Tim W
b35b4674d0
fix forking behaviour
2019-08-06 14:17:28 +08:00
Tim W
f48d1b1231
add more links
2019-08-06 13:54:15 +08:00
Adam Cammack
cf9b94a964
Set needs_cleanup flag for exploits that need it
...
The `needs_cleanup` flag needs to be set per-module when an exploit
needs an interactive session to clean up. Some `FileDropper` exploits
need additional cleanup to what the mixin provides, but since all
`FileDropper`s already mark themselves as needing cleanup those are not
covered here. A few of these could potentially be refactored to use the
original exploitation method to clean up or to compile the list of
files/commands to clean up ahead of time, but that is out of the scope
of this fix.
2019-08-02 10:23:53 -05:00
Adam Cammack
5e64f8560a
Fix whitespace
2019-08-02 10:23:41 -05:00
Tim W
b258b8270e
fix #12104 , add CVE-2019-13272 PTRACE_TRACEME linux local exploit
2019-07-19 13:24:13 +08:00
Guillaume Andre
395e4d2424
Update documentation. Register options by alphabetical order.
...
Change-Id: I46bb3701107a504dddbf030e0345d7adc83bafac
2019-07-18 10:45:44 +01:00
yaumn
e51138fa4b
Establish a tcp connection to check for the exim version.
2019-07-13 22:45:21 +01:00
yaumn
764a4a0692
Improve check regex
2019-07-13 19:57:03 +01:00
yaumn
e2a9907e99
Add SendExpectTimeout option
2019-07-13 19:55:12 +01:00
yaumn
f465e43e34
Change tcp communication with meterpreter
2019-07-13 19:25:34 +01:00
Guillaume Andre
60dbbb0455
Ensure temp files are deleted in every case
...
Change-Id: I53401e4bcce887048f433743a965421f93d699ba
2019-07-12 12:20:37 +01:00
Guillaume Andre
642a71383d
Classic shell exploit now uses a bash script
...
Change-Id: I770cf9bcae5c5a265c19f2dc9e4a512e30705b6c
2019-07-11 17:01:23 +01:00
Guillaume Andre
565e18cbe8
Add a few checks
...
Change-Id: Ieca129a54d2105bf646e6f848cb5ecec804c372f
2019-07-11 14:20:21 +01:00
yaumn
435240ed41
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:24:48 +01:00
yaumn
074c73236a
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:24:32 +01:00
yaumn
7812e0037b
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:24:13 +01:00
yaumn
af89433c1d
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:23:50 +01:00
yaumn
9ffbfe0985
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:23:38 +01:00
yaumn
a06dffa174
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:22:52 +01:00
Guillaume Andre
5d52b0326b
Add better checks at the beginning of the exploit.
...
Change-Id: Ib80907f03f15b6c0cf32b48f059cf042e4d6a91f
2019-07-10 11:33:09 +01:00
Guillaume Andre
b68383141c
Added Qualys and dhn to credits. Set suid bit of payload instead of shell launcher. Print detected exim version
...
Change-Id: I61805a4d2b6f7f8a268b677c3c6f1d76ada034da
2019-07-09 16:51:14 +01:00
yaumn
df46faf71f
Finish documentation. Exploit is stable.
2019-07-07 23:58:29 +01:00
yaumn
7b2a1b67ed
Add a documentation file
2019-07-07 00:25:54 +01:00
yaumn
a5843e48a9
Basic reverse shell does not disconnect anymore
2019-07-06 00:53:33 +01:00
Guillaume Andre
4c2cacd7d6
Add meterpreter support
2019-07-05 16:53:39 +01:00
yaumn
2c8ad0e357
First tests with meterpreter sockets
2019-07-05 01:04:15 +01:00
yaumn
74eb74e606
Pipe method with netcat now works
2019-07-04 23:15:23 +01:00
Guillaume Andre
e4c27d3eab
Clean pipe file
...
Change-Id: Ibc78639ad44eb56ffa26fcfb4f656b5a78dbf76a
2019-07-04 16:20:13 +01:00
Guillaume Andre
3c0b581371
Clean code
...
Change-Id: I83287dcd52c4ba566396a0ff7e4f3c3125d12bb0
2019-07-04 16:16:27 +01:00
Guillaume Andre
9b378ceb71
Add options. Add pipe netcat method
...
Change-Id: I0c401add1c2ff76e3e2c3d82a8fb7f74db405a1f
2019-07-04 15:02:03 +01:00
yaumn
bddfef0cac
Add options. Exploits now works with both setuid and nc methods
2019-07-04 00:16:28 +01:00
yaumn
bb58160d10
Exploits now also works with netcat
2019-07-03 14:30:23 +01:00
yaumn
4f1d9af5fd
Add netcat method (still buggy though)
2019-07-03 14:30:23 +01:00
Guillaume Andre
a2411a1d63
First version of the exploit is now working
...
Change-Id: Idf6b6d773cf71c477fe68885313f5f98d74d9c11
2019-07-03 14:30:23 +01:00
Guillaume Andre
bef6425d0e
First commit
...
Change-Id: If751eb1753fc8991fe7971c7123a203734396a46
2019-07-03 14:30:23 +01:00
bcoles
c7ff78c277
Remove spaces at EOL
2019-06-29 14:01:18 +10:00
Brendan Coles
203e3b74db
Add Serv-U FTP Server prepareinstallation Privilege Escalation
2019-06-29 03:52:53 +00:00
Wei Chen
a93a520c3a
Land #11960 , Add LPE for Cisco Prime Infrastructure's runrshell exe
2019-06-19 10:49:17 -05:00
Wei Chen
caa9987a77
Register payload for cleanup
2019-06-10 11:20:25 -05:00
Wei Chen
d63484562c
Correct disclosure date
2019-06-10 11:14:41 -05:00
Wei Chen
12cfada465
Add Cisco Prime Infrastructure runrshell Privilege Escalation
2019-06-10 10:29:43 -05:00
Brendan Coles
8cac968acb
Fix abrt package version check
2019-06-10 02:21:10 +00:00
bcoles
ca8c72d586
Fix abrt package version check
2019-05-30 04:24:53 +10:00
Brendan Coles
f11ce8635f
Add ptrace Sudo Token Privilege Escalation module
2019-04-30 21:54:18 +00:00
Jacob Robles
6c29da6e8e
Land #11673 , Add yum persistence module
2019-04-30 06:49:43 -05:00
Jacob Robles
e5cb003c5c
Remove trailing whitespace
2019-04-30 06:25:48 -05:00
Wei Chen
6668b226ba
Land #11761 , Cleanup apport_abrt_chroot_priv_esc
2019-04-29 14:04:24 -05:00
Jacob Robles
147b9fef98
Land #11665 , Add APT persistence module
2019-04-27 12:32:21 -05:00
Jacob Robles
1faa41aafe
Dont require hook name
2019-04-26 13:11:40 -05:00
@shellfail
652e4b0a34
Update modules/exploits/linux/local/yum_package_manager_persistence.rb
...
Changed date format
Co-Authored-By: aringo <ringo.aaron@gmail.com >
2019-04-25 20:09:54 -05:00