Commit Graph

13654 Commits

Author SHA1 Message Date
Brent Cook 3d507250b0 Land #9745, Update QNX iwatchd to use newer APIs 2018-10-06 05:06:42 -04:00
Brent Cook c9ebe5ae23 Land #9745, Add ifwatchd QNX privilege escalation exploit module 2018-10-06 05:03:50 -04:00
Brendan Coles 89b6aafd85 Use register_file_for_cleanup 2018-10-06 04:37:04 +00:00
Brent Cook e2f97c75a0 Land #10616, update Unitrends UEB module to support vulnerabilities in version 10 2018-10-05 16:20:38 -05:00
Brent Cook a51243ce91 Land #10745, Update lastore_daemon_dbus_priv_esc tested versions 2018-10-05 11:35:31 -04:00
William Vu 7bc98e0ea8 Fix formatting and convert a missed AKA reference 2018-10-05 03:22:08 -05:00
William Vu d9cb052189 Fix improper use of the Ruby shovel operator (<<)
junk would be modified and returned, and we just want to return the
concatenated string. Practically doesn't matter, but it's incorrect.

This was my first public module. I've been wanting to fix this since.
I'm noticing it again now as I look for how I used Ret in a target.
2018-10-05 02:18:06 -05:00
Dylan Pindur 0f34f94496 Add back SSL options for tc-agent-xmlrpc-module 2018-10-05 15:11:13 +08:00
Dylan Pindur 8ae0bcbacd Refactor if statements to be cleaner 2018-10-05 09:48:44 +08:00
bwatters-r7 28fb27187a Land #10418, Add DCOM/RPC NTLM Reflection (MS16-075) Via Reflective DLL
Merge branch 'land-10418' into upstream-master
2018-10-04 16:54:53 -05:00
bwatters-r7 9a45c66db4 Fixed check to you know, check. 2018-10-04 16:38:35 -05:00
Brendan Coles fe7ce02dfd Update tested versions 2018-10-04 21:13:21 +00:00
William Vu 9f30512532 Land #10707, module traits to augment module rank 2018-10-04 13:26:14 -05:00
Jacob Robles 071aa04111 Land #10738, Add Zahir Enterprise 6 build 10b BOF 2018-10-04 11:00:12 -05:00
Wei Chen fb60558777 Land #10712, Make exploit/linux/http/axis_srv_parhand_rce more stable 2018-10-04 10:10:28 -05:00
Jacob Robles 060c68d2e0 Aligment, minor modifications 2018-10-04 10:10:09 -05:00
Jacob Robles 8b955f8ec5 Land #10704, Navigate CMS Unauthenticated RCE 2018-10-04 06:44:21 -05:00
Dhiraj Mishra 9f8f0b8885 Fixing carriage/spaces return at EOL 2018-10-04 15:41:46 +05:30
Dhiraj Mishra 783789d098 Updating 2018-10-04 15:01:06 +05:30
Thomas Gregory 144c76ecd4 Latest fix based on @jrobles-r7 recommendations
Fixing:
- MetasploitModule class changed
- Remove the word 'exploit' from name
- Remove StackAdjustment
- Remove Privileged option
- Remove make_nops(12)
- Remove extra buffer at the end of exploit
2018-10-04 16:18:02 +07:00
Thomas Gregory 991ac3c671 Fixing for msftidy
Fixing some format because still throw errors
2018-10-03 18:55:29 +07:00
Dylan Pindur 11d9b44922 Add exploit module for TeamCity Agent XMLRPC 2018-10-03 18:33:10 +08:00
Thomas Gregory cb5d68b641 Fixing based on msftidy.rb
Makes msftidy happy
2018-10-03 17:13:24 +07:00
bwatters-r7 428d368444 shut up, rubocop 2018-10-02 14:40:55 -05:00
bwatters-r7 64d53cd882 code cleanup 2018-10-02 14:06:25 -05:00
Fabio Poloni 4927f96f61 Fixed small typo 2018-10-02 15:57:57 +02:00
Jacob Robles 97729727d8 Minor modifications 2018-10-02 06:57:04 -05:00
Rob 6f5a8f8f42 Fix outdated metadata 2018-10-01 18:59:09 +01:00
Tim W dea3f90e0b add documentation with the current status 2018-10-01 17:54:00 +08:00
modpr0be ff560ee990 Add test for Zahir 0day exploit
Add test for Zahir 0day exploit, need to test more e.g. VirtualBox or Physical machines.
2018-09-29 18:59:14 +07:00
William Vu ee06ec2fda Background a subshell to continue execution
This provides a more stable injection. I should have tested this sooner.
2018-09-27 23:51:42 -05:00
William Vu 0dab5b622f Change default target to cmd/unix 2018-09-27 23:39:32 -05:00
William Vu e999b4d81c Lower rank to AverageRanking 2018-09-27 23:28:13 -05:00
William Vu 7a2d0acee6 Add basic check method and move rand_srv
The .srv can be random each request.
2018-09-27 23:28:13 -05:00
William Vu d29d936d6f Bump WfsDelay to 10 for this slow-ass device 2018-09-27 23:28:13 -05:00
asoto-r7 e4256f4595 Make ENABLE_STATIC an OptBool, as I should have done in the first place 2018-09-27 17:54:22 -05:00
Pyriphlegethon 342cfe4199 Refactor again 2018-09-27 12:38:05 +02:00
Pyriphlegethon 82b1f40925 Add cleanup code 2018-09-27 11:17:53 +02:00
Pyriphlegethon 2b86297138 Refactor 2018-09-27 11:16:54 +02:00
Pyriphlegethon f55483d17d Fix incorrect session_id extraction 2018-09-27 11:07:43 +02:00
Wei Chen 9064fac1ff Fix code based on Will's feedback 2018-09-26 21:13:37 -05:00
Wei Chen 583874d370 Update use of reliability/side-effects/stability metadata 2018-09-26 18:54:08 -05:00
Pyriphlegethon f882c3aec2 Add Navigate CMS Unauthenticated Remote Code Execution 2018-09-26 21:39:15 +02:00
h00die b486708b02 Land #10663 extremeparr solaris LPE 2018-09-23 13:53:18 -04:00
Dhiraj Mishra db15340306 Fixing 2018-09-22 15:30:51 +05:30
Dhiraj Mishra 25ed5dc3a6 Moving to exploits/windows/local 2018-09-22 15:22:30 +05:30
Brendan Coles 7687e6e7b7 Update tested versions 2018-09-22 03:57:03 +00:00
bwatters-r7 849547793b Land #10643, CVE-2018-8440 ALPC Scheduler
Merge branch 'land-10643' into upstream-master
2018-09-21 15:38:45 -05:00
Jacob Robles 47bf780b88 specify meterpreter, update documentation
Warning is after spell...
2018-09-21 12:31:56 -05:00
Jacob Robles c9de43c8d0 Code cleanup, feedback from bcoles 2018-09-21 10:11:26 -05:00