Commit Graph

3337 Commits

Author SHA1 Message Date
h00die a0585dcb9e Land #8872 docs for octopusdeploy_deploy 2017-08-22 21:36:44 -04:00
Jon Hart e4fc307ebb Add docs 2017-08-22 15:12:02 -07:00
Erik Lenoir be2739d335 Transform loots into creds 2017-08-22 11:57:51 +02:00
james 7f8e6b83dc Update documentation for exploit/windows/http/octopusdeploy_deploy
Remove self explanatory options.
2017-08-21 19:47:24 -05:00
james 60215297be Update documentation for exploit/windows/http/octopusdeploy_deploy
Fix awkward wording.
2017-08-21 19:17:41 -05:00
james de9392995a Add documentation for exploit/windows/http/octopusdeploy_deploy 2017-08-21 19:11:36 -05:00
Deepanshu Gajbhiye 8f4fcb5094 tcp.md
This module does a complete full tcp scan of each port on the target host. It does a full 3 way handshake on each port.
2017-08-21 13:09:12 -04:00
Brent Cook eabe4001c2 Land #8492, Add IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution module 2017-08-20 18:48:22 -05:00
Brent Cook cbd7790e95 Land #8751, Add Asterisk Gather Credentials auxiliary module 2017-08-20 18:34:27 -05:00
Brent Cook 840c0d5f56 Land #7808, add exploit for VMware VDP with known ssh private key (CVE-2016-7456) 2017-08-20 17:36:45 -05:00
Brent Cook f7dc831e9a Land #8799, Add module to detect Docker, LXC, and systemd-nspawn containers 2017-08-20 14:45:57 -05:00
Brent Cook 2eba188166 Land #8789, Add COM class ID hijack method for bypassing UAC 2017-08-20 13:57:17 -05:00
Erik Lenoir cde319a5ec Optim module and add doc 2017-08-18 19:30:41 +02:00
Jay Turla b0a4634b24 Update connect.md
Adding the command in installing gem "serialport".
2017-08-17 18:55:44 +08:00
Brendan Coles 3fcd248d3a Add documentation 2017-08-17 09:51:09 +00:00
Tim 648dca7bdb fix silly documentation mistake 2017-08-17 14:43:58 +08:00
james 1c44092ba9 Add module documentation for post/linux/gather/checkcontainer 2017-08-16 21:15:56 -05:00
OJ 408a83a36b Added comhijack module documentation 2017-08-16 13:05:27 +10:00
Erik Lenoir 6ac8ed490b Add documentation file 2017-08-15 16:56:20 +02:00
Brendan Coles 60f7534969 Add documentation 2017-08-15 03:43:22 +00:00
Brent Cook 68f569d8f5 Land #8809, Add documentation for OSX meterpreter 2017-08-13 09:31:28 -04:00
William Vu 4315c2d8ea Land #8802, single-char args for terp scripts 2017-08-10 01:29:55 -05:00
Pearce Barry bb5fffebc4 Land #8796, SMBLoris Denial of Service Module. 2017-08-09 16:24:55 -05:00
Pearce Barry 901a1fdd1b Minor tweaks. 2017-08-09 15:44:32 -05:00
bwatters-r7 dd79aa3afb Land #8627, Add post module multi/gather/jenkins 2017-08-09 10:43:21 -05:00
Tim 9c87f5f52f commands should be highlighted 2017-08-08 12:45:39 +08:00
Tim eb3e07ee10 minor tweak since background is default now 2017-08-08 12:37:28 +08:00
Tim 61bb59d653 fix typos 2017-08-08 12:31:30 +08:00
Tim 0fde536691 add documentation for OSX meterpreter 2017-08-08 12:26:22 +08:00
Tim 46ca543712 add docs for Android APK injection 2017-08-07 15:56:48 +08:00
Josh Hale ed2286c637 Fix references to multi_console_command 2017-08-06 18:58:38 -05:00
Pearce Barry e1576154fb Document the new padding option. 2017-08-06 18:34:56 -05:00
David Maloney 289f03241b add module documentation
add module docs for the new smbloris DoS
2017-08-04 16:10:44 -05:00
Brent Cook da3ca9eb90 update some documentation 2017-08-03 17:09:44 -05:00
Yorick Koster 67dddd2402 Typo reported by @nixawk 2017-08-02 15:47:21 -05:00
Yorick Koster 3229320ba9 Code review feedback from @nixawk 2017-08-02 15:46:51 -05:00
Yorick Koster 565a3355be CVE-2017-8464 LNK Remote Code Execution Vulnerability
This module exploits a vulnerability in the handling of Windows
Shortcut files (.LNK) that contain a dynamic icon, loaded from a
malicious DLL.

This vulnerability is a variant of MS15-020 (CVE-2015-0096). The
created LNK file is similar except in an additional
SpecialFolderDataBlock is included. The folder ID set in this
SpecialFolderDataBlock is set to the Control Panel. This is enought to
bypass the CPL whitelist. This bypass can be used to trick Windows into
loading an arbitrary DLL file.
2017-08-02 15:46:30 -05:00
Martin Pizala d7d64286e2 Add documentation for exploit module Rancher Server - Docker Exploit 2017-07-28 08:04:59 +02:00
Brendan Coles 798dfe0b88 Add documentation 2017-07-26 10:18:23 +00:00
Martin Pizala dd0c78484a Fix mistake 2017-07-26 02:17:51 +02:00
Martin Pizala cd418559bc Docker Daemon - Unprotected TCP Socket Exploit 2017-07-26 00:21:35 +02:00
Brent Cook 6300758c46 use https for metaploit.com links 2017-07-24 06:26:21 -07:00
Ricardo Almeida fe5c6dc28f Orientdb 2.2.x RCE - Update documentation 2017-07-24 10:09:06 +01:00
Brent Cook 7c55cdc1c8 fix some module documentation
3 modules got documentation landed in the wrong spot. This also fixes a few
typos and improves formatting.
2017-07-23 07:46:52 -07:00
Pearce Barry 6bb745744b Land #8471, Add VICIdial user_authorization Unauthenticated Command Execution module 2017-07-21 15:57:08 -05:00
Ricardo Almeida 00a817d228 Orientdb 2.2.x RCE - Add documentation 2017-07-20 09:03:26 +01:00
bwatters-r7 ffad0d1bbf Land #8559, Ipfire oinkcode exec 2017-07-19 14:31:18 -05:00
thesubtlety 47f55b1c81 add documentation 2017-07-18 21:30:53 -04:00
Jon Hart e93e524c3b Merge branch 'upstream-master' into feature/rdp-scanner 2017-07-17 13:46:59 -07:00
Jon Hart e5ef737c21 Add documentation 2017-07-17 13:45:12 -07:00