gwillcox-r7
0dde85f562
Land #13739 , Cisco AnyConnect Priv Esc via Path Traversal
2020-06-24 17:47:52 -05:00
gwillcox-r7
15de510623
Add in RuboCop and msftidy_docs.rb fixes
2020-06-24 17:19:21 -05:00
Christophe De La Fuente
5f64444d4f
Update module and documentation from code review
2020-06-24 23:34:26 +02:00
Christophe De La Fuente
3997dbdade
Updates from code review
2020-06-22 16:06:09 +02:00
Christophe De La Fuente
2e33241a90
Update module and add documentation
2020-06-19 20:17:11 +02:00
Shelby Pace
1cb57a7e79
Land #13444 , add GOG Galaxy Client Privesc
2020-06-15 08:53:12 -05:00
Shelby Pace
801ef062a1
modify docs for new output
2020-06-15 08:42:27 -05:00
gwillcox-r7
d0ff2b116a
Add in some changes to the documentation to conform to linting standards
2020-06-10 23:22:43 -05:00
gwillcox-r7
9db73454aa
Update documentation to better describe the versions tested
2020-06-10 18:52:49 -05:00
gwillcox-r7
542581a377
Update documentation to reflect recent changes to the exploit
2020-06-10 12:22:00 -05:00
gwillcox-r7
d6b5a1009d
Add in Windows 10 v1803 x64 exploit documentation
2020-06-10 11:02:53 -05:00
gwillcox-r7
477418539b
Upload documentation
2020-06-10 11:02:51 -05:00
Joe Testa
5508bda29e
Moved module into exploit/windows/local. Added documentation.
2020-05-18 17:09:10 -04:00
bwatters-r7
9b40554ec6
Land #13370 , Add Druva inSync inSyncCPHwnet64.exe RPC Type 5 Privilege Escalation
...
Merge branch 'land-13370' into upstream-master
2020-05-12 13:20:27 -05:00
Spencer McIntyre
b4e2599921
Remove trailing whitespace to fix build failures
2020-05-07 09:59:34 -04:00
Spencer McIntyre
9769e04b6e
Land #13322 , CVE-2020-0668 Service tracing file junction overwrite
2020-05-07 09:47:20 -04:00
Spencer McIntyre
26d4cb7a47
Tweak the service tracking checks and update docs markdown
2020-05-07 09:46:19 -04:00
bwatters-r7
a5fe498610
Update ARCH handling, suggested changes, and last-minute fixes
2020-05-06 15:36:53 -05:00
Brendan Coles
bf16307d7f
Add Druva inSync inSyncCPHwnet64.exe RPC Type 5 Privilege Escalation
2020-05-06 14:09:46 +00:00
gwillcox-r7
02bc959d1b
Documentation alignment to 72 character width as is standard
2020-05-05 21:01:52 -05:00
Tim W
bcf9449b29
add basic check method
2020-05-01 19:02:21 +08:00
bwatters-r7
01f1cfd188
Update documentation with note about prior windows versions
2020-04-30 09:37:52 -05:00
Tim W
8e9a162b1b
fix
2020-04-30 18:05:00 +08:00
Tim W
ea22e34b9c
fix description
2020-04-30 17:51:28 +08:00
Tim W
109f0a01f7
add windows 7 sp1 scenario
2020-04-30 17:19:54 +08:00
Tim W
ff0704b316
code review from grant <3
2020-04-30 17:19:54 +08:00
Tim W
7560f7de8c
remove changes to other files
2020-04-30 17:19:54 +08:00
Tim W
f05b50f54e
add documentation for CVE-2019-0808
2020-04-30 17:19:53 +08:00
bwatters-r7
191044cdad
Final fixes and documentation
2020-04-29 10:18:22 -05:00
Shelby Pace
640eb77403
Land #13260 , add docker wincred module
2020-04-24 10:02:38 -05:00
Shelby Pace
24eeba09e8
typo
2020-04-24 10:01:31 -05:00
bwatters-r7
1c757f90db
bcoles suggestions
2020-04-22 18:08:58 -05:00
Spencer McIntyre
62a000fe32
Land #13193 , add updates to the trusted service path LPE
2020-04-16 11:41:02 -04:00
bwatters-r7
9bede45746
Word
2020-04-15 17:01:32 -05:00
bwatters-r7
23cd4708c6
Forgot a step
2020-04-15 16:57:56 -05:00
bwatters-r7
2166ab04ac
First swipe at CVE-2019-15752
2020-04-15 16:52:45 -05:00
h00die
a01d50de38
add windows writable? and update unqouted service path
2020-04-10 14:54:20 -04:00
h00die
f339e2e476
doc tidy
2020-04-03 22:02:28 -04:00
h00die
6d8fc1dad6
unquoted service path updates
2020-04-03 22:00:15 -04:00
Spencer McIntyre
0316ed7a18
Add module docs for CVE-2020-0796
2020-04-02 17:48:07 -04:00
bwatters-r7
c9e4ca34c3
Land #12921 , Updating regex in ms16_075_reflection_juicy exploit windows version check
...
Merge branch 'land-12921' into upstream-master
2020-02-20 21:10:37 -06:00
William Vu
de6306fa35
Fix message, once more with feeling
2020-02-20 11:26:21 -06:00
William Vu
9c69059a24
Fix DisablePayloadHandler warning once and for all
2020-02-20 10:35:47 -06:00
0x44434241
9e46926a0f
Update documentation/modules/exploit/windows/local/ms16_075_reflection_juicy.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2020-02-12 08:18:49 +09:00
0x44434241
785dbb6ba3
Update documentation/modules/exploit/windows/local/ms16_075_reflection_juicy.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2020-02-12 08:18:27 +09:00
0x44434241
9c30250161
Updating documentation for juicy potato exploit.
...
Added a link to information on the expiry of the bug, and explicitly
listing which versions of Microsoft Windows were and were not
vulnerable.
2020-02-10 16:33:45 +09:00
bwatters-r7
7f3c0c9314
Land #12906 , Add module for CVE-2019-19363
...
Merge branch 'land-12906' into upstream-master
2020-02-06 15:22:17 -06:00
Shelby Pace
e736588795
change method of exploitation for reliability
...
This commit changes a few things:
1. The module first writes the dll to a
temp location.
2. The module writes a batch file to a
temp location.
3. The batch file copies the dll until
the copy command fails (presumably
because the dll is now in use by
PrintIsolationHost.exe).
4. The dropped files are deleted.
5. Docs updated to reflect changes.
2020-02-06 12:51:36 -06:00
Shelby Pace
772431a29e
add documentation
2020-02-03 16:25:16 -06:00
Brendan Coles
34621c0adc
Add Windscribe WindscribeService Named Pipe Privilege Escalation
2020-02-01 00:41:07 +00:00