bcoles
f6725dfc4e
feedback_assistant_root: Check if OSX version is blank in check method
2023-04-28 19:52:15 +10:00
Jack Heysel
f4ad778bd0
Added missing session types
2023-02-02 13:29:43 -05:00
Jack Heysel
af2ef53462
Land #17415 , macOS dirty cow priv esc
2023-02-02 12:15:19 -05:00
bcoles
6f4a17230d
exploits/osx/local/vmware_fusion_lpe: Add notes
2023-02-02 18:46:08 +11:00
bcoles
ef87a63bde
modules: Check datastore ForceExploit before checking if session is root
2023-02-02 18:17:02 +11:00
Jack Heysel
3c7cbf62e6
Updated default payload
2023-02-01 16:56:28 -05:00
timwr
ce260f53f3
Add CVE-2022-46689 macOS dirty cow
2022-12-28 22:46:08 +07:00
Shelby Pace
0596620de7
Update modules/exploits/osx/local/acronis_trueimage_xpc_privesc.rb
...
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com >
2022-12-13 09:49:59 -06:00
space-r7
13a557013c
support 2021 version of software
...
specifically, the exploit will now search
for com.acronis.helpertool in addtion to the
2020 helper tool name. This also updates the
check() method to return CheckCode::Detected
for when we find the vulnerable service but
can't detect the build number
2022-12-12 15:53:35 -06:00
space-r7
9c7355388c
add attackerkb link
2022-12-06 11:19:05 -06:00
space-r7
162b0daf3b
add new options and usage of pre-compiled exploit
...
also updates documentation with new option
descriptions
2022-11-17 17:20:41 -06:00
space-r7
ea486169b4
use erb template for objective-c code
2022-11-17 11:55:19 -06:00
Shelby Pace
f8dff82a78
Update modules/exploits/osx/local/acronis_trueimage_xpc_privesc.rb
...
Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com >
2022-11-17 10:29:49 -06:00
space-r7
486e469682
add new reference
2022-11-16 10:32:08 -06:00
space-r7
383e121f20
add FileDropper usage and module description
2022-11-15 12:37:39 -06:00
space-r7
e0c693c5a8
add objective-c code and pid code
2022-11-14 17:57:39 -06:00
space-r7
8e59cac3a8
add check and exploit methods
2022-11-11 17:56:13 -06:00
adfoster-r7
059e39a6f0
Specify meterpreter compatibility command requirements
2021-09-08 22:59:25 +01:00
adfoster-r7
4a9a15e638
Run Rubocop layout rules on modules
2021-08-27 17:19:43 +01:00
cgranleese-r7
56510a2e8e
Updates some notes on modules that weren't passing tests due to new rubocop rule
2021-07-28 16:20:02 +01:00
dwelch-r7
319f15d938
Handle nil versions for rubygems 4
2021-02-25 16:47:49 +00:00
Alan Foster
b06c5c12aa
Rubocop recently landed modules continued
2021-02-25 14:13:40 +00:00
Alan Foster
5b3fde7735
Rubocop recently landed modules
2021-02-16 15:08:08 +00:00
Brendan Coles
a1c316c679
msftidy: Fix exploit module checks for author and stack buffer overflow
2021-02-13 04:10:13 +00:00
cgranleese-r7
3a2932b798
Migrate old uses of manual autocheck to use the new prepend autocheck
2021-02-02 10:15:46 +00:00
dwelch-r7
1617b3ec9b
Use zeitwerk for lib/msf/core folder
2020-12-07 10:31:45 +00:00
Alan Foster
30809787c4
Convert disclosure dates to iso8601
2020-10-02 21:00:37 +01:00
Tim W
7b1f5c1728
add documentation
2020-09-04 17:42:30 +08:00
Tim W
c069d940a9
fix restoring of /etc/pam.d/login
2020-08-27 19:04:43 +08:00
Tim W
eabc59e5ed
fix disown
2020-08-19 00:04:14 +08:00
Tim W
dce83ad859
cleanup properly
2020-08-18 17:42:56 +08:00
Tim W
6fad6f8e8d
fix check method
2020-08-18 15:56:05 +08:00
Tim W
0e4fcd7379
CVE-2020-9839
2020-08-18 15:56:01 +08:00
Tim W
d90b822356
fix #13486 , add support for python and cmd targets in osx/local/persistence
2020-05-21 20:12:48 +08:00
Alan Foster
8b47ee6013
Fix fail with call in vmware fusion lpe
2020-05-05 19:24:07 +01:00
Alan Foster
f2c3fc5f00
Rubocop recently landed modules
2020-04-17 11:55:04 +01:00
William Vu
5aab28a1a6
Fix command separator conflict
2020-04-02 11:30:59 -05:00
William Vu
7ed37c2e77
Fix module and get it working on 10.1.6
2020-04-02 11:06:21 -05:00
h00die
954f123e7e
remove extra lines
2020-03-30 22:25:16 -04:00
h00die
1b658aa85f
11.5.3 cleanup and reliability
2020-03-30 22:22:01 -04:00
h00die
0291adf4c7
add 11.5.3 exploit
2020-03-28 11:55:55 -04:00
h00die
a4e11fd311
spaces EOL SMH
2020-03-27 18:01:44 -04:00
h00die
e9e142b573
shoutout
2020-03-27 18:01:43 -04:00
h00die
7bc30ecf39
add version check
2020-03-27 18:01:43 -04:00
h00die
eda3653a51
tidy
2020-03-27 18:01:43 -04:00
h00die
4f6e2fe84e
vmware fusion osx lpe
2020-03-27 18:01:43 -04:00
Tim W
0b0d4c8633
add x64 option to osx/local/persistence and update removal commands
2020-01-28 17:18:23 +08:00
Francesco Soncina
06843d0ea5
update removal commands for osx/local/persistence
...
fixes #12870
2020-01-21 16:53:11 +01:00
Brent Cook
e50ab5cd13
Land #11726 , add exploit for CVE-2019-8513, macOS TimeMachine cmd injection
2019-06-29 05:36:12 -05:00
Wei Chen
efa00cd2d0
Update module description
2019-05-20 12:43:54 -05:00