Commit Graph

325 Commits

Author SHA1 Message Date
Brent Cook 0784370b98 more typo and whitespace fixes 2015-10-20 13:09:17 -05:00
Rob Fuller 2f1406e1c8 fix typo
not sure how this got in there
2015-10-20 13:48:00 -04:00
Stuart 853d822992 Merge pull request #1 from bcook-r7/land-5380-pageantjacker
update pageantjacker to run as part of extapi
2015-09-23 09:45:53 +01:00
Stuart Morgan cdd39f52b1 Merge branch 'master' of https://github.com/rapid7/metasploit-framework into pageant_extension 2015-09-21 14:34:56 +02:00
Brent Cook 61e7e1d094 update pageantjacker to run as part of extapi 2015-09-20 20:25:00 -05:00
HD Moore a2d5511e39 Land #5379, new post modules to load into powershell sessions 2015-08-26 17:11:40 -05:00
benpturner 8800d89424 Updated to reflect HD's comments on indents and name of local script. 2015-08-16 10:47:20 +01:00
Stuart Morgan ee7c418ca8 Rubocop and msftidy-ied :-) 2015-08-14 17:19:07 +01:00
Stuart Morgan 02a58d459b Merge remote-tracking branch 'upstream/master' into pageant_extension 2015-08-14 17:05:38 +01:00
Stuart Morgan e2b6c11a3e Update 2015-08-14 16:24:52 +01:00
Tod Beardsley a342a9db10 Another sticky keys ref, from @carnal0wnage 2015-07-29 12:32:38 -05:00
Tod Beardsley 8043e5a88e Add a reference to the sticky keys exploit 2015-07-29 12:31:43 -05:00
Tod Beardsley ee66cadde2 Don't use bullet points in descriptions
They never render correctly in anything other than a text editor.

modules/post/windows/manage/sticky_keys.rb first landed in #5760,
Sticky Keys post module
2015-07-29 12:29:09 -05:00
William Vu 4dd2c31b44 Land #5760, Sticky Keys post module 2015-07-23 17:12:31 -05:00
William Vu 06ed7ba574 Add a comma 2015-07-23 17:12:17 -05:00
OJ ebdbb179ce Last of the style fixes 2015-07-24 08:09:25 +10:00
OJ db7fadfc36 Fix indentation 2015-07-24 08:08:01 +10:00
OJ 616e1ddd68 Change enum to action, a couple of tidies 2015-07-24 08:01:58 +10:00
OJ e60f590f09 Add DisplaySwitch.exe support with WINDOWS+P
As per @mubix's request.
2015-07-24 07:20:31 +10:00
OJ 1dd765d6e6 Remove trailing spaces 2015-07-23 13:17:34 +10:00
OJ 0f2692f24f Fix up silly mistake with fail_with 2015-07-23 13:14:35 +10:00
OJ 691b13ebd8 Add the sticky_keys module 2015-07-23 12:53:47 +10:00
wchen-r7 425a9dc266 credit OJ 2015-07-17 13:47:17 -05:00
wchen-r7 663bcbe53b Avoid checking these system process names 2015-07-17 13:46:02 -05:00
OJ e1b1db9f88 Fix stupid typo 2015-07-16 23:03:49 +10:00
OJ 986463e489 Fix killav post module, handle errors, better output 2015-07-16 11:35:01 +10:00
Marc-Andre Meloche 2735c035b5 fixed issues as requested.
fixed.
2015-07-15 20:36:19 -04:00
Marc-Andre Meloche 579fb5fb1f Fixed
Fixed
2015-07-15 20:09:42 -04:00
Marc-Andre Meloche c762e9e8d6 Fixed as requested.
I added the possibility to read from file, instead of modifying the module each time.
2015-07-15 20:02:18 -04:00
Marc-Andre Meloche 7520bc9a8a Exported Killav into a post-exploitation module
I was unsure if this was the place to send the update.
2015-07-15 14:04:37 -04:00
g0tmi1k 6dcc9b7dab More inconsistencies 2015-06-12 21:59:15 +01:00
g0tmi1k a53ca53a6a Fix inconstancy - multi/handler 2015-06-12 21:23:51 +01:00
RageLtMan f575fb8df9 Merge branch 'feature-merge_psh_updates_201505'
Conflicts:
	lib/msf/core/post/windows/powershell.rb

Rename upload_script_via_psh to stage_psh_env within post PSH lib.
Perform the same rename within load_script post module.
2015-05-29 03:42:25 -04:00
benpturner e06f47b2bd Updates load_script to have support for folders and to include the stager process in the mixin module for other post mods 2015-05-25 15:48:27 +01:00
RageLtMan 23b69a0c22 license update 2015-05-21 00:32:31 -04:00
RageLtMan 6d9f6c9715 retab exec_powershell.rb 2015-05-20 19:08:50 -04:00
RageLtMan 27e12754fe Import Powershell libraries and sample post module
Sync critical functionality from Rex and Msf namespaces dealing
with encoding and processing of powershell script for exploit
or post namespaces.

Import Post module. Primarily adds a psh_exec method which will be
replaced in the next PR with @benpturner's work integrated into
the Post module namespace.

Provide a sample metasploit windows post module to show the
execution pipeline - entire subs process can be removed and the
module reduced to a psh_exec(datastore['SCRIPT']).

This commit is designed to provide sync between the SVIT fork and
upstream. Pending commits to be based on this work will provide
access to .NET compiler in the Post namespace to be used for
dynamic persistent payload creation on target and the import of
@benpturner's work.
2015-05-20 18:18:51 -04:00
benpturner cdea522c3e Use the Rex::Powershell::Command function to encode the stream 2015-05-20 10:34:54 +01:00
Stuart Morgan 6e682e2da3 Sometimes the SSH tools seem to do something strange with sockets, so just cope with tihs 2015-05-19 17:59:34 +01:00
benpturner 514e382d3b Remove require 2015-05-19 16:20:32 +01:00
benpturner 4a808af40a Typo 2015-05-19 16:17:11 +01:00
benpturner 1a6404dc08 Typo 2015-05-19 16:09:30 +01:00
benpturner 93d6903272 New verbose 2015-05-19 16:08:43 +01:00
benpturner 07986a1ed2 Updated author 2015-05-19 16:06:44 +01:00
benpturner 8916ccf9e5 new numbers 2015-05-19 16:00:49 +01:00
benpturner 763d960d2b new 2015-05-19 15:55:00 +01:00
benpturner b513304756 new changes 2015-05-19 15:47:30 +01:00
Stuart Morgan 6a7943a662 Added check for UNIX sockets support 2015-05-19 15:13:15 +01:00
Stuart Morgan 3d466b7e6b Credit where credit is due, Ben has given a huge amount of support and guidance 2015-05-19 14:51:08 +01:00
Stuart Morgan fac09a6bcf Added a clarification comment 2015-05-19 14:46:44 +01:00