Commit Graph

31849 Commits

Author SHA1 Message Date
Tim W d7ba48426d update payload cached sizes 2021-12-10 06:15:28 +00:00
Spencer McIntyre 1915b1395e Land #15742, Added module for CVE-2021-40444 2021-12-08 17:46:02 -05:00
Spencer McIntyre 2f6710e02e Remove the Not_Hosted target
It's not currently working and Metasploit should just handle everything
2021-12-08 17:22:44 -05:00
Spencer McIntyre 410b276c3f Update metasploit-payloads gem to 2.0.65 2021-12-08 13:19:22 -05:00
bwatters 852230c739 Fix bug brought in by importing Msf::Post::File
Split out javascript to a file and deobfuscate it
Update documentation for new targets
Fix other small suggestions
2021-12-08 10:36:27 -06:00
space-r7 22d2ba599f Land #15929, add new targets for ms08-067 netapi 2021-12-07 13:16:23 -06:00
Christophe De La Fuente 389fd55952 Land #15808, Fix #15804 powershell read_file on Windows Server 2012 2021-12-07 11:59:11 +01:00
adfoster-r7 7dd5d5d3c2 Land #1585, Fix SMB SpiderShare Enum 2021-12-03 13:07:09 +00:00
Brendan Coles a60c59c3af ms08_067_netapi: Add nine Windows 2003 SP2 targets for various locales
* Windows 2003 SP2 Portuguese (NX)
* Windows 2003 SP2 Chinese - Simplified (NX)
* Windows 2003 SP2 Czech (NX)
* Windows 2003 SP2 Dutch (NX)
* Windows 2003 SP2 Hungarian (NX)
* Windows 2003 SP2 Italian (NX)
* Windows 2003 SP2 Russian (NX)
* Windows 2003 SP2 Swedish (NX)
* Windows 2003 SP2 Turkish (NX)
2021-12-02 16:33:02 +00:00
bwatters 6c3a29077f Update rm -rf string to be less fragile 2021-12-02 10:31:47 -06:00
bwatters 77812ae4c4 Update documentation for multiple binaries, add targeting data,
other bcoles improvements
2021-12-02 09:57:48 -06:00
bwatters 620b2d2b12 Update targeting selection and payloads, fix python cmd_exec 2021-12-02 08:03:03 -06:00
bwatters 47aacbdf32 Fix cmd_exec to be friendly with binary and python meterpreters
Add arch checks for payload/target
2021-12-01 16:18:49 -06:00
bwatters a3f2d5468a Add some quick debugging output 2021-12-01 14:54:48 -06:00
bwatters 18cc2ef516 Add support for aarch64 Ubuntu versions 2021-12-01 14:54:48 -06:00
bwatters c6e2be2cd7 Ensure deletion of exploit and payload even if the exploit fails. 2021-12-01 14:54:48 -06:00
bwatters b1f6937542 Updated exploit to compile on target, added control over directory creation
Added a method to get source code for the write and compile method
2021-12-01 14:54:47 -06:00
bwatters eba7803e1a Add check method 2021-12-01 14:54:47 -06:00
bwatters bf1b3b377c Add cve-2021-3493 module 2021-12-01 14:54:47 -06:00
space-r7 51d85fada5 Land #15914, ms03_026_dcom cleanup 2021-11-30 11:37:43 -06:00
bwatters 999ffa36cc Actually delete extra files 2021-11-30 10:10:30 -06:00
Tim W abb11cf896 Land #15918, add more targets for ms07_029_msdns_zonename 2021-11-30 08:24:03 +00:00
Brendan Coles 28bc460bac ms07_029_msdns_zonename: Add additional Windows 2000/2003 target offsets 2021-11-30 07:38:08 +00:00
Tim W 9733ced0e4 cleanup and move LOAD_MODULES option to Msf::Payload::Windows::Powershell 2021-11-30 07:06:11 +00:00
Tim W 5d722d3cfa add non-cmd powershell_reverse_tcp_ssl payloads 2021-11-30 06:30:59 +00:00
Tim W e5ef1bb7fc rubocop 2021-11-30 06:30:59 +00:00
Tim W 32f272d96a fix the windows/x64/powershell_reverse_tcp handler 2021-11-30 06:30:58 +00:00
Tim W 21d7bc823e fix URL 2021-11-30 06:30:58 +00:00
Tim W 6a57ef4c65 run rubocop on changed files 2021-11-30 06:30:58 +00:00
Tim W 9097b181b0 add powershell_reverse_tcp_ssl 2021-11-30 06:30:58 +00:00
bwatters 14064ff3f9 Update module description and remove extra module. 2021-11-29 15:23:02 -06:00
sjanusz 84c9a30c40 Fix depth check 2021-11-29 17:54:54 +00:00
sjanusz 0ea203fcfe Add rport comment, change table creation, rubocop lint 2021-11-29 17:00:48 +00:00
Brendan Coles 8fa73f9e90 ms05_039_pnp: Rename 'Windows 2000 SP4 English/French/German/Dutch' target to 'Windows 2000 SP4 Universal' 2021-11-28 13:39:05 +00:00
Brendan Coles 5fab1da09b ms03_026_dcom: cleanup 2021-11-28 08:25:31 +00:00
sjanusz ce3215e35b Fix broken files check, make return dirs consistent 2021-11-26 12:51:07 +00:00
sjanusz 147ca34308 Fix empty list check & add return statement to rescue 2021-11-25 11:38:22 +00:00
Grant Willcox e21812fa5c Land #15864, fix #15856, fix shell_to_meterpreter to detect x64 windows and return an x64 meterpreter session 2021-11-24 17:41:31 -06:00
Grant Willcox 1b9f9f0620 Add in final review fixes to handle Windows ARM if ever encountered 2021-11-24 16:37:21 -06:00
sjanusz 1a435f8a77 Working spidering on Windows XP, 7 & 10, DB options work, fix error handling 2021-11-24 17:34:33 +00:00
William Vu 344bdacae4 Remove preferred payload
We'll add it back to Framework later.
2021-11-24 10:44:59 -06:00
William Vu e8e5467b70 Credit mr_me for keytool classloading technique
Confirmed. :)
2021-11-23 20:12:05 -06:00
William Vu 3702615003 Improve check precision by matching more stuff 2021-11-23 19:05:09 -06:00
William Vu e2cf3e6706 Clarify working directory for FileDropper 2021-11-23 19:05:09 -06:00
William Vu 2f1bfa738a Add ManageEngine ADSelfService Plus CVE-2021-40539 2021-11-23 19:05:09 -06:00
Grant Willcox 0007887a0c Land #15898, trade URI.encode & URI.escape for Ruby 3 2021-11-23 12:07:48 -06:00
Jeffrey Martin d802a9ee0b remove rubocop exemption no longer required 2021-11-23 07:58:07 -06:00
Jeffrey Martin 21a6a18d92 trade URI.encode & URI.escape for Ruby 3
Ruby 3 removed the `URI.escape` methods however access to
the a parse for the same RFC is stil available at `URI::DEFAULT_PARSER.escape`.

Per the Ruby forum [comment](https://bugs.ruby-lang.org/issues/17309#note-1) this should equal.
2021-11-22 14:11:03 -06:00
sjanusz 8f7b9c5ad8 Improve disk shares 2021-11-22 12:41:45 +00:00
sjanusz 779881dd55 Add constants & exception handling for RubySMB 2021-11-22 12:36:59 +00:00