Commit Graph

168 Commits

Author SHA1 Message Date
dwelch-r7 11c886b30f Land #17616, Run rubocop on post modules 2023-02-08 14:09:16 +00:00
adfoster-r7 a81a71c5df Run rubocop on post modules 2023-02-08 13:47:34 +00:00
adfoster-r7 433bafdccf Add missing module notes for stability reliability and side effects 2023-02-08 11:45:17 +00:00
Brendan Coles c17c2636ae post/osx/gather/hashdump: Add 'meterpreter' to supported SessionTypes 2022-01-20 13:11:24 +00:00
BuildTools ee8838eea5 added validation to make sure the file path is set 2021-04-14 17:47:19 -04:00
BuildTools b42a22c4de Updated documentation 2021-04-01 13:30:39 -04:00
jconnolly80911 c0531f4208 OSX Post exploitation .gitignore retrieval
This post exploitation module is meant to locate all .gitignore files in a user's home directory as well as retrieve the contents of both the .gitignore as well as the files contained in the .gitignore. There are two modes. Mode 1 finds the .gitignore files. Mode 2 retrieves the file. You must set the FILE path with the gitignore file you'd like to retrieve. This could be used to retrieve potentially sensitive artifacts.

After establishing a meterpreter session:
* use post/osx/gather/gitignore
* set mode 1
* set session n (where n is the session in which you'd like to run the module)
* run

The module will take some time to complete but will recursively search all directories from the user's home directory for .gitignore files and then print the absolute path of each file it finds. Copy the path of whichever gitignore you'd like to read and paste into the FILE variable.

* set mode 2
* set file /path/to/.gitignore
* run

At this point, the module will display the contents of the gitignore file. If it contains something of interest, you can copy the filename and replace it in the absolute path for which you found the .gitignore. 

* set file /path/to/artifact
* run

This will retrieve the contents of the artifact you are looking to read.
2021-03-31 14:47:48 -04:00
dwelch-r7 1617b3ec9b Use zeitwerk for lib/msf/core folder 2020-12-07 10:31:45 +00:00
Alan Foster 30809787c4 Convert disclosure dates to iso8601 2020-10-02 21:00:37 +01:00
Brendan Coles a765c1d994 post/osx/gather/enum_osx: Fix typos 2020-08-18 16:02:24 +00:00
Steve Baker 8eca964ced Update path in osx_enum to fix keychain download
Looks like an anchoring "/" has always been missing for the keychain download in enum_osx to function.
2020-08-16 22:50:03 -05:00
Francesco Soncina da820f08e6 don't interact with other apps to avoid asking permissions 2020-02-13 16:17:33 +01:00
dwelch-r7 fe2b3f8f29 Remove targets from post modules 2019-09-23 17:26:36 +01:00
h00die 06256cc05b fix osx 10.7 hash IDing, and JTR ids 2019-05-30 18:33:45 -04:00
Brent Cook 4137135ad4 Land #11737, store password from osx/gather/password_prompt_spoof 2019-04-24 05:06:20 -05:00
h00die 4d2962386e save creds from password prompt spoof 2019-04-16 20:44:45 -04:00
h00die 621c7182bf osx docs and cleanup 2019-04-15 21:01:05 -04:00
h00die 9f6b9d586b updating jtr formats in hashdumpers 2019-01-30 20:16:08 -05:00
Tim W 6dd36bd8da Land #10427, add OSX VNC password gather module 2018-10-02 14:47:51 +08:00
Tim W b5cf682169 cleanup post/osx/gather/vnc_password_osx and add loot/credentials 2018-10-02 14:22:09 +08:00
Brent Cook 3e61a98f25 use non-system users for hashdump 2018-09-24 22:17:58 -05:00
pwnforfun e1ec0ec899 hash_dump now working properly up to Mac OS X High Sierra (10.13.6 included) 2018-09-06 12:00:36 +02:00
Kevin Gonzalvo 41dd8a62cb rename class name
rename for snake case
2018-08-10 17:27:19 +02:00
Kevin Gonzalvo bb208118c3 Ruby decrypt
The decryption of the key in the msf has been added
2018-08-10 16:25:33 +02:00
Kevin Gonzalvo 0e8180f263 delete space
delete bad spaces
2018-08-06 19:01:32 +02:00
Kevin Gonzalvo 5e7a77dea8 add new functiom
added checking directory of VNC
2018-08-06 18:45:24 +02:00
Kevin Gonzalvo d6a60bd10e remove dependencies
removed not necessary dependencies
2018-08-06 17:20:25 +02:00
Kevin Gonzalvo e194922855 Add vnc password osx
This module show Apple VNC Password from Mac OS X High Sierra.
2018-08-06 17:11:42 +02:00
Brendan Coles 45481f26b6 Add Msf::Post::OSX::Priv mixin 2018-05-22 22:25:39 +00:00
Brent Cook 520b8bc3c0 remove many duplicate code paths 2018-05-17 08:14:32 -05:00
Brent Cook 406f1fe165 fix #10046, remove invalid timeout argument on cmd_exec 2018-05-17 07:38:22 -05:00
Tim W 72cd97d3e4 minor documentation and comment tweaks 2018-04-18 14:22:32 +08:00
Tim W ee6f83c281 match newfs_apfs regex 2018-04-10 14:45:14 +08:00
thecarterb 3f40f43609 Make final output more readable 2018-04-07 11:05:47 -04:00
cbrnrd 0806c0725f Fix some bugs with command exits
Also fix a bug in check()
2018-04-03 10:35:49 -04:00
cbrnrd c401872af6 Fix some logic flaws and other review things
Also make the output more reliable
2018-03-30 19:20:20 -07:00
cbrnrd 76af9d5a15 Add apfs_encrypted_volume_passwd.rb 2018-03-29 23:47:45 -07:00
h00die c90f885938 Finished spelling issues 2017-09-17 16:00:04 -04:00
Brent Cook 6300758c46 use https for metaploit.com links 2017-07-24 06:26:21 -07:00
g0tmi1k 0f453c602e Even more print_status -> print_good 2017-07-19 11:46:39 +01:00
g0tmi1k b8d80d87f1 Remove last newline after class - Make @wvu-r7 happy 2017-07-19 11:19:49 +01:00
g0tmi1k 4720d1a31e OCD fixes - Spaces 2017-07-14 08:46:59 +01:00
William Vu 64452de06d Fix msf/core and self.class msftidy warnings
Also fixed rex requires.
2017-05-03 15:44:51 -05:00
William Vu b6fe6c1d38 Fix #7597, minor changes to enum_messages 2016-11-28 17:37:32 -06:00
root dc64f63517 Removed useless comments 2016-11-24 01:33:20 +00:00
root 5284e20a52 Optimised SQL vars, removed unneeded requires and changed the "exec" function name 2016-11-24 01:27:03 +00:00
root ce514ed3e5 Fixed broken fail_with function call and whitespace on line ending 2016-11-22 03:04:12 +00:00
root e0f8d622ec Added metasploit module for access OSX messages database 2016-11-22 02:53:38 +00:00
David Maloney eb73a6914d replace old rex::ui::text::table refs
everywhere we called the class we have now rewritten it
to use the new namespace

MS-1875
2016-08-10 13:30:09 -05:00
Brent Cook 57a3a2871b remove various session manipulation hacks since session.platform should always contain an os identifier 2016-05-08 22:39:41 -05:00