Commit Graph

517 Commits

Author SHA1 Message Date
cn-kali-team 94de45d856 Fix Bug 2020-02-29 23:22:56 +08:00
cn-kali-team 60f4787123 Exception handling and automatic get_domain info 2020-02-29 15:26:39 +08:00
cn-kali-team 9fa339eca8 Add an option,Fully implemented through API 2020-02-29 00:22:58 +08:00
cn-kali-team ee64f38d8c Added post module for adding local user accounts 2020-02-25 20:03:05 +08:00
bwatters-r7 2db93c9051 Land #12002, Feature/reverse ssh
Merge branch 'land-12002' into upstream-master
2020-02-21 09:17:51 -06:00
dwelch-r7 31a6e0e396 Add post module for ssh persistence in windows 2020-02-05 16:21:38 +00:00
dwelch-r7 97f5f37344 Land #12807, Install OpenSSH for Windows 2020-02-03 14:50:30 +00:00
bluesentinelsec 5d7c50e3ed updated to use Msf::Post::Windows::Powershell mixin 2020-01-19 19:51:44 -05:00
bluesentinelsec 7eeb8c33eb Added new post exploitation module: 'Install OpenSSH for Windows' 2020-01-09 19:58:31 -05:00
Francesco Soncina 988971bd94 Update shellcode_inject.rb 2019-12-18 16:05:37 +01:00
Francesco Soncina f22c6f2f63 add support for PPID spoofing to migrate 2019-12-17 16:39:18 +01:00
Francesco Soncina f9d2f9fa2e Update shellcode_inject.rb 2019-12-17 01:42:52 +01:00
Francesco Soncina cbd225dfed Update shellcode_inject.rb 2019-12-17 01:34:12 +01:00
Francesco Soncina 5c7c071094 add support for PPID spoofing to shellcode_inject 2019-12-17 01:31:40 +01:00
bwatters-r7 6be4729a02 Land #12391, Add shellcode_inject post module
Merge branch 'land-12391' into upstream-master
2019-12-12 15:20:51 -06:00
bwatters-r7 fb5c896d40 Streamline Checks and error for channelized comms before injection 2019-12-12 15:19:17 -06:00
bwatters-r7 cc25a30d1a Move dpendency to mixin and adjust print statements 2019-12-04 09:00:03 -06:00
bwatters-r7 2a14332f20 First try at adding error handling and offloading methods to the
Post::Windows::Process mixin for resusability and deduplication
2019-12-03 14:11:50 -06:00
Francesco Soncina 2549de809d fix bug in PID check 2019-11-07 12:57:05 +01:00
Francesco Soncina e992480b5c Update shellcode_inject.rb 2019-10-17 16:02:59 +02:00
Francesco Soncina 74ae445128 Add AUTOUNHOOK support for shellcode_inject post module
The module will now first inject the unhook dll and then the provided shellcode.
2019-10-10 16:35:57 +02:00
bwatters-r7 47dd96df68 Remove duplicate module in the wrong place 2019-10-08 08:48:11 -05:00
Francesco Soncina dd9fb2d9d6 Add shellcode_inject post module
This module injects an arbitrary shellcode into a target process.
2019-10-03 16:47:10 +02:00
dwelch-r7 fe2b3f8f29 Remove targets from post modules 2019-09-23 17:26:36 +01:00
Francesco Soncina b6b3a54b79 fix typo in payload_inject
:)
2019-07-27 19:02:33 +02:00
RageLtMan f874f50748 Update Author fields for several modules
Add hirura to authors list for the Ruby reverse_ssh payloads.

Update all modules with author-per-line name references to be
consistent (useful given the difference in names between commiter
in git log and GitHub account).

Next steps:
  See if HrrRbSsh client-side implementation can be fleshed out
enough to create alternative payload outputs for both of the Ruby
modules (using TARGET/ACTION to select between net/ or hrr_).
2019-06-25 20:49:26 -04:00
Brent Cook 53557cc92e replace trivial usage of expand_path with getenv
expand_path is not implemented consistently across platforms and
sessions, which leads to confusing behavior. In places where we have trivial
single variable expansions, this changes modules and library code to just use
getenv.

We'll look at the rest individually to see if they can also be reimplemented in
terms of getenv.
2019-05-31 17:44:35 -05:00
bwatters-r7 df9c3da47e Land #10842, Add Windows Post Module to roll back Windows Defender signatures
Merge branch 'land-10842' into upstream-master
2018-12-03 10:57:38 -06:00
bwatters-r7 a801d741c9 Remove old module 2018-11-30 17:28:54 -06:00
bwatters-r7 70031b6721 Shut up msftidy and document updates 2018-11-30 16:41:40 -06:00
bwatters-r7 3c992b7af1 Updated documentation and added options in the module to update or roll back
definitions
2018-11-30 16:25:33 -06:00
bwatters-r7 a41b9a77d8 Change the module name, fix cleanup, add documentation 2018-11-30 15:20:34 -06:00
bwatters-r7 1304f93f1f Add more checks and a cleanup function 2018-11-29 10:39:46 -06:00
Luisco100 7f26364d5b Changes suggested by OJ 2018-10-29 22:01:47 -05:00
Luisco100 74683ce951 Add Windows Post Module to disable Windows Defender signatures 2018-10-21 12:07:54 -05:00
bwatters-r7 20daba6e2d fix line endings 2018-08-28 11:33:17 -05:00
alpiste f1e4079641 move add_thread code to lib/rex/post/meterpreter/extensions/peinjector/peinjector.rb 2018-08-28 09:02:21 -05:00
alpiste 015abca8af MSFTidy module 2018-08-28 09:02:21 -05:00
alpiste bb151bb727 MSFTidy module 2018-08-28 09:02:21 -05:00
alpiste 2251c4a712 Add peinjector post module 2018-08-28 09:02:21 -05:00
William Vu 14da99bb3d Fix missing RequestError in a few post modules
Should be Rex::Post::Meterpreter::RequestError.
2018-06-12 17:11:29 -05:00
Aaron Soto be18930f12 Cleaned up output, only querying for %WINDIR% if necessary 2018-04-09 15:27:50 -05:00
Auxilus c07f2f1a09 Update run_as.rb 2018-04-09 21:24:16 +05:30
Auxilus c34b796f13 Remove temp file from dist after cmd execution
https://github.com/rapid7/metasploit-framework/issues/9830
2018-04-09 20:14:01 +05:30
bwatters-r7 e17be05e6a Land #9595, Add post module RID Hijacking on Windows 2018-04-03 14:12:34 -05:00
r4wd3r d6dc0a2d4f Adjust rid_hijack.rb code style with rubocop recommendations. 2018-04-03 04:57:41 +02:00
Jacob Robles 57b048fbf7 Remove requires, changed in-place modification 2018-03-26 17:46:18 -05:00
Green-m 18a1593de7 Clean up registry and fix bug when cleaning the windows local file 2018-03-02 02:31:09 -05:00
Green-m d1e91dfdfd Fix bug 2018-03-01 22:19:03 -05:00
Green-m 2bb8fc7325 Fix bug 2018-03-01 22:16:59 -05:00