Commit Graph

7658 Commits

Author SHA1 Message Date
Jacob Baines afa3d92774 Switched to upnp implementation 2021-08-10 18:17:18 -04:00
Dimitrie-Toma Furdui 6dae595e4e fixed version check for cve_2018_8453_win32k_priv_esc 2021-08-10 21:49:42 +03:00
Alan Foster 03400991af Update uses of open ssl 2021-08-10 15:40:23 +01:00
adfoster-r7 b9d2f30bbd Update psexec module to use SMBSHARE option name for consistency 2021-08-10 13:17:57 +01:00
Jacob Baines b3dbf7c0e9 Altered the approach in check 2021-08-09 22:05:16 -04:00
Grant Willcox 55404ff29f Further fixes from review and further touch up edits 2021-08-09 14:23:05 -05:00
Grant Willcox c03ca1d39d Fix RuboCop error 2021-08-09 12:21:07 -05:00
Grant Willcox f8d838bba2 Fix first round of comments from the review process 2021-08-09 12:13:27 -05:00
Grant Willcox 8517286e89 RuboCop fix to description to make it happy 2021-08-09 10:05:21 -05:00
Grant Willcox 838142362c Apply first round of updates from review comments to improve explanations of the vulnerability and fix some minor issues 2021-08-09 09:59:09 -05:00
Jacob Baines 7703810c4a Fixed rubocop issue 2021-08-07 06:59:50 -04:00
Jacob Baines 0e41a0e81e Addressed all but one review items 2021-08-07 06:46:49 -04:00
Jacob Baines 8d699c0c4e Addressed various review comments 2021-08-06 14:55:50 -04:00
Jacob Baines f851faf2e4 Initial commit for Canon driver exploit 2021-08-05 11:17:45 -04:00
Jacob Baines 4cff38b9c2 Fixed rubocop issues 2021-08-04 16:41:20 -04:00
Jacob Baines 699c53151b Fixed msftidy issues 2021-08-04 16:14:27 -04:00
Jacob Baines e6c48db072 Initial version of CVE-2021-35449 2021-08-04 16:08:43 -04:00
cgranleese-r7 56510a2e8e Updates some notes on modules that weren't passing tests due to new rubocop rule 2021-07-28 16:20:02 +01:00
Grant Willcox 31b82452ec Fix up Spencer's comments from review to correctly pass in parameters to execute_dll() as some calls were passing the wrong set of parameters 2021-07-23 12:34:25 -05:00
Grant Willcox 2fb379374f Update documentation where possible for changed exploits 2021-07-23 12:34:12 -05:00
Grant Willcox fabc566402 Improve process.rb's execute_dll to now automatically detect the architecture of the target and of the DLL and then appropriately decide if it needs to launch a WoW64 process to inject into. 2021-07-23 12:33:41 -05:00
Grant Willcox bc0439fc47 Improve the list of potential processes to spawn and inject into to be more believable 2021-07-23 12:33:16 -05:00
Grant Willcox 96b15c9650 Update process.rb to support injecting into a random process and not just notepad.exe all the time to improve signature evasion. Also support injecting into one's own Meterpreter process for further stealth. Finally update one module to showcase off how these changes look like on a real module. 2021-07-23 12:33:01 -05:00
William Vu 0ba430c8c4 Fix a bunch of things
Mostly RuboCop and refactoring.
2021-07-20 20:07:08 -05:00
adfoster-r7 f189724174 Land #15217, Combine eternalblue modules 2021-07-09 12:23:34 +01:00
William Vu 6fbaecf919 Backport print changes to recent modules 2021-07-08 21:26:35 -05:00
A Galway cb31ffd82f add support for authenticated login with smb1 2021-07-08 18:41:54 +01:00
A Galway ccf5c36c44 combine both verseions of eb into a single module 2021-07-08 17:42:35 +01:00
A Galway 88e64fcfae eternalblue_win8 ported from python to ruby 2021-07-08 17:42:30 +01:00
agalway-r7 410493f729 Land #15318, NSClient priv esc post module 2021-07-06 16:07:30 +01:00
Hakyac 8b0c4a1042 Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-07-06 11:18:56 +02:00
Yann Castel 1a057d321b rhost is working 2021-07-05 10:24:49 +02:00
Hakyac 2085c2db13 Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-06-30 20:28:35 +02:00
Yann Castel 211bf4351d adding delay option 2021-06-18 11:32:15 +02:00
Grant Willcox 62f9d15ba3 Land #15314, Add Exploit for CVE-2021-31181 (SharePoint RCE) 2021-06-16 10:39:49 -05:00
Spencer McIntyre d1be69eae6 Implement changes based on PR feedback 2021-06-14 10:15:27 -04:00
Yann Castel d8c0b67c96 Merge branch 'nscp_pe' of github.com:Hakyac/metasploit-framework into nscp_pe 2021-06-14 10:08:20 +02:00
Hakyac c9a0e3b58a Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-06-14 10:08:59 +02:00
Yann Castel 1e6fcd8e3a Merge branch 'nscp_pe' of github.com:Hakyac/metasploit-framework into nscp_pe 2021-06-14 10:07:14 +02:00
Hakyac b8bf750886 Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-06-14 10:07:01 +02:00
Spencer McIntyre edee95bbb2 Update the check to not fail if a COOKIE is used 2021-06-10 11:29:07 -04:00
Yann Castel 8557d73a65 better error handling 'get_auth_token' 2021-06-10 09:54:06 +02:00
Hakyac da866d13e8 Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-06-10 09:32:24 +02:00
Hakyac 82ce7e2ab3 Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-06-10 09:32:01 +02:00
Hakyac 7f3bd1a61a Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-06-10 09:21:04 +02:00
agalway-r7 1858b574ec Land #15305, Authenticated RCE module for NSClient++ 2021-06-09 15:38:34 +01:00
Yann Castel 87847cf886 fix typo 2021-06-09 15:11:55 +02:00
Yann Castel ebc8dba921 intial commit 2021-06-09 15:10:03 +02:00
Yann Castel c7b7b871c9 missing variable e for rescue 2021-06-09 11:13:39 +02:00
Yann Castel 674eb51f86 add scenario + small changes 2021-06-09 08:59:35 +02:00