h00die
557a15a115
spelling fixes on docs
2023-10-10 14:46:18 -04:00
Christophe De La Fuente
1058291af9
Land #18314 , Windows Error Reporting RCE (CVE-2023-36874)
2023-09-27 15:25:06 +02:00
Christophe De La Fuente
2c9932b242
Update documentation - Options section
2023-09-27 15:17:04 +02:00
bwatters
0b84feaf60
updates from code review
2023-09-26 14:03:31 -05:00
bwatters
b4a1bb8fa2
Add docs and support for shell sessions; update exe to work without runtime lib.
2023-09-19 17:50:18 -05:00
jheysel-r7
ef55c4f2c1
Update documentation/modules/exploit/windows/local/cve_2023_28252_clfs_driver.md
2023-08-30 12:11:37 -04:00
Jack Heysel
bcfc892195
General code clean up
2023-08-04 14:27:14 -04:00
Jack Heysel
29c2361a9c
Module clean up, docs, metadata, rubocop
2023-08-02 18:53:20 -04:00
Christophe De La Fuente
6d4ee0c071
Add exploit for CVE-2023-21768
2023-03-27 20:08:22 +02:00
cgranleese-r7
80dbbca020
Land #17371 , Lenovo Diagnostics Driver Privilege Escalation (CVE-2022-3699)
2023-02-03 13:43:04 +00:00
Jack Heysel
4da94325f3
Rubocop
2023-01-19 13:52:58 -05:00
Jack Heysel
63d9445911
Fix for Win Server 2022 and 2019
2023-01-19 00:52:38 -05:00
Jack Heysel
2c2bfec4a0
Tested on Windows Build 19044, 19045 and 22000
2023-01-18 01:41:30 -05:00
h00die
0ac4d3d2e6
doc how to set permissions on service
2023-01-13 17:07:17 -05:00
Spencer McIntyre
3ddcf73c2b
Remove the QUICK option altogether
...
Use blocks to check whether each service is exploitable as they are
enumerated. With this change, it is the service and path enumeration
halts once an exploitable one is found that yields a session.
Also all files are registered for cleanup.
2023-01-13 17:06:42 -05:00
h00die
90a12cf3b0
unquoted service path tweaks
2023-01-13 17:06:42 -05:00
h00die
c52eb09cbb
unquoted service path tweaks
2023-01-13 17:06:42 -05:00
Jack Heysel
2fa7e7b2d5
Lenovo Diagnostics Driver Privilege Escaltion (CVE-2022-3699)
2022-12-12 21:53:53 -05:00
Ron Bowes
3ac3fa6c32
Move the Zimbra Slapper doc to the right folder (Windows -> Linux)
2022-10-25 09:51:27 -07:00
bcoles
666a3efcfd
ms10_092_schelevator: Cleanup
2022-08-19 15:19:28 +10:00
Ron Bowes
be25e1fc77
Add documentation
2022-08-05 13:55:05 -05:00
Grant Willcox
51df37de87
Add in documentation and also update the module to handle NarratorQuickstart.exe which sometimes comes up and can lead to visual indicators
2022-03-28 17:53:53 -05:00
bwatters
b4de9fa92a
Land #16344 , Add module for CVE-2022-21999 and More Railgun Definitions
...
Merge branch 'land-16344' into upstream-master
2022-03-16 08:37:05 -05:00
space-r7
4a8707982a
fix module name in output
2022-03-14 09:35:56 -05:00
space-r7
c646d01671
add systems tested
2022-03-14 09:17:43 -05:00
space-r7
99664efed7
use full user name, add test output to docs
2022-03-14 09:15:36 -05:00
space-r7
07e6eef201
rename module, modify check
2022-03-10 17:02:58 -06:00
space-r7
f116f9e701
add docs
2022-03-04 15:54:58 -06:00
Spencer McIntyre
443bf1249a
Remove all the old CVE-2021-1732 data
2022-02-18 15:25:39 -05:00
Spencer McIntyre
bcd7cb1122
Writeup the module metadata and docs
2022-02-18 15:23:44 -05:00
Grant Willcox
3af93cbacc
Fix up changes from timwr's review so long
2021-11-09 10:36:50 -06:00
Grant Willcox
780a9370a2
First draft of code, documentation, and exploit DLL plus exploit code
2021-11-09 10:36:40 -06:00
Spencer McIntyre
674628e600
Land #15384 , Improve Windows RDLL injection
2021-08-26 12:11:44 -04:00
Grant Willcox
5a80e9678c
Address Spencer's comments and remove changes that don't directly use the DLL injection library API change
2021-08-24 16:34:01 -05:00
Grant Willcox
5fdf990f24
Land #15519 , Lexmark Universal Print Driver Local Privilege Escalation
2021-08-11 15:03:53 -05:00
Grant Willcox
92327461d3
Add in driver installation instructions to documentation
2021-08-11 14:40:21 -05:00
Grant Willcox
7b25bd366f
Update documentation and fix a few typos so that it reflects latest changes
2021-08-11 12:25:36 -05:00
Jacob Baines
afa3d92774
Switched to upnp implementation
2021-08-10 18:17:18 -04:00
Grant Willcox
55404ff29f
Further fixes from review and further touch up edits
2021-08-09 14:23:05 -05:00
Grant Willcox
f8d838bba2
Fix first round of comments from the review process
2021-08-09 12:13:27 -05:00
Grant Willcox
838142362c
Apply first round of updates from review comments to improve explanations of the vulnerability and fix some minor issues
2021-08-09 09:59:09 -05:00
Jacob Baines
0e41a0e81e
Addressed all but one review items
2021-08-07 06:46:49 -04:00
Jacob Baines
8d699c0c4e
Addressed various review comments
2021-08-06 14:55:50 -04:00
Jacob Baines
f851faf2e4
Initial commit for Canon driver exploit
2021-08-05 11:17:45 -04:00
Jacob Baines
e6c48db072
Initial version of CVE-2021-35449
2021-08-04 16:08:43 -04:00
Grant Willcox
2fb379374f
Update documentation where possible for changed exploits
2021-07-23 12:34:12 -05:00
Grant Willcox
fabc566402
Improve process.rb's execute_dll to now automatically detect the architecture of the target and of the DLL and then appropriately decide if it needs to launch a WoW64 process to inject into.
2021-07-23 12:33:41 -05:00
Grant Willcox
bc0439fc47
Improve the list of potential processes to spawn and inject into to be more believable
2021-07-23 12:33:16 -05:00
agalway-r7
410493f729
Land #15318 , NSClient priv esc post module
2021-07-06 16:07:30 +01:00
Yann Castel
ebc8dba921
intial commit
2021-06-09 15:10:03 +02:00