Commit Graph

438 Commits

Author SHA1 Message Date
Jake Baines e7810acb1e Pulled offsets out of dll into module. Auto-find lsass.exe when pid is 0 2021-12-18 10:56:46 -08:00
Jake Baines deab4ce90e Initial commit of Dellicious port 2021-12-08 07:33:16 -08:00
Christophe De La Fuente 1befd545e3 Land #15558, add module to access a sessions filesystem in a browser 2021-10-25 18:37:42 +02:00
adfoster-r7 9f0804cbfb Fix Meterpreter spelling mistake 2021-10-12 23:40:43 +01:00
Jay Turla f5edbffb74 Update diagnostic_state.md 2021-10-04 07:30:45 +08:00
Jay Turla 3e3cbb5c4e Update diagnostic_state.md 2021-10-04 01:38:15 +08:00
Jay Turla 8bdbf99c80 Add Diagnostic State Module
## Introduction
This module will keep the vehicle in a diagnostic state on rounds by sending tester present packet.

## Verification Steps

Fire up virtual CAN bus:

1. `sudo modprobe can`
2. `sudo modprobe vcan`
3. `sudo ip link add dev vcan0 type vcan`
4. `sudo ip link set up vcan0`

Launch msf:

5. Start `msfconsole`
6. `use auxiliary/server/local_hwbridge`
7. `set uripath testbus`
8. `run`
9. `use auxiliary/client/hwbridge/connect`
10. `set targeturi testbus`

## Options

```
Module options (post/hardware/automotive/diagnostic_state):

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   ARBID    0x7DF            no        CAN ID to perform ECU Hard Reset
   CANBUS                    no        CAN Bus to perform scan on, defaults to connected bus
   ROUNDS   500              yes       Number of executed rounds
   SESSION                   yes       The session to run this module on.
```

## Scenarios
You can test this module doing a candump and you should receive a response for each can frame in a loop at 0x7E8 when running UDS Simulator.

```
msf5 auxiliary(client/hwbridge/connect) > run
[*] Running module against 127.0.0.1

[*] Attempting to connect to 127.0.0.1...
[*] Hardware bridge interface session 1 opened (127.0.0.1 -> 127.0.0.1) at 2019-09-11 04:59:40 -0700
[+] HWBridge session established
[*] HW Specialty: {"automotive"=>true}  Capabilities: {"can"=>true, "custom_methods"=>true}
[!] NOTICE:  You are about to leave the matrix.  All actions performed on this hardware bridge
[!]          could have real world consequences.  Use this module in a controlled testing
[!]          environment and with equipment you are authorized to perform testing on.
[*] Auxiliary module execution completed
msf5 auxiliary(client/hwbridge/connect) > sessions

Active sessions
===============

  Id  Name  Type                   Information  Connection
  --  ----  ----                   -----------  ----------
  1         hwbridge cmd/hardware  automotive   127.0.0.1 -> 127.0.0.1 (127.0.0.1)

msf5 auxiliary(client/hwbridge/connect) > sessions -i 1
[*] Starting interaction with 1...

hwbridge > run post/hardware/automotive/diagnostic_state canbus=vcan0

[*] Putting the vehicle in a diagnostic state...
[*] In order to keep the vehicle in this state, you need to continuously send a packet to let the vehicle know that a diagnostic technician is present.
hwbridge >
```

You can use candump to verify the CAN messages being sent:

```
─$ candump vcan0
└─$ candump vcan0
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E

-- snippet --
```

UDS Server Output
```
└─$ ./uds-server -v -V "PWN3D" vcan0
Using CAN interface vcan0
Fuzz level set to: 0
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E

-- snippet --
```
2021-10-04 01:35:31 +08:00
adfoster-r7 26e317d093 Land #15707, Add ECU Hard Reset for hwbridge 2021-09-28 19:18:46 +01:00
Kazuyoshi Maruta 32d45c07fe Add xchat.md 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta 09ed5b671e Add xchat.rb, Add kmeleon.md 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta 37cc6e540e Add modules, Rename a module 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta c1742a23b9 Update wording on Module documentation. Replace EXTRACT_CREDENTIALS_FROM_FILE with EXTRACT_DATA 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta 6a8782f388 Update module documentation. 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta cc50f75a09 Update line.md 2021-09-27 12:26:52 -05:00
KazuCyber 858c05b476 Update documentation/modules/post/windows/gather/credentials/aim.md
Co-authored-by: Brendan <bwatters@rapid7.com>
2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta dc6f6a8f25 Packrat: 29 post exploitation modules 2021-09-27 12:26:52 -05:00
Jay Turla 05703c1918 Update ecu_hard_reset.md 2021-09-27 19:19:46 +08:00
Jay Turla f60c492cf1 Add ECU Hard Reset for hwbridge 2021-09-27 18:58:39 +08:00
Tim W 30f1a0cd7b add documentation 2021-09-23 13:02:17 +01:00
Grant Willcox e94d3bf260 Fix minor documentation change 2021-09-03 12:55:51 -05:00
Grant Willcox e62f5e3011 Update documentation to reflect latest changes and update module to check files exist and bail if they don't, including when uploading a custom image 2021-09-03 12:55:45 -05:00
Grant Willcox 3334fce5e8 Fix up initial documentation concerns 2021-09-03 12:55:44 -05:00
Your Name 817904a916 Add Geutebruck Post Exploitation Module 2021-09-03 12:55:39 -05:00
Spencer McIntyre dba3db741a Land #15462, [CVE-2021-36934] HiveNightmare 2021-07-29 12:53:48 -04:00
Spencer McIntyre 36cc2fd7e5 Rename an option and update docs for HiveNightmare 2021-07-29 12:07:56 -04:00
Yann Castel fb99af1152 Add post module for HiveNightmare
correct CVE id

Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb

Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>

Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>

Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>

Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>

use of vars_get + delete payload after use

initial commit

Update hivenightmare_windows_sam_leak.rb

using railgun to read files + specific index option

Update hivenightmare_windows_sam_leak.rb

post module + add description + add documentation

Delete wp_plugin_modern_events_calendar_rce.rb

Delete wp_plugin_modern_events_calendar_rce.md

add scenario in doc

Update windows_sam_hivenightmare.md

Update windows_sam_hivenightmare.rb

Update modules/post/windows/gather/credentials/windows_sam_hivenightmare.rb

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>

minor changes

msftidy

Update modules/post/windows/gather/credentials/windows_sam_hivenightmare.rb

Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2021-07-29 11:54:31 -04:00
Christophe De La Fuente 8b4bce35ca Fix issues from rubocop and msftidy_docs.rb 2021-07-09 15:47:11 +02:00
Christophe De La Fuente 5a71e7b0ee Merge remote-tracking branch 'upstream/pr/15154' into HEAD 2021-07-09 15:32:04 +02:00
adfoster-r7 f26d0b676a Land #14984 - OSX Post exploitation .gitignore retrieval 2021-05-26 00:50:43 +01:00
bwatters 8266f2ffdc Land #15113, post gather module for saltstack salt #15113
Merge branch 'land-15113' into upstream-master
2021-05-17 15:33:20 -05:00
Ashley Donaldson 0836f77754 Added documentation for the memory dump module 2021-05-05 19:12:13 +10:00
Ashley Donaldson 14f9414e94 Added instructions to help understand how to use the extracted data 2021-05-03 13:22:19 +10:00
Ashley Donaldson f0a442b77d Retrieve configured kerberos ticket location before retrieving tickets
Rather than assume that file-configured kerberos tickets will be at /tmp/krb5_*, let's check the config file.
Also allows us to give more meaningful error messages and point people in the direction of where to look if it doesn't work.
2021-05-03 13:07:45 +10:00
h00die 2c76671436 add windows minion file 2021-05-02 10:01:06 -04:00
h00die 2c0c7791a0 more error handling, updated docs 2021-05-02 08:19:43 -04:00
Ashley Donaldson 86a7b7b915 Forked a long time ago, so let's get it closer to the main branch 2021-05-02 14:23:56 +10:00
h00die fde1696ae2 windows and osx updates 2021-04-30 20:59:54 -04:00
Spencer McIntyre 95e59f514c Land #15021, add KOFFEE exploit for CVE-2020-8539 2021-04-23 09:25:16 -04:00
Spencer McIntyre 50873d3d88 Fix some typos and markdown formatting 2021-04-23 09:24:38 -04:00
gianpyc 3c64475da9 Adding new actions on the module and updated documentation 2021-04-22 04:34:22 -04:00
Tim W deaa241ca5 Land #15065, fix post/linux/gather/checkvm 2021-04-20 17:02:45 +01:00
pingport80 43f4ec921d update docs and remove lscpu check 2021-04-20 21:12:27 +05:30
gianpyc c4956ce19b Updatied the module with the full set of actions 2021-04-16 04:54:29 -04:00
BuildTools f5f14b9bb7 cleaned up with msftidy 2021-04-13 12:57:14 -04:00
Grant Willcox 9e43a34599 Add in scenario to documentation for when database is connected and loot is being stored. 2021-04-12 13:52:41 -05:00
Grant Willcox 045367cff7 Apply RuboCop formatting to documentation and module 2021-04-12 13:52:00 -05:00
Grant Willcox 0b06904dd0 Update module with more checks and replace the Process migration strategy with a PID migration strategy. Also update documentation accordingly 2021-04-12 13:05:26 -05:00
gianpyc e9088cfc12 Run rubocop and msftidy_docs, both on the module and documentation 2021-04-12 04:13:03 -04:00
h00die 938b4741a9 saltstack doc update and tested 2021-04-10 13:46:19 -04:00
gianpyc 84babda37d Adding documentation for KOFFEE exploit 2021-04-09 10:45:35 -04:00