Commit Graph

31610 Commits

Author SHA1 Message Date
RAMELLA Sébastien dfc226cf5f add. Supposed 0day MSWord RCE 2022-05-30 21:23:18 +04:00
RAMELLA Sébastien 38973510f7 update modules (auxiliary and exploit) 2021-11-09 15:18:58 +04:00
surya 2f00ccfbc8 Linted Stuff 2021-10-08 03:04:34 +05:30
surya 59ffc44dbc Cleared a minor error 2021-10-08 02:57:13 +05:30
surya d1e3a104db Merged branches 2021-10-08 02:55:39 +05:30
surya 4d4b51d158 => Added .gitignore
=> Added Deobfuscated HTML Payload
=> Removed Extra Author Credits
=> Made SRVHOST AND SRVPORT MANDATORY
=> generate_uri replaced with builtin get_uri
2021-10-08 02:50:27 +05:30
suryasaradhi cbbb83073f Added Authors 2021-10-05 21:03:45 +05:30
surya 48388133dd Msftidy up code v2 2021-10-05 02:33:36 +05:30
surya 171f114ce2 Msftidy up code v1 2021-10-05 02:10:33 +05:30
surya 3461c7aef6 Added module for CVE-2021-40444 2021-10-05 01:44:34 +05:30
adfoster-r7 50ad2f13e1 Land #15739, Add Diagnostic State Module for hwbridge 2021-10-04 17:49:24 +01:00
Jay Turla 613d26743a Update diagnostic_state.rb 2021-10-04 07:31:06 +08:00
h00die 43d77d63ce ghostcat meta updates 2021-10-03 16:30:12 -04:00
Jay Turla 8bdbf99c80 Add Diagnostic State Module
## Introduction
This module will keep the vehicle in a diagnostic state on rounds by sending tester present packet.

## Verification Steps

Fire up virtual CAN bus:

1. `sudo modprobe can`
2. `sudo modprobe vcan`
3. `sudo ip link add dev vcan0 type vcan`
4. `sudo ip link set up vcan0`

Launch msf:

5. Start `msfconsole`
6. `use auxiliary/server/local_hwbridge`
7. `set uripath testbus`
8. `run`
9. `use auxiliary/client/hwbridge/connect`
10. `set targeturi testbus`

## Options

```
Module options (post/hardware/automotive/diagnostic_state):

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   ARBID    0x7DF            no        CAN ID to perform ECU Hard Reset
   CANBUS                    no        CAN Bus to perform scan on, defaults to connected bus
   ROUNDS   500              yes       Number of executed rounds
   SESSION                   yes       The session to run this module on.
```

## Scenarios
You can test this module doing a candump and you should receive a response for each can frame in a loop at 0x7E8 when running UDS Simulator.

```
msf5 auxiliary(client/hwbridge/connect) > run
[*] Running module against 127.0.0.1

[*] Attempting to connect to 127.0.0.1...
[*] Hardware bridge interface session 1 opened (127.0.0.1 -> 127.0.0.1) at 2019-09-11 04:59:40 -0700
[+] HWBridge session established
[*] HW Specialty: {"automotive"=>true}  Capabilities: {"can"=>true, "custom_methods"=>true}
[!] NOTICE:  You are about to leave the matrix.  All actions performed on this hardware bridge
[!]          could have real world consequences.  Use this module in a controlled testing
[!]          environment and with equipment you are authorized to perform testing on.
[*] Auxiliary module execution completed
msf5 auxiliary(client/hwbridge/connect) > sessions

Active sessions
===============

  Id  Name  Type                   Information  Connection
  --  ----  ----                   -----------  ----------
  1         hwbridge cmd/hardware  automotive   127.0.0.1 -> 127.0.0.1 (127.0.0.1)

msf5 auxiliary(client/hwbridge/connect) > sessions -i 1
[*] Starting interaction with 1...

hwbridge > run post/hardware/automotive/diagnostic_state canbus=vcan0

[*] Putting the vehicle in a diagnostic state...
[*] In order to keep the vehicle in this state, you need to continuously send a packet to let the vehicle know that a diagnostic technician is present.
hwbridge >
```

You can use candump to verify the CAN messages being sent:

```
─$ candump vcan0
└─$ candump vcan0
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E

-- snippet --
```

UDS Server Output
```
└─$ ./uds-server -v -V "PWN3D" vcan0
Using CAN interface vcan0
Fuzz level set to: 0
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E

-- snippet --
```
2021-10-04 01:35:31 +08:00
Spencer McIntyre 845ea16e5f Land #15729, Add nil check for return value 2021-10-01 18:11:51 -04:00
kalba-security c1c71d34fe add nil check for the return value of add_printer_driver_ex, since this will return nil if the response can't be mapped to a win32 status code 2021-09-30 19:28:00 -04:00
bwatters 14a5ce11d2 Land #15720, Fix #15717, replacing 'RHOSTS' with 'rhost'
Merge branch 'land-15720' into upstream-master
2021-09-29 11:10:59 -05:00
bwatters b354ea7f58 Update python payload cached sizes 2021-09-29 09:34:16 -05:00
NeffIsBack 0873d4db19 Fix #15717, replacing 'RHOSTS' with 'rhost'
As seen in the json file the `RHOSTS` parameter, which is set in Metasploit, is passed as `rhost` to the python script. Therefore `RHOSTS` is not a valid index in the `args` json file, causing the python script to crash as seen in #15717.

`{
   "WORKSPACE":"",
   "VERBOSE":"false",
   "THREADS":"1",
   "ShowProgress":"true",
   "ShowProgressPercent":"10",
   "targeturi":"/RDWeb/Pages/en-US/login.aspx",
   "rport":"443",
   "domain":"",
   "username":"********",
   "password":"",
   "timeout":"1250",
   "enum_domain":"true",
   "verify_service":"true",
   "user_agent":"Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0",
   "UNPARSED_RHOSTS":"***.***.***.***",
   "**rhost**":"***.***.***.***"
}`
2021-09-29 15:49:09 +02:00
adfoster-r7 26e317d093 Land #15707, Add ECU Hard Reset for hwbridge 2021-09-28 19:18:46 +01:00
adfoster-r7 230c7b5e82 Remove repeatable session metadata 2021-09-28 18:51:51 +01:00
Tim W 4289c8b3ea Land #15441, add date filtering to stdapi_fs_search 2021-09-28 15:55:43 +01:00
Tim W dd76fe4d07 update payload cached sizes 2021-09-28 15:30:17 +01:00
bwatters ded4401b2b More rubocop fixes.... 2021-09-27 12:34:07 -05:00
bwatters 082948f8d9 Fix references to new global and fix a forgotten module 2021-09-27 12:26:53 -05:00
bwatters 6e08c6087e Rubocop corrections 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta 77e144b668 Add a method to check if the folder containing the artifact exists 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta 0d021deb0c Update modules with rubocop 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta e6d2c01ad2 Run Rubocop for aim.rb 2021-09-27 12:26:53 -05:00
KazuCyber aa9598cd20 Rename ICQ.rb to icq.rb 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta 09ed5b671e Add xchat.rb, Add kmeleon.md 2021-09-27 12:26:53 -05:00
KazuCyber 81719f6613 Update aim.rb
Bug fix.
2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta 37cc6e540e Add modules, Rename a module 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta c1742a23b9 Update wording on Module documentation. Replace EXTRACT_CREDENTIALS_FROM_FILE with EXTRACT_DATA 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta e582c15f56 Update & and & to 'and' 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta 94d3f87461 Update artifact description in line.rb 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta dc6f6a8f25 Packrat: 29 post exploitation modules 2021-09-27 12:26:52 -05:00
Grant Willcox a7b57e9e66 Land #15709, Bump metasploit-payloads to 2.0.56 and mettle to 1.0.12 2021-09-27 11:41:46 -05:00
Tim W de398ae61f update payload cached sizes 2021-09-27 15:31:14 +01:00
adfoster-r7 959527a4c4 Land #15669, Add meterpreter compatibility metadata to screenshare module 2021-09-27 15:18:01 +01:00
Jay Turla 70c400e883 Update ecu_hard_reset.rb 2021-09-27 19:39:06 +08:00
adfoster-r7 06762d0934 Update references to railgun to be consistent 2021-09-27 12:37:14 +01:00
Jay Turla 9dc315094c Update ecu_hard_reset.rb 2021-09-27 19:30:36 +08:00
Jay Turla f60c492cf1 Add ECU Hard Reset for hwbridge 2021-09-27 18:58:39 +08:00
Jay Turla 31262ef807 Update ecu_hard_reset.rb 2021-09-25 11:12:34 +08:00
Jack Heysel b7f7c30f2b Land #15594, a wordpress scanner enhancement
This adds options to the wordpress scanner to allow the user
to only scan for plugins or themes that metasploit has
modules for.
2021-09-24 15:51:07 -04:00
space-r7 756fac4921 Land #15677, add Netgear auth bypass 2021-09-24 14:44:34 -05:00
jheysel-r7 3b12461e9e Merge branch 'master' into feat/db-skip 2021-09-24 12:01:30 -04:00
Jay Turla 2091f9c715 Update ecu_hard_reset.rb 2021-09-24 23:50:25 +08:00
Grant Willcox 6ed3462517 Add in public data for stolen wifi credentials and cleanup code for the file we have to write for the telnet auxiliary module to work 2021-09-24 10:44:10 -05:00