Joshua Rogers
|
f0eb43d99f
|
Update modules/auxiliary/dos/http/squid_range_dos.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
|
2021-10-21 19:15:30 +02:00 |
|
Joshua Rogers
|
2a6f19f0f4
|
Final lintify
|
2021-10-21 10:24:00 +02:00 |
|
Joshua Rogers
|
095c02d363
|
Include CVE-2021-31807 proof-of-concept. Also remove excessive HTTP
headers where possible.
|
2021-10-20 21:01:48 +02:00 |
|
Spencer McIntyre
|
94fd173e8e
|
Update module docs, report the vuln
|
2021-10-19 16:40:24 -04:00 |
|
Spencer McIntyre
|
0213efe588
|
Use Metasploit's HTTP server to trigger the DoS
|
2021-10-19 15:06:02 -04:00 |
|
Joshua Rogers
|
c58dd6bfd1
|
Use HttpClient in place of sockets. Lintify.
|
2021-10-07 19:04:46 +02:00 |
|
Joshua Rogers
|
eb10f2ac1f
|
Fix typo in ruby script. Add documentation .md file.
|
2021-10-07 14:01:00 +02:00 |
|
Joshua Rogers
|
1db96ad985
|
Add notes.
|
2021-10-07 13:57:11 +02:00 |
|
Joshua Rogers
|
fac5f0c987
|
Add PoC for CVE-2021-31806 Squid DoS Attack
|
2021-10-07 13:29:56 +02:00 |
|