William Vu
05721ef2ec
Land #12581 , additional BlueKeep doc fixes
2019-11-15 11:26:06 -06:00
William Vu
1d6e0a8638
Further correct target documentation
2019-11-15 11:23:28 -06:00
William Vu
6e904ea105
Fix/clarify target documentation for BlueKeep
2019-11-15 11:14:00 -06:00
dwelch-r7
dfaba0a98e
Add endpoints for report_web_*
2019-11-15 16:33:28 +00:00
Metasploit
4ad895e7d6
automatic module_metadata_base.json update
2019-11-15 05:09:59 -06:00
Tim W
41e3bccdaa
Land #12497 , add android hashdumper for cracking Android pin codes
2019-11-15 18:13:16 +08:00
Green-m
22412d4570
Fix bind error bug, and enhance check method.
2019-11-15 09:52:58 +08:00
Metasploit
640bf58321
automatic module_metadata_base.json update
2019-11-14 15:28:12 -06:00
William Vu
8564d63767
Land #12575 , 2008 caveat note in BlueKeep exploit
2019-11-14 15:19:44 -06:00
William Vu
618a7c9771
Land #12567 , tribute banner for the console
2019-11-14 14:47:08 -06:00
Metasploit
a08f046cb1
Bump version of framework to 5.0.61
2019-11-14 12:55:01 -06:00
William Vu
28ecefadb8
Warn about fDisableCam in automatic mode
2019-11-14 11:08:27 -06:00
William Vu
cb6d85bee2
Add suggestion about GROOMBASE
2019-11-14 11:08:14 -06:00
William Vu
fc64ac42af
State 2008 caveat in module description and doc
2019-11-14 10:57:42 -06:00
Brent Cook
bbe95e393d
initial integration work
2019-11-14 10:29:58 -06:00
Brendan Coles
5f976f0c45
Land #12570 , Fix compile failure handling in Post::Linux::Compile
5.0.60
2019-11-14 08:09:13 +00:00
h00die
8b8c70b145
add samsung and md5 processing
2019-11-13 21:48:25 -05:00
Cory Kennedy
a66a59ae2a
Changed Filename
2019-11-13 20:26:49 -06:00
Cory Kennedy
03117ea685
Update SecKC.txt
2019-11-13 20:26:01 -06:00
Metasploit
b7f4eba8b7
automatic module_metadata_base.json update
2019-11-13 11:44:06 -06:00
sinn3r
5c6686a105
Land #12532 , Add FusionPBX Command exec.php Command Execution
...
Add FusionPBX Command exec.php Command Execution
2019-11-13 11:33:21 -06:00
sinn3r
66ad5deb47
Land #12531 , Add FusionPBX Operator Panel exec.php Command Execution
...
Add FusionPBX Operator Panel exec.php Command Execution
2019-11-13 11:31:30 -06:00
sinn3r
71cbefa5e8
Land #12534 , Add FreeSWITCH Event Socket Command Execution
...
Add FreeSWITCH Event Socket Command Execution
2019-11-13 11:27:53 -06:00
Brent Cook
fff9f51d07
add initial ruby implementation of chacha
...
Note this is the original version with the 64-bit IV and 64-bit block
counter. This can be changed to the RFC version in a bit.
2019-11-13 09:22:14 -06:00
Metasploit
b93ef61c06
automatic module_metadata_base.json update
2019-11-13 08:45:46 -06:00
Shelby Pace
1ebef8bcb2
Land #12529 , add CMSMS object inject exploit
2019-11-13 08:37:05 -06:00
Shelby Pace
f79a35d428
check response
2019-11-13 08:34:23 -06:00
Metasploit
b510c04f61
automatic module_metadata_base.json update
2019-11-13 02:29:49 -06:00
William Vu
8e208daec2
Land #12572 , .rubocop.yml renamed cop fix
2019-11-13 02:15:21 -06:00
William Vu
349bc93054
Land #12573 , DOUBLEPULSAR exploit style fixes
2019-11-13 02:13:54 -06:00
William Vu
45e2a3b229
Address RuboCop review
2019-11-13 02:10:03 -06:00
William Vu
7a4c48ee27
Fix style in exploit/windows/smb/doublepulsar_rce
2019-11-13 02:04:14 -06:00
William Vu
671836b93b
Fix renamed RuboCop check in .rubocop.yml
2019-11-13 01:45:01 -06:00
Metasploit
fc300c6bf4
automatic module_metadata_base.json update
2019-11-13 00:48:01 -06:00
William Vu
1d94564af4
Land #12571 , DOUBLEPULSAR exploit metadata updates
2019-11-13 00:35:28 -06:00
William Vu
4877032e8a
Update exploit/windows/smb/doublepulsar_rce info
2019-11-13 00:30:09 -06:00
Tim W
d364c22541
fix NameError uninitialized constant Msf::Post::Linux::Compile::Failure
2019-11-13 12:30:02 +08:00
lle-bout
6766d9f6f7
Fix exploit/windows/local/ms16_032_secondary_logon_handle_privesc
...
- Powershell script was outdated.
Updated from https://www.exploit-db.com/exploits/39719
- Powershell script was buggy when current directory
was set to e.g. C:\ProgramData. (Get-Item Error)
Fixed.
- Stager was being dropped to current directory, but
it is not guaranteed that we always have permission
to write a file there. Use %TEMP% instead.
- Exploit only seems to work when executed under
a powershell of the same architecture as the
host. (Not WOW64)
This module now ensures that no matter the
architecture of the meterpreter, a powershell
of the same architecture as the host is being
run. (Using Sysnative directory when on WOW64)
- Stager was broken, now generating stager with Rex
and dropping stager as `.ps1` instead of `.txt`.
Ideally the exploit should be rewritten to
accept a shellcode payload directly or a smaller
stager powershell should be created so that it
fits in under 1024 bytes and can be fed directly
to CreateProcessWithLogonW without dropping to
disk.
2019-11-13 05:01:47 +01:00
h00die
ec63c4c419
fix negative bug, add docs
2019-11-12 22:32:07 -05:00
scanu92
d9b0c1aa2f
add advanced options ForceExploit
2019-11-12 23:03:28 +01:00
scanu92
1489e03f0a
Update cmsms_object_injection_rce.rb
2019-11-12 23:02:16 +01:00
scanu92
78ea784e84
Update modules/exploits/multi/http/cmsms_object_injection_rce.rb
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-11-12 23:00:31 +01:00
Cory Kennedy
7d9ab29c8c
Create SecKC.txt
2019-11-12 15:55:26 -06:00
Metasploit
493c48dcd6
automatic module_metadata_base.json update
2019-11-12 15:52:58 -06:00
Shelby Pace
baf27f9654
Land #12542 , add Bludit File Upload Exploit
2019-11-12 15:44:34 -06:00
h00die
f47721c907
Merge pull request #14 from timwr/android_hashdump
...
fallback to settings.db if locksettings.db does not exist
2019-11-12 16:33:01 -05:00
Cristina Muñoz
e804745766
Bugfix: correct reference to asm file
2019-11-12 09:30:27 -08:00
Metasploit
dea692a5bd
automatic module_metadata_base.json update
2019-11-12 03:17:11 -06:00
William Vu
7d77c0fd5a
Land #12543 , myworkspace.id to myworkspace_id fix
2019-11-12 03:09:08 -06:00
Metasploit
b1aeb5d040
automatic module_metadata_base.json update
2019-11-12 03:06:45 -06:00