adfoster-r7
|
4a9a15e638
|
Run Rubocop layout rules on modules
|
2021-08-27 17:19:43 +01:00 |
|
Grant Willcox
|
7cf2e66085
|
Fix up regex to properly match results and not include the 'version' part of the string, which was causing Rex::Version to return incorrect results and therefore make the 'check' method fail
|
2021-08-26 17:41:41 -05:00 |
|
Grant Willcox
|
415b46d9a7
|
Fix Rubocop errors
|
2021-08-26 16:52:58 -05:00 |
|
Dimitrie-Toma Furdui
|
63aaa8f438
|
fixed version check for docker_credential_wincred
|
2021-08-26 16:33:45 -05:00 |
|
Spencer McIntyre
|
674628e600
|
Land #15384, Improve Windows RDLL injection
|
2021-08-26 12:11:44 -04:00 |
|
Grant Willcox
|
be9a7bc9b9
|
Fix up error in alpc_taskscheduler.rb where it expected a DLL but we passed it shellcode instead
|
2021-08-26 09:27:21 -05:00 |
|
Grant Willcox
|
7652a2240e
|
Add in missing import for modules/exploits/windows/local/ntapphelpcachecontrol.rb to prevent crashes due to execute_dll not being defined
|
2021-08-25 18:19:58 -05:00 |
|
Grant Willcox
|
5a80e9678c
|
Address Spencer's comments and remove changes that don't directly use the DLL injection library API change
|
2021-08-24 16:34:01 -05:00 |
|
sjanusz
|
8e00c5a188
|
Add default payload option to targets
|
2021-08-20 16:38:22 +01:00 |
|
William Vu
|
31796c6236
|
Land #15561, ProxyShell exploit
|
2021-08-19 10:31:02 -05:00 |
|
William Vu
|
0a06730802
|
Update contributors
|
2021-08-19 10:30:21 -05:00 |
|
Spencer McIntyre
|
84f8c44e69
|
Write to the targeted backend server
|
2021-08-18 12:34:40 -04:00 |
|
Spencer McIntyre
|
75e63992d6
|
Write an exploit for ProxyShell
|
2021-08-18 10:50:34 -04:00 |
|
Jack Heysel
|
5aa56b303a
|
Land #15539, Fix cve_2018_8453_win32k_priv_esc
Fixes the check method for the above module, prior
to this change the module was not running against 1703.
|
2021-08-13 11:01:58 -04:00 |
|
Grant Willcox
|
85ef49a79c
|
Land #15535, Update psexec module to use SMBSHARE option name for consistency
|
2021-08-11 17:41:38 -05:00 |
|
Grant Willcox
|
5fdf990f24
|
Land #15519, Lexmark Universal Print Driver Local Privilege Escalation
|
2021-08-11 15:03:53 -05:00 |
|
Grant Willcox
|
7b25bd366f
|
Update documentation and fix a few typos so that it reflects latest changes
|
2021-08-11 12:25:36 -05:00 |
|
Jacob Baines
|
afa3d92774
|
Switched to upnp implementation
|
2021-08-10 18:17:18 -04:00 |
|
Dimitrie-Toma Furdui
|
6dae595e4e
|
fixed version check for cve_2018_8453_win32k_priv_esc
|
2021-08-10 21:49:42 +03:00 |
|
adfoster-r7
|
b9d2f30bbd
|
Update psexec module to use SMBSHARE option name for consistency
|
2021-08-10 13:17:57 +01:00 |
|
Jacob Baines
|
b3dbf7c0e9
|
Altered the approach in check
|
2021-08-09 22:05:16 -04:00 |
|
Grant Willcox
|
55404ff29f
|
Further fixes from review and further touch up edits
|
2021-08-09 14:23:05 -05:00 |
|
Grant Willcox
|
c03ca1d39d
|
Fix RuboCop error
|
2021-08-09 12:21:07 -05:00 |
|
Grant Willcox
|
f8d838bba2
|
Fix first round of comments from the review process
|
2021-08-09 12:13:27 -05:00 |
|
Grant Willcox
|
8517286e89
|
RuboCop fix to description to make it happy
|
2021-08-09 10:05:21 -05:00 |
|
Grant Willcox
|
838142362c
|
Apply first round of updates from review comments to improve explanations of the vulnerability and fix some minor issues
|
2021-08-09 09:59:09 -05:00 |
|
Jacob Baines
|
7703810c4a
|
Fixed rubocop issue
|
2021-08-07 06:59:50 -04:00 |
|
Jacob Baines
|
0e41a0e81e
|
Addressed all but one review items
|
2021-08-07 06:46:49 -04:00 |
|
Jacob Baines
|
8d699c0c4e
|
Addressed various review comments
|
2021-08-06 14:55:50 -04:00 |
|
Jacob Baines
|
f851faf2e4
|
Initial commit for Canon driver exploit
|
2021-08-05 11:17:45 -04:00 |
|
Jacob Baines
|
4cff38b9c2
|
Fixed rubocop issues
|
2021-08-04 16:41:20 -04:00 |
|
Jacob Baines
|
699c53151b
|
Fixed msftidy issues
|
2021-08-04 16:14:27 -04:00 |
|
Jacob Baines
|
e6c48db072
|
Initial version of CVE-2021-35449
|
2021-08-04 16:08:43 -04:00 |
|
cgranleese-r7
|
56510a2e8e
|
Updates some notes on modules that weren't passing tests due to new rubocop rule
|
2021-07-28 16:20:02 +01:00 |
|
Grant Willcox
|
31b82452ec
|
Fix up Spencer's comments from review to correctly pass in parameters to execute_dll() as some calls were passing the wrong set of parameters
|
2021-07-23 12:34:25 -05:00 |
|
Grant Willcox
|
2fb379374f
|
Update documentation where possible for changed exploits
|
2021-07-23 12:34:12 -05:00 |
|
Grant Willcox
|
fabc566402
|
Improve process.rb's execute_dll to now automatically detect the architecture of the target and of the DLL and then appropriately decide if it needs to launch a WoW64 process to inject into.
|
2021-07-23 12:33:41 -05:00 |
|
Grant Willcox
|
bc0439fc47
|
Improve the list of potential processes to spawn and inject into to be more believable
|
2021-07-23 12:33:16 -05:00 |
|
Grant Willcox
|
96b15c9650
|
Update process.rb to support injecting into a random process and not just notepad.exe all the time to improve signature evasion. Also support injecting into one's own Meterpreter process for further stealth. Finally update one module to showcase off how these changes look like on a real module.
|
2021-07-23 12:33:01 -05:00 |
|
William Vu
|
0ba430c8c4
|
Fix a bunch of things
Mostly RuboCop and refactoring.
|
2021-07-20 20:07:08 -05:00 |
|
adfoster-r7
|
f189724174
|
Land #15217, Combine eternalblue modules
|
2021-07-09 12:23:34 +01:00 |
|
William Vu
|
6fbaecf919
|
Backport print changes to recent modules
|
2021-07-08 21:26:35 -05:00 |
|
A Galway
|
cb31ffd82f
|
add support for authenticated login with smb1
|
2021-07-08 18:41:54 +01:00 |
|
A Galway
|
ccf5c36c44
|
combine both verseions of eb into a single module
|
2021-07-08 17:42:35 +01:00 |
|
A Galway
|
88e64fcfae
|
eternalblue_win8 ported from python to ruby
|
2021-07-08 17:42:30 +01:00 |
|
agalway-r7
|
410493f729
|
Land #15318, NSClient priv esc post module
|
2021-07-06 16:07:30 +01:00 |
|
Hakyac
|
8b0c4a1042
|
Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
|
2021-07-06 11:18:56 +02:00 |
|
Yann Castel
|
1a057d321b
|
rhost is working
|
2021-07-05 10:24:49 +02:00 |
|
Hakyac
|
2085c2db13
|
Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
|
2021-06-30 20:28:35 +02:00 |
|
Yann Castel
|
211bf4351d
|
adding delay option
|
2021-06-18 11:32:15 +02:00 |
|