Commit Graph

2023 Commits

Author SHA1 Message Date
William Vu 6c6aa8db82 Print generated CmdStager with inspect, not join
I dun goofed. I knew I should have just printed it verbatim.

tl;dr I thought I had accounted for command compression. I was wrong.
This should also give us more information about what exactly is being
run and how many times.
2018-04-11 13:49:00 -05:00
zerosum0x0 3a266d93b6 support for ARM 2018-03-29 15:11:27 -06:00
William Vu 862a3ff74d Land #9618, pipe auditing improvements 2018-03-26 17:01:48 -05:00
William Vu 23a7444646 Add PipeAuditor mixin to Psexec_MS17_010 mixin 2018-03-22 15:37:44 -05:00
William Vu 558ecbcb49 Add PipeAuditor mixin 2018-03-22 15:37:36 -05:00
Auxilus b22c606b9a msftidy fixes 2018-03-13 01:39:47 +05:30
Auxilus 9a9e9ead51 msftidy fixes 2018-03-13 01:34:26 +05:30
Auxilus 131ad69083 return array from connect_to_pipe 2018-03-13 01:32:17 +05:30
Auxilus ef515d256d msftidy fixes 2018-03-13 00:34:25 +05:30
Auxilus 6e9a4916f5 scanner update 2018-03-13 00:23:18 +05:30
Auxilus 80c7e9442b output formatting 2018-03-09 22:16:26 +05:30
Auxilus 8b3e5c745b fix pipeaudit.rb 2018-03-09 22:14:16 +05:30
Auxilus 2b7364a637 Add wordlist 2018-03-09 21:46:07 +05:30
Auxilus 1342284dc9 Add wordlist 2018-03-09 21:38:59 +05:30
Auxilus 7855c416c9 push latest changes 2018-03-09 14:52:53 +05:30
Auxilus 28f5920c9d update module 2018-03-09 14:45:56 +05:30
Auxilus 5bdc0b4ecd update mixins.rb 2018-03-09 14:18:10 +05:30
Auxilus 0e84026334 fix module path 2018-03-09 14:08:09 +05:30
Auxilus 899e03ba9b Move pipeaudit to exploit/smb/client 2018-03-09 14:05:53 +05:30
Auxilus e6a9f2609f include mixin to psexec_ms17_010 2018-03-08 23:01:58 +05:30
William Vu 0e4fc48df4 Fix #9602, a little defensive programming
Check for a nil message and unnecessary auth failures while looping.
2018-02-26 16:52:25 -06:00
Auxilus 3f93055a72 Add pipe_auditor 2018-02-24 11:14:03 +05:30
William Vu 3880f6a65e Finally fix "Unknown admin user ''" after 2yrs
The failed password auth was necessary after all. I misread the PoC. :'(

Apparently the password auth sets the username, while the backdoored
keyboard-interactive auth sets the password.
2018-02-21 20:44:35 -06:00
Brent Cook 3d67d2ed12 Land #9443, Add warning to FileDropper for deleting CWD 2018-02-19 21:22:39 -06:00
zerosum0x0 afef1948bf catch exception for patched Vista 2018-02-01 21:39:25 -07:00
zerosum0x0 469209a2b3 prefer x64 dynamite 2018-01-31 17:19:09 -07:00
zerosum0x0 6d7b48382e fix print arch key 2018-01-31 17:17:53 -07:00
zerosum0x0 ec26f01360 fix x64 typo 2018-01-31 17:12:07 -07:00
William Vu da23432745 Update cleanup method to check CWD 2018-01-31 16:19:43 -06:00
William Vu e60aeca2db Pass in session to CWD check
Oops, used to this being accessible universally. Not the case here.
2018-01-31 16:19:43 -06:00
William Vu 199a7cc134 Check for subdirectories and relative paths 2018-01-31 16:19:43 -06:00
William Vu 09d931e392 Split assignment across two lines for clarity
https://github.com/bbatsov/ruby-style-guide#use-if-case-returns
2018-01-31 16:19:43 -06:00
William Vu 15ff70fbda Add warning to FileDropper for deleting CWD 2018-01-31 16:19:43 -06:00
zerosum0x0 d5d3769517 more robust Windows XP SP0/SP1 fix 2018-01-30 18:11:07 -07:00
zerosum0x0 a9fa1b6a4d catch TypeError for matched pairs Frag leak 2018-01-30 10:32:59 -07:00
zerosum0x0 bbeccdd024 more trace and more flexible tolerance for SP0/SP1 2018-01-29 19:57:43 -07:00
zerosum0x0 7007bc1444 hopefully fixed XP SP0/SP1 issues 2018-01-29 19:11:30 -07:00
zerosum0x0 cfb7aa6de7 NULL pointer checks on read/write primitives 2018-01-29 18:10:01 -07:00
zerosum0x0 b5a88e3c8b remove VERBOSE req for prints in DBGTRACE 2018-01-29 15:01:37 -07:00
zerosum0x0 9b7c19db08 fix exception 2018-01-29 07:57:08 -07:00
zerosum0x0 a15befe94b squelch ::Rex::Proto::SMB::Exceptions::NoReply 2018-01-29 07:48:00 -07:00
zerosum0x0 6d35d241de fix pack error for xp 2018-01-29 07:45:07 -07:00
zerosum0x0 1a74c60339 fix output 2018-01-29 02:21:01 -07:00
zerosum0x0 0c23c5fcad notes 2018-01-29 01:37:03 -07:00
zerosum0x0 24a79ae7b3 clean up DBGTRACE 2018-01-29 01:18:49 -07:00
zerosum0x0 a321a70349 clean up token for earlier versions of windows 2018-01-29 01:09:31 -07:00
zerosum0x0 4bc3b31550 properly scope cleanup 2018-01-29 00:49:38 -07:00
zerosum0x0 bfef87a445 fixed up indentations 2018-01-29 00:19:42 -07:00
zerosum0x0 42dbab763b increased leak attempts 2018-01-28 23:27:19 -07:00
zerosum0x0 7b19951317 fix the danger zone 2018-01-28 22:32:00 -07:00