s7u55
|
06118ab8dc
|
Update modules/exploits/linux/local/omniresolve_suid_priv_esc.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
|
2019-10-02 11:43:12 +03:00 |
|
s7u55
|
9765792127
|
Update documentation/modules/exploit/linux/local/omniresolve_suid_priv_esc.md
Co-Authored-By: bcoles <bcoles@gmail.com>
|
2019-10-02 11:42:44 +03:00 |
|
s7u55
|
98c8168253
|
Update modules/exploits/linux/local/omniresolve_suid_priv_esc.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
|
2019-10-02 11:42:34 +03:00 |
|
Metasploit
|
85ea40064c
|
automatic module_metadata_base.json update
|
2019-10-02 00:48:17 -05:00 |
|
s7u55
|
43b2332afe
|
Add omniresolve priv escalation module (CVE-2019-11660) fix
|
2019-10-02 01:38:51 -04:00 |
|
s7u55
|
bb0eb16a3e
|
Add omniresolve priv escalation module (CVE-2019-11660)
|
2019-10-01 15:03:29 -04:00 |
|
bwatters-r7
|
477a70934f
|
Fix copy/pasta error in options
|
2019-10-01 10:10:51 -05:00 |
|
Brent Cook
|
f3c8037728
|
Land #12374, Add DOUBLEPULSAR payload execution and neutralization module
|
2019-10-01 01:32:35 -05:00 |
|
Brent Cook
|
b223e5e66a
|
Land #12377, Fix stack_adjustment bug
|
2019-10-01 01:31:53 -05:00 |
|
William Vu
|
9592e85975
|
Fix stack_adjustment nil bug and refactor method
Also fix incorrect docs.
|
2019-09-30 19:18:58 -05:00 |
|
Metasploit
|
00fba6bf48
|
automatic module_metadata_base.json update
|
2019-09-30 17:37:28 -05:00 |
|
dwelch-r7
|
db7e594ef4
|
land #12065, local file config loader
Adds a couple of modules for loading in cisco/juniper configs from a
file without needing a shell and a post module
|
2019-09-30 23:26:27 +01:00 |
|
dwelch-r7
|
e3c51ed89e
|
land #12376, replace intro with introduction
|
2019-09-30 23:18:28 +01:00 |
|
William Vu
|
ade9c23772
|
Don't be lazy and spell out "introduction" in docs
This was unfortunately my doing, and then people copied me.
|
2019-09-30 16:58:00 -05:00 |
|
William Vu
|
a1d1303ab9
|
Add module doc
|
2019-09-30 16:49:14 -05:00 |
|
bwatters-r7
|
273e8b6a82
|
Add image execute options persistence module
|
2019-09-30 16:34:43 -05:00 |
|
William Vu
|
3edb0e3ef5
|
Reword module title and description
|
2019-09-30 14:28:53 -05:00 |
|
William Vu
|
4b5c6002b4
|
Move implant neutralization code to method
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
d5a26b892a
|
Remove unused status codes in check
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
32728742ea
|
Clarify why we can't proceed
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
4975a24900
|
Refactor methods to use @tree_id ivar
Whoops, forgot this when I ivar'd it.
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
b1f2fa4e64
|
Don't hardcode body size
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
ed0b856aac
|
Prefer << over +=
Oops, spending too much time with Python.
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
255af7f2d3
|
Simplify data count calculation
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
ade715f88a
|
Update disclosure date to dump date
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
7417aa8a30
|
Rename module and note kill target in description
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
0392521887
|
Fix same multiplex ID meaning implant not detected
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
33d7a2a818
|
Remove SMB::Client::Authenticated
They're fine as advanced options, since this targets a null session.
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
6b4cf4970e
|
Don't support x86 at the moment
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
aa2f7d378a
|
Create method for kernel shellcode size
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
8190e7067a
|
Calculate kernel shellcode size
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
05b83ff5da
|
Calculate max payload size automagically
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
8cae04f194
|
Use constant for maximum shellcode size
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
fb1bb0fd2f
|
Don't use NOPs because Peter would be sad
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
530bf9bc0c
|
Finish RCE with Jacob's help
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
3a5a05f3a9
|
Use recently enhanced Rex::Text.xor
|
2019-09-30 14:18:41 -05:00 |
|
William Vu
|
90cb0e039f
|
Add DOUBLEPULSAR payload execution
|
2019-09-30 14:18:41 -05:00 |
|
h00die
|
0288649fc2
|
rename juniper variables
|
2019-09-30 15:03:38 -04:00 |
|
dwelch-r7
|
30691d1c18
|
Add ranking
|
2019-09-30 12:20:38 +01:00 |
|
h00die
|
cbc7d1e6aa
|
add headings, run date, tab to space
|
2019-09-28 12:03:51 -04:00 |
|
h00die
|
c188d179ed
|
fix atutor bugs
|
2019-09-26 20:37:10 -04:00 |
|
h00die
|
0d143a1ce3
|
smb capture docs spelling
|
2019-09-26 19:06:02 -04:00 |
|
h00die
|
82f0daeb68
|
smb capture docs finished
|
2019-09-26 19:02:57 -04:00 |
|
Metasploit
|
0a41599ce4
|
Bump version of framework to 5.0.51
|
2019-09-26 12:12:14 -05:00 |
|
Metasploit
|
dd13820cac
|
automatic module_metadata_base.json update
5.0.50
|
2019-09-26 10:16:31 -05:00 |
|
dwelch-r7
|
84cc85a099
|
Land #12316 prefix fingerprint by rhost and rport
|
2019-09-26 16:04:53 +01:00 |
|
dwelch-r7
|
f6eaeaac71
|
Merge remote-tracking branch 'upstream/pr/12316' into HEAD
|
2019-09-26 15:20:45 +01:00 |
|
dwelch-r7
|
7395297da4
|
Add rank
|
2019-09-26 13:32:36 +01:00 |
|
dwelch-r7
|
1425d180b9
|
Add module to exploit file sharing wizard
|
2019-09-26 13:30:52 +01:00 |
|
RAMELLA Sébastien
|
28bbcd5402
|
fix. linux stager and add. documentation
|
2019-09-26 16:26:44 +04:00 |
|