Commit Graph

740 Commits

Author SHA1 Message Date
h00die 8beb6255cb fix spelling in aux modules 2024-01-07 15:02:53 -05:00
RadioLogic 61c4ba7503 Renamed module to correct name 2023-05-25 21:21:49 -04:00
RadioLogic 72ef6537ef Added tested versions to description 2023-05-25 14:21:52 -04:00
RadioLogic 1c57019096 Merge branch 'master' into vsftpd_232 2023-05-24 10:58:22 -04:00
RadioLogic 0aee634d67 Put authors on separate lines 2023-05-24 10:48:31 -04:00
RadioLogic 6882a7cc60 Shortened payload to be readable 2023-05-17 12:05:40 -04:00
RadioLogic ab0b8b8274 Ran msftidy on module 2023-05-17 11:48:09 -04:00
RadioLogic 775173381c Made progress show in dots rather than status 2023-05-17 11:44:37 -04:00
RadioLogic 9c888da5cb Reverted from threading as payload finally works 2023-05-17 11:43:50 -04:00
RadioLogic 49e7c2459f Fixed payload to properly function 2023-05-17 11:40:29 -04:00
RadioLogic 6a846c2c94 Added stub since stopping doesnt exist 2023-05-17 00:44:18 -04:00
RadioLogic b7b1df23ea Implemented threading into module 2023-05-12 14:28:10 -04:00
RadioLogic 04e6bf804f Made stability involve service down 2023-05-12 14:27:58 -04:00
cgranleese-r7 e004be00fe Converted to Active Support 2023-04-05 16:53:01 +01:00
cgranleese-r7 769e2e760c stop point 2023-04-04 10:27:15 +01:00
cgranleese-r7 c3a7da54d5 reduces code duplication 2023-04-04 10:27:11 +01:00
cgranleese-r7 40e6917b7f tests passing 2023-04-04 10:24:09 +01:00
cgranleese-r7 10144a9f13 Land #17615, Add missing module notes for stability reliability and side effects 2023-02-08 12:28:47 +00:00
adfoster-r7 433bafdccf Add missing module notes for stability reliability and side effects 2023-02-08 11:45:17 +00:00
bcoles 19b526d584 qubes_mirage_firewall_dos: Fix notes for SideEffects and Reliability 2023-02-05 12:04:59 +11:00
Krzysztof Burghardt 551edbe0d1 Review and lint fixes 2023-01-09 13:27:35 -06:00
Krzysztof Burghardt a1ee09d544 New exploit for CVE-2022-46770 Mirage firewall DoS 2023-01-09 13:27:35 -06:00
Jeffrey Martin 6b5948a69d restore raw_send_recv for module using SMTP mixin
changes in #16153 adjusted modules that were not utilizing
`Exploit::Remote::SMTPDeliver` in error restore calls to `raw_send_recv`
that is no longer shadowed by in `SMTPDeliver`.
2023-01-04 14:45:58 -06:00
bcoles 431804ef15 Fix typos: Replace 'the the' with 'the' 2022-12-04 17:41:24 +11:00
RadioLogic 6d676e9ac5 Added vsftpd dos module 2022-11-26 16:00:01 -05:00
bcoles 5f92d9418d Modules: Fix Stability/SideEffects/Reliability notes for several modules 2022-10-01 17:54:59 +10:00
adfoster-r7 3a281234df Add feature flagged datastore rewrite, with support for option fallback lookups 2022-09-16 12:59:02 +01:00
sjanusz bbf9e3163a Fix file reads on Windows for binary files 2022-03-21 12:47:39 +00:00
Grant Willcox 0f2813f70c Update module and documentation for edits found whilst doing final pass of code 2022-03-16 16:55:03 -05:00
mauricelambert e678615f27 Fix items from code review 2022-03-16 16:54:38 -05:00
mauricelambert 33e12bf06f Correct CVE number, comments and documentation 2022-03-16 16:54:24 -05:00
mauricelambert b745a24a9d Random payload && TARGETURI option 2022-03-16 16:54:15 -05:00
mauricelambert 7c806a8723 Add auxiliary module for DOS IIS Server 2022-03-16 16:53:59 -05:00
adfoster-r7 ad2fab6fee Land #16153, read full response on smtp send/recv 2022-03-04 01:24:46 +00:00
h00die d5ba1afbec fix URLs not resolving
fix URLs not resolving

add csv export to references

fix URLs not resolving

pdf not pd

missed a url change

remove extra recirectedfrom fields

remove extra file

fix ovftool url accidental replacement
2022-02-16 17:22:40 -06:00
Jeffrey Martin af3fa09896 refactor smtp delivery to support continuation
When dealing with SMTP servers the communication needs to flow
a known protocol. To ensure the socket is in the correct state
after a send and receive it needs to be read until a line return
a response code followed by a `space` and additional data and `\r\n`
or the response code immediately followed by `\r\n` is returned.
2022-02-14 16:55:49 -06:00
Marek Šuppa c1fefd0856 fix: Missing comma
* Fix missing comma in a list of useragents
2022-01-29 00:51:56 +01:00
Jeffrey Martin 21a6a18d92 trade URI.encode & URI.escape for Ruby 3
Ruby 3 removed the `URI.escape` methods however access to
the a parse for the same RFC is stil available at `URI::DEFAULT_PARSER.escape`.

Per the Ruby forum [comment](https://bugs.ruby-lang.org/issues/17309#note-1) this should equal.
2021-11-22 14:11:03 -06:00
Joshua Rogers f0eb43d99f Update modules/auxiliary/dos/http/squid_range_dos.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2021-10-21 19:15:30 +02:00
Joshua Rogers 2a6f19f0f4 Final lintify 2021-10-21 10:24:00 +02:00
Joshua Rogers 095c02d363 Include CVE-2021-31807 proof-of-concept. Also remove excessive HTTP
headers where possible.
2021-10-20 21:01:48 +02:00
Spencer McIntyre 94fd173e8e Update module docs, report the vuln 2021-10-19 16:40:24 -04:00
Spencer McIntyre 0213efe588 Use Metasploit's HTTP server to trigger the DoS 2021-10-19 15:06:02 -04:00
Joshua Rogers c58dd6bfd1 Use HttpClient in place of sockets. Lintify. 2021-10-07 19:04:46 +02:00
Joshua Rogers eb10f2ac1f Fix typo in ruby script. Add documentation .md file. 2021-10-07 14:01:00 +02:00
Joshua Rogers 1db96ad985 Add notes. 2021-10-07 13:57:11 +02:00
Joshua Rogers fac5f0c987 Add PoC for CVE-2021-31806 Squid DoS Attack 2021-10-07 13:29:56 +02:00
adfoster-r7 4a9a15e638 Run Rubocop layout rules on modules 2021-08-27 17:19:43 +01:00
cgranleese-r7 a894b8cc29 Updates Python shebangs to Python 3 2021-05-18 12:43:04 +01:00
Alan Foster 100da2f1b1 Enforce Style/RedundantBegin for new modules 2021-05-13 04:01:03 +01:00