Tim W
0bffcd6212
Land #12448 , fix cmd/unix/reverse_perl_ssl and cmd/unix/reverse_php_ssl payloads
2020-02-16 12:11:28 +08:00
Brendan Coles
d047feeb03
Add check for CPU vulnerability status to enum_system
2020-02-15 14:35:38 +00:00
Metasploit
b632a3cc6e
automatic module_metadata_base.json update
2020-02-14 21:43:45 -06:00
Brendan Coles
f5844ee953
Land #12830 , Ensure post/windows/gather/enum_patches gathers all patches
2020-02-15 03:47:43 +00:00
0x44434241
f61c188e57
Handling possible nil case of regex on OS build.
...
Feedback from adfoster-r7
Testing of detection:
```
msf5 exploit(windows/local/ms16_075_reflection_juicy) > check
[*] Target appears to be patched or not vulnerable (Windows 10 (10.0
Build 18363).)
[*] The target is not exploitable.
```
Testing of (forced) nil-case:
```
msf5 exploit(windows/local/ms16_075_reflection_juicy) > check
[*] Reloading module...
[!] Could not determine Windows build number - exploiting might fail.
[*] The target is not exploitable.
```
2020-02-14 09:26:04 +09:00
William Vu
7e9bd506d6
Add generate -v to optionally show payload stage
2020-02-13 16:33:48 -06:00
Metasploit
1556a603f0
Bump version of framework to 5.0.75
2020-02-13 12:08:40 -06:00
Metasploit
70d365f6c9
automatic module_metadata_base.json update
5.0.74
2020-02-13 09:58:47 -06:00
dwelch-r7
07954c0ce2
Land #12902 , Add exploit module for crosschex buffer overflow
2020-02-13 15:48:10 +00:00
dwelch-r7
0e55e20c9c
Land #12902 , Add exploit module for crosschex buffer overflow
2020-02-13 15:43:38 +00:00
Francesco Soncina
da820f08e6
don't interact with other apps to avoid asking permissions
2020-02-13 16:17:33 +01:00
Francesco Soncina
64c4fec0d0
accept both array or string in report_loot()
2020-02-13 16:12:40 +01:00
Adam Galway
2ca2b5c7bb
replaces magic numbers with target fields
2020-02-13 14:17:23 +00:00
0x44434241
fce70c9284
Adjusting print method to better reflect the situation.
2020-02-13 08:02:02 +09:00
dwelch-r7
556ad5f3b7
Land #12927 , fix getsockname usage in the SOCKS5 server
2020-02-12 12:30:19 +00:00
Adam Galway
cbcf8a2a68
adds to_i and removes default options
2020-02-12 12:04:15 +00:00
Spencer McIntyre
d829f2ab43
Fix getsockname usage in the SOCKS5 server
2020-02-11 21:53:36 -06:00
0x44434241
6d73b572c7
Update vulnerable systems documentation.
...
Feedback from bcoles.
2020-02-12 08:22:43 +09:00
0x44434241
9e46926a0f
Update documentation/modules/exploit/windows/local/ms16_075_reflection_juicy.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2020-02-12 08:18:49 +09:00
0x44434241
785dbb6ba3
Update documentation/modules/exploit/windows/local/ms16_075_reflection_juicy.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2020-02-12 08:18:27 +09:00
Adam Galway
8fd3b483d3
improves option descriptions & timeout handling
2020-02-11 15:05:24 +00:00
Adam Galway
946e244c8c
Updates docs and adds basic options
2020-02-11 13:40:51 +00:00
Adam Galway
a7a80e08a8
Updated docs with platform info
2020-02-11 12:55:07 +00:00
Adam Galway
3395b91c83
adds module documentation
2020-02-10 16:45:44 +00:00
Metasploit
d7f92a932e
automatic module_metadata_base.json update
2020-02-10 05:42:10 -06:00
Adam Galway
65521270ea
Land #12853 , InfiniteWP exploit & mixin upgrades
2020-02-10 11:33:49 +00:00
0x44434241
9c30250161
Updating documentation for juicy potato exploit.
...
Added a link to information on the expiry of the bug, and explicitly
listing which versions of Microsoft Windows were and were not
vulnerable.
2020-02-10 16:33:45 +09:00
0x44434241
25d863d912
Updating regex in exploit windows version check.
...
This addresses issue #12698 , where the Windows OS and build was not
being parsed correctly due to changes in the client.sys.config lib.
Tested against Windows 10 (patched):
```
msf5 exploit(windows/local/ms16_075_reflection_juicy) > rcheck
[*] Reloading module...
[-] Target appears to be patched or not vulnerable (Windows 10 (10.0
Build 18363).)
[*] The target is not exploitable.
```
2020-02-10 15:32:02 +09:00
h00die
3707d4caa6
use default options
2020-02-08 15:31:27 -05:00
mattaberegg
a0b6584d19
Added password randomization
2020-02-07 19:14:56 -08:00
mattaberegg
e2f2d55ecc
Updated check message
2020-02-07 18:34:27 -08:00
mattaberegg
90503b2c61
Documentation cosmetic updates
2020-02-07 18:28:24 -08:00
mattaberegg
cb372a54f4
Added info to cleanup message
2020-02-07 16:41:27 -08:00
mattaberegg
a05611d756
Improve cleanup functionality
2020-02-07 16:13:25 -08:00
William Vu
eab1245eef
Update module doc
2020-02-07 12:30:00 -06:00
William Vu
a9ae212b27
Replace ForceExploit with AutoCheck mixin
2020-02-07 12:04:57 -06:00
wvu-r7
2ad8a02fd7
Fix version check
...
Co-Authored-By: adamgalway-r7 <54621924+adamgalway-r7@users.noreply.github.com >
2020-02-07 10:10:28 -06:00
Metasploit
44030bd784
automatic module_metadata_base.json update
2020-02-07 09:33:38 -06:00
Spencer McIntyre
6557cabd65
Land #12900 , add teamviewer password recovery
2020-02-07 10:24:12 -05:00
Spencer McIntyre
5a62630309
Add installation steps to the module docs
2020-02-07 10:20:17 -05:00
Spencer McIntyre
cbf0d14666
Fix the store_valid_credentials service info
2020-02-07 10:07:41 -05:00
dwelch-r7
54550dba74
tidied up docs
2020-02-07 14:08:51 +00:00
Metasploit
7472a18493
automatic module_metadata_base.json update
2020-02-07 06:45:35 -06:00
Adam Galway
b01f02480f
Land #12912 , removes and aliases jtr modules
2020-02-07 12:38:26 +00:00
Metasploit
10b49979d4
automatic module_metadata_base.json update
2020-02-07 05:54:21 -06:00
Alan Foster
4dcb2fbd96
Land #12889 , Add OpenSMTPD MAIL FROM RCE
2020-02-07 11:43:18 +00:00
William Vu
763dbf5d5d
Check WordPress version
2020-02-07 03:14:17 -06:00
William Vu
6c59d7c37c
Refactor module
2020-02-07 01:38:11 -06:00
William Vu
3b258eeb19
Refactor plugin editing
2020-02-07 01:10:42 -06:00
blurbdust
a5a5ea7ded
clean up code, update documentation
2020-02-06 22:27:47 -06:00