Commit Graph

6361 Commits

Author SHA1 Message Date
Carsten Maartmann-Moe 680393d4d6 Refined check method to actually verify vulnerability 2018-11-15 22:31:31 +01:00
Carsten Maartmann-Moe 541283a4dd Tidied up set_payload 2018-11-12 20:45:49 +01:00
Brendan Coles 0bdab320f7 Remove useless variable declaration
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-12 12:04:22 +01:00
Carsten Maartmann-Moe e06af184c8 Tidy check method 2018-11-11 22:53:13 +01:00
Carsten Maartmann-Moe 8894af58de serialized, not deserialized... 2018-11-11 22:47:57 +01:00
Carsten Maartmann-Moe 1e8fbc3a1b Fixed indentation and added a status message printout when exploiting 2018-11-11 22:37:42 +01:00
Carsten Maartmann-Moe cf5ca78350 Added YSOSerial payload generating string 2018-11-11 22:15:30 +01:00
Brendan Coles 3770f121fe Changing result parsing style
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:07:37 +01:00
Brendan Coles 951d3e1117 Changing result parsing style
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:07:32 +01:00
Brendan Coles 446eec00b3 Remove disconnect
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:04:43 +01:00
Brendan Coles 189c203e3d Remove handler
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:04:34 +01:00
Brendan Coles e5df5494d9 Remove connect
Co-Authored-By: carmaa <carsten@carmaa.com>
2018-11-11 08:04:22 +01:00
Carsten Maartmann-Moe 5a978dca2e Removed architecture to make payload selection work 2018-11-10 23:00:54 +01:00
Carsten Maartmann-Moe cbaacf696a Add exploit module for CVE-2017-12557
HP Intelligent Management Java Deserialization RCE (Windows)
2018-11-10 22:36:43 +01:00
Jeffrey Martin dd57b27652 Rename hash to generate_process_hash
In the interest of compatibility this uses a more descriptive name for
the process hash creation method instead of overriding ruby's hash method.
See https://docs.ruby-lang.org/en/2.0.0/Hash.html
2018-11-05 17:16:16 -06:00
Shelby Pace 0c38babb9e Land #10874, rm size restriction from pyld_inject 2018-11-05 15:16:40 -06:00
bwatters-r7 f185c06204 Land 10794, Add support for ms17_010_eternalblue_win8 ProcessName option
Merge branch 'land-10794' into upstream-master
2018-11-05 15:08:59 -06:00
bwatters-r7 7ca2311325 Land #10792, Add support for ms17_010_eternalblue ProcessName option
Merge branch 'land-10792' into upstream-master
2018-11-05 14:19:10 -06:00
bwatters-r7 1f0941101f shut up, msftidy 2018-11-05 14:13:33 -06:00
bwatters-r7 4f2ba46125 Stop some of the rubocop carnage 2018-11-05 14:11:24 -06:00
bwatters-r7 5ec155fd44 Changed some options to advanced 2018-11-05 09:59:17 -06:00
l9c ff07289132 better style according to the review 2018-11-05 13:46:36 +08:00
Jacob Robles 6bc4b71ca3 Land #10873, Add notes to exploit modules 2018-11-02 14:11:11 -05:00
Spencer McIntyre 7faa775b55 Remove the now unnecessary DisableNops option 2018-11-02 14:57:41 -04:00
bwatters-r7 114a8127e8 Land #10858, bypassuac_eventvwr optimizations - reduce created processes and artifacts
Merge branch 'land-10858' into upstream-master
2018-10-31 16:44:32 -05:00
bwatters-r7 af7a7d586b Add validation check to make sure x64 remote host and a x86 session
cannot select an x64 target.
2018-10-31 16:31:52 -05:00
Fabien 0cf8563fae Update bypassuac_computerDefault.rb 2018-10-30 11:37:05 +01:00
Fabien bf295ecce5 Update bypassuac_computerDefault.rb 2018-10-30 11:36:38 +01:00
Elazar Broad 6fe7bb0bb6 Increase sleep time to 10 seconds
Increase the wait time before removing the registry key - allows the payload to spawn successfully on slow systems.
2018-10-29 12:55:03 -04:00
Brendan Coles 1c340f8202 Land #10853, Add universal targeting to Mercury/32 IMAP LOGIN exploit 2018-10-28 18:17:46 +00:00
kr3bz 370bcaf8d8 Update mercury_login.md 2018-10-28 09:49:15 +01:00
Brendan Coles a34310095c Update modules/exploits/windows/imap/mercury_login.md
Co-Authored-By: kr3bz <44395414+kr3bz@users.noreply.github.com>
2018-10-28 09:41:29 +01:00
Brendan Coles bfd3a17c0e Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <44395414+kr3bz@users.noreply.github.com>
2018-10-28 09:41:14 +01:00
kr3bz 5efbefdaea Update mercury_login.md 2018-10-28 09:37:47 +01:00
kr3bz 2839a73cbd Update mercury_login.rb 2018-10-28 09:35:15 +01:00
Spencer McIntyre 52fee303d4 Remove the size restriction from payload_inject 2018-10-27 21:26:09 -04:00
Spencer McIntyre caf76a6555 Add applicable notes to my exploit modules 2018-10-27 20:54:14 -04:00
kr3bz c61737bb18 Update mercury_login.md 2018-10-27 20:52:54 +02:00
kr3bz 239632ca03 Update mercury_login.md 2018-10-27 20:52:24 +02:00
kr3bz 3cf8a01b55 Update mercury_login.md 2018-10-27 20:51:31 +02:00
Brendan Coles 965c2d5c01 Update modules/exploits/windows/imap/mercury_login.rb
Co-Authored-By: kr3bz <racic.ivan@gmail.com>
2018-10-26 13:37:37 +02:00
Fabien 6b4e132f35 Create bypassuac_computerDefault.rb 2018-10-25 16:58:56 +02:00
Fabien 280a714faf Delete bypassuac_computerDefault.rb 2018-10-25 16:58:34 +02:00
Wei Chen e84ba62740 Cosmetic changes for local/webexec 2018-10-24 16:13:47 -05:00
Elazar Broad 16d633fabd Remove spaces before EOL 2018-10-24 11:04:41 -04:00
Shelby Pace 3729e9ed7b added description, references 2018-10-24 09:46:00 -05:00
Fabien 9f0c8a0929 Create bypassuac_computerDefault.rb 2018-10-24 15:06:07 +02:00
kr3bz 2e2d742ae7 Added updated mercury_login
Added additional space for the payload, made recommended changes, msftidy does not produce errors, readded null byte as a badchar.
2018-10-24 11:08:37 +02:00
Elazar Broad ef2854c918 Use in-memory reflection for executing the payload
Use to_win32pe_psh_reflection() instead of to_win32pe_psh_net() in order to reduce the amount of processes and forensic artifacts created by this module.
2018-10-23 22:12:10 -04:00
Elazar Broad d75c599929 Use ShellExecuteA to spawn eventvwr.exe
Use ShellExecuteA from railgun to spawn eventvwr.exe, as opposed to cmd /c. This reduces the amount of processes generated by this module.
2018-10-23 21:52:36 -04:00