Adam Cammack
517d32b082
Update payload cache sizes
2019-07-30 10:34:47 -05:00
Adam Cammack
23ea772076
Golf Ruby pingback payload syntax
2019-07-30 10:32:31 -05:00
bwatters-r7
05ffa6e4a0
More updates, optimizations, and style fixes
2019-07-29 16:29:32 -05:00
bwatters-r7
d6dc397b21
Fix bugs introduced by syntax changes.
2019-07-29 14:00:09 -05:00
bwatters-r7
6bf10e1f91
Fixups for syntax
2019-07-29 11:55:51 -05:00
bwatters-r7
cec29c6473
More fixes for syntax
2019-07-26 14:51:44 -05:00
bwatters-r7
79b7bbd2cf
Update payload cache size and fix import bug
2019-07-26 13:52:36 -05:00
bwatters-r7
2f804faed9
Rubocop and @acammack cleanup suggestions
2019-07-26 12:36:59 -05:00
bwatters-r7
7c2d214af2
Clean up debugging, move options to one place and delete superflous file
...
change the uuid handing to prevent changes to it when it gets put in payloads
2019-07-25 19:45:05 -05:00
asoto-r7
79c45a6c52
Clean up require's and calculate CachedSize
2019-07-25 19:42:50 -05:00
asoto-r7
be011da9f9
Ruby pingback payload (bind and reverse)
2019-07-25 19:42:50 -05:00
Brent Cook
6300758c46
use https for metaploit.com links
2017-07-24 06:26:21 -07:00
g0tmi1k
b8d80d87f1
Remove last newline after class - Make @wvu-r7 happy
2017-07-19 11:19:49 +01:00
William Vu
64452de06d
Fix msf/core and self.class msftidy warnings
...
Also fixed rex requires.
2017-05-03 15:44:51 -05:00
Christian Mehlmauer
3123175ac7
use MetasploitModule as a class name
2016-03-08 14:02:44 +01:00
Brent Cook
6b1e911041
Instantiate payload modules so parameter validation occurs
...
Calling .new on payload modules does not perform parameter validation, leading
to a number cached sizes based on invalid parameters. Most notably,
normalization does not occur either, which makes all OptBool params default to
true.
2015-08-14 11:35:39 -05:00
HD Moore
02509d02e4
The result of running ./tools/update_payload_cached_sizes.rb
2015-03-09 15:31:04 -05:00
URI Assassin
35d3bbf74d
Fix up comment splats with the correct URI
...
See the complaint on #4039 . This doesn't fix that particular
issue (it's somewhat unrelated), but does solve around
a file parsing problem reported by @void-in
2014-10-17 11:47:33 -05:00
Tod Beardsley
23d058067a
Redo the boilerplate / splat
...
[SeeRM #8496 ]
2013-10-15 13:51:57 -05:00
Tab Assassin
41e4375e43
Retab modules
2013-08-30 16:28:54 -05:00
Tod Beardsley
be39079830
Trailing whitespace fix
...
Note that this commit needed a --no-verify because of the erroneous
check in msftidy for writing to stdout. The particular syntax of this
payload makes it look like we're doing that when we're really not.
So don't sweat it.
2013-04-15 13:58:06 -05:00
Tod Beardsley
e149c8670b
Unconflicting ruby_string method
...
Looks like the conflict was created by the msftidy fixes that happened
over on the master branch. No big deal after all.
2013-03-20 15:49:23 -05:00
HD Moore
cae6661574
Handle invalid commands gracefully (dont exit)
2013-02-12 11:33:23 -08:00
HD Moore
4c2bddc452
Fix a typo and always treat ports as integers:
2013-02-12 08:59:11 -08:00
HD Moore
a33d1ef877
This allows the ruby payloads to work properly on Windows
2013-02-12 08:55:37 -08:00
RageLtMan
ffb88baf4a
initial module import from SV rev_ssl branch
2013-02-03 15:06:24 -05:00
James Lee
92c736a6a9
Move fork stuff out of exploit into payload mixin
...
Tested xml against 3.2.10 and json against 3.0.19
2013-01-28 21:34:39 -06:00
James Lee
c89b2b2ec6
Once more, with feeling
2013-01-10 15:29:54 -06:00
James Lee
7fd3440c1a
Fix hd's attempt to rename ruby payloads
2013-01-10 15:25:50 -06:00
James Lee
4fcb8b6f8d
Revert "Rename again to be consistent with payload naming"
...
This reverts commit 0fa2fcd811 .
2013-01-10 15:24:25 -06:00
HD Moore
0fa2fcd811
Rename again to be consistent with payload naming
2013-01-10 14:16:37 -06:00
HD Moore
88b08087bf
Renamed and made more robust
2013-01-10 14:05:29 -06:00
HD Moore
e05f4ba927
Thread wrappers were causing instant session closure
2013-01-10 00:41:58 -06:00
HD Moore
4c1e501ed0
Exploit for CVE-2013-0156 and new ruby-platform modules
2013-01-09 23:10:13 -06:00