Tim W
d7ba48426d
update payload cached sizes
2021-12-10 06:15:28 +00:00
Spencer McIntyre
1915b1395e
Land #15742 , Added module for CVE-2021-40444
2021-12-08 17:46:02 -05:00
Spencer McIntyre
2f6710e02e
Remove the Not_Hosted target
...
It's not currently working and Metasploit should just handle everything
2021-12-08 17:22:44 -05:00
Spencer McIntyre
410b276c3f
Update metasploit-payloads gem to 2.0.65
2021-12-08 13:19:22 -05:00
bwatters
852230c739
Fix bug brought in by importing Msf::Post::File
...
Split out javascript to a file and deobfuscate it
Update documentation for new targets
Fix other small suggestions
2021-12-08 10:36:27 -06:00
space-r7
22d2ba599f
Land #15929 , add new targets for ms08-067 netapi
2021-12-07 13:16:23 -06:00
Christophe De La Fuente
389fd55952
Land #15808 , Fix #15804 powershell read_file on Windows Server 2012
2021-12-07 11:59:11 +01:00
adfoster-r7
7dd5d5d3c2
Land #1585 , Fix SMB SpiderShare Enum
2021-12-03 13:07:09 +00:00
Brendan Coles
a60c59c3af
ms08_067_netapi: Add nine Windows 2003 SP2 targets for various locales
...
* Windows 2003 SP2 Portuguese (NX)
* Windows 2003 SP2 Chinese - Simplified (NX)
* Windows 2003 SP2 Czech (NX)
* Windows 2003 SP2 Dutch (NX)
* Windows 2003 SP2 Hungarian (NX)
* Windows 2003 SP2 Italian (NX)
* Windows 2003 SP2 Russian (NX)
* Windows 2003 SP2 Swedish (NX)
* Windows 2003 SP2 Turkish (NX)
2021-12-02 16:33:02 +00:00
bwatters
6c3a29077f
Update rm -rf string to be less fragile
2021-12-02 10:31:47 -06:00
bwatters
77812ae4c4
Update documentation for multiple binaries, add targeting data,
...
other bcoles improvements
2021-12-02 09:57:48 -06:00
bwatters
620b2d2b12
Update targeting selection and payloads, fix python cmd_exec
2021-12-02 08:03:03 -06:00
bwatters
47aacbdf32
Fix cmd_exec to be friendly with binary and python meterpreters
...
Add arch checks for payload/target
2021-12-01 16:18:49 -06:00
bwatters
a3f2d5468a
Add some quick debugging output
2021-12-01 14:54:48 -06:00
bwatters
18cc2ef516
Add support for aarch64 Ubuntu versions
2021-12-01 14:54:48 -06:00
bwatters
c6e2be2cd7
Ensure deletion of exploit and payload even if the exploit fails.
2021-12-01 14:54:48 -06:00
bwatters
b1f6937542
Updated exploit to compile on target, added control over directory creation
...
Added a method to get source code for the write and compile method
2021-12-01 14:54:47 -06:00
bwatters
eba7803e1a
Add check method
2021-12-01 14:54:47 -06:00
bwatters
bf1b3b377c
Add cve-2021-3493 module
2021-12-01 14:54:47 -06:00
space-r7
51d85fada5
Land #15914 , ms03_026_dcom cleanup
2021-11-30 11:37:43 -06:00
bwatters
999ffa36cc
Actually delete extra files
2021-11-30 10:10:30 -06:00
Tim W
abb11cf896
Land #15918 , add more targets for ms07_029_msdns_zonename
2021-11-30 08:24:03 +00:00
Brendan Coles
28bc460bac
ms07_029_msdns_zonename: Add additional Windows 2000/2003 target offsets
2021-11-30 07:38:08 +00:00
Tim W
9733ced0e4
cleanup and move LOAD_MODULES option to Msf::Payload::Windows::Powershell
2021-11-30 07:06:11 +00:00
Tim W
5d722d3cfa
add non-cmd powershell_reverse_tcp_ssl payloads
2021-11-30 06:30:59 +00:00
Tim W
e5ef1bb7fc
rubocop
2021-11-30 06:30:59 +00:00
Tim W
32f272d96a
fix the windows/x64/powershell_reverse_tcp handler
2021-11-30 06:30:58 +00:00
Tim W
21d7bc823e
fix URL
2021-11-30 06:30:58 +00:00
Tim W
6a57ef4c65
run rubocop on changed files
2021-11-30 06:30:58 +00:00
Tim W
9097b181b0
add powershell_reverse_tcp_ssl
2021-11-30 06:30:58 +00:00
bwatters
14064ff3f9
Update module description and remove extra module.
2021-11-29 15:23:02 -06:00
sjanusz
84c9a30c40
Fix depth check
2021-11-29 17:54:54 +00:00
sjanusz
0ea203fcfe
Add rport comment, change table creation, rubocop lint
2021-11-29 17:00:48 +00:00
Brendan Coles
8fa73f9e90
ms05_039_pnp: Rename 'Windows 2000 SP4 English/French/German/Dutch' target to 'Windows 2000 SP4 Universal'
2021-11-28 13:39:05 +00:00
Brendan Coles
5fab1da09b
ms03_026_dcom: cleanup
2021-11-28 08:25:31 +00:00
sjanusz
ce3215e35b
Fix broken files check, make return dirs consistent
2021-11-26 12:51:07 +00:00
sjanusz
147ca34308
Fix empty list check & add return statement to rescue
2021-11-25 11:38:22 +00:00
Grant Willcox
e21812fa5c
Land #15864 , fix #15856 , fix shell_to_meterpreter to detect x64 windows and return an x64 meterpreter session
2021-11-24 17:41:31 -06:00
Grant Willcox
1b9f9f0620
Add in final review fixes to handle Windows ARM if ever encountered
2021-11-24 16:37:21 -06:00
sjanusz
1a435f8a77
Working spidering on Windows XP, 7 & 10, DB options work, fix error handling
2021-11-24 17:34:33 +00:00
William Vu
344bdacae4
Remove preferred payload
...
We'll add it back to Framework later.
2021-11-24 10:44:59 -06:00
William Vu
e8e5467b70
Credit mr_me for keytool classloading technique
...
Confirmed. :)
2021-11-23 20:12:05 -06:00
William Vu
3702615003
Improve check precision by matching more stuff
2021-11-23 19:05:09 -06:00
William Vu
e2cf3e6706
Clarify working directory for FileDropper
2021-11-23 19:05:09 -06:00
William Vu
2f1bfa738a
Add ManageEngine ADSelfService Plus CVE-2021-40539
2021-11-23 19:05:09 -06:00
Grant Willcox
0007887a0c
Land #15898 , trade URI.encode & URI.escape for Ruby 3
2021-11-23 12:07:48 -06:00
Jeffrey Martin
d802a9ee0b
remove rubocop exemption no longer required
2021-11-23 07:58:07 -06:00
Jeffrey Martin
21a6a18d92
trade URI.encode & URI.escape for Ruby 3
...
Ruby 3 removed the `URI.escape` methods however access to
the a parse for the same RFC is stil available at `URI::DEFAULT_PARSER.escape`.
Per the Ruby forum [comment](https://bugs.ruby-lang.org/issues/17309#note-1 ) this should equal.
2021-11-22 14:11:03 -06:00
sjanusz
8f7b9c5ad8
Improve disk shares
2021-11-22 12:41:45 +00:00
sjanusz
779881dd55
Add constants & exception handling for RubySMB
2021-11-22 12:36:59 +00:00