Jeffrey Martin
6b5948a69d
restore raw_send_recv for module using SMTP mixin
...
changes in #16153 adjusted modules that were not utilizing
`Exploit::Remote::SMTPDeliver` in error restore calls to `raw_send_recv`
that is no longer shadowed by in `SMTPDeliver`.
2023-01-04 14:45:58 -06:00
Jeffrey Martin
af3fa09896
refactor smtp delivery to support continuation
...
When dealing with SMTP servers the communication needs to flow
a known protocol. To ensure the socket is in the correct state
after a send and receive it needs to be read until a line return
a response code followed by a `space` and additional data and `\r\n`
or the response code immediately followed by `\r\n` is returned.
2022-02-14 16:55:49 -06:00
cgranleese-r7
a894b8cc29
Updates Python shebangs to Python 3
2021-05-18 12:43:04 +01:00
dwelch-r7
319f15d938
Handle nil versions for rubygems 4
2021-02-25 16:47:49 +00:00
Alan Foster
5b438fd933
Preference target values when registering options
2020-11-05 23:16:37 +00:00
Alan Foster
30809787c4
Convert disclosure dates to iso8601
2020-10-02 21:00:37 +01:00
mattaberegg
a861ad3f21
Payload handler/cleanup improvement
2020-02-19 18:57:08 -08:00
mattaberegg
a0b6584d19
Added password randomization
2020-02-07 19:14:56 -08:00
mattaberegg
e2f2d55ecc
Updated check message
2020-02-07 18:34:27 -08:00
mattaberegg
cb372a54f4
Added info to cleanup message
2020-02-07 16:41:27 -08:00
mattaberegg
a05611d756
Improve cleanup functionality
2020-02-07 16:13:25 -08:00
mattaberegg
edb3aa30f8
Minor style and performance edits
2020-02-05 15:19:06 -08:00
mattaberegg
6f453a0f83
Module rewrite to include Cron exploitation
2020-02-02 17:29:39 -08:00
mattaberegg
c1b66aac77
Updated check function and description
2020-01-20 17:16:45 -08:00
mattaberegg
4af14109f5
Grammar change in exploit name
2020-01-19 14:15:11 -08:00
mattaberegg
d91a166034
Made changes from comments on PR #12858
2020-01-19 13:46:47 -08:00
mattaberegg
fc1b337c58
Add Apache James 2.3.2 Insecure User Creation Command Injection exploit module.
2020-01-18 19:05:27 -08:00
Brent Cook
ce991071e4
Land #12524 , update most python code with python 3 compatibility
2019-12-23 14:49:08 -06:00
h00die
8cb58be4c0
style
2019-12-11 06:44:35 -05:00
h00die
3b2a54a599
add aka to some modules
2019-12-10 09:53:13 -05:00
Cristina
c9948c037d
Apply suggestions from code review
...
- Change executable in shebang from python3 to python
- Revert changes to files that will only run as python2
Co-Authored-By: acammack-r7 <adam_cammack@rapid7.com >
2019-11-01 19:20:22 -07:00
Cristina Muñoz
10b5df1c4f
Change all python2.7 shebangs to python3.
...
Remove utf-8 encoding declarations, as this is the default for python3.
2019-10-31 15:10:58 -07:00
Cristina Muñoz
8563a29003
Convert all python code to python3. Fixes #12506 .
2019-10-31 14:16:14 -07:00
Auxilus
6c9fafb9d5
Delete unused variable
...
I suppose the variable 'f' was for Name in https://github.com/rapid7/metasploit-framework/blob/06720ee18b2d661aa5ea695ed80e4daa88fbf20c/modules/exploits/linux/smtp/haraka.py#L70
I'm not sure, should it be 'f' at https://github.com/rapid7/metasploit-framework/blob/06720ee18b2d661aa5ea695ed80e4daa88fbf20c/modules/exploits/linux/smtp/haraka.py#L70 or just the way it is atm?
2018-12-14 22:27:11 +05:30
Erin Bleiweiss
69a785ff46
Update json for python modules
2018-08-31 16:56:22 -05:00
Brent Cook
b90583d07c
don't throw an exception in haraka checks if we cannot connect
2018-07-18 17:17:45 -05:00
Adam Cammack
1fddbdb8ef
Specify the command option external modules
2018-07-10 10:24:07 -05:00
William Vu
0820268d8a
Improve rank handling with shim logic
2018-06-19 16:46:20 -05:00
William Vu
9913606ed9
Correct rank and formatting in Haraka
2018-06-19 11:44:02 -05:00
Adam Cammack
b0e712e992
Add banner check exploit/linux/smtp/haraka
2018-05-11 12:45:32 -05:00
Adam Cammack
90f2fe545c
Add PEP8 whitespace to exploit/linux/smtp/haraka
2018-05-11 12:43:30 -05:00
Adam Cammack
dd57138423
Make external module read loop more robust
...
Changes from a "hope we get at most one message at a time" model to
something beginning to resemble a state machine. Also logs error output
and fails the MSF module when the external module fails.
2017-11-20 16:52:05 -06:00
h00die
a40429158f
40% done
2017-08-28 20:17:58 -04:00
Brent Cook
6300758c46
use https for metaploit.com links
2017-07-24 06:26:21 -07:00
g0tmi1k
524373bb48
OCD - Removed un-needed full stop
2017-07-21 07:41:51 -07:00
g0tmi1k
b8d80d87f1
Remove last newline after class - Make @wvu-r7 happy
2017-07-19 11:19:49 +01:00
Brent Cook
f4820d24fb
add a few more AKA references
2017-07-06 22:43:46 -05:00
Brent Cook
fede672a81
further revise templates
2017-05-08 14:26:24 -05:00
William Vu
64452de06d
Fix msf/core and self.class msftidy warnings
...
Also fixed rex requires.
2017-05-03 15:44:51 -05:00
Brent Cook
037fdf854e
move common json-rpc bits to a library
2017-04-26 18:08:08 -05:00
Nate Caroe
92e7183a74
Small typo fix
...
Running msfconsole would generate an Ubuntu crash report (?). This seems to be the culprit.
2017-04-17 11:14:51 -06:00
Adam Cammack
6910cb04dd
Add first exploit written in Python
2017-03-31 17:07:55 -05:00
OJ
1d617ae389
Implement first pass of architecture/platform refactor
2016-10-28 07:16:05 +10:00
Thao Doan
7c396dbf59
Use URIHOST
2016-09-16 12:48:54 -07:00
aushack
11342356f8
Support LHOST for metasploit behind NAT
2016-09-13 11:23:49 +10:00
Brent Cook
b08d1ad8d8
Revert "Land #6812 , remove broken OSVDB references"
...
This reverts commit 2b016e0216 , reversing
changes made to 7b1d9596c7 .
2016-07-15 12:00:31 -05:00
wchen-r7
816bc91e45
Resolve #6807 , remove all OSVDB references.
...
OSVDB is no longer a vulnerability database, therefore all the
references linked to it are invalid.
Resolve #6807
2016-04-23 12:32:34 -05:00
Christian Mehlmauer
3123175ac7
use MetasploitModule as a class name
2016-03-08 14:02:44 +01:00
Brent Cook
f703fa21d6
Revert "change Metasploit3 class names"
...
This reverts commit 666ae14259 .
2016-03-07 13:19:55 -06:00
Brent Cook
44990e9721
Revert "change Metasploit4 class names"
...
This reverts commit 3da9535e22 .
2016-03-07 13:19:48 -06:00