William Vu
92de0b132f
Make HttpClientTimeout a float, f'ing finally
2020-01-13 22:25:18 -06:00
William Vu
cd65efb259
Revert tuned timeout in favor of HttpClientTimeout
...
Bad habit!
2020-01-13 22:02:12 -06:00
William Vu
c71a75950a
Make cmd/unix/generic timeout configurable
2020-01-13 21:35:10 -06:00
William Vu
93c69b3a96
Bump send_request_cgi timeout to 3.5s for shells
2020-01-13 21:29:28 -06:00
William Vu
d996ba5b2c
Revert future-proofed yet shitty case statement
2020-01-13 21:09:07 -06:00
William Vu
a635676604
Update wording in module description
2020-01-13 21:04:07 -06:00
William Vu
4cbbe23b11
Improve wording in doc
2020-01-13 21:02:56 -06:00
William Vu
249702ea51
Explain credit in scanner
2020-01-13 20:57:35 -06:00
William Vu
b4550933bb
Update module doc
2020-01-13 20:51:58 -06:00
William Vu
af4505f007
Clean up module
2020-01-13 20:48:18 -06:00
Metasploit
0359a79792
automatic module_metadata_base.json update
2020-01-13 20:26:34 -06:00
William Vu
fe23d4b72b
Clobber datastore in CheckModule again!
...
Seems adding VHOST and SSL wasn't enough. This is a stopgap...
2020-01-13 20:25:07 -06:00
William Vu
04084f84f7
Run rubocop -a
2020-01-13 20:25:07 -06:00
William Vu
a45821b706
Rename module
2020-01-13 20:25:07 -06:00
William Vu
b4a08503f8
Merge remote-tracking branch 'upstream/master' into pr/12816
2020-01-13 20:25:00 -06:00
William Vu
6c4970f901
Land #12819 : Fix #12813 , Twitter handle correction
2020-01-13 20:21:46 -06:00
William Vu
c9041dae28
Fix @altjx's Twitter handle (@altonjx)
2020-01-13 20:19:48 -06:00
Metasploit
55a3f2aac1
automatic module_metadata_base.json update
2020-01-13 18:25:38 -06:00
William Vu
6498a7c231
Land #12813 , Citrix CVE-2019-19781 scanner
2020-01-13 18:16:51 -06:00
William Vu
99235c729f
Clean up module doc
2020-01-13 18:05:42 -06:00
William Vu
4ac7f81542
Add Twitter handles
2020-01-13 17:54:28 -06:00
William Vu
3354e69c47
Improve smb.conf check and add PATH option
2020-01-13 17:52:14 -06:00
William Vu
332afe89af
Update module doc
2020-01-13 16:45:44 -06:00
William Vu
94b6b6d082
Clean up module
2020-01-13 16:39:05 -06:00
William Vu
d7deb4e80a
Run rubocop -a
2020-01-13 16:39:05 -06:00
William Vu
f1cc40bd77
Rename module
2020-01-13 16:39:05 -06:00
kalba-security
c30cd8e0cc
Add documentation
2020-01-14 00:31:44 +02:00
secenv
eaddce910f
Documentation for dlink_dir859_subscribe_exec
2020-01-13 13:27:42 -03:00
secenv
1429a496da
Remove _telnet from filename
...
No need to keep it, it drops meterpreter as payload now.
2020-01-13 13:18:43 -03:00
secenv
eab0bd5755
Randomize "Callback" header URL
2020-01-13 11:39:23 -03:00
RAMELLA Sébastien
5d3ad626e6
add. documentation
2020-01-13 18:22:09 +04:00
Metasploit
b235f26b60
automatic module_metadata_base.json update
2020-01-12 17:24:51 -06:00
Brent Cook
20cf419e18
Land #12797 , improve BlueKeep over remote networks
2020-01-12 17:15:29 -06:00
RAMELLA Sébastien
1570118a14
fix: again chmod 644 WTF!
2020-01-13 01:43:15 +04:00
RAMELLA Sébastien
a64b0fa9e7
add. python staged meterpreter support
2020-01-13 01:25:29 +04:00
RAMELLA Sébastien
c323df180a
fix. file perms to 664
2020-01-12 22:10:23 +04:00
zerosum0x0
aed9b45229
Merge pull request #5 from busterb/bkmouse
...
move rdp_move_mouse to rdp library, add GROOMDELAY
2020-01-12 10:52:27 -07:00
RAMELLA Sébastien
50637d0d91
add initial source code
2020-01-12 21:12:14 +04:00
Brent Cook
33dadefd53
move rdp_move_mouse to rdp library, add GROOMDELAY
2020-01-12 08:19:44 -06:00
Brent Cook
476eabbffe
Land #12811 , add newline when printing raw payloads to the console
2020-01-12 07:01:34 -06:00
Brent Cook
55d782c640
Land #12812 , update port processing for openvas
2020-01-12 06:52:25 -06:00
Alton Johnson
b3bf82be07
Changed permission from executable to just readable
2020-01-11 19:31:38 -05:00
Jeffrey Martin
25e0355951
update port processing for openvas
...
Port in openvas OMP version 7.0 reports serialize in a new format.
<ports max="1000" start="1"><count>3</count>
<port>general/tcp<host>192.168.8.100</host><severity>2.6</severity><threat>Low</threat></port>
<port>general/CPE-T<host>192.168.8.100</host><severity>0.0</severity><threat>Log</threat></port>
<port>general/icmp<host>192.168.8.100</host><severity>0.0</severity><threat>Log</threat></port>
<port>445/tcp (IANA: microsoft-ds)<host>192.168.8.100</host><severity>9.3</severity><threat>High</threat></port>
<port>139/tcp (IANA: netbios-ssn)<host>192.168.8.100</host><severity>0.0</severity><threat>Log</threat></port>
<port>135/tcp (IANA: epmap)<host>192.168.8.100</host><severity>5.0</severity><threat>Medium</threat></port>
</ports>
2020-01-11 15:15:56 -06:00
kalba-security
03d6d1aed5
Add citrix_directory_traversal module to /modules/auxiliary/scanner/http/
2020-01-11 22:45:00 +02:00
L
0876b8e7d7
enhancement payload generate raw
2020-01-11 19:43:04 +08:00
Metasploit
d507612817
automatic module_metadata_base.json update
2020-01-10 02:40:26 -06:00
Tim W
2ea5bd139a
Land #12792 , Fix #12791 , check for nil response on connection failure in efs_fmws_userid_bof
2020-01-10 16:31:32 +08:00
L
7f82816065
Add description udp listening information
2020-01-10 14:58:36 +08:00
bluesentinelsec
7eeb8c33eb
Added new post exploitation module: 'Install OpenSSH for Windows'
2020-01-09 19:58:31 -05:00
Adam Cammack
8b18f86169
Land #12806 , Properly invoke bundler in Dockerfile
2020-01-09 13:57:56 -06:00