adfoster-r7
9f6950c6c8
Ensure HTML is escaped in markdown codeblocks
2022-04-27 19:51:05 +01:00
Jake Baines
aba48a6905
Improve JSON cleanup, fix jjs specific wording, and moved JJS_PATH to defaultoptions
2022-04-20 06:27:43 -07:00
Jake Baines
ae54c8c3d9
Initial implementation of authenticated RCE against ManageEngine ADSelfService Plus (CVE-2022-28810)
2022-04-19 10:33:54 -07:00
Spencer McIntyre
5de966cfb1
Land #16382 , CVE-2022-26904 SuperProfile LPE
2022-04-07 12:52:39 -04:00
usiegl00
8495bff61c
Merge master and update the smb_shadow module
...
Add comments detailing the technique used to attack SMBv3. Remove some
comments that are no longer needed. Fix Gemfile.lock conflict.
2022-04-06 07:06:45 +09:00
Grant Willcox
e800dcb597
Add in documentation file
2022-04-04 12:05:28 -05:00
usiegl00
7e010cbde2
Merge master and update smb_shadow + dispatcher
...
The smb_shadow module can confirm the server smb version supported with
the ConfirmServerDialect option. The shadow_mitm_dispatcher closes each
stream before opening a new one to prevent leaking file descriptors.
2022-04-02 10:39:02 +09:00
Grant Willcox
51df37de87
Add in documentation and also update the module to handle NarratorQuickstart.exe which sometimes comes up and can lead to visual indicators
2022-03-28 17:53:53 -05:00
bwatters
b4de9fa92a
Land #16344 , Add module for CVE-2022-21999 and More Railgun Definitions
...
Merge branch 'land-16344' into upstream-master
2022-03-16 08:37:05 -05:00
space-r7
4a8707982a
fix module name in output
2022-03-14 09:35:56 -05:00
space-r7
c646d01671
add systems tested
2022-03-14 09:17:43 -05:00
space-r7
99664efed7
use full user name, add test output to docs
2022-03-14 09:15:36 -05:00
space-r7
07e6eef201
rename module, modify check
2022-03-10 17:02:58 -06:00
adfoster-r7
22f88f9ab7
Add docs
2022-03-08 23:52:24 +00:00
space-r7
f116f9e701
add docs
2022-03-04 15:54:58 -06:00
bwatters
b69db83398
Land #16202 , Add exploit for CVE-2022-21882 (Win32k LPE)
...
Merge branch 'land-16202' into upstream-master
2022-02-25 15:55:48 -06:00
Grant Willcox
fddd3f15c2
Fix up code so that it will not block on attempting to delete the configuration on the folder, just in case the configuration doesn't exist in the first place. Instead print a warning and continue.
2022-02-22 17:52:29 -06:00
Spencer McIntyre
443bf1249a
Remove all the old CVE-2021-1732 data
2022-02-18 15:25:39 -05:00
Spencer McIntyre
bcd7cb1122
Writeup the module metadata and docs
2022-02-18 15:23:44 -05:00
Grant Willcox
a7ace66b3f
Use send_request_cgi and update options to use HttpUsername and HttpPassword accordingly. This simplifies code. Also update documentation accordingly
2022-02-14 18:19:00 -06:00
Grant Willcox
c49591cf11
Add in changes to use targets array as per Spencer's suggestion so we can now spawn Meterpreter shells. Also remove ACCOUNT_LOCKOUTS and fix a call that should have been .get_xml_document
2022-02-14 17:38:10 -06:00
Grant Willcox
4c1b2478fa
Add in exploit and documentation
2022-02-11 13:58:56 -06:00
Christophe De La Fuente
41ebb3aa29
Land #15903 , SMB Shadow Module: Direct SMB Session Takeover
2022-01-07 16:57:17 +01:00
usiegl00
3051c5d9f5
Add mutex to cleanup in smb_shadow
...
The mutex will prevent multiple calls to cleanup when the module is
stopped with Ctrl-C. Add a Notes section to the documentation which
describes arpspoof usage and such.
2022-01-07 14:18:15 +09:00
William Vu
d55af3aa00
Add module doc
2021-12-23 12:27:57 -06:00
Spencer McIntyre
1915b1395e
Land #15742 , Added module for CVE-2021-40444
2021-12-08 17:46:02 -05:00
Spencer McIntyre
2f6710e02e
Remove the Not_Hosted target
...
It's not currently working and Metasploit should just handle everything
2021-12-08 17:22:44 -05:00
Spencer McIntyre
75deb69eab
Reformat the CVE-2021-40444 module docs
2021-12-08 16:45:22 -05:00
bwatters
852230c739
Fix bug brought in by importing Msf::Post::File
...
Split out javascript to a file and deobfuscate it
Update documentation for new targets
Fix other small suggestions
2021-12-08 10:36:27 -06:00
usiegl00
609bf4be3c
Update smb_shadow module to clean unnecessary code
...
Remove the return statement after fail_with which will never be reached.
Add documentation for the module options. Reset the packet forwarding
settings during the module cleanup.
2021-12-07 08:41:52 +09:00
usiegl00
260ea0725c
Update smb_shadow module and docs for review
...
Add mutex to module to prevent race condition. Add sleep to after arp
query to prevent arp cache restoration. Add DefangedMode to indicate
system network changes. Change module INTERFACE option to be explicit.
Remove unnecessary module payload parameters. Add module Notes.
2021-12-03 14:33:40 +09:00
bwatters
14064ff3f9
Update module description and remove extra module.
2021-11-29 15:23:02 -06:00
Brendan Coles
5fab1da09b
ms03_026_dcom: cleanup
2021-11-28 08:25:31 +00:00
usiegl00
e19511a31c
Update documentation for the smb_shadow module.
...
Add additional clarity and details to the existing documentation for the
smb_shadow module. Remove some outdated comments and fix some spelling
errors.
2021-11-25 08:12:13 +09:00
William Vu
344bdacae4
Remove preferred payload
...
We'll add it back to Framework later.
2021-11-24 10:44:59 -06:00
usiegl00
e2734293e1
Add SMB Shadow Module: Direct SMB Session Takeover
...
This module intercepts direct SMB connections on the LAN.
Both the SMB Server and Client must be on the LAN.
The SMB Client must be authenticating to the Server as an Administrator.
This module is dependent on an external ARP spoofer.
2021-11-24 20:05:30 +09:00
William Vu
d2c322e875
Revert option name styling in module doc
...
Bug in our local renderer's styling. GitHub renders it just fine.
2021-11-23 19:05:26 -06:00
William Vu
053dc70782
Add words to module doc
2021-11-23 19:05:09 -06:00
William Vu
a8daed1e79
Add module doc
2021-11-23 19:05:09 -06:00
Grant Willcox
8d55b16ade
Fix one more mistake and rename document and module to a more easy to find name
2021-11-11 16:42:58 -06:00
Grant Willcox
27310dc002
Add in exploit and documentation for CVE-2021-42237
2021-11-10 15:52:22 -06:00
Grant Willcox
3af93cbacc
Fix up changes from timwr's review so long
2021-11-09 10:36:50 -06:00
Grant Willcox
780a9370a2
First draft of code, documentation, and exploit DLL plus exploit code
2021-11-09 10:36:40 -06:00
RAMELLA Sébastien
38973510f7
update modules (auxiliary and exploit)
2021-11-09 15:18:58 +04:00
adfoster-r7
9f0804cbfb
Fix Meterpreter spelling mistake
2021-10-12 23:40:43 +01:00
Spencer McIntyre
56cd43a8b8
Land #15624 , Add module for CVE-2020-27955
2021-09-15 14:54:19 -04:00
Jack Heysel
abbb994dab
Updated docs
2021-09-07 13:55:21 -04:00
Jack Heysel
7fe44583fe
Updated docs
2021-09-07 13:32:52 -04:00
Jack Heysel
3c43bd409d
Added docs an Git User-Agent FP
2021-09-03 16:15:39 -05:00
Spencer McIntyre
95015f0c2b
Update the ProxyShell module docs
2021-08-27 17:50:28 -04:00