h00die
8beb6255cb
fix spelling in aux modules
2024-01-07 15:02:53 -05:00
RadioLogic
61c4ba7503
Renamed module to correct name
2023-05-25 21:21:49 -04:00
RadioLogic
72ef6537ef
Added tested versions to description
2023-05-25 14:21:52 -04:00
RadioLogic
1c57019096
Merge branch 'master' into vsftpd_232
2023-05-24 10:58:22 -04:00
RadioLogic
0aee634d67
Put authors on separate lines
2023-05-24 10:48:31 -04:00
RadioLogic
6882a7cc60
Shortened payload to be readable
2023-05-17 12:05:40 -04:00
RadioLogic
ab0b8b8274
Ran msftidy on module
2023-05-17 11:48:09 -04:00
RadioLogic
775173381c
Made progress show in dots rather than status
2023-05-17 11:44:37 -04:00
RadioLogic
9c888da5cb
Reverted from threading as payload finally works
2023-05-17 11:43:50 -04:00
RadioLogic
49e7c2459f
Fixed payload to properly function
2023-05-17 11:40:29 -04:00
RadioLogic
6a846c2c94
Added stub since stopping doesnt exist
2023-05-17 00:44:18 -04:00
RadioLogic
b7b1df23ea
Implemented threading into module
2023-05-12 14:28:10 -04:00
RadioLogic
04e6bf804f
Made stability involve service down
2023-05-12 14:27:58 -04:00
cgranleese-r7
e004be00fe
Converted to Active Support
2023-04-05 16:53:01 +01:00
cgranleese-r7
769e2e760c
stop point
2023-04-04 10:27:15 +01:00
cgranleese-r7
c3a7da54d5
reduces code duplication
2023-04-04 10:27:11 +01:00
cgranleese-r7
40e6917b7f
tests passing
2023-04-04 10:24:09 +01:00
cgranleese-r7
10144a9f13
Land #17615 , Add missing module notes for stability reliability and side effects
2023-02-08 12:28:47 +00:00
adfoster-r7
433bafdccf
Add missing module notes for stability reliability and side effects
2023-02-08 11:45:17 +00:00
bcoles
19b526d584
qubes_mirage_firewall_dos: Fix notes for SideEffects and Reliability
2023-02-05 12:04:59 +11:00
Krzysztof Burghardt
551edbe0d1
Review and lint fixes
2023-01-09 13:27:35 -06:00
Krzysztof Burghardt
a1ee09d544
New exploit for CVE-2022-46770 Mirage firewall DoS
2023-01-09 13:27:35 -06:00
Jeffrey Martin
6b5948a69d
restore raw_send_recv for module using SMTP mixin
...
changes in #16153 adjusted modules that were not utilizing
`Exploit::Remote::SMTPDeliver` in error restore calls to `raw_send_recv`
that is no longer shadowed by in `SMTPDeliver`.
2023-01-04 14:45:58 -06:00
bcoles
431804ef15
Fix typos: Replace 'the the' with 'the'
2022-12-04 17:41:24 +11:00
RadioLogic
6d676e9ac5
Added vsftpd dos module
2022-11-26 16:00:01 -05:00
bcoles
5f92d9418d
Modules: Fix Stability/SideEffects/Reliability notes for several modules
2022-10-01 17:54:59 +10:00
adfoster-r7
3a281234df
Add feature flagged datastore rewrite, with support for option fallback lookups
2022-09-16 12:59:02 +01:00
sjanusz
bbf9e3163a
Fix file reads on Windows for binary files
2022-03-21 12:47:39 +00:00
Grant Willcox
0f2813f70c
Update module and documentation for edits found whilst doing final pass of code
2022-03-16 16:55:03 -05:00
mauricelambert
e678615f27
Fix items from code review
2022-03-16 16:54:38 -05:00
mauricelambert
33e12bf06f
Correct CVE number, comments and documentation
2022-03-16 16:54:24 -05:00
mauricelambert
b745a24a9d
Random payload && TARGETURI option
2022-03-16 16:54:15 -05:00
mauricelambert
7c806a8723
Add auxiliary module for DOS IIS Server
2022-03-16 16:53:59 -05:00
adfoster-r7
ad2fab6fee
Land #16153 , read full response on smtp send/recv
2022-03-04 01:24:46 +00:00
h00die
d5ba1afbec
fix URLs not resolving
...
fix URLs not resolving
add csv export to references
fix URLs not resolving
pdf not pd
missed a url change
remove extra recirectedfrom fields
remove extra file
fix ovftool url accidental replacement
2022-02-16 17:22:40 -06:00
Jeffrey Martin
af3fa09896
refactor smtp delivery to support continuation
...
When dealing with SMTP servers the communication needs to flow
a known protocol. To ensure the socket is in the correct state
after a send and receive it needs to be read until a line return
a response code followed by a `space` and additional data and `\r\n`
or the response code immediately followed by `\r\n` is returned.
2022-02-14 16:55:49 -06:00
Marek Šuppa
c1fefd0856
fix: Missing comma
...
* Fix missing comma in a list of useragents
2022-01-29 00:51:56 +01:00
Jeffrey Martin
21a6a18d92
trade URI.encode & URI.escape for Ruby 3
...
Ruby 3 removed the `URI.escape` methods however access to
the a parse for the same RFC is stil available at `URI::DEFAULT_PARSER.escape`.
Per the Ruby forum [comment](https://bugs.ruby-lang.org/issues/17309#note-1 ) this should equal.
2021-11-22 14:11:03 -06:00
Joshua Rogers
f0eb43d99f
Update modules/auxiliary/dos/http/squid_range_dos.rb
...
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com >
2021-10-21 19:15:30 +02:00
Joshua Rogers
2a6f19f0f4
Final lintify
2021-10-21 10:24:00 +02:00
Joshua Rogers
095c02d363
Include CVE-2021-31807 proof-of-concept. Also remove excessive HTTP
...
headers where possible.
2021-10-20 21:01:48 +02:00
Spencer McIntyre
94fd173e8e
Update module docs, report the vuln
2021-10-19 16:40:24 -04:00
Spencer McIntyre
0213efe588
Use Metasploit's HTTP server to trigger the DoS
2021-10-19 15:06:02 -04:00
Joshua Rogers
c58dd6bfd1
Use HttpClient in place of sockets. Lintify.
2021-10-07 19:04:46 +02:00
Joshua Rogers
eb10f2ac1f
Fix typo in ruby script. Add documentation .md file.
2021-10-07 14:01:00 +02:00
Joshua Rogers
1db96ad985
Add notes.
2021-10-07 13:57:11 +02:00
Joshua Rogers
fac5f0c987
Add PoC for CVE-2021-31806 Squid DoS Attack
2021-10-07 13:29:56 +02:00
adfoster-r7
4a9a15e638
Run Rubocop layout rules on modules
2021-08-27 17:19:43 +01:00
cgranleese-r7
a894b8cc29
Updates Python shebangs to Python 3
2021-05-18 12:43:04 +01:00
Alan Foster
100da2f1b1
Enforce Style/RedundantBegin for new modules
2021-05-13 04:01:03 +01:00