Commit Graph

480 Commits

Author SHA1 Message Date
Wei Chen f9a804e7d8 Bring the PR up to date 2018-04-23 08:52:05 -05:00
William Vu 1f31bcd26f Update telpho10_credential_dump 2018-03-27 14:57:57 -05:00
Jacob Robles ba0d990273 Documentation added and Error Checks 2018-03-15 10:46:08 -05:00
Jacob Robles 9e23997c3d Added Error Handling 2018-03-14 08:16:17 -05:00
Jacob Robles 1d51cf6d24 Implement Suggested Changes 2018-03-14 06:15:49 -05:00
Jacob Robles 64a51c1bd7 Save Credentials and IP 2018-03-13 08:47:08 -05:00
Mzack9999 5ee50c5fab Username and password reported as credentials 2018-03-12 07:01:03 -05:00
Mzack9999 3d6af4c7ee Removed mail from author section 2018-03-12 07:01:03 -05:00
Mzack9999 b0ed8c4702 code cleanup 2018-03-12 07:01:03 -05:00
Mzack9999 7b781d53c9 Small code refactoring, added verbose output 2018-03-12 07:01:03 -05:00
Mzack9999 fe89e2d391 Corrected check method, warning in case of absence of news and TARGETURI parameter 2018-03-12 07:01:03 -05:00
Mzack9999 f09d9a8994 Solved msftidy.rb issues 2018-03-12 07:01:02 -05:00
Mzack9999 dbba27cc97 Fixed minor issues and added automatic detection of Patten1/Pattern2 2018-03-12 07:01:02 -05:00
Mzack9999 63444a2c43 Corrected wrong label in password hash message 2018-03-12 07:01:02 -05:00
Mzack9999 4a40f40c14 Typo3 News Module Sql Injection exploit 2018-03-12 07:00:45 -05:00
Jacob Robles ea78e21961 Documentation accuracy 2018-03-09 07:43:12 -06:00
Jacob Robles 5a2f197c47 Remove redundant RPORT 2018-03-07 14:41:51 -06:00
Jacob Robles f6ebce2440 Update User List 2018-03-06 06:38:06 -06:00
Jacob Robles 5fde6bf5d3 Update Code 2018-03-05 22:39:16 -06:00
Jacob Robles a344ffadd8 Modified Code, Added additional check 2018-02-26 07:29:08 -06:00
Jacob Robles 4e4aeb7b4d Add GitStack v2.3.10 Unauth REST API Aux Module 2018-02-26 06:04:38 -06:00
Wei Chen 949b474a0a Avoid target_uri.path
It doesn't look like target_uri.path is suitable for this scenario,
because it causes our input to be modified and hard to use.
2018-02-15 16:31:09 -06:00
Wei Chen 5467f4c97e Add header 2018-02-15 16:19:54 -06:00
Jacob Robles c9a3894bdb Removed require statements 2018-02-08 12:00:47 -06:00
Jacob Robles 724a0e29f6 Update Parsing, Added Rescue 2018-02-07 19:19:58 -06:00
Jacob Robles 1de8ec1073 Implemented Suggested Changes
Updated documentation headings and function/filename formatting.
Updated module options and formatting. Added check for file to parse.
2018-02-07 08:01:54 -06:00
Jacob Robles 1233bb855c msftidy checks 2018-02-05 22:54:03 -06:00
Jacob Robles 1e9e9c9be0 Ulterius Server < v1.9.5.0 Directory Traversal
Adds documentation and module for Ulterius Server
directory traversal vulnerability.
2018-02-05 22:50:09 -06:00
Jan-Frederik Rieckers 7f3df74134 fixup! Adding Module for Postfixadmin CVE-2017-5930
Add error handling if request fails

Fix a typo in doc, add default value to doc
2017-12-30 13:04:23 +01:00
Jan-Frederik Rieckers 289e887895 Adding Module for Postfixadmin CVE-2017-5930
This exploit allows domain admins to delete protected aliases.
It can be used to redirect aliases like abuse@domain and can aid in
further attacks.
2017-12-29 17:13:59 +01:00
juushya 038119d9df Use of get_cookies_parsed, changing dirs, marking deprecated in 2 mods, more 2017-12-23 00:14:27 +05:30
Tod Beardsley e93282b71d Drop calls to vprint_* 2017-12-19 16:53:02 -06:00
Tod Beardsley 2dc2ac134e Don't default verbose 2017-12-19 16:48:41 -06:00
Tod Beardsley 85350a9645 Add Rapid7 blog references 2017-12-18 17:11:47 -06:00
Tod Beardsley ae4edd65e1 Hard wrap descriptions 2017-12-18 17:03:13 -06:00
Tod Beardsley 27a324237b Initial commit for Cambium issues from @juushya
Note, these will trigger a bunch of WARNING msftidy messages for setting
cookies directly. This is on purpose.
2017-12-18 16:32:55 -06:00
Patrick Webster 2f6da89674 Change author name to nick. 2017-11-09 03:00:24 +11:00
Adam Cammack b0dc44fb86 Land #8909, Avoid saving some invalid creds 2017-09-05 12:43:03 -05:00
Pearce Barry 2bbba9c500 Avoid some ActiveRecord validation errors.
Per discussion with @bcoles in [PR 8759](https://github.com/rapid7/metasploit-framework/pull/8759#issuecomment-325028479), setting a login data's last_attempted_at value while also setting the status to UNTRIED will cause a validation error when there's a running+connected MSF DB.

This PR removes the handful of existing cases we're doing this (thx, @bcoles!).
2017-08-30 15:31:36 -05:00
h00die 32a4436ecd first round of spelling/grammar fixes 2017-08-24 21:38:44 -04:00
Brent Cook 6300758c46 use https for metaploit.com links 2017-07-24 06:26:21 -07:00
g0tmi1k 524373bb48 OCD - Removed un-needed full stop 2017-07-21 07:41:51 -07:00
g0tmi1k 3f6925196b OCD - store_loot & print_good 2017-07-19 13:02:49 +01:00
g0tmi1k ef826b3f2c OCD - print_good & print_error 2017-07-19 12:48:52 +01:00
g0tmi1k df9b642746 More print_status -> print_good 2017-07-19 11:39:15 +01:00
g0tmi1k b8d80d87f1 Remove last newline after class - Make @wvu-r7 happy 2017-07-19 11:19:49 +01:00
g0tmi1k a008f8e795 BruteForce - > Brute Force 2017-07-19 10:39:58 +01:00
g0tmi1k 4720d1a31e OCD fixes - Spaces 2017-07-14 08:46:59 +01:00
g0tmi1k 9309115627 OCD - Banner clean up 2017-07-14 08:19:50 +01:00
g0tmi1k fd843f364b Removed extra lines 2017-07-14 08:17:16 +01:00