Christophe De La Fuente
f9077bcd8d
Land #12704 , OpenNetAdmin 18.1.1 Remote Code Execution exploit
2020-02-21 15:49:26 +01:00
h00die
fe0e955dc2
Land #12849 , oracle_login docs
2020-02-21 08:58:16 -05:00
h00die
f451041d4b
oracle_login docs
2020-02-21 08:41:42 -05:00
bwatters-r7
c9e4ca34c3
Land #12921 , Updating regex in ms16_075_reflection_juicy exploit windows version check
...
Merge branch 'land-12921' into upstream-master
2020-02-20 21:10:37 -06:00
Onur ER
e4456c9006
Update opennetadmin_ping_cmd_injection.md
2020-02-21 04:14:21 +03:00
Onur ER
1fe1506b42
Update documentation/modules/exploit/unix/webapp/opennetadmin_ping_cmd_injection.md
...
Co-Authored-By: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com >
2020-02-21 03:06:56 +03:00
William Vu
de6306fa35
Fix message, once more with feeling
2020-02-20 11:26:21 -06:00
William Vu
9c69059a24
Fix DisablePayloadHandler warning once and for all
2020-02-20 10:35:47 -06:00
Christophe De La Fuente
f484e6c83c
Land #12862 , Apache James 2.3.2 arbitrary file write exploit module
2020-02-20 10:41:13 +01:00
mattaberegg
739928b56a
Added line break to docs
2020-02-19 17:56:13 -08:00
Shelby Pace
db8555e007
Land #12942 , add Diamorphine privilege escalation
2020-02-19 10:36:39 -06:00
William Vu
0264802756
Reformat module doc
2020-02-18 23:28:08 -06:00
William Vu
a34ffb3694
Fix typos in module doc
2020-02-18 23:27:15 -06:00
William Vu
6ad9956af8
Correct module doc filename
2020-02-18 23:24:46 -06:00
Brent Cook
8489bcdfd9
This fixes broken links to the community.rapid7.com blog
...
Performed mechanically with sed, spot-checked that the new blog can consume these links.
2020-02-18 09:06:11 -06:00
Adam Galway
48ba1026c6
Land 12915, adds windows ssh persistence module
2020-02-17 12:02:49 +00:00
Brendan Coles
ac6d0e4391
Add Diamorphine Rootkit Signal Privilege Escalation module
2020-02-16 14:53:16 +00:00
dwelch-r7
0e55e20c9c
Land #12902 , Add exploit module for crosschex buffer overflow
2020-02-13 15:43:38 +00:00
0x44434241
9e46926a0f
Update documentation/modules/exploit/windows/local/ms16_075_reflection_juicy.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2020-02-12 08:18:49 +09:00
0x44434241
785dbb6ba3
Update documentation/modules/exploit/windows/local/ms16_075_reflection_juicy.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2020-02-12 08:18:27 +09:00
Adam Galway
946e244c8c
Updates docs and adds basic options
2020-02-11 13:40:51 +00:00
Adam Galway
a7a80e08a8
Updated docs with platform info
2020-02-11 12:55:07 +00:00
Adam Galway
65521270ea
Land #12853 , InfiniteWP exploit & mixin upgrades
2020-02-10 11:33:49 +00:00
0x44434241
9c30250161
Updating documentation for juicy potato exploit.
...
Added a link to information on the expiry of the bug, and explicitly
listing which versions of Microsoft Windows were and were not
vulnerable.
2020-02-10 16:33:45 +09:00
mattaberegg
90503b2c61
Documentation cosmetic updates
2020-02-07 18:28:24 -08:00
mattaberegg
a05611d756
Improve cleanup functionality
2020-02-07 16:13:25 -08:00
William Vu
eab1245eef
Update module doc
2020-02-07 12:30:00 -06:00
Spencer McIntyre
6557cabd65
Land #12900 , add teamviewer password recovery
2020-02-07 10:24:12 -05:00
Spencer McIntyre
5a62630309
Add installation steps to the module docs
2020-02-07 10:20:17 -05:00
dwelch-r7
54550dba74
tidied up docs
2020-02-07 14:08:51 +00:00
Adam Galway
b01f02480f
Land #12912 , removes and aliases jtr modules
2020-02-07 12:38:26 +00:00
Alan Foster
4dcb2fbd96
Land #12889 , Add OpenSMTPD MAIL FROM RCE
2020-02-07 11:43:18 +00:00
William Vu
763dbf5d5d
Check WordPress version
2020-02-07 03:14:17 -06:00
William Vu
6c59d7c37c
Refactor module
2020-02-07 01:38:11 -06:00
blurbdust
a5a5ea7ded
clean up code, update documentation
2020-02-06 22:27:47 -06:00
William Vu
8c07e17912
Update module docs
2020-02-06 15:57:54 -06:00
bwatters-r7
7f3c0c9314
Land #12906 , Add module for CVE-2019-19363
...
Merge branch 'land-12906' into upstream-master
2020-02-06 15:22:17 -06:00
William Vu
68565f575f
Update module doc
2020-02-06 14:55:41 -06:00
Shelby Pace
e736588795
change method of exploitation for reliability
...
This commit changes a few things:
1. The module first writes the dll to a
temp location.
2. The module writes a batch file to a
temp location.
3. The batch file copies the dll until
the copy command fails (presumably
because the dll is now in use by
PrintIsolationHost.exe).
4. The dropped files are deleted.
5. Docs updated to reflect changes.
2020-02-06 12:51:36 -06:00
William Vu
62c98710ad
Reword vulnerable commit range
2020-02-06 11:03:20 -06:00
dwelch-r7
a704f757b7
fix windows version
2020-02-06 11:22:03 +00:00
dwelch-r7
95941d539e
Add docs for windows ssh persistence
2020-02-06 11:19:14 +00:00
William Vu
95fa8602bc
Refactor modules that use Expect
2020-02-05 21:16:21 -06:00
William Vu
b98c0c6876
Add module doc
2020-02-05 17:01:58 -06:00
Jeffrey Martin
2bb91a2262
remove jtr specific modules that are refactored
2020-02-05 16:52:19 -06:00
Shelby Pace
a154efa250
Land #12887 , add dlink ssdpcgi cmd inject
2020-02-05 13:19:05 -06:00
Shelby Pace
691a18c997
move docs file, add options
2020-02-05 12:58:46 -06:00
bwatters-r7
9db6b5184b
Land #12894 , Add Windscribe WindscribeService Named Pipe Privilege Escalation
...
Merge branch 'land-12894' into upstream-master
2020-02-05 12:37:34 -06:00
Shelby Pace
772431a29e
add documentation
2020-02-03 16:25:16 -06:00
blurbdust
f3e6f562a1
add docs, fix module location
2020-02-03 13:16:53 -06:00