metasploit-framework/external/source
OJ defc0ebe5c
ppr_flatten_rec update, RDI submodule, and refactor
This commit contains a few changes for the ppr_flatten_rec local windows
exploit. First, the exploit binary itself:

* Updated to use the RDI submodule.
* Updated to build with VS2013.
* Updated to generate a binary called `ppr_flatten_rc.x86.dll`.
* Invocation of the exploit requires address of the payload to run.

Second, the module in MSF behaved a little strange. I expected it to create
a new session with system privs and leave the existing session alone. This
wasn't the case. It used to create an instance of notepad, migrate the
_existing_ session to it, and run the exploit from there. This behaviour
didn't seem to be consistent with other local exploits. The changes
include:

* Existing session is now left alone, only used as a proxy.
* New notepad instance has exploit reflectively loaded.
* New notepad instance has payload directly injected.
* Exploit invocation takes the payload address as a parameter.
* A wait is added as the exploit is slow to run (nature of the exploit).
* Payloads are executed on successful exploit.
2013-11-27 20:44:18 +10:00
..
DLLHijackAuditKit
ReflectiveDLLInjection@88e8e5f109 Add RDI submodule, port Kitrap0d 2013-11-27 16:04:41 +10:00
byakugan
cmdstager/debug_asm
dllinject
exploits ppr_flatten_rec update, RDI submodule, and refactor 2013-11-27 20:44:18 +10:00
ipwn
javapayload Remove javapayload source 2013-06-12 10:57:23 -05:00
meterpreter Remove meterpreter source 2013-06-11 16:42:30 -05:00
metsvc
msfJavaToolkit
osx
passivex
pxesploit
shellcode Merge branch 'master' of https://github.com/geyslan/metasploit-framework 2013-11-11 14:22:00 -03:00
tightvnc
unixasm
vncdll
DLLHijackAuditKit.zip