Commit Graph

7074 Commits

Author SHA1 Message Date
adfoster-r7 4a9a15e638 Run Rubocop layout rules on modules 2021-08-27 17:19:43 +01:00
Grant Willcox 7cf2e66085 Fix up regex to properly match results and not include the 'version' part of the string, which was causing Rex::Version to return incorrect results and therefore make the 'check' method fail 2021-08-26 17:41:41 -05:00
Grant Willcox 415b46d9a7 Fix Rubocop errors 2021-08-26 16:52:58 -05:00
Dimitrie-Toma Furdui 63aaa8f438 fixed version check for docker_credential_wincred 2021-08-26 16:33:45 -05:00
Spencer McIntyre 674628e600 Land #15384, Improve Windows RDLL injection 2021-08-26 12:11:44 -04:00
Grant Willcox be9a7bc9b9 Fix up error in alpc_taskscheduler.rb where it expected a DLL but we passed it shellcode instead 2021-08-26 09:27:21 -05:00
Grant Willcox 7652a2240e Add in missing import for modules/exploits/windows/local/ntapphelpcachecontrol.rb to prevent crashes due to execute_dll not being defined 2021-08-25 18:19:58 -05:00
Grant Willcox 5a80e9678c Address Spencer's comments and remove changes that don't directly use the DLL injection library API change 2021-08-24 16:34:01 -05:00
sjanusz 8e00c5a188 Add default payload option to targets 2021-08-20 16:38:22 +01:00
William Vu 31796c6236 Land #15561, ProxyShell exploit 2021-08-19 10:31:02 -05:00
William Vu 0a06730802 Update contributors 2021-08-19 10:30:21 -05:00
Spencer McIntyre 84f8c44e69 Write to the targeted backend server 2021-08-18 12:34:40 -04:00
Spencer McIntyre 75e63992d6 Write an exploit for ProxyShell 2021-08-18 10:50:34 -04:00
Jack Heysel 5aa56b303a Land #15539, Fix cve_2018_8453_win32k_priv_esc
Fixes the check method for the above module, prior
to this change the module was not running against 1703.
2021-08-13 11:01:58 -04:00
Grant Willcox 85ef49a79c Land #15535, Update psexec module to use SMBSHARE option name for consistency 2021-08-11 17:41:38 -05:00
Grant Willcox 5fdf990f24 Land #15519, Lexmark Universal Print Driver Local Privilege Escalation 2021-08-11 15:03:53 -05:00
Grant Willcox 7b25bd366f Update documentation and fix a few typos so that it reflects latest changes 2021-08-11 12:25:36 -05:00
Jacob Baines afa3d92774 Switched to upnp implementation 2021-08-10 18:17:18 -04:00
Dimitrie-Toma Furdui 6dae595e4e fixed version check for cve_2018_8453_win32k_priv_esc 2021-08-10 21:49:42 +03:00
adfoster-r7 b9d2f30bbd Update psexec module to use SMBSHARE option name for consistency 2021-08-10 13:17:57 +01:00
Jacob Baines b3dbf7c0e9 Altered the approach in check 2021-08-09 22:05:16 -04:00
Grant Willcox 55404ff29f Further fixes from review and further touch up edits 2021-08-09 14:23:05 -05:00
Grant Willcox c03ca1d39d Fix RuboCop error 2021-08-09 12:21:07 -05:00
Grant Willcox f8d838bba2 Fix first round of comments from the review process 2021-08-09 12:13:27 -05:00
Grant Willcox 8517286e89 RuboCop fix to description to make it happy 2021-08-09 10:05:21 -05:00
Grant Willcox 838142362c Apply first round of updates from review comments to improve explanations of the vulnerability and fix some minor issues 2021-08-09 09:59:09 -05:00
Jacob Baines 7703810c4a Fixed rubocop issue 2021-08-07 06:59:50 -04:00
Jacob Baines 0e41a0e81e Addressed all but one review items 2021-08-07 06:46:49 -04:00
Jacob Baines 8d699c0c4e Addressed various review comments 2021-08-06 14:55:50 -04:00
Jacob Baines f851faf2e4 Initial commit for Canon driver exploit 2021-08-05 11:17:45 -04:00
Jacob Baines 4cff38b9c2 Fixed rubocop issues 2021-08-04 16:41:20 -04:00
Jacob Baines 699c53151b Fixed msftidy issues 2021-08-04 16:14:27 -04:00
Jacob Baines e6c48db072 Initial version of CVE-2021-35449 2021-08-04 16:08:43 -04:00
cgranleese-r7 56510a2e8e Updates some notes on modules that weren't passing tests due to new rubocop rule 2021-07-28 16:20:02 +01:00
Grant Willcox 31b82452ec Fix up Spencer's comments from review to correctly pass in parameters to execute_dll() as some calls were passing the wrong set of parameters 2021-07-23 12:34:25 -05:00
Grant Willcox 2fb379374f Update documentation where possible for changed exploits 2021-07-23 12:34:12 -05:00
Grant Willcox fabc566402 Improve process.rb's execute_dll to now automatically detect the architecture of the target and of the DLL and then appropriately decide if it needs to launch a WoW64 process to inject into. 2021-07-23 12:33:41 -05:00
Grant Willcox bc0439fc47 Improve the list of potential processes to spawn and inject into to be more believable 2021-07-23 12:33:16 -05:00
Grant Willcox 96b15c9650 Update process.rb to support injecting into a random process and not just notepad.exe all the time to improve signature evasion. Also support injecting into one's own Meterpreter process for further stealth. Finally update one module to showcase off how these changes look like on a real module. 2021-07-23 12:33:01 -05:00
William Vu 0ba430c8c4 Fix a bunch of things
Mostly RuboCop and refactoring.
2021-07-20 20:07:08 -05:00
adfoster-r7 f189724174 Land #15217, Combine eternalblue modules 2021-07-09 12:23:34 +01:00
William Vu 6fbaecf919 Backport print changes to recent modules 2021-07-08 21:26:35 -05:00
A Galway cb31ffd82f add support for authenticated login with smb1 2021-07-08 18:41:54 +01:00
A Galway ccf5c36c44 combine both verseions of eb into a single module 2021-07-08 17:42:35 +01:00
A Galway 88e64fcfae eternalblue_win8 ported from python to ruby 2021-07-08 17:42:30 +01:00
agalway-r7 410493f729 Land #15318, NSClient priv esc post module 2021-07-06 16:07:30 +01:00
Hakyac 8b0c4a1042 Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-07-06 11:18:56 +02:00
Yann Castel 1a057d321b rhost is working 2021-07-05 10:24:49 +02:00
Hakyac 2085c2db13 Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-06-30 20:28:35 +02:00
Yann Castel 211bf4351d adding delay option 2021-06-18 11:32:15 +02:00