Spencer McIntyre
|
3afe3ebfa3
|
Add the module docs
|
2021-06-08 15:23:24 -04:00 |
|
Spencer McIntyre
|
325ecfedff
|
Add some error handling while extracting the key
|
2021-06-08 14:58:58 -04:00 |
|
Hakyac
|
dc40cddb04
|
Update modules/exploits/windows/http/nscp_authenticated_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
|
2021-06-08 16:38:01 +02:00 |
|
Hakyac
|
d2bf8ae912
|
Update modules/exploits/windows/http/nscp_authenticated_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
|
2021-06-08 16:34:40 +02:00 |
|
Yann Castel
|
2df710158e
|
conflict fixed
|
2021-06-08 15:29:38 +02:00 |
|
Yann Castel
|
31515faccb
|
various changes
|
2021-06-08 15:26:50 +02:00 |
|
Hakyac
|
ce0c699213
|
Update modules/exploits/windows/http/nscp_authenticated_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
|
2021-06-08 15:11:25 +02:00 |
|
Hakyac
|
1f2f04b0d0
|
Update modules/exploits/windows/http/nscp_authenticated_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
|
2021-06-08 15:10:08 +02:00 |
|
Yann Castel
|
cf5848ab3e
|
add comment for second token generation
|
2021-06-08 14:31:03 +02:00 |
|
Hakyac
|
9e0b7cb171
|
Update modules/exploits/windows/http/nscp_authenticated_rce.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
|
2021-06-08 14:21:04 +02:00 |
|
Hakyac
|
21bfa629d0
|
Update modules/exploits/windows/http/nscp_authenticated_rce.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
|
2021-06-08 14:20:52 +02:00 |
|
Hakyac
|
38c63a6966
|
Update modules/exploits/windows/http/nscp_authenticated_rce.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
|
2021-06-08 14:20:32 +02:00 |
|
Yann Castel
|
e9305dc622
|
rubocop ok
|
2021-06-08 09:32:51 +02:00 |
|
Spencer McIntyre
|
64077e1395
|
Add and use a new sharepoint mixin
|
2021-06-07 15:25:07 -04:00 |
|
Spencer McIntyre
|
8cc220ccbc
|
Initial commit of CVE-2021-31181
|
2021-06-07 13:37:28 -04:00 |
|
Yann Castel
|
bf96b88446
|
add default port + set ssl to true
|
2021-06-07 16:48:16 +02:00 |
|
Yann Castel
|
212039fa6b
|
rubocop ok
|
2021-06-07 16:30:42 +02:00 |
|
Yann Castel
|
6a7e30749d
|
initial commit
|
2021-06-07 14:39:10 +02:00 |
|
William Vu
|
6498554084
|
Clean up NetMotion Mobility exploit and docs
Refactor target selection once again.
|
2021-06-02 23:47:01 -05:00 |
|
Shelby Pace
|
8e4a33f2a2
|
Land #15223, move TokenMagic validation logic
|
2021-05-24 14:51:13 -05:00 |
|
bwatters
|
8e1391f098
|
Land #15216, Fix targeting for CVE-2021-21551
Merge branch 'land-15216' into upstream-master
|
2021-05-21 14:56:08 -05:00 |
|
bwatters
|
72375d1f67
|
Land #15024, Add RCE Exploit For CVE-2020-0796 (SMBGhost)
Merge branch 'land-15024' into upstream-master
|
2021-05-20 17:02:04 -05:00 |
|
Spencer McIntyre
|
a6f650a1a3
|
Add a clear warning about instability due to KPP
|
2021-05-20 17:28:14 -04:00 |
|
bwatters
|
a89fffade1
|
Update check method and move it to earlier in the module to prevent crashing
on windows 7 sp0 targets.
|
2021-05-19 15:58:40 -05:00 |
|
Spencer McIntyre
|
78d47b11f2
|
Add targeting for Windows 10 v21H1
|
2021-05-18 12:56:02 -04:00 |
|
William Vu
|
aad4ea8e09
|
Add check
Thanks to @adfoster-r7 for the round of golf!
|
2021-05-17 13:58:03 -05:00 |
|
William Vu
|
47740c8ac3
|
Add NetMotion Mobility CVE-2021-26914 exploit
|
2021-05-17 13:58:03 -05:00 |
|
Grant Willcox
|
e7983c3b6f
|
Land #15192, Enforce Style/RedundantBegin for new modules
|
2021-05-17 09:51:57 -05:00 |
|
Grant Willcox
|
7a9050c7ea
|
Fix up check method so that it will correctly warn the user that the target might not be vulnerable only cause the DLL hijacking technique doesn't work on certain targets.
|
2021-05-14 17:47:39 -05:00 |
|
Jack Heysel
|
c8b62a1ff9
|
Fixed check method nil check, update numberd list in docs, added wfsdelay warning when in dll mode
|
2021-05-14 17:47:31 -05:00 |
|
Jack Heysel
|
950bbad852
|
Removed nil script check, updated docs
|
2021-05-14 17:47:15 -05:00 |
|
Jack Heysel
|
eb4573164b
|
Addressed comments
|
2021-05-14 17:46:26 -05:00 |
|
Jack Heysel
|
e29dce4f08
|
Removed comments from powershell script
|
2021-05-14 17:45:42 -05:00 |
|
Jack Heysel
|
d23df37b62
|
Responded to comments, refactored to remove duplicate code
|
2021-05-14 17:44:08 -05:00 |
|
Jack Heysel
|
d5f2cfb3de
|
Added x86 codepath for uso trigger
|
2021-05-14 17:44:08 -05:00 |
|
Jack Heysel
|
b112aae55c
|
Rubocop offense
|
2021-05-14 17:44:08 -05:00 |
|
Jack Heysel
|
fab3a9afc8
|
Added wfsdelay, updated docs
|
2021-05-14 17:44:07 -05:00 |
|
Jack Heysel
|
addc1ad601
|
Replace shelled usoclient call with uso_trigger
|
2021-05-14 17:44:07 -05:00 |
|
Jack Heysel
|
5640dac24d
|
Fixed sc command, updated check method, moved tokenmagic.ps1
|
2021-05-14 17:44:07 -05:00 |
|
Jack Heysel
|
ca637be0c9
|
Fixed powershell script, updated authors
|
2021-05-14 17:44:06 -05:00 |
|
Jack Heysel
|
1eab94cc26
|
beta draft
|
2021-05-14 17:43:44 -05:00 |
|
bwatters
|
8792febcf8
|
Land #15190, Add Exploit For CVE-2021-21551 (Dell DBUtil_2_3 IOCTL)
Merge branch 'land-15190' into upstream-master
|
2021-05-14 13:55:12 -05:00 |
|
adfoster-r7
|
ac2c467121
|
Land #15011, Enhance analyze command API to understand modules' needs
|
2021-05-14 14:30:33 +01:00 |
|
Spencer McIntyre
|
d990e884af
|
Add and test even more targets
|
2021-05-13 17:27:58 -04:00 |
|
Spencer McIntyre
|
eb89550f85
|
Clear up some target offset discrepancies
|
2021-05-13 16:06:15 -04:00 |
|
Spencer McIntyre
|
7d841a0f79
|
Add a target for Windows 7 x64
|
2021-05-13 14:24:15 -04:00 |
|
Spencer McIntyre
|
4825407d21
|
Add a target for Windows 8.1 x64
|
2021-05-13 12:56:47 -04:00 |
|
Alan Foster
|
100da2f1b1
|
Enforce Style/RedundantBegin for new modules
|
2021-05-13 04:01:03 +01:00 |
|
Spencer McIntyre
|
477749f77f
|
Refactor the code to be reusable and add docs
|
2021-05-12 16:36:17 -04:00 |
|
Spencer McIntyre
|
d3de52da59
|
The exploit is now functional for Win10 v1803-20H2
|
2021-05-12 16:14:59 -04:00 |
|