William Vu
6c6aa8db82
Print generated CmdStager with inspect, not join
...
I dun goofed. I knew I should have just printed it verbatim.
tl;dr I thought I had accounted for command compression. I was wrong.
This should also give us more information about what exactly is being
run and how many times.
2018-04-11 13:49:00 -05:00
zerosum0x0
3a266d93b6
support for ARM
2018-03-29 15:11:27 -06:00
William Vu
862a3ff74d
Land #9618 , pipe auditing improvements
2018-03-26 17:01:48 -05:00
William Vu
23a7444646
Add PipeAuditor mixin to Psexec_MS17_010 mixin
2018-03-22 15:37:44 -05:00
William Vu
558ecbcb49
Add PipeAuditor mixin
2018-03-22 15:37:36 -05:00
Auxilus
b22c606b9a
msftidy fixes
2018-03-13 01:39:47 +05:30
Auxilus
9a9e9ead51
msftidy fixes
2018-03-13 01:34:26 +05:30
Auxilus
131ad69083
return array from connect_to_pipe
2018-03-13 01:32:17 +05:30
Auxilus
ef515d256d
msftidy fixes
2018-03-13 00:34:25 +05:30
Auxilus
6e9a4916f5
scanner update
2018-03-13 00:23:18 +05:30
Auxilus
80c7e9442b
output formatting
2018-03-09 22:16:26 +05:30
Auxilus
8b3e5c745b
fix pipeaudit.rb
2018-03-09 22:14:16 +05:30
Auxilus
2b7364a637
Add wordlist
2018-03-09 21:46:07 +05:30
Auxilus
1342284dc9
Add wordlist
2018-03-09 21:38:59 +05:30
Auxilus
7855c416c9
push latest changes
2018-03-09 14:52:53 +05:30
Auxilus
28f5920c9d
update module
2018-03-09 14:45:56 +05:30
Auxilus
5bdc0b4ecd
update mixins.rb
2018-03-09 14:18:10 +05:30
Auxilus
0e84026334
fix module path
2018-03-09 14:08:09 +05:30
Auxilus
899e03ba9b
Move pipeaudit to exploit/smb/client
2018-03-09 14:05:53 +05:30
Auxilus
e6a9f2609f
include mixin to psexec_ms17_010
2018-03-08 23:01:58 +05:30
William Vu
0e4fc48df4
Fix #9602 , a little defensive programming
...
Check for a nil message and unnecessary auth failures while looping.
2018-02-26 16:52:25 -06:00
Auxilus
3f93055a72
Add pipe_auditor
2018-02-24 11:14:03 +05:30
William Vu
3880f6a65e
Finally fix "Unknown admin user ''" after 2yrs
...
The failed password auth was necessary after all. I misread the PoC. :'(
Apparently the password auth sets the username, while the backdoored
keyboard-interactive auth sets the password.
2018-02-21 20:44:35 -06:00
Brent Cook
3d67d2ed12
Land #9443 , Add warning to FileDropper for deleting CWD
2018-02-19 21:22:39 -06:00
zerosum0x0
afef1948bf
catch exception for patched Vista
2018-02-01 21:39:25 -07:00
zerosum0x0
469209a2b3
prefer x64 dynamite
2018-01-31 17:19:09 -07:00
zerosum0x0
6d7b48382e
fix print arch key
2018-01-31 17:17:53 -07:00
zerosum0x0
ec26f01360
fix x64 typo
2018-01-31 17:12:07 -07:00
William Vu
da23432745
Update cleanup method to check CWD
2018-01-31 16:19:43 -06:00
William Vu
e60aeca2db
Pass in session to CWD check
...
Oops, used to this being accessible universally. Not the case here.
2018-01-31 16:19:43 -06:00
William Vu
199a7cc134
Check for subdirectories and relative paths
2018-01-31 16:19:43 -06:00
William Vu
09d931e392
Split assignment across two lines for clarity
...
https://github.com/bbatsov/ruby-style-guide#use-if-case-returns
2018-01-31 16:19:43 -06:00
William Vu
15ff70fbda
Add warning to FileDropper for deleting CWD
2018-01-31 16:19:43 -06:00
zerosum0x0
d5d3769517
more robust Windows XP SP0/SP1 fix
2018-01-30 18:11:07 -07:00
zerosum0x0
a9fa1b6a4d
catch TypeError for matched pairs Frag leak
2018-01-30 10:32:59 -07:00
zerosum0x0
bbeccdd024
more trace and more flexible tolerance for SP0/SP1
2018-01-29 19:57:43 -07:00
zerosum0x0
7007bc1444
hopefully fixed XP SP0/SP1 issues
2018-01-29 19:11:30 -07:00
zerosum0x0
cfb7aa6de7
NULL pointer checks on read/write primitives
2018-01-29 18:10:01 -07:00
zerosum0x0
b5a88e3c8b
remove VERBOSE req for prints in DBGTRACE
2018-01-29 15:01:37 -07:00
zerosum0x0
9b7c19db08
fix exception
2018-01-29 07:57:08 -07:00
zerosum0x0
a15befe94b
squelch ::Rex::Proto::SMB::Exceptions::NoReply
2018-01-29 07:48:00 -07:00
zerosum0x0
6d35d241de
fix pack error for xp
2018-01-29 07:45:07 -07:00
zerosum0x0
1a74c60339
fix output
2018-01-29 02:21:01 -07:00
zerosum0x0
0c23c5fcad
notes
2018-01-29 01:37:03 -07:00
zerosum0x0
24a79ae7b3
clean up DBGTRACE
2018-01-29 01:18:49 -07:00
zerosum0x0
a321a70349
clean up token for earlier versions of windows
2018-01-29 01:09:31 -07:00
zerosum0x0
4bc3b31550
properly scope cleanup
2018-01-29 00:49:38 -07:00
zerosum0x0
bfef87a445
fixed up indentations
2018-01-29 00:19:42 -07:00
zerosum0x0
42dbab763b
increased leak attempts
2018-01-28 23:27:19 -07:00
zerosum0x0
7b19951317
fix the danger zone
2018-01-28 22:32:00 -07:00