William Vu
c6fd9a4b08
Land #13895 , SAP RECON CVE-2020-6287 improvements
2020-07-27 08:51:16 -05:00
Spencer McIntyre
dc0f254c0e
Update the module docs for CVE-2020-6287
2020-07-23 18:02:43 -04:00
William Vu
a89c966bbc
Land #13852 , SAP "RECON" CVE-2020-6287 aux module
2020-07-23 10:30:36 -05:00
Spencer McIntyre
d108cd0da9
Address feedback for consistency within CVE-2020-6287
2020-07-23 10:31:46 -04:00
Spencer McIntyre
593ddd8ac4
Add module docs for CVE-2020-6287
2020-07-23 09:47:22 -04:00
William Vu
2d6d2a811d
Update module docs with Net::LDAP warning
2020-07-22 16:38:34 -05:00
William Vu
8528a62691
Update module docs
2020-07-22 15:45:26 -05:00
William Vu
f736b0192f
Add LDAPS support and update vCenter vmdir modules
2020-07-22 14:23:00 -05:00
William Vu
41457b21d9
Land #13868 , vCenter vmdir CVE-2020-3952 hash dump
2020-07-22 14:00:44 -05:00
William Vu
3eb9bda8c5
Update module docs one final time
...
No need to show the test creds. Output is consistent now.
2020-07-22 13:24:55 -05:00
William Vu
797b22c41a
Update module docs after recent changes
2020-07-22 12:47:21 -05:00
Shelby Pace
bf4d0bf6ee
Land #13828 , add Zentao Pro rce
2020-07-22 09:42:11 -05:00
Shelby Pace
6c066a97ed
add bcoles suggestions
2020-07-22 09:39:17 -05:00
William Vu
da709b1ee4
Update module doc
2020-07-21 09:38:54 -05:00
William Vu
5f5a2e7508
Refactor code (untested)
2020-07-21 01:09:46 -05:00
William Vu
d5d4716b1c
Update TMSH escape reliability notes
...
What's strange is that if the stars align, like if the system has been
"used" enough, the exploit is incredibly reliable. Maybe my test
environment is bonkers.
2020-07-17 06:26:00 -05:00
William Vu
c082ccd337
Make Meterpreter the default target
2020-07-17 06:10:53 -05:00
William Vu
1ae689ce5f
Improve robustness by refactoring error handling
...
tmshCmd.jsp is extremely unreliable!
2020-07-17 05:23:42 -05:00
bwatters
eb863048f0
Land #13741 , CVE-2020-5741: Plex rce on Windows
...
Merge branch 'land-13741' into upstream-master
2020-07-16 10:20:50 -05:00
gwillcox-r7
8cfcfe36aa
Land #13750 , Centralize Cisco, Juniper, Brocade and Ubuiquiti auxiliary modules under networking directory
2020-07-16 10:16:52 -05:00
bwatters
ceea94c368
Update docs for installation of target software
2020-07-16 10:16:48 -05:00
h00die
3d851ca668
add run
2020-07-14 21:06:33 -04:00
h00die
80770125b5
review comments
2020-07-14 21:01:28 -04:00
kalba-security
2d3588c0ad
Add suggestions from code review
2020-07-13 12:51:57 -04:00
Brendan Coles
384a71b06a
Land #13271 , Update auxiliary/server/capture/smtp to store credentials
2020-07-11 17:30:06 +00:00
h00die
85bd740640
review comments
2020-07-11 15:19:16 -04:00
kalba-security
df42399f61
Add installation instructions to docs
2020-07-09 17:20:07 -04:00
kalba-security
36397a3e8f
Add cmdstager support
2020-07-09 15:21:12 -05:00
kalba-security
3eceeca911
Add Pandora FMS Events Remote Code Execution module and docs
2020-07-09 15:21:12 -05:00
Shelby Pace
895c170394
Land #13769 , add FortiMail auth bypass scanner
2020-07-09 09:28:45 -05:00
kalba-security
6c4f975f97
Fix linting
2020-07-08 16:51:55 -04:00
kalba-security
470a0c9423
Add installation instructions to docs
2020-07-08 16:50:10 -04:00
kalba-security
1f631e20ad
Add zentao_pro_rce Windows exploit and docs
2020-07-08 15:13:45 -04:00
Spencer McIntyre
16ff439296
Land #13807 , Add F5 BIG-IP TMUI Directory Traversal and File Upload RCE (CVE-2020-5902)
2020-07-07 13:44:01 -04:00
William Vu
3ec597ce38
Update module doc
2020-07-07 12:12:38 -05:00
Patrick
361df36f33
Apply suggestions from code review by space-r7
...
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2020-07-07 10:56:27 +02:00
William Vu
ac3b31a911
Add module doc
2020-07-06 18:07:52 -05:00
Shelby Pace
a2309f018e
Land #13740 , add springcloud dir traversal
2020-07-06 09:48:40 -05:00
Brendan Coles
f9a5de87f8
Land #13789 , Add OpenSIS Unauthenticated PHP Code Execution module
2020-07-04 15:49:45 +00:00
h00die
89332d0056
native python for plex unpickle
2020-07-03 19:37:18 -04:00
EgiX
d62b8d16c6
Update opensis_chain_exec.md
2020-07-03 17:43:10 +02:00
EgiX
ab703f376b
Create opensis_chain_exec.md
2020-07-01 23:51:17 +02:00
gwillcox-r7
c311ea5b5b
Land #13768 , Netgear R6700 Admin Password Reset (CVE-2020-10923 and CVE-2020-10924)
2020-07-01 14:58:53 -05:00
William Vu
08c1402be9
Land #13733 , AnyDesk GUI CVE-2020-13160 exploit
2020-07-01 14:47:07 -05:00
Spencer McIntyre
a27bf9df38
Fix some grammatical mistakes and set a default target for anydesk
2020-07-01 15:27:33 -04:00
gwillcox-r7
fdfef2729f
Update documentation and modules to better list the range of versions affected now that we know which versions we can target and the CVE IDs. Also update the firmware links to archive.org links in case they ever get removed which is more common than you think
2020-07-01 13:28:46 -05:00
gwillcox-r7
ddb41d5a50
Update module and documentation with new output from the exploit
2020-07-01 13:28:32 -05:00
gwillcox-r7
3db867e5eb
Futher updates to the module documentation since technically this module doesn't send the packet to UDP port 23 to enable the telnet server.
2020-07-01 13:28:15 -05:00
Radek Domanski
1e520f27e9
Updating md as per comments
2020-07-01 13:27:32 -05:00
Radek Domanski
a19c50044f
Fixing firmware download link
2020-07-01 13:27:30 -05:00