Commit Graph

8767 Commits

Author SHA1 Message Date
William Vu abe65cd400 Land #5974, java_jmx_server start order fix 2015-09-15 01:33:44 -05:00
wchen-r7 ae5aa8f542 No FILE_CONTENTS option 2015-09-12 23:32:02 -05:00
Hans-Martin Münch (h0ng10) 0c4604734e Webserver starts at the beginning, stops at the end 2015-09-12 19:42:31 +02:00
wchen-r7 01053095f9 Add MS15-100 Microsoft Windows Media Center MCL Vulnerability 2015-09-11 15:05:06 -05:00
wchen-r7 017832be88 Land #5953, Add Bolt CMS File Upload Vulnerability 2015-09-10 18:29:13 -05:00
wchen-r7 602a12a1af typo 2015-09-10 18:28:42 -05:00
Roberto Soares 68521da2ce Fix check method. 2015-09-10 04:40:12 -03:00
Roberto Soares 0ba03f7a06 Fix words. 2015-09-09 21:27:57 -03:00
Roberto Soares bc3f5b43ab Removerd WordPress mixin. 2015-09-09 21:26:15 -03:00
Roberto Soares d3aa61d6a0 Move bolt_file_upload.rb to exploits/multi/http 2015-09-09 13:41:44 -03:00
Roberto Soares 2800ecae07 Fix alignment. 2015-09-09 01:21:08 -03:00
Roberto Soares 48bd2c72a0 Add fail_with method and other improvements 2015-09-09 01:11:35 -03:00
Roberto Soares f08cf97224 Check method implemented 2015-09-08 23:54:20 -03:00
Roberto Soares 6de0c9584d Fix some improvements 2015-09-08 23:15:42 -03:00
jvazquez-r7 23ab702ec4 Land #5631, @blincoln682F048A's module for Endian Firewall Proxy
* Exploit CVE-2015-5082
2015-09-04 16:28:32 -05:00
jvazquez-r7 2abfcd00b1 Use snake_case 2015-09-04 16:27:09 -05:00
jvazquez-r7 15aa5de991 Use Rex::MIME::Message 2015-09-04 16:26:53 -05:00
jvazquez-r7 adcd3c1e29 Use static max length 2015-09-04 16:18:55 -05:00
jvazquez-r7 1ebc25092f Delete some comments 2015-09-04 16:18:15 -05:00
Roberto Soares cc405957db Add some improvements 2015-09-04 16:02:30 -03:00
Roberto Soares 4531d17cab Added the rest of the code 2015-09-04 15:37:42 -03:00
Roberto Soares b9ba12e42a Added get_token method. 2015-09-04 15:27:28 -03:00
Roberto Soares 6f4f8e34b4 Added method bolt_login. 2015-09-04 10:45:15 -03:00
Roberto Soares a195f5bb9e Initial commit - Skeleton 2015-09-04 04:09:16 -03:00
James Lee b2c401696b Add certutil support.
Tested while landing #5736
2015-09-03 14:24:37 -05:00
James Lee 1e6a1f6d05 Revert "Fix spec like I shoulda done before landing #5736"
This reverts commit 956c8e550d.

Conflicts:
	spec/lib/rex/exploitation/cmdstager/certutil_spec.rb
2015-09-03 14:18:55 -05:00
James Lee b4547711f3 Add certutil support.
Tested while landing #5736
2015-09-03 13:27:10 -05:00
HD Moore 9b51352c62 Land #5639, adds registry persistence 2015-09-03 11:26:38 -05:00
HD Moore 4090c2c8ea Land #5880, adds ScriptHost UAC bypass for Win7/2008 2015-09-02 14:14:18 -05:00
Meatballs 582cc795ac Remove newlines 2015-09-02 19:42:04 +01:00
HD Moore 43d3e69fb2 Land #5917, update local exploit checks 2015-09-02 12:55:45 -05:00
Meatballs 8f25a006a8 Change to automatic target 2015-09-02 09:13:25 +01:00
wchen-r7 4275a65407 Update local exploit checks to follow the guidelines.
Please see wiki "How to write a check() method" to learn how
these checkcodes are determined.
2015-09-01 23:26:45 -05:00
Meatballs 27775fbe58 Restrict to 7 and 2k8 2015-09-01 22:23:37 +01:00
HD Moore cd65478d29 Land #5826, swap ExitFunction -> EXITFUNC 2015-09-01 13:58:12 -05:00
Christian Mehlmauer bfc24aea16 change exitfunc to thread 2015-09-01 10:52:25 +02:00
Christian Mehlmauer 115f409fef change exitfunc to thread 2015-09-01 10:48:07 +02:00
Christian Mehlmauer 5398bf78eb change exitfunc to thread 2015-09-01 10:46:54 +02:00
Christian Mehlmauer 3e613dc333 change exitfunc to thread 2015-09-01 10:43:45 +02:00
Christian Mehlmauer 648c034d17 change exitfunc to thread 2015-09-01 10:42:15 +02:00
Brent Cook d670a62000 Land #5822, migrate obsolete payload compatibility options 2015-08-31 15:20:20 -05:00
wchen-r7 9364982467 Land #5665, Add osx rootpipe entitlements exploit for 10.10.3 2015-08-28 13:33:16 -05:00
wchen-r7 e45347e745 Explain why vulnerable 2015-08-28 13:26:01 -05:00
wchen-r7 423d52476d Normal options should be all caps 2015-08-28 13:24:23 -05:00
jvazquez-r7 da4b360202 Fix typo 2015-08-26 15:29:34 -05:00
jvazquez-r7 5d0ed797a3 Update DLL 2015-08-26 15:15:32 -05:00
jvazquez-r7 dd529013f6 Update ruby side 2015-08-26 15:12:09 -05:00
Brent Cook b1ef560264 Merge payload_inject 64-bit inject fix from @Meatballs1 2015-08-24 09:26:00 -05:00
Meatballs 1c91b126f1 X64 compat for payload_inject 2015-08-23 22:03:57 +01:00
Meatballs 228087dced Initial working scripthost bypass uac 2015-08-23 20:16:15 +01:00