Spencer McIntyre
|
bf13ffc692
|
Update documentation based on feedback
|
2020-10-01 09:19:15 -04:00 |
|
Christophe De La Fuente
|
59fff3d7fe
|
Land #14161, VyOS config processor
|
2020-09-28 13:02:19 +02:00 |
|
Spencer McIntyre
|
a14780d024
|
Update the zerologon options for clarity
|
2020-09-22 14:57:57 -04:00 |
|
Spencer McIntyre
|
3ae4eb3dce
|
Convert the BinData error_status value to a Ruby integer
|
2020-09-21 11:38:33 -04:00 |
|
h00die
|
610d4d86d2
|
initial vyos implementation
|
2020-09-20 19:48:20 -04:00 |
|
Spencer McIntyre
|
a810d37c47
|
Move the NetrServerPasswordSet2 DCERPC data defs into RubySMB
|
2020-09-18 16:19:23 -04:00 |
|
Spencer McIntyre
|
fdedcfa600
|
Updates to use the latest proposed RubySMB changes
|
2020-09-18 14:27:14 -04:00 |
|
Spencer McIntyre
|
996598bfc8
|
Use a proper constant and specify null values for forward compatibility
|
2020-09-17 18:07:41 -04:00 |
|
Spencer McIntyre
|
b794c88433
|
Implement a check method for the vulnerability
|
2020-09-17 14:37:36 -04:00 |
|
Spencer McIntyre
|
27b6c8a55b
|
Add module docs and apply rubocop fixes to the module
|
2020-09-17 14:28:53 -04:00 |
|
Spencer McIntyre
|
0b61092fe5
|
Add module data, use fail_with and rename an option for consistency
|
2020-09-17 13:35:30 -04:00 |
|
Spencer McIntyre
|
7e1e1f593f
|
Refactor the code and support restoring the machine password
|
2020-09-17 12:49:56 -04:00 |
|
Spencer McIntyre
|
58033cbaa2
|
Cleanup the code for CVE-2020-1472
|
2020-09-17 09:50:35 -04:00 |
|
Spencer McIntyre
|
f407da63e8
|
Initial check for CVE-2020-1472 complete
|
2020-09-16 16:15:19 -04:00 |
|
Christophe De La Fuente
|
e11840c2a5
|
land #14031, F5 processor
|
2020-09-14 18:38:58 +02:00 |
|
h00die
|
537be9054d
|
spacing and a to an
|
2020-08-25 16:17:37 -04:00 |
|
Spencer McIntyre
|
9bd687edcd
|
Land #14034, telpho10_credential_dump: Prevent traversal in untar
|
2020-08-25 09:35:32 -04:00 |
|
Shelby Pace
|
c578fde89c
|
Land #13982, add cisco 7937g ssh privesc
|
2020-08-21 15:04:24 -05:00 |
|
Shelby Pace
|
39284d4263
|
align logging line, fix msftidy_docs warning
|
2020-08-21 14:55:45 -05:00 |
|
debifrank
|
33524c0cbf
|
Create cisco_7937g_ssh_privesc.py
|
2020-08-21 13:40:53 -04:00 |
|
Brendan Coles
|
37a06756cc
|
telpho10_credential_dump: Prevent traveral in untar
|
2020-08-21 15:30:55 +00:00 |
|
h00die
|
c8a541c187
|
pre rubocop
|
2020-08-20 14:27:51 -04:00 |
|
Shelby Pace
|
86dbac3466
|
add a space to author field
|
2020-08-20 10:52:39 -05:00 |
|
h00die
|
3326d86db7
|
review comments
|
2020-08-20 10:26:13 -05:00 |
|
h00die
|
43fabcad53
|
arista
|
2020-08-20 10:25:08 -05:00 |
|
Spencer McIntyre
|
07ab8b294f
|
Land #13957, allow dns server on different port
|
2020-08-07 16:15:17 -04:00 |
|
bwatters
|
231ad83773
|
Land #13860,Mikrotik Processing
Merge branch 'land-13860' into upstream-master
|
2020-08-07 14:48:22 -05:00 |
|
Robin Wood
|
0d6dcb6dc8
|
Update dyn_dns_update.rb
removed commit from other PR
|
2020-08-07 12:47:39 +01:00 |
|
Robin Wood
|
9ba8e3a803
|
Update dyn_dns_update.rb
Removed the deregistering of RPORT
|
2020-08-07 12:46:20 +01:00 |
|
Robin
|
cc1614be72
|
checking reply when asking if record already exists
|
2020-08-07 12:25:13 +01:00 |
|
Robin
|
51f2261921
|
allow dns server on different port
|
2020-08-07 11:39:58 +01:00 |
|
Jeffrey Martin
|
9aa26d1208
|
Merge upstream into 6.x
|
2020-08-03 11:43:47 -05:00 |
|
h00die
|
d366666418
|
add Mikrotik SwOS
|
2020-07-30 11:29:25 -04:00 |
|
William Vu
|
c6fd9a4b08
|
Land #13895, SAP RECON CVE-2020-6287 improvements
|
2020-07-27 08:51:16 -05:00 |
|
Spencer McIntyre
|
13d7c5445a
|
Address rubocop complaints
|
2020-07-23 18:10:07 -04:00 |
|
Spencer McIntyre
|
ff4db5daea
|
Add the REMOVE action to the exploit for CVE-2020-6287
|
2020-07-23 17:59:40 -04:00 |
|
Spencer McIntyre
|
68614bcc3b
|
Add check functionality for CVE-20220-6287
|
2020-07-23 14:46:06 -04:00 |
|
William Vu
|
a89c966bbc
|
Land #13852, SAP "RECON" CVE-2020-6287 aux module
|
2020-07-23 10:30:36 -05:00 |
|
Spencer McIntyre
|
e0046ef8f2
|
Randomize unnecessary values and set the secure attribute
|
2020-07-23 10:47:53 -04:00 |
|
Spencer McIntyre
|
d108cd0da9
|
Address feedback for consistency within CVE-2020-6287
|
2020-07-23 10:31:46 -04:00 |
|
Spencer McIntyre
|
593ddd8ac4
|
Add module docs for CVE-2020-6287
|
2020-07-23 09:47:22 -04:00 |
|
Spencer McIntyre
|
2364b3f46c
|
Fix the remaining rubocop issues for CVE-2020-6287
|
2020-07-22 19:18:42 -04:00 |
|
Spencer McIntyre
|
7b781ca12f
|
Report a vuln in the CVE-2020-6287 module and fix xpath comparisons
|
2020-07-22 18:29:55 -04:00 |
|
Spencer McIntyre
|
2d43da2a39
|
Apply rubocop fixes for CVE-2020-6287
|
2020-07-22 18:04:11 -04:00 |
|
Spencer McIntyre
|
ec9ee2baa7
|
Complete the exploit with privilege escalation through a role
|
2020-07-22 17:57:39 -04:00 |
|
William Vu
|
f601c49ba9
|
Default to LDAPS in vCenter Server vmdir modules
|
2020-07-22 15:40:10 -05:00 |
|
William Vu
|
f736b0192f
|
Add LDAPS support and update vCenter vmdir modules
|
2020-07-22 14:23:00 -05:00 |
|
William Vu
|
5f5a2e7508
|
Refactor code (untested)
|
2020-07-21 01:09:46 -05:00 |
|
h00die
|
5706e901d4
|
review comments
|
2020-07-19 11:42:31 -04:00 |
|
h00die
|
eaf7161cae
|
mikrotik
|
2020-07-18 07:45:24 -04:00 |
|