Brent Cook
0784370b98
more typo and whitespace fixes
2015-10-20 13:09:17 -05:00
Rob Fuller
2f1406e1c8
fix typo
...
not sure how this got in there
2015-10-20 13:48:00 -04:00
Stuart
853d822992
Merge pull request #1 from bcook-r7/land-5380-pageantjacker
...
update pageantjacker to run as part of extapi
2015-09-23 09:45:53 +01:00
Stuart Morgan
cdd39f52b1
Merge branch 'master' of https://github.com/rapid7/metasploit-framework into pageant_extension
2015-09-21 14:34:56 +02:00
Brent Cook
61e7e1d094
update pageantjacker to run as part of extapi
2015-09-20 20:25:00 -05:00
HD Moore
a2d5511e39
Land #5379 , new post modules to load into powershell sessions
2015-08-26 17:11:40 -05:00
benpturner
8800d89424
Updated to reflect HD's comments on indents and name of local script.
2015-08-16 10:47:20 +01:00
Stuart Morgan
ee7c418ca8
Rubocop and msftidy-ied :-)
2015-08-14 17:19:07 +01:00
Stuart Morgan
02a58d459b
Merge remote-tracking branch 'upstream/master' into pageant_extension
2015-08-14 17:05:38 +01:00
Stuart Morgan
e2b6c11a3e
Update
2015-08-14 16:24:52 +01:00
Tod Beardsley
a342a9db10
Another sticky keys ref, from @carnal0wnage
2015-07-29 12:32:38 -05:00
Tod Beardsley
8043e5a88e
Add a reference to the sticky keys exploit
2015-07-29 12:31:43 -05:00
Tod Beardsley
ee66cadde2
Don't use bullet points in descriptions
...
They never render correctly in anything other than a text editor.
modules/post/windows/manage/sticky_keys.rb first landed in #5760 ,
Sticky Keys post module
2015-07-29 12:29:09 -05:00
William Vu
4dd2c31b44
Land #5760 , Sticky Keys post module
2015-07-23 17:12:31 -05:00
William Vu
06ed7ba574
Add a comma
2015-07-23 17:12:17 -05:00
OJ
ebdbb179ce
Last of the style fixes
2015-07-24 08:09:25 +10:00
OJ
db7fadfc36
Fix indentation
2015-07-24 08:08:01 +10:00
OJ
616e1ddd68
Change enum to action, a couple of tidies
2015-07-24 08:01:58 +10:00
OJ
e60f590f09
Add DisplaySwitch.exe support with WINDOWS+P
...
As per @mubix's request.
2015-07-24 07:20:31 +10:00
OJ
1dd765d6e6
Remove trailing spaces
2015-07-23 13:17:34 +10:00
OJ
0f2692f24f
Fix up silly mistake with fail_with
2015-07-23 13:14:35 +10:00
OJ
691b13ebd8
Add the sticky_keys module
2015-07-23 12:53:47 +10:00
wchen-r7
425a9dc266
credit OJ
2015-07-17 13:47:17 -05:00
wchen-r7
663bcbe53b
Avoid checking these system process names
2015-07-17 13:46:02 -05:00
OJ
e1b1db9f88
Fix stupid typo
2015-07-16 23:03:49 +10:00
OJ
986463e489
Fix killav post module, handle errors, better output
2015-07-16 11:35:01 +10:00
Marc-Andre Meloche
2735c035b5
fixed issues as requested.
...
fixed.
2015-07-15 20:36:19 -04:00
Marc-Andre Meloche
579fb5fb1f
Fixed
...
Fixed
2015-07-15 20:09:42 -04:00
Marc-Andre Meloche
c762e9e8d6
Fixed as requested.
...
I added the possibility to read from file, instead of modifying the module each time.
2015-07-15 20:02:18 -04:00
Marc-Andre Meloche
7520bc9a8a
Exported Killav into a post-exploitation module
...
I was unsure if this was the place to send the update.
2015-07-15 14:04:37 -04:00
g0tmi1k
6dcc9b7dab
More inconsistencies
2015-06-12 21:59:15 +01:00
g0tmi1k
a53ca53a6a
Fix inconstancy - multi/handler
2015-06-12 21:23:51 +01:00
RageLtMan
f575fb8df9
Merge branch 'feature-merge_psh_updates_201505'
...
Conflicts:
lib/msf/core/post/windows/powershell.rb
Rename upload_script_via_psh to stage_psh_env within post PSH lib.
Perform the same rename within load_script post module.
2015-05-29 03:42:25 -04:00
benpturner
e06f47b2bd
Updates load_script to have support for folders and to include the stager process in the mixin module for other post mods
2015-05-25 15:48:27 +01:00
RageLtMan
23b69a0c22
license update
2015-05-21 00:32:31 -04:00
RageLtMan
6d9f6c9715
retab exec_powershell.rb
2015-05-20 19:08:50 -04:00
RageLtMan
27e12754fe
Import Powershell libraries and sample post module
...
Sync critical functionality from Rex and Msf namespaces dealing
with encoding and processing of powershell script for exploit
or post namespaces.
Import Post module. Primarily adds a psh_exec method which will be
replaced in the next PR with @benpturner's work integrated into
the Post module namespace.
Provide a sample metasploit windows post module to show the
execution pipeline - entire subs process can be removed and the
module reduced to a psh_exec(datastore['SCRIPT']).
This commit is designed to provide sync between the SVIT fork and
upstream. Pending commits to be based on this work will provide
access to .NET compiler in the Post namespace to be used for
dynamic persistent payload creation on target and the import of
@benpturner's work.
2015-05-20 18:18:51 -04:00
benpturner
cdea522c3e
Use the Rex::Powershell::Command function to encode the stream
2015-05-20 10:34:54 +01:00
Stuart Morgan
6e682e2da3
Sometimes the SSH tools seem to do something strange with sockets, so just cope with tihs
2015-05-19 17:59:34 +01:00
benpturner
514e382d3b
Remove require
2015-05-19 16:20:32 +01:00
benpturner
4a808af40a
Typo
2015-05-19 16:17:11 +01:00
benpturner
1a6404dc08
Typo
2015-05-19 16:09:30 +01:00
benpturner
93d6903272
New verbose
2015-05-19 16:08:43 +01:00
benpturner
07986a1ed2
Updated author
2015-05-19 16:06:44 +01:00
benpturner
8916ccf9e5
new numbers
2015-05-19 16:00:49 +01:00
benpturner
763d960d2b
new
2015-05-19 15:55:00 +01:00
benpturner
b513304756
new changes
2015-05-19 15:47:30 +01:00
Stuart Morgan
6a7943a662
Added check for UNIX sockets support
2015-05-19 15:13:15 +01:00
Stuart Morgan
3d466b7e6b
Credit where credit is due, Ben has given a huge amount of support and guidance
2015-05-19 14:51:08 +01:00
Stuart Morgan
fac09a6bcf
Added a clarification comment
2015-05-19 14:46:44 +01:00