Commit Graph

1741 Commits

Author SHA1 Message Date
bwatters-r7 40d5f46277 Lad #10017, D-Link DSL-2750B Unauthenticated OS Command Injection
Merge branch 'land-10017' into upstream-master
2018-05-22 10:54:33 -05:00
lucyoa 6cc1a8dcbd Rubocop fixes 2018-05-22 10:34:05 -04:00
Tim W 88ab836e15 Land #9987, AF_PACKET chocobo_root exploit 2018-05-21 17:05:53 +08:00
Tim W 9e9dff8b6a fix file cleanup on failed exploitation 2018-05-21 16:47:09 +08:00
Tim W cd0161ada2 fix gcc for shell_reverse_tcp payloads on ubuntu 2018-05-21 16:46:42 +08:00
lucyoa 6ae55aadd4 Fixing documentation, improving exploits code 2018-05-20 12:55:46 -04:00
bwatters-r7 294b263159 Land #9966, Add Reliable Datagram Sockets (RDS) Privilege Escalation exploit
Merge branch 'land-9966' into upstream-master
2018-05-18 17:06:04 -05:00
Brent Cook 37f1e44a12 Land #10009, Add initial check support to external modules 2018-05-18 09:31:31 -05:00
Brendan Coles eb3733ffb4 unless 2018-05-17 17:42:55 +00:00
Tim W 6594cbb5cc Land #9947, AF_PACKET packet_set_ring exploit 2018-05-17 18:43:52 +08:00
Tim W dc227153c4 fix gcc on shell_reverse_tcp session 2018-05-17 18:43:27 +08:00
Tim W ce5b24eda0 fork early and cleanup files in module 2018-05-17 00:32:01 +08:00
William Vu 436e414b93 Land #7815, CVE-2016-9299 exploit 2018-05-16 05:29:41 -05:00
William Vu 959cbde6eb Clean up module 2018-05-16 05:29:25 -05:00
Brendan Coles c5f980f633 GoodRanking 2018-05-16 02:38:19 +00:00
lucyoa 8dd7a27f7b Fixes according to code review 2018-05-14 05:46:23 -04:00
lucyoa f65361258b Adding vulnerable firmwares to description 2018-05-13 15:08:32 -04:00
lucyoa 382364a3ff Adding documentation, improving description 2018-05-13 15:04:40 -04:00
lucyoa c3ad02121c Exploit for D-Link DSL2750B OS Command Injection vulnerability 2018-05-13 13:58:35 -04:00
Tim W ed5f2bffa9 Land #9919, add libuser roothelper privilege escalation exploit 2018-05-12 17:11:21 +08:00
Tim W a8660e4042 make the PASSWORD option required 2018-05-12 17:10:21 +08:00
Adam Cammack b0e712e992 Add banner check exploit/linux/smtp/haraka 2018-05-11 12:45:32 -05:00
Adam Cammack 90f2fe545c Add PEP8 whitespace to exploit/linux/smtp/haraka 2018-05-11 12:43:30 -05:00
Brendan Coles 5ae9b0185d Add AF_PACKET chocobo_root Privilege Escalation exploit 2018-05-07 07:11:07 +00:00
HD Moore 2a211d99af Nuke base_directory after all, FileDropper does not like our path 2018-05-06 22:58:06 -05:00
HD Moore a9f9d61f1e Use the target_directory, not base 2018-05-06 22:56:59 -05:00
HD Moore cd48507aab Use FileDropper, switch to earlier target directory 2018-05-06 22:56:36 -05:00
HD Moore 1f7b13bea8 Additional module cleanup 2018-05-06 22:50:13 -05:00
HD Moore 3d172df0c4 MD5 of TID and cleanup if statement 2018-05-06 22:24:36 -05:00
HD Moore 68f2e08400 Swap to positive logic 2018-05-06 22:22:47 -05:00
HD Moore 9712215e66 Add Bugtraq ID 2018-05-06 22:21:13 -05:00
HD Moore 5d57e9db34 Remove unnecessary RHOST definition 2018-05-06 22:20:51 -05:00
HD Moore 8141e949fc Note the runtimes 2018-05-05 18:34:11 -05:00
HD Moore e775a97ae2 Adds panos_readsessionvars exploit module 2018-05-05 15:41:17 -05:00
Brendan Coles 3aa7441e10 Update tested versions 2018-05-05 09:11:31 +00:00
Brendan Coles 24af15b6e7 Update kernel version and system arch detection 2018-05-05 07:16:53 +00:00
Brendan Coles 3a688451b6 Add Reliable Datagram Sockets (RDS) Privilege Escalation 2018-05-03 12:51:21 +00:00
Brendan Coles f7504dd9d5 Add AF_PACKET packet_set_ring Privilege Escalation exploit 2018-04-28 01:40:17 +00:00
Brent Cook 79d8f5e86c autofilter = false means skip, which is reverse of intuition 2018-04-26 17:20:55 -05:00
Jeffrey Martin 54aaf1f718 Land #9937, enable autofilter on tp-link camera exploit 2018-04-26 16:08:09 -05:00
Brent Cook 4789cdc596 enable autofilter on tp-link camera exploit 2018-04-26 14:56:39 -05:00
Brent Cook 0fa0358993 Land #9853, Update Linux sock_sendpage local exploit module 2018-04-26 14:30:51 -05:00
Brendan Coles ef5272cdc6 Update tested versions 2018-04-23 20:28:24 +00:00
Brendan Coles 00583caadf Add Libuser roothelper Privilege Escalation exploit 2018-04-23 17:49:11 +00:00
bwatters-r7 1c92134606 Land #9756, Add lastore-daemon D-Bus Privilege Escalation exploit
Merge branch 'land-9756' into upstream-master
2018-04-20 15:45:37 -05:00
bwatters-r7 37a844bef0 Land # 9247, Add ASUS infosvr Auth Bypass Command Execution exploit
Merge branch 'land-9247' into upstream-master
2018-04-20 11:24:47 -05:00
Brendan Coles fc7040099c Update Linux sock_sendpage local exploit module 2018-04-10 11:15:42 +00:00
Brendan Coles 9bb6e72020 Add lastore-daemon D-Bus Privilege Escalation exploit 2018-03-24 23:16:42 +00:00
William Vu 176fb13c84 Fix #9650, missed code from TelnetEnable refactor
1. Functionality was added incrementally, and I missed an opportunity to
consolidate a few methods under @do_exploit.
2. The Capture mixin can raise RuntimeError for a number of different
reasons, not just a lack of root privileges.

tl;dr Fix my incompetence and laziness. :-)

I don't think EDB and friends usually get these updates. :(
2018-03-05 14:46:27 -06:00
William Vu 6dbf9445c9 Add MAC address discovery 2018-03-02 19:18:30 -06:00