Spencer McIntyre
f24df8a051
Change an exception class and drop DOMAIN passing
2022-11-28 10:06:14 -05:00
Heyder Andrade
ff63f0aa32
Added reference
2022-11-28 14:11:07 +01:00
omer citak
9aa1a84b3a
added target uri in to "Authorization not requested" error message
2022-11-27 15:35:34 +03:00
RadioLogic
6d676e9ac5
Added vsftpd dos module
2022-11-26 16:00:01 -05:00
Ashley Donaldson
25a0d0ff0e
Fixes #17227 - polkit_dbus_auth_bypass module when run from a command shell
2022-11-25 15:13:57 +11:00
ErikWynter
78dfaa12ef
add opentsdb_yrange_cmd_injection module and docs
2022-11-24 21:37:24 +02:00
Spencer McIntyre
6350daf2d8
Land #17273 , F5 exploit module CVE-2022-41800
...
F5 exploit module CVE-2022-41800 (authenticated RCE in RPM code)
2022-11-23 17:57:18 -05:00
Ron Bowes
b7cf112d42
Fix an issue where the session handler would close too early on Zimbra modules
2022-11-23 13:09:47 -08:00
Ron Bowes
ffbf8b303a
Change a 'return 0' to 'fail_with', per Christophe's request
2022-11-23 12:51:51 -08:00
Ron Bowes
28a68ede8c
Merge branch 'master' into zimbra-fixes
2022-11-23 12:50:56 -08:00
Ron Bowes
aa3d8be77c
Remove Targets
2022-11-23 11:11:35 -08:00
Ron Bowes
4fd22226fe
Combine into one module with options to turn features on/off
2022-11-23 11:10:34 -08:00
Ron Bowes
cbb50ed902
Remove non-functioning Arch'es
2022-11-23 10:42:07 -08:00
Spencer McIntyre
3f58bfe11e
Check that the target is Exchange Server 2019
2022-11-23 10:47:10 -05:00
Heyder Andrade
27f8f4fc47
Cleanup
2022-11-23 01:55:06 +01:00
Heyder Andrade
7880530989
The check method should report when finding a vulnerable product.
...
I think all exploit modules should "report" in the check method when finding a vulnerable
product. By doing that we can take advantage of all check methods in the exploit module
and use them as a "scanner". That would give the chance for the user to check multiple
simultaneously targets and save the result for further actions.
2022-11-23 01:29:38 +01:00
Heyder Andrade
0e5f8d49f9
Code cleanup and payload generation improvements
2022-11-23 00:29:10 +01:00
adfoster-r7
6446c1425b
Land #17283 , enum_psk: Cleanup
2022-11-22 12:28:55 +00:00
adfoster-r7
6c76fd7beb
Land #17284 , modules/post/linux/gather: Use Post::Linux::System.get_hostname method
2022-11-22 11:55:47 +00:00
Heyder Andrade
7983c14166
Removed a bunch of hard-coded stuff and cleaned out fake smart server
2022-11-22 12:07:55 +01:00
h00die
7227bec259
set autocheck false
2022-11-21 15:53:37 -05:00
bwatters
8c9e2c9fc7
Add check method, update hosting IP/port
2022-11-21 15:53:37 -05:00
h00die
d141efcbfe
screen effects
2022-11-21 15:53:37 -05:00
h00die
181b8e4eea
review comments
2022-11-21 15:53:37 -05:00
h00die
d4536b24a6
remote control collection rce
2022-11-21 15:53:37 -05:00
Spencer McIntyre
ed99f2f67f
Bypass EEMS M1
2022-11-21 11:13:16 -05:00
h00die
6877304bac
exploit for cve-2021-22015 vcenter priv esc
2022-11-20 11:29:49 -05:00
bcoles
651dd68439
tor_hiddenservices: Check locate command exists
2022-11-21 01:07:50 +11:00
bcoles
2dbd2043ec
modules/post/linux/gather: Use Post::Linux::System.get_hostname method
2022-11-21 00:46:44 +11:00
bcoles
ad36f28ec1
enum_psk: Cleanup
2022-11-21 00:28:34 +11:00
Heyder Andrade
3d73f574d4
Impreve error handling
2022-11-20 12:10:04 +01:00
h00die
5e93ed3bae
explicit check of CVE-2022-22948
2022-11-19 10:37:36 -05:00
h00die
40f97995f8
review comment
2022-11-19 10:37:36 -05:00
h00die
9a19c4411d
wrap up module additions
2022-11-19 10:37:36 -05:00
h00die
dff9b35d56
add database stuff to vcenter post module
2022-11-19 10:37:36 -05:00
Heyder Andrade
c9eaa9af37
Added module for #CVE-2022-2992
2022-11-19 15:21:31 +01:00
Grant Willcox
8ca7550062
Land #17257 , Adding exploit for ChurchInfo 1.2.13-1.3.0 RCE (CVE-2021-43258)
2022-11-18 19:27:10 -06:00
Grant Willcox
237eb904d4
Add in fixes for documentation examples and then update the code to fix some bugs
2022-11-18 18:30:07 -06:00
Grant Willcox
85a6770973
Add additional checks, a check method, and fix up some doc errors
2022-11-18 18:22:06 -06:00
m4lwhere
b9ecdb3bc2
Use TARGETURI, registered cleanup, implment cookie_jar, and perform response checks and documentation
2022-11-18 18:21:27 -06:00
m4lwhere
a33a313544
Adding exploit for ChurchInfo 1.3.0
2022-11-18 18:21:08 -06:00
space-r7
3d5708e3e6
Land #17271 , add f5 big-ip csrf exploit
2022-11-18 16:19:09 -06:00
space-r7
8b30ff3dce
remove CmdStager inclusion
2022-11-18 16:18:25 -06:00
Spencer McIntyre
29d57dde66
Consolidate into ProxyMaybeShell
2022-11-18 17:01:01 -05:00
Spencer McIntyre
fc7594dbc8
Add exploit for CVE-2022-41082 AKA ProxyNotShell
2022-11-18 17:00:27 -05:00
bwatters
20e1788d97
Land #17145 , Add hashes option and better error handling to wmiexec
...
Merge branch 'land-17145' into upstream-master
2022-11-18 10:16:33 -06:00
npm-cesium137-io
6f885ba700
Add solarwinds_orion_dump post module
...
Post module for extracting encrypted credentials from SolarWinds Orion
NPM. Tested on the 2020 version.
2022-11-18 10:40:10 -05:00
Christophe De La Fuente
5280580c08
Fixes from code review
2022-11-18 11:02:32 +01:00
space-r7
162b0daf3b
add new options and usage of pre-compiled exploit
...
also updates documentation with new option
descriptions
2022-11-17 17:20:41 -06:00
h00die
496a6f74ff
remove verbiage of list
2022-11-17 16:49:11 -05:00