wizard32
c55e2e58f0
'raw_headers' Updated
2017-01-05 15:19:17 +02:00
wizard32
1d82ee0470
'raw_headers' field Updated
2017-01-05 15:17:17 +02:00
wizard32
c29a9ac00f
Show Info updated
2017-01-05 14:18:38 +02:00
wizard32
1a38caa230
Encode - Decode code Updated
2017-01-05 13:07:34 +02:00
wizard32
9f4be89391
Update websphere_java_deserialize.rb
...
Update information "Options" field
2017-01-05 12:38:54 +02:00
Pedro Ribeiro
6004caa475
fix whitespace
2017-01-05 01:58:16 +00:00
juushya
c5acda0a22
Fixed the file permissions
2017-01-05 04:40:41 +05:30
William Vu
19319f15d4
Land #7626 , Eir D1000 modem exploit
2017-01-04 17:02:39 -06:00
Pedro Ribeiro
d95a3ff2ac
made changes suggested
2017-01-04 23:02:10 +00:00
juushya
c15b77c31b
Add Cambium ePMP 1000 Login Scanner module
2017-01-05 04:19:32 +05:30
William Vu
b0e79076fe
Switch to wget CmdStager and tune timing
...
We don't want to trample the device with requests.
2017-01-04 16:42:53 -06:00
wizard32
82e49fb27e
Update websphere_java_deserialize.rb
2017-01-04 10:23:48 +02:00
William Vu
94d76cfb06
Merge remote-tracking branch 'upstream/master' into tr-069-ntpserver-command-injection
2017-01-03 17:04:04 -06:00
Brent Cook
7585999e18
Land #7782 , Update themoon exploit to use wget command stager
2017-01-03 16:30:12 -06:00
wchen-r7
ed74b239e3
Land #7768 , PHPMailer Sendmail Argument Injection exploit
2017-01-03 16:04:05 -06:00
wchen-r7
3155af679a
Fix a typo
2017-01-03 16:03:45 -06:00
Adam Cammack
fe0a3c8669
Update themoon exploit to use wget command stager
2017-01-03 15:50:57 -06:00
wizard32
b06c5bac2f
Invalid CVE format and Spaces at EOL fixed
2017-01-03 21:45:22 +02:00
wizard32
0722944b47
Invalid CVE format fixed
2017-01-03 21:38:32 +02:00
wizard32
8534fde50f
Websphere Java Deserialization (RCE)
...
This module exploits a vulnerability in IBM's WebSphere Application Server. An unsafe deserialization call of unauthenticated Java objects exists to the Apache Commons Collections (ACC) library, which allows remote arbitrary code execution. Authentication is not required in order to exploit this vulnerability.
2017-01-03 16:04:51 +02:00
phroxvs
a9a83bc21c
fix for uninitialized constant in Net::SSH on OS X
2017-01-03 06:16:07 -05:00
phroxvs
3c2486b9f5
initial version of CVE-2016-7456 exploit
2017-01-03 03:39:22 -05:00
phroxvs
589084896a
initial version of CVE-2016-7456 exploit
2017-01-03 03:36:49 -05:00
Pedro Ribeiro
9d3e90e8e5
cleanup
2017-01-02 17:32:38 +00:00
Brent Cook
04a026e786
remove lies from module, this is a bound socket
2017-01-02 09:47:18 -06:00
Pedro Ribeiro
4c29d23c8a
further cleaning
2016-12-31 17:02:34 +00:00
Pedro Ribeiro
956602cbfe
add final wnr2000 sploits
2016-12-31 16:49:05 +00:00
j91321
6c9e43f2ad
Add fingerprinting of devices, change documentation
2016-12-30 23:52:29 +01:00
Brent Cook
fdca963b61
check if the socket exists before closing
2016-12-30 14:59:31 -06:00
Spencer McIntyre
cd90fd3b1c
Fix PHPMailer targets since 5.2.20 is not affected
2016-12-30 15:31:15 -05:00
Spencer McIntyre
1eab4b3a7d
Add an optional explicit triggeruri for phpmailer
2016-12-30 14:24:07 -05:00
Spencer McIntyre
64037b0d6e
Use a proper target instead of VERSION
2016-12-29 17:37:16 -05:00
Brent Cook
fae4751771
Land #7744 , update kiwi extension to Mimikatz 2.1
2016-12-29 16:22:45 -06:00
Spencer McIntyre
c9dd7a50b6
Add the PHPMailer Argument Injection exploit
2016-12-29 17:17:06 -05:00
William Vu
9d0ada9b83
Land #7749 , make drb_remote_codeexec great again
2016-12-28 06:11:48 -06:00
William Vu
cfca4b121c
Clean up module
2016-12-28 06:10:46 -06:00
William Vu
29d6cf4480
Fix nil bug in generic/custom and change opt order
...
I think PAYLOADSTR should take precedence over PAYLOADFILE. Usually,
you'll use PAYLOADFILE but might want to override with PAYLOADSTR. I
doubt this change will hurt anyone, since few people set both at once.
The payload description even says "either," so there's that.
2016-12-28 05:15:25 -06:00
William Vu
afd8315e1d
Remove apache_continuum_cmd_exec CmdStager flavor
...
It is inferred from the platform, and we don't want to override it
needlessly. :bourne is what worked during testing, but it won't always
work. Now we can override the flavor with CMDSTAGER::FLAVOR.
2016-12-27 16:24:16 -06:00
Pedro Ribeiro
870e8046b5
add sploits
2016-12-27 21:12:35 +00:00
bwatters_r7
a580055491
Land #7730 , add module to run exe as another user via powershell
2016-12-27 08:13:48 -06:00
William Vu
a7debd09fd
Fix broken YouTube link in firetv_youtube
...
Guess it's back to Epic Sax Guy. :-)
2016-12-25 20:22:07 -06:00
William Vu
6bb0f3207d
Add reboot action to chromecast_reset
2016-12-25 15:20:46 -06:00
h00die
699da8df5b
Land #7746 , chromecast_wifi now uses Scanner
2016-12-25 11:36:31 -05:00
Brent Cook
57e4bcbf71
Land #7454 , add CVE-2013-6282, put_user/get_user exploit for Android
2016-12-24 14:44:34 -06:00
wchen-r7
81b310f928
Up to date
2016-12-23 17:24:01 -06:00
wchen-r7
144f886e8b
Add LoginScanner module for BAVision IP cameras
2016-12-23 16:22:17 -06:00
William Vu
0589948a73
Remove other rhost (oops) and fail_with
2016-12-23 16:10:21 -06:00
Jon Hart
b4235835c8
rhost -> ip
2016-12-23 13:20:24 -08:00
Jon Hart
60e602c371
Update chromecast wifi gather module to use Scanner for scanning in bulk
2016-12-23 11:34:19 -08:00
joernchen of Phenoelit
679ebf31bd
Minor fix to make dRuby great again
2016-12-23 15:12:22 +01:00