Commit Graph

3937 Commits

Author SHA1 Message Date
Spencer McIntyre 20590e91fb Land #14541, Create fanny_bmp_check.rb 2021-01-25 15:08:22 -05:00
Spencer McIntyre 3cd65606ee Update the fanny_bmp_check module and documentation 2021-01-25 14:54:44 -05:00
William Martens 4445812b60 Create fanny_bmp_check.rb
Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Thanks, I thought the comments on it would be needed/ (this is my first module)

Co-authored-by: bcoles <bcoles@gmail.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

[+] thanks!

Co-authored-by: bcoles <bcoles@gmail.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Co-authored-by: bcoles <bcoles@gmail.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Co-authored-by: bcoles <bcoles@gmail.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

[+] thanks for the sharp eye! It certainly does. I tried at my side to make it look as a "flow" but never really succeeded with it. Again, thanks!

Co-authored-by: bcoles <bcoles@gmail.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Co-authored-by: bcoles <bcoles@gmail.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Of course, this is my first module - I'm sorry, thanks for pointing it out!

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>

Update fanny_bmp_check.rb

Changed
 ...on #{sysinfo['Computer']} for...
to
"Target #{match} result(s) found in
And as well as the + 'shell'  in the session types.
And, as well as  commented some stuff I will remove (the comments, that is) when this is done.
The URL (ref) at the Desc. of the module needs to be a bit more short. Will do this too.

Changed (if not already?) the src link.

Create fanny_bmp_check_Docs.md

Rename fanny_bmp_check_Docs.md to fanny_bmp_check.md

Docs ready to go, (msftidy_docs done[x])

 ./tools/dev/msftidy_docs.rb documentation/modules/post/windows/gather/forensics/fanny_bmp_check.md
(no results) - so It's ready to go

msftidy.rb Done [no errors)

msftidy.rb Done [no errors)

Update fanny_bmp_check.md

Update fanny_bmp_check.md

Removed References since they were not (really) meant for being included,  It was more of my own Notes/Comments that accidentally came with it. 👍

Indentation (2 spaces, + the 33 to 44 lineblock fixed[x])

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Co-authored-by: bcoles <bcoles@gmail.com>

fanny_bmp_check.rb

Updated fanny_bmp_check.rb to use arrays instead.

Update fanny_bmp_check.rb

Rubocop fixed

Update fanny_bmp_check.rb

Added report_vuln()  as Jmartin suggested

Update fanny_bmp_check.rb

Update v2

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Oh,  yes -  Thank you,  again - sorry

Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>

Sorry for confusion; 2 problems(line 66+line 61) (work arounded for now)

2 Problems, first; it did not work with the info line (line 66, 61)
If It's still wrong ( the loop , which I have tried to fix)

I am not entirely sue what the problem is, because If I had the end there it was (commented out, line 61) - then it gets, unexpected 'end'  expecting end-of-input,

Coming back again, sorry for the confusion.

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Ah, tried it over here - and it worked,  Thanks!

Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>

Update documentation/modules/post/windows/gather/forensics/fanny_bmp_check.md

Of course,  thanks, committing this suggestion.

Regards

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-01-25 14:54:37 -05:00
adfoster-r7 ba730d5c3c Land #14618, Add exploit for CVE-2020-28949: Archive_Tar PEAR plugin arbitrary file write 2021-01-25 12:12:12 +00:00
Grant Willcox 0ec99c03f9 Clean up documentation formatting a little bit 2021-01-22 14:27:57 -06:00
William Vu 00cbc33ebb Add module doc 2021-01-22 01:06:14 -06:00
William Vu 7ce10f68ae RuboCop for great justice
And update docs.
2021-01-21 10:44:18 -06:00
William Vu a336ee483a Update exploit/unix/smtp/opensmtpd_mail_from_rce
Failure was caused by POSIX read requiring an argument.
2021-01-21 03:56:19 -06:00
Grant Willcox 95d3bd98ac Do msftidy_docs and rubocop changes 2021-01-15 18:10:23 -06:00
Grant Willcox 2f0abe4900 Add in documentation and fix up small issues with module 2021-01-15 18:06:07 -06:00
Shelby Pace 560327deba Land #14616, fix typo in autoroute.md 2021-01-15 15:43:50 -06:00
Christophe De La Fuente c8819259ae Land #14414, CVE-2020-1337 - patch bypass for CVE-2020-1048 2021-01-15 19:13:14 +01:00
chenxiaotian e2e3cc12b0 Update autoroute.md 2021-01-15 16:22:33 +08:00
bwatters d8e68e6487 Specify you must be SYSTEM for dll removal in docs and removed unused variable in the module 2021-01-12 11:45:53 -06:00
Spencer McIntyre 33bd712e0a Land #14585, Create module for CVE-2020-17136: Cloud Filter Arbitrary File Creation EoP 2021-01-11 17:16:40 -05:00
bwatters 50e115b414 Cleanup and edits per review from Christophe
Removed unused method from ps script
Cleaned up some code in the module
Added removal instructions to the documentation
2021-01-11 16:02:58 -06:00
Shelby Pace 7aef731267 Land #14572, add AIT CSV import rce 2021-01-11 15:37:05 -06:00
h00die 7d7263cf1f spelling 2021-01-09 08:13:19 -05:00
Grant Willcox 3072391d00 Make second round of review edits to fix Spencer's comments 2021-01-08 12:50:52 -06:00
Christophe De La Fuente 2886ee0448 Land #14582, Support command actions for post modules and consolidate VSS modules 2021-01-08 16:54:04 +01:00
Grant Willcox 3e52debd8b Update the exploit a bit more to remove excess options and also update the documentation accordingly. 2021-01-06 12:16:06 -06:00
Christophe De La Fuente 17c393f101 Land #14046, Adding juicypotato-like privilege escalation exploit for windows 2021-01-06 16:02:05 +01:00
Grant Willcox 863417fca7 Second round of updates and some rubocop changes to conform to standards. 2021-01-06 01:30:40 -06:00
Grant Willcox 81ee149ea2 Add check code support to module and update the documentation accordingly, plus rework the module description 2021-01-06 01:06:08 -06:00
Shelby Pace 7cab5568ab Land #14568, add total upkeep backup download 2021-01-05 14:01:04 -06:00
bwatters 54f5e565fa Land #14330, SpamTitan Gateway Remote Code Execution
Merge branch 'land-14330' into upstream-master
2021-01-04 12:14:12 -06:00
Spencer McIntyre 2f58d246e7 Add documentation for the new VSS module 2021-01-04 12:25:41 -05:00
h00die d8c55501a5 ait csv improter exploit 2021-01-01 12:14:52 -05:00
h00die c64d0038ab review step 1 2020-12-31 12:54:33 -05:00
h00die ff3dd7b73a first go of wp_total_upkeep 2020-12-30 16:34:12 -05:00
Spencer McIntyre 8701a2e6e8 Remove the deprecated SOCKS modules in favor of the new unified one 2020-12-29 13:33:06 -05:00
Grant Willcox 7de662c807 Land #14521, Struts2 Multi Eval OGNL RCE 2020-12-23 11:40:16 -06:00
Grant Willcox 70f8ff31f8 Update documentation to include missing extra options I forgot to document, edit the wording on the module to match the documentation, and do final touch ups. 2020-12-23 10:50:22 -06:00
Grant Willcox 799b451324 Add in updates to documentation to fix spelling mistakes and to also add in missing documentation for some options, plus to make some explanations a bit clearer. 2020-12-22 17:33:40 -06:00
bwatters d2ca5d331d Add documentation 2020-12-22 14:14:20 -06:00
Grant Willcox 4a449f97d3 Land #14522, Replace hard-coded Shiro default key with ENC_KEY 2020-12-22 09:26:49 -06:00
Grant Willcox 24e8aeffe5 Incorporate review feedback and update the associated documentation. 2020-12-21 17:29:21 -06:00
Grant Willcox 2c66beac17 Land #14429, Create shodan_host.rb, a module to grab ports from a given IP using Shodan 2020-12-21 15:58:17 -06:00
Grant Willcox 12277d3020 Apply RuboCop changes to the exploit module and also make final adjustments to the exploit code to handle some edge cases and fix review comments 2020-12-21 15:26:48 -06:00
William Vu 39110d04f0 Add note about needing an Oracle account 2020-12-18 21:20:29 -06:00
William Vu 4d85602fae Fix incorrect scenario header in module doc
I retested in VirtualBox and updated the output but not the header.
2020-12-18 21:15:05 -06:00
C4ssandre 57c57a398d Adding new check to filter out Windows 7 and Windows XP. Indeed, lab experiments has shown that BITS does not attempt to connect to WinRM port, making those systems not vulnerable. 2020-12-19 02:51:48 +01:00
Spencer McIntyre 11faafa4e9 Land #14474, Wordpress 2-day: easy-wp-smtp arbitrary wordpress user password reset 2020-12-18 17:07:46 -05:00
Spencer McIntyre 764efbeac3 Fixup a typo, an unnecessary statement and clarify a statement 2020-12-18 17:07:16 -05:00
h00die 3cb39c2fca Land #14497, wordpress uplicator plugin arbitrary file read 2020-12-18 17:05:40 -05:00
Christophe De La Fuente dc6b67f4c6 Land #14509, Fixes for Solr RCE 2020-12-18 21:51:06 +01:00
h00die 9e6d20a83c create aggressive mode and some review 2020-12-18 15:30:45 -05:00
Spencer McIntyre 9b8b4621df Land #14368, Pulse Connect Secure gzip RCE: cve-2020-8260 2020-12-17 17:43:55 -05:00
h00die a1702e8b53 rubocop and minor adjustments 2020-12-17 06:39:43 -05:00
Spencer McIntyre 87dacce2cd Land #14446, Add Oracle Solaris SunSSH PAM parse_user_name() exploit (CVE-2020-14871) 2020-12-16 16:01:32 -05:00