William Vu
3c1fa90a75
Land #12515 , Pulse Secure VPN RCE
2019-11-12 02:55:01 -06:00
William Vu
add013283d
Land #12511 , Pulse Secure VPN file read redux
2019-11-12 02:51:11 -06:00
William Vu
a8e289ee9c
Code-block env(1)
2019-11-12 02:46:18 -06:00
William Vu
f14eda45e8
Land #12537 , minimum Ruby version in gemspec
2019-11-12 02:28:04 -06:00
William Vu
a267ad9d64
Reference env(1) as the reason we have useful RCE
2019-11-12 02:17:58 -06:00
William Vu
a17b2c2041
Add module doc
2019-11-12 02:10:10 -06:00
William Vu
8df559eceb
Update print to warning
2019-11-12 02:09:43 -06:00
Tim W
6ac4d9ca33
skip if no -wal and -shm exists, and remove salt length check
2019-11-12 16:07:37 +08:00
wvu-r7
0c4580f254
Calibrate timeout for hax
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-11-12 02:03:52 -06:00
William Vu
de72ed8545
Print our glorious success
2019-11-12 02:02:53 -06:00
William Vu
238c931fd3
Don't fail module if blocking through timeout
2019-11-12 01:55:56 -06:00
William Vu
d8e612726c
Note that an admin SID is required at present
2019-11-12 01:46:23 -06:00
William Vu
1573664c78
Reduce timeout for when the shell pops
2019-11-12 01:41:19 -06:00
Tim W
da3f298a9b
fallback to settings.db if locksettings.db does not exist
2019-11-12 15:40:28 +08:00
William Vu
bc5b0645dd
Fix typo
2019-11-12 01:25:36 -06:00
William Vu
2c6c46701c
Update DefaultOptions
2019-11-12 01:23:53 -06:00
William Vu
8664ac9dd8
Add target print
2019-11-12 01:17:28 -06:00
William Vu
e9fb4a2528
Check for nil
...
Oops.
2019-11-12 01:10:26 -06:00
William Vu
f4c7690247
Print cmd/unix/generic command output, minus HTML
2019-11-12 01:08:56 -06:00
William Vu
09901fdf56
Clarify session cookie could be invalid
2019-11-12 01:08:25 -06:00
William Vu
5b825e8245
Readd cmd/unix/generic target with manual badchars
2019-11-12 01:08:09 -06:00
Metasploit
2a02c6b318
automatic module_metadata_base.json update
2019-11-11 17:49:45 -06:00
William Vu
22da634ddc
Land #12553 , Meltdown fix for BlueKeep exploit
2019-11-11 17:33:52 -06:00
William Vu
4f2cab4cf1
Add references
2019-11-11 17:33:10 -06:00
Metasploit
70a3aab8ac
automatic module_metadata_base.json update
2019-11-11 15:55:53 -06:00
bwatters-r7
3b57705a1f
Land #11390 , Add exploit module for Xorg X11 Server Local Privilege Escalation on AIX
...
Merge branch 'land-11390' into upstream-master
2019-11-11 15:42:54 -06:00
Wei Chen
717a31c7c3
Fix typos and format
2019-11-11 14:47:56 -06:00
bwatters-r7
820aa4f46c
Update documents with vimeo video example and update SideEffects value
...
in the module cache.
2019-11-11 14:28:07 -06:00
Shelby Pace
d1e9538f9c
use stager_name
2019-11-11 09:32:28 -06:00
Shelby Pace
7d5deafcee
add check for cipher
2019-11-11 09:11:51 -06:00
bwatters-r7
ef6ae90ca6
Add case statement for admin check
2019-11-11 09:00:11 -06:00
William Vu
b6b131e808
Land #12556 , 64K ought to be enough for anyone
2019-11-10 21:25:48 -06:00
Nicholas Starke
986b1dfbd5
Addressing comments on pull request
...
I have updated this module as per the comments left on the pull request.
This includes adding a timeout configuration option and adding a check
for the webSocketDebuggerUrl key
2019-11-10 15:43:01 -06:00
Brendan Coles
d172534417
64K ought to be enough for anyone
2019-11-10 09:49:49 +00:00
lle-bout
1d7cdac421
Add Wordpress Plainview Activity Monitor RCE
...
Description:
```
Plainview Activity Monitor Wordpress plugin is vulnerable to OS
command injection which allows an attacker to remotely execute
commands on underlying system. Application passes unsafe user supplied
data to ip parameter into activities_overview.php.
Privileges are required in order to exploit this vulnerability, but
this plugin version is also vulnerable to CSRF attack and Reflected
XSS. Combined, these three vulnerabilities can lead to Remote Command
Execution just with an admin click on a malicious link.
```
2019-11-10 08:27:45 +01:00
h00die
f8ef7a8db9
add crack_mobile, handle negative hashes
2019-11-09 15:55:53 -05:00
Wyatt Dahlenburg
a2aba34112
Trimmed test_keys method
2019-11-09 12:00:22 -06:00
h00die
f27afeae65
android hashdump docs
2019-11-09 10:11:45 -05:00
h00die
6d23059cc0
android hashdump updates
2019-11-09 10:11:45 -05:00
h00die
389f269dcd
first test of android hashdumper
2019-11-09 10:09:18 -05:00
zerosum0x0
01d84c5654
remove syscall hook
2019-11-08 19:44:52 -07:00
John Kollross
12fb919fee
Merge pull request #1 from rapid7/master
...
update
2019-11-08 10:36:45 -06:00
Shelby Pace
8b5260f6ab
use OptEnum for optimization level
2019-11-08 08:58:56 -06:00
Metasploit
a72067ced5
automatic module_metadata_base.json update
2019-11-07 21:32:19 -06:00
Jeffrey Martin
eb07305104
Land #11695 , Password Cracker Overhaul(ie hashcat)
2019-11-07 19:09:52 -06:00
Christophe De La Fuente
94939837e0
Land #12550 , update .mailmap
...
Add @adamgalway-r7 contact details to the mailmap
2019-11-07 23:25:40 +01:00
Shelby Pace
bfa27e6bed
add flag, use DefaultOptions for linker script
2019-11-07 15:33:31 -06:00
bwatters-r7
f426206246
update code from bcoles suggestions.
2019-11-07 15:30:53 -06:00
Metasploit
e46b5dc701
Bump version of framework to 5.0.60
2019-11-07 12:19:38 -06:00
Shelby Pace
1a88e7610b
add optimization flag, use basename method
2019-11-07 10:46:57 -06:00