Commit Graph

1952 Commits

Author SHA1 Message Date
wchen-r7 d6565a9aee Merge branch 'bes_flash' into bapv2_flash_test 2015-07-14 00:34:54 -05:00
jvazquez-r7 b72ba7f51c Add AS2 flash detection code 2015-07-13 18:26:02 -05:00
jvazquez-r7 8fb6bedd94 Delete as3 detecotr 2015-07-13 18:23:39 -05:00
jvazquez-r7 9116460cb0 Add prototype with AS3 2015-07-13 16:33:55 -05:00
jvazquez-r7 299978d0e2 Put again old exploiter 2015-07-11 00:36:32 -05:00
jvazquez-r7 63005a3b92 Add module for flash CVE-2015-5122
* Just a fast port for the exploit leaked
* Just tested on win7sp1 / IE11
2015-07-11 00:28:55 -05:00
Tod Beardsley 3d630de353 Replace with a real CVE number 2015-07-07 14:44:12 -05:00
wchen-r7 2cdaace42f Land #5678, Land adobe_flash_hacking_team_uaf.r 2015-07-07 12:34:59 -05:00
jvazquez-r7 d9aacf2d41 Add module for hacking team flash exploit 2015-07-07 11:19:48 -05:00
Mo Sadek 9e2e64bba1 Land #5644, Windows 10 Detection for os.js 2015-07-06 16:19:06 -05:00
wchen-r7 482247771d Add a fingerprint for Windows 10 + IE11 2015-07-01 18:06:25 -05:00
wchen-r7 cd688437ac Add support for Windows 10 for os.js
Resolves #4248
2015-07-01 15:02:22 -05:00
jvazquez-r7 1de94a6865 Add module for CVE-2015-3113 2015-07-01 13:13:57 -05:00
jvazquez-r7 ee0377ca16 Add module for CVE-2015-3105 2015-06-25 13:35:01 -05:00
OJ ae41f2bfa0 Update exploit binaries for ms15-051 2015-06-25 09:33:15 +10:00
Brent Cook e75287875b hack android-specific commands back to life 2015-06-22 20:41:58 -05:00
OJ 3686accadd Merge branch 'upstream/master' into cve-2015-1701 2015-06-22 07:52:17 +10:00
jvazquez-r7 04901baab8 Land #5572 @todb-r7's adds snowden's password to unix_passwords.txt 2015-06-19 17:01:22 -05:00
Tod Beardsley b580f93c22 New password from Snowden 2015-06-19 15:37:48 -05:00
jvazquez-r7 d116f1efd5 Land #5566, @wchen-r7 fixes #5565 modifying os.js 2015-06-19 11:07:00 -05:00
wchen-r7 308cad8c40 Fix #5565, Fix os.js service pack detection
Fix #5565
2015-06-18 18:51:16 -05:00
jvazquez-r7 de1542e589 Add module for CVE-2015-3090 2015-06-18 12:36:14 -05:00
wchen-r7 17b8ddc68a Land #5524, adobe_flash_pixel_bender_bof in flash renderer 2015-06-15 02:42:16 -05:00
jvazquez-r7 72672fc8f7 Delete debug 2015-06-11 17:39:36 -05:00
jvazquez-r7 8ed13b1d1b Add linux support for CVE-2014-0515 2015-06-11 16:18:50 -05:00
wchen-r7 ae21b0c260 Land #5523, adobe_flash_domain_memory_uaf in the flash renderer 2015-06-10 16:59:19 -05:00
wchen-r7 4c5b1fbcef Land #5522, adobe_flash_worker_byte_array_uaf in the flash renderer 2015-06-10 14:49:41 -05:00
jvazquez-r7 7527aa4f34 Disable debug 2015-06-10 14:07:18 -05:00
jvazquez-r7 6c7ee10520 Update to use the new flash Exploiter 2015-06-10 13:52:43 -05:00
jvazquez-r7 7fba64ed14 Allow more search space 2015-06-10 12:26:53 -05:00
jvazquez-r7 ecbddc6ef8 Play with memory al little bit better 2015-06-10 11:54:57 -05:00
wchen-r7 d622c782ef Land #5519, adobe_flash_uncompress_zlib_uninitialized in the flash renderer 2015-06-10 11:52:47 -05:00
jvazquez-r7 2b4fe96cfd Tweak Heap Spray 2015-06-10 10:56:24 -05:00
jvazquez-r7 a6fe383852 Use AS Exploiter 2015-06-10 09:32:52 -05:00
jvazquez-r7 e5d6c9a3cb Make last code cleanup 2015-06-09 16:01:57 -05:00
jvazquez-r7 cf8c6b510b Debug version working 2015-06-09 15:46:21 -05:00
jvazquez-r7 39851d277d Unset debug flag 2015-06-09 11:36:09 -05:00
jvazquez-r7 b7f0fad72f Modify CVE-2014-0569 to use the flash exploitation code 2015-06-09 11:31:39 -05:00
Tod Beardsley f29b38b602 Add the top 20 keyboard patterns as passwords
See https://wpengine.com/unmasked/ for lots more, but this
covers the gif at

https://wpengine.com/unmasked/assets/images/commonkeyboardpatterns.gif
2015-06-05 16:46:08 -05:00
OJ b291d41b76 Quick hack to remove hard-coded offsets 2015-06-05 13:19:41 +10:00
jvazquez-r7 02181addc5 Update CVE-2014-0556 2015-06-04 18:23:50 -05:00
wchen-r7 23df66bf3a Land #5481, no powershell. exec shellcode from the renderer process. 2015-06-04 15:45:09 -05:00
jvazquez-r7 ab68d8429b Add more targets 2015-06-04 12:11:53 -05:00
jvazquez-r7 80cb70cacf Add support for Windows 8.1/Firefox 2015-06-03 22:46:04 -05:00
jvazquez-r7 74117a7a52 Allow to execute payload from the flash renderer 2015-06-03 16:33:41 -05:00
OJ 455a3b6b9d Add butchered version of CVE-2015-1701 2015-06-03 21:48:23 +10:00
Brent Cook 64e86165ef remove android meterpreter bins, update to payloads 1.0.2
This switches us to using the Android payload files from the
metasploit-payloads gem
2015-06-01 09:14:31 -05:00
Brent Cook 7d5af66fa0 Merge branch 'master' into land-5367-uuid-stagers 2015-05-29 13:00:35 -05:00
wchen-r7 737559bcbb Land #5180, VBA Powershell for Office Macro 2015-05-28 19:55:27 -05:00
jvazquez-r7 e9714bfc82 Solve conflics 2015-05-27 23:22:00 -05:00