Ashley Donaldson
|
75ba9110e2
|
Added module for Windows version comparisons
Utilised it in various existing modules - this should fix some subtle bugs in specific modules' version detection.
|
2023-05-25 14:36:46 +10:00 |
|
adfoster-r7
|
059e39a6f0
|
Specify meterpreter compatibility command requirements
|
2021-09-08 22:59:25 +01:00 |
|
adfoster-r7
|
4a9a15e638
|
Run Rubocop layout rules on modules
|
2021-08-27 17:19:43 +01:00 |
|
dwelch-r7
|
319f15d938
|
Handle nil versions for rubygems 4
|
2021-02-25 16:47:49 +00:00 |
|
Alan Foster
|
5b3fde7735
|
Rubocop recently landed modules
|
2021-02-16 15:08:08 +00:00 |
|
Alan Foster
|
30809787c4
|
Convert disclosure dates to iso8601
|
2020-10-02 21:00:37 +01:00 |
|
gwillcox-r7
|
593945ee61
|
Update module documentation with more detail r.e affected versions and the fact that the use of UNC paths could cause an issue if they are not typed in correctly. Also update the module documentation to use the output from recent tests to reflect recent changes. Shortern the module description and update its stability rating. Finally add in a reliability rating for the exploit module.
|
2020-09-10 11:32:45 -05:00 |
|
gwillcox-r7
|
16b27ae270
|
Add in version checking to ensure we only check if the target has the 'Enable insecure guest logons' enabled if their build number is greater than or equal to 10.0.16299.0, which was the build where this change first was implemented.
|
2020-09-10 11:32:45 -05:00 |
|
gwillcox-r7
|
45480373a9
|
Fix up the exploit module so that it will not wait for AV if a UNC path is used, as there is no chance the AV on the host can remove the file on the UNC share, and the UNC share won't be accessed until the exact moment it is needed
|
2020-09-10 11:32:45 -05:00 |
|
gwillcox-r7
|
7e1560ff26
|
Update documentation with the installation instructions I mentioned in the GitHub comments. Also RuboCop the exploit module code.
|
2020-09-10 11:32:18 -05:00 |
|
gwillcox-r7
|
0d493bbc54
|
Add in extra code to handle cases where the loops may enter a infinte loop state. New code should prevent this from happening
|
2020-09-10 11:32:18 -05:00 |
|
gwillcox-r7
|
a94d36248b
|
Add in the AVTIMEOUT option to allow the module to check if any AV or other processes deleted the uploaded DLL file, thereby preventing a situation where the DNS server is unable to restart. Also add in some warning's r.e when we enter the danger section and when we exit it so that users at more aware of when this is happening.
|
2020-09-10 11:32:18 -05:00 |
|
gwillcox-r7
|
78dc43efa5
|
Fix up incorrect regex within the check method to fix a logic bug
|
2020-09-10 11:32:18 -05:00 |
|
ide0x90
|
c4d463e921
|
Added option to generate standalone DLL.
|
2020-09-10 11:32:18 -05:00 |
|
ide0x90
|
53f3b70b33
|
Changed DLL so that it doesn't block the DNS service from stopping after the module executes.
Added OS check (>= Server 2003 is vulnerable so far).
Now cleans up dropped DLL and modified registry value.
|
2020-09-10 11:32:18 -05:00 |
|
ide0x90
|
7701ea1bc8
|
Compile DLL so that the DNS service doesn't crash when the module is run.
|
2020-09-10 11:32:18 -05:00 |
|
ide0x90
|
151fdb7ea5
|
Reduced exploit ranking and added check to see if session is elevated.
|
2020-09-10 11:32:18 -05:00 |
|
ide0x90
|
d1e9039af4
|
Initial module and documentation for Microsoft Windows DNS ServerLevelPluginDll abuse
|
2020-09-10 11:31:51 -05:00 |
|