Commit Graph

155 Commits

Author SHA1 Message Date
FenixH 056dd6baec rpc_creds fix 2019-12-09 11:14:06 +01:00
FenixH 65f8fa003c rpc fixes 2019-12-06 12:29:53 +01:00
FenixH 303009ce67 Merge remote-tracking branch 'upstream/master' 2019-12-06 11:09:52 +01:00
Adam Cammack 5565ef9450 Return check codes from scanner runs 2019-11-19 00:35:17 -06:00
Adam Cammack de845214d1 Add module check result tracking to RPC API
This adds a few sets and a hash to the Msf::Simple::Framework that help
keep track of running checks and their eventual results.
2019-10-29 12:45:09 -05:00
FenixH 72abac0683 Fix call to method in null object in rpc_creds method 2019-10-24 11:19:09 +02:00
Adam Cammack c0d365aa46 Unify modules and cache with fullname method 2019-06-03 13:19:29 -05:00
Matthew Kienow fbf7668889 Fix delete vuln
Convert fetched Mdm::Vuln::ActiveRecord_Associations_CollectionProxy to
an Array as the code only expects to process an Mdm::Vuln or Array.
2019-04-26 14:44:37 -04:00
Matthew Kienow a393e3f71f Fix finding a service to return
Convert fetched Mdm::Service::ActiveRecord_Associations_CollectionProxy
to an Array as the code only expects to process an Mdm::Service or
Array.
2019-04-26 14:40:49 -04:00
Matthew Kienow 8173fd5d8a Update opts usage to match the method comment
Conditions assignment is to the singular hosts.address, so the plural
addresses doesn't make sense.
2019-04-26 14:34:40 -04:00
Matthew Kienow 7a0681f816 Fix incorrect method comments and examples 2019-04-26 14:30:28 -04:00
Jeffrey Martin 25743e1346 one more missing doc 2019-02-19 10:03:20 -06:00
Jeffrey Martin 5e8d33483e update docs to clarify workspace rewuirements 2019-02-15 17:32:49 -06:00
Jeffrey Martin 6460180423 guard for unknown host, fix processing of modules 2019-02-15 17:19:23 -06:00
Jeffrey Martin 32c090868c adjustments for analyze 2019-01-28 10:11:40 -06:00
Jeffrey Martin 24f5422db9 use analyze.host to reflect final location of util 2019-01-09 16:59:50 -06:00
Jeffrey Martin f93497de8f refactor to allow analyze via rpc 2019-01-09 16:48:54 -06:00
Brent Cook ba0bfb1114 Land #10781, Fix error in rpc_shell_read RPC method. 2018-10-10 09:02:47 -05:00
Ivo Nutár 50755b2e00 Fix function rpc_shell_read - return result as string 2018-10-10 11:36:17 +02:00
Ivo Nutár 36b7fb3524 Fix function rpc_shell_read - remove wrong parameter data, return correct values 2018-10-10 11:31:03 +02:00
Wei Chen c7efd57144 Sync up with master 2018-10-06 08:27:01 -05:00
Matthew Kienow 06700efbc4 Skip payload generate to reduce processing time 2018-10-04 22:06:32 -04:00
Matthew Kienow ccad78d567 Fix spelling mistake 2018-10-02 14:11:02 -04:00
Matthew Kienow d807600ebe Enhance RPC information retrieval
Add the ability to retrieve additional module information for payloads,
encoders and nops. Add ability to filter these modules by architectures.
2018-10-02 13:38:07 -04:00
Wei Chen 02ef565730 Update evasion_module_type branch 2018-09-24 08:20:32 -05:00
Wei Chen 1f16052988 Make key random and fix RPC 2018-09-05 15:09:47 -05:00
Wei Chen a3df5bb5d9 Fix rpc_info 2018-09-04 08:35:39 -05:00
Wei Chen d89b971d83 Add API doc for rpc_compatible_evasion_payloads 2018-09-03 22:25:51 -05:00
Wei Chen e9c4698291 Support RPC 2018-09-03 22:15:23 -05:00
William Vu b1c633faf6 Add Group Policy Preferences support to db_import
And take the Jaden Smith approach, as @busterb quipped to me. :)

This one's a little weird, since you normally import scans into
Metasploit, but now that creds are first-class in the database, it makes
more sense to be able to import them.

Currently, your alternatives are post/windows/gather/credentials/gpp,
which requires a session, and auxiliary/scanner/smb/smb_enum_gpp, which
requires a network scan.
2018-08-21 23:44:39 -05:00
Brent Cook 730010aa06 remove RingBuffer from interactive command shells, fix token handling 2018-04-06 13:49:13 -05:00
Brent Cook 5635e81a87 export module.search command 2017-06-24 15:50:37 -05:00
Brent Cook f96f61d29e enhance module info to be on par with pro RPC interface 2017-06-21 08:36:49 -05:00
TheNaterz 40fafaa270 dereference the service from the service manager 2017-06-09 16:24:01 -06:00
TheNaterz c3b2476a51 add arch to rpc session details 2017-06-08 16:26:13 -06:00
James Barnett bd21d2811b Update client to use TLS1.2 2017-04-04 17:57:07 -05:00
wchen-r7 f600fa1caa Be aware of logout 2017-02-14 17:03:57 -06:00
wchen-r7 81abbfba46 Resolve #7959, Automatically login to RPC service after expiration
When the RPC client token expires, it will automatically login
again, and renew the token during the next RPC request.

Resolves #7959
2017-02-14 16:41:08 -06:00
Brent Cook f69b4a330e handle Ruby 2.4 Fixnum/Bignum -> Integer deprecations 2017-01-22 10:20:03 -06:00
James Lee 3c0ce8eafb Fix some rubocop complaints 2017-01-13 17:24:23 -06:00
William Vu 0800a4f816 Update RPC functionality 2017-01-12 19:35:42 -06:00
Brent Cook 57ab974737 File.exists? must die 2016-04-21 00:47:07 -04:00
wchen-r7 a5f3bddfc8 Support RPC API 2016-02-18 00:39:12 -06:00
Louis Sato 657a5481dc fix rpc session conditional to allow powershell read/write 2015-10-28 11:49:32 -05:00
Brent Cook 4b271425c9 s/datstore/datastore/g 2015-10-20 13:05:49 -05:00
wchen-r7 910ae8a480 Fix #5461, actually stop a job from the RPC service
Fix #5461. The RPC service is incorrectly using the wrong method to
stop a job, this patch should fix that.
2015-06-04 23:09:55 -05:00
David Maloney 356f361b40 add sid to the the yard docs
you win this round OJ ;)

MSP-12722
2015-05-21 09:30:09 -05:00
David Maloney 48c50a897c add rpc call to change meterp transport
this rpc method allows the user to change transport
on an existing meterp session. if it's successful
it will close the old 'session' tied to the rpevious transport

MSP-12722
2015-05-19 14:43:25 -05:00
Brent Cook 8bd2a69112 simplify and fix rpc_get_note 2015-05-01 16:01:07 -05:00
Brent Cook 52b9fc8fca handle unknown host when generating a new note 2015-05-01 15:47:05 -05:00