Commit Graph

55054 Commits

Author SHA1 Message Date
William Vu 05721ef2ec Land #12581, additional BlueKeep doc fixes 2019-11-15 11:26:06 -06:00
William Vu 1d6e0a8638 Further correct target documentation 2019-11-15 11:23:28 -06:00
William Vu 6e904ea105 Fix/clarify target documentation for BlueKeep 2019-11-15 11:14:00 -06:00
dwelch-r7 dfaba0a98e Add endpoints for report_web_* 2019-11-15 16:33:28 +00:00
Metasploit 4ad895e7d6 automatic module_metadata_base.json update 2019-11-15 05:09:59 -06:00
Tim W 41e3bccdaa Land #12497, add android hashdumper for cracking Android pin codes 2019-11-15 18:13:16 +08:00
Green-m 22412d4570 Fix bind error bug, and enhance check method. 2019-11-15 09:52:58 +08:00
Metasploit 640bf58321 automatic module_metadata_base.json update 2019-11-14 15:28:12 -06:00
William Vu 8564d63767 Land #12575, 2008 caveat note in BlueKeep exploit 2019-11-14 15:19:44 -06:00
William Vu 618a7c9771 Land #12567, tribute banner for the console 2019-11-14 14:47:08 -06:00
Metasploit a08f046cb1 Bump version of framework to 5.0.61 2019-11-14 12:55:01 -06:00
William Vu 28ecefadb8 Warn about fDisableCam in automatic mode 2019-11-14 11:08:27 -06:00
William Vu cb6d85bee2 Add suggestion about GROOMBASE 2019-11-14 11:08:14 -06:00
William Vu fc64ac42af State 2008 caveat in module description and doc 2019-11-14 10:57:42 -06:00
Brent Cook bbe95e393d initial integration work 2019-11-14 10:29:58 -06:00
Brendan Coles 5f976f0c45 Land #12570, Fix compile failure handling in Post::Linux::Compile 5.0.60 2019-11-14 08:09:13 +00:00
h00die 8b8c70b145 add samsung and md5 processing 2019-11-13 21:48:25 -05:00
Cory Kennedy a66a59ae2a Changed Filename 2019-11-13 20:26:49 -06:00
Cory Kennedy 03117ea685 Update SecKC.txt 2019-11-13 20:26:01 -06:00
Metasploit b7f4eba8b7 automatic module_metadata_base.json update 2019-11-13 11:44:06 -06:00
sinn3r 5c6686a105 Land #12532, Add FusionPBX Command exec.php Command Execution
Add FusionPBX Command exec.php Command Execution
2019-11-13 11:33:21 -06:00
sinn3r 66ad5deb47 Land #12531, Add FusionPBX Operator Panel exec.php Command Execution
Add FusionPBX Operator Panel exec.php Command Execution
2019-11-13 11:31:30 -06:00
sinn3r 71cbefa5e8 Land #12534, Add FreeSWITCH Event Socket Command Execution
Add FreeSWITCH Event Socket Command Execution
2019-11-13 11:27:53 -06:00
Brent Cook fff9f51d07 add initial ruby implementation of chacha
Note this is the original version with the 64-bit IV and 64-bit block
counter. This can be changed to the RFC version in a bit.
2019-11-13 09:22:14 -06:00
Metasploit b93ef61c06 automatic module_metadata_base.json update 2019-11-13 08:45:46 -06:00
Shelby Pace 1ebef8bcb2 Land #12529, add CMSMS object inject exploit 2019-11-13 08:37:05 -06:00
Shelby Pace f79a35d428 check response 2019-11-13 08:34:23 -06:00
Metasploit b510c04f61 automatic module_metadata_base.json update 2019-11-13 02:29:49 -06:00
William Vu 8e208daec2 Land #12572, .rubocop.yml renamed cop fix 2019-11-13 02:15:21 -06:00
William Vu 349bc93054 Land #12573, DOUBLEPULSAR exploit style fixes 2019-11-13 02:13:54 -06:00
William Vu 45e2a3b229 Address RuboCop review 2019-11-13 02:10:03 -06:00
William Vu 7a4c48ee27 Fix style in exploit/windows/smb/doublepulsar_rce 2019-11-13 02:04:14 -06:00
William Vu 671836b93b Fix renamed RuboCop check in .rubocop.yml 2019-11-13 01:45:01 -06:00
Metasploit fc300c6bf4 automatic module_metadata_base.json update 2019-11-13 00:48:01 -06:00
William Vu 1d94564af4 Land #12571, DOUBLEPULSAR exploit metadata updates 2019-11-13 00:35:28 -06:00
William Vu 4877032e8a Update exploit/windows/smb/doublepulsar_rce info 2019-11-13 00:30:09 -06:00
Tim W d364c22541 fix NameError uninitialized constant Msf::Post::Linux::Compile::Failure 2019-11-13 12:30:02 +08:00
lle-bout 6766d9f6f7 Fix exploit/windows/local/ms16_032_secondary_logon_handle_privesc
- Powershell script was outdated.
   Updated from https://www.exploit-db.com/exploits/39719

 - Powershell script was buggy when current directory
   was set to e.g. C:\ProgramData. (Get-Item Error)
   Fixed.

 - Stager was being dropped to current directory, but
   it is not guaranteed that we always have permission
   to write a file there. Use %TEMP% instead.

 - Exploit only seems to work when executed under
   a powershell of the same architecture as the
   host. (Not WOW64)
   This module now ensures that no matter the
   architecture of the meterpreter, a powershell
   of the same architecture as the host is being
   run. (Using Sysnative directory when on WOW64)

 - Stager was broken, now generating stager with Rex
   and dropping stager as `.ps1` instead of `.txt`.

   Ideally the exploit should be rewritten to
   accept a shellcode payload directly or a smaller
   stager powershell should be created so that it
   fits in under 1024 bytes and can be fed directly
   to CreateProcessWithLogonW without dropping to
   disk.
2019-11-13 05:01:47 +01:00
h00die ec63c4c419 fix negative bug, add docs 2019-11-12 22:32:07 -05:00
scanu92 d9b0c1aa2f add advanced options ForceExploit 2019-11-12 23:03:28 +01:00
scanu92 1489e03f0a Update cmsms_object_injection_rce.rb 2019-11-12 23:02:16 +01:00
scanu92 78ea784e84 Update modules/exploits/multi/http/cmsms_object_injection_rce.rb
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2019-11-12 23:00:31 +01:00
Cory Kennedy 7d9ab29c8c Create SecKC.txt 2019-11-12 15:55:26 -06:00
Metasploit 493c48dcd6 automatic module_metadata_base.json update 2019-11-12 15:52:58 -06:00
Shelby Pace baf27f9654 Land #12542, add Bludit File Upload Exploit 2019-11-12 15:44:34 -06:00
h00die f47721c907 Merge pull request #14 from timwr/android_hashdump
fallback to settings.db if locksettings.db does not exist
2019-11-12 16:33:01 -05:00
Cristina Muñoz e804745766 Bugfix: correct reference to asm file 2019-11-12 09:30:27 -08:00
Metasploit dea692a5bd automatic module_metadata_base.json update 2019-11-12 03:17:11 -06:00
William Vu 7d77c0fd5a Land #12543, myworkspace.id to myworkspace_id fix 2019-11-12 03:09:08 -06:00
Metasploit b1aeb5d040 automatic module_metadata_base.json update 2019-11-12 03:06:45 -06:00