Coles
5e134d7d8d
Update modules/exploits/multi/misc/consul_service_exec.rb
...
Co-Authored-By: QKaiser <QKaiser@users.noreply.github.com>
2018-12-18 19:27:19 +01:00
Brendan Coles
5192c081ee
Update modules/exploits/multi/misc/consul_service_exec.rb
...
Co-Authored-By: QKaiser <QKaiser@users.noreply.github.com>
2018-12-18 19:27:08 +01:00
Quentin Kaiser
6ad40deac3
print_status will never throw a JSON::ParseError exception.
2018-12-18 19:15:13 +01:00
Quentin Kaiser
a3d020a7e2
Add support for authorization with X-Consul-Token ACL header.
2018-12-18 16:56:03 +01:00
Quentin Kaiser
1839144978
Cleaner to define this as a Hash, then call .to_json on it.
2018-12-18 16:53:49 +01:00
Quentin Kaiser
177ae2f927
fail_with is not allowed in check method. Use vprint_error and return a CheckCode instead. Cleaner response check in check function. Usage of CheckCode instead of Exploit::CheckCode.
2018-12-18 16:33:53 +01:00
Quentin Kaiser
0feadf636b
Define in RPORT and SSL in register_options rather than DefaultOptions. Support for echo and printf command stager flavors + support for curl and wget command stager flavors (hence reactivation of SRVHOST, SRVPORT, URIPATH and SSLCert).
2018-12-18 16:29:36 +01:00
Quentin Kaiser
0acdcd98f2
Merge branch 'master' into consul_service_exec
2018-12-18 16:27:08 +01:00
Wei Chen
847e3232ab
Land #11102 , remove old metasm remnants
2018-12-18 08:53:53 -06:00
Metasploit
483a3618ae
automatic module_metadata_base.json update
2018-12-17 19:32:00 -08:00
Brent Cook
fc2d217c0a
Land #11135 , strip comments from source code before uploading it to the target
2018-12-17 21:23:29 -06:00
Brent Cook
333d44186b
Land #11138 , add reverse_tcp mixin for vax payload
2018-12-17 21:17:40 -06:00
Metasploit
595ebf5dc7
automatic module_metadata_base.json update
2018-12-17 12:23:47 -08:00
bwatters
bf13693d37
Land #11101 , temp fix for x64/xor stage encoder
...
Merge branch 'land-11101' into upstream-master
2018-12-17 14:14:55 -06:00
LouDnl
2a69fffa6b
fix for ReverseTcp error
...
Update vax shell_reverse_tcp.rb to fix ReverseTcp NameError
Error:
/opt/metasploit-framework/embedded/framework/modules/payloads/singles/bsd/vax/shell_reverse_tcp.rb:24:in `initialize': uninitialized constant Msf::Handler::ReverseTcp (NameError)
After adding this line the error dissapeared for me and I was able to run msfconsole again.
2018-12-17 19:28:07 +01:00
Metasploit
1b581b0c1f
automatic module_metadata_base.json update
2018-12-17 08:11:04 -08:00
Shelby Pace
2fc501d260
Land #11112 , Fix bpf_priv_esc exploit module
2018-12-17 10:00:50 -06:00
Metasploit
601804d315
automatic module_metadata_base.json update
2018-12-17 07:18:35 -08:00
Jacob Robles
7839add2fd
Land #11123 , Add module windows persistent service
2018-12-17 09:07:21 -06:00
Green-m
cb0cde3602
Merge pull request #7 from jrobles-r7/patch/service_doc
...
Documentation Update
2018-12-17 21:44:43 +08:00
Jacob Robles
80e70b29ef
Doc Formatting
2018-12-17 07:34:52 -06:00
Green-m
b5904bcd82
Merge pull request #6 from jrobles-r7/patch/service_space
...
Fix additional path space issues
2018-12-17 21:20:42 +08:00
Jacob Robles
88b7b7df4a
Fix additional path space issues
2018-12-17 07:00:23 -06:00
Green-m
0aa6e5a640
Handle path with spaces correctly.
2018-12-17 10:25:06 +08:00
Brendan Coles
fcb512878c
Add strip_comments method to Linux local exploits
2018-12-16 14:11:54 +00:00
Wei Chen
5bf28887d2
Land #11127 , Fix TARGETURI support in struts2_namespace_ognl
2018-12-15 09:33:48 -06:00
Green-m
b2c6dfa0df
Merge pull request #5 from jrobles-r7/patch/service_code
...
Patch/service code
2018-12-15 14:06:17 +08:00
Brendan Coles
cba195b7d8
Update tested versions
2018-12-15 05:44:32 +00:00
Brendan Coles
a7b5737980
Update documentation
2018-12-15 05:41:40 +00:00
Brendan Coles
b8e134b95d
Update version check
2018-12-15 05:39:50 +00:00
Francesco Soncina
6237740116
lint: remove spaces
2018-12-15 01:02:13 +01:00
Metasploit
ed03590ad8
automatic module_metadata_base.json update
2018-12-14 14:02:44 -08:00
Wei Chen
e268691511
Land #11124 , delete unused variable
2018-12-14 15:22:42 -06:00
Jacob Robles
8adfef5730
Remove Version, Fix Whitespace
2018-12-14 13:19:49 -06:00
Jacob Robles
e67eaa94c9
Move code to ERB template
2018-12-14 13:13:32 -06:00
William Vu
38bdee19e8
Fix TARGETURI support in struts2_namespace_ognl
2018-12-14 13:08:50 -06:00
Auxilus
6c9fafb9d5
Delete unused variable
...
I suppose the variable 'f' was for Name in 06720ee18b/modules/exploits/linux/smtp/haraka.py (L70)
I'm not sure, should it be 'f' at 06720ee18b/modules/exploits/linux/smtp/haraka.py (L70)
or just the way it is atm?
2018-12-14 22:27:11 +05:30
Jacob Robles
556d182231
Remove code that was replaced
2018-12-14 09:15:01 -06:00
Jacob Robles
a057b72bd9
Use argument
2018-12-14 09:14:27 -06:00
Jacob Robles
dfa84aa1af
Use exploit default exception handling
2018-12-14 09:12:32 -06:00
Jacob Robles
5fd7b82f7a
Remove unused parameter
2018-12-14 09:10:29 -06:00
Green-m
48ad8e8038
Merge pull request #4 from jrobles-r7/service-patch
...
Work around snprintf
2018-12-14 20:05:32 +08:00
Brent Cook
06720ee18b
Land #11121 , remove call to undefined port_allowed?
2018-12-13 20:01:15 -06:00
Jeffrey Martin
4963647bf6
remove call to method not defined
2018-12-13 17:00:41 -06:00
Metasploit
1205615b6c
automatic module_metadata_base.json update
2018-12-13 14:24:49 -08:00
Brent Cook
673cfe6889
Land #11119 , Add WEBUI_PORT to hp_van_sdn_cmd_inject exploit
2018-12-13 16:15:53 -06:00
Metasploit
04d8e2fc63
automatic module_metadata_base.json update
2018-12-13 13:40:15 -08:00