wchen-r7
18347a8de7
Land #7774 , Fix pivoting of UDP sockets in scanners
2017-01-10 13:57:28 -06:00
Pedro Ribeiro
c0880985bc
fix duplicate entry for platform
2017-01-10 01:17:44 +00:00
wchen-r7
8194603725
Add CVE-2016-6435 - Cisco Firepower Management Console Dir Traversal
2017-01-09 14:39:37 -06:00
wchen-r7
74cea5dd04
Use Linux payloads instead of cmd/unix/interact
...
As of now, cmd/unix/interact causes msfconsole to freeze, so
we can't use this.
2017-01-09 11:11:17 -06:00
wizard32
467a476598
Update websphere_java_deserialize.rb
2017-01-08 13:33:01 +02:00
Gabor Seljan
9162374ae3
Add automatic targeting
2017-01-08 11:23:18 +01:00
juushya
93168648b4
Minor update in description
2017-01-08 13:28:07 +05:30
Gabor Seljan
d2472712f3
Add module for DiskBoss Enterprise (EDB-40869)
2017-01-07 19:44:38 +01:00
Brent Cook
cdcf4cce7d
improve zip module windows script fallback
...
- handle non-English locales
- wait more reliably, handle network paths where FS info gets stale
- use absolute paths correctly
2017-01-07 12:27:03 -06:00
Craig Smith
5f07bca775
Hardware Bridge API. Initial bridge API that supports the HW rest protocol specified here:
...
http://opengarages.org/hwbridge Supports an automotive extension with UDS calls for mdoule
development.
2017-01-06 19:51:41 -08:00
wchen-r7
e331066d6d
Add CVE-2016-6433 Cisco Firepower Management Console UserAdd Exploit
2017-01-06 17:05:25 -06:00
juushya
4133a6fa97
Minor cleanup, msftidy check
2017-01-07 03:57:46 +05:30
dmohanty-r7
5cba9b0034
Land #7747 , Add LoginScanner module for BAVision IP cameras
2017-01-06 16:25:44 -06:00
wizard32
829f7da7e0
Update websphere_java_deserialize.rb
2017-01-06 18:39:04 +02:00
Pedro Ribeiro
13bca2ebc7
add httpusername and password for auto auth
2017-01-06 16:33:51 +00:00
wizard32
538a1bf21d
'WfsDelay' Option added
...
20sec added on 'WfsDelay' Option for first time exploit run due to the delay of powershell to load all the available modules.
2017-01-06 18:11:48 +02:00
juushya
ba8394ecc1
Minor updates
2017-01-06 15:34:17 +05:30
juushya
39423a70a7
Add Meteocontrol Weblog Extract Admin password module
2017-01-06 15:20:41 +05:30
wizard32
c55e2e58f0
'raw_headers' Updated
2017-01-05 15:19:17 +02:00
wizard32
1d82ee0470
'raw_headers' field Updated
2017-01-05 15:17:17 +02:00
wizard32
c29a9ac00f
Show Info updated
2017-01-05 14:18:38 +02:00
wizard32
1a38caa230
Encode - Decode code Updated
2017-01-05 13:07:34 +02:00
wizard32
9f4be89391
Update websphere_java_deserialize.rb
...
Update information "Options" field
2017-01-05 12:38:54 +02:00
Pedro Ribeiro
6004caa475
fix whitespace
2017-01-05 01:58:16 +00:00
juushya
c5acda0a22
Fixed the file permissions
2017-01-05 04:40:41 +05:30
William Vu
19319f15d4
Land #7626 , Eir D1000 modem exploit
2017-01-04 17:02:39 -06:00
Pedro Ribeiro
d95a3ff2ac
made changes suggested
2017-01-04 23:02:10 +00:00
juushya
c15b77c31b
Add Cambium ePMP 1000 Login Scanner module
2017-01-05 04:19:32 +05:30
William Vu
b0e79076fe
Switch to wget CmdStager and tune timing
...
We don't want to trample the device with requests.
2017-01-04 16:42:53 -06:00
wizard32
82e49fb27e
Update websphere_java_deserialize.rb
2017-01-04 10:23:48 +02:00
William Vu
94d76cfb06
Merge remote-tracking branch 'upstream/master' into tr-069-ntpserver-command-injection
2017-01-03 17:04:04 -06:00
Brent Cook
7585999e18
Land #7782 , Update themoon exploit to use wget command stager
2017-01-03 16:30:12 -06:00
wchen-r7
ed74b239e3
Land #7768 , PHPMailer Sendmail Argument Injection exploit
2017-01-03 16:04:05 -06:00
wchen-r7
3155af679a
Fix a typo
2017-01-03 16:03:45 -06:00
Adam Cammack
fe0a3c8669
Update themoon exploit to use wget command stager
2017-01-03 15:50:57 -06:00
wizard32
b06c5bac2f
Invalid CVE format and Spaces at EOL fixed
2017-01-03 21:45:22 +02:00
wizard32
0722944b47
Invalid CVE format fixed
2017-01-03 21:38:32 +02:00
wizard32
8534fde50f
Websphere Java Deserialization (RCE)
...
This module exploits a vulnerability in IBM's WebSphere Application Server. An unsafe deserialization call of unauthenticated Java objects exists to the Apache Commons Collections (ACC) library, which allows remote arbitrary code execution. Authentication is not required in order to exploit this vulnerability.
2017-01-03 16:04:51 +02:00
Pedro Ribeiro
9d3e90e8e5
cleanup
2017-01-02 17:32:38 +00:00
Brent Cook
04a026e786
remove lies from module, this is a bound socket
2017-01-02 09:47:18 -06:00
Pedro Ribeiro
4c29d23c8a
further cleaning
2016-12-31 17:02:34 +00:00
Pedro Ribeiro
956602cbfe
add final wnr2000 sploits
2016-12-31 16:49:05 +00:00
j91321
6c9e43f2ad
Add fingerprinting of devices, change documentation
2016-12-30 23:52:29 +01:00
Brent Cook
fdca963b61
check if the socket exists before closing
2016-12-30 14:59:31 -06:00
Spencer McIntyre
cd90fd3b1c
Fix PHPMailer targets since 5.2.20 is not affected
2016-12-30 15:31:15 -05:00
Spencer McIntyre
1eab4b3a7d
Add an optional explicit triggeruri for phpmailer
2016-12-30 14:24:07 -05:00
Spencer McIntyre
64037b0d6e
Use a proper target instead of VERSION
2016-12-29 17:37:16 -05:00
Brent Cook
fae4751771
Land #7744 , update kiwi extension to Mimikatz 2.1
2016-12-29 16:22:45 -06:00
Spencer McIntyre
c9dd7a50b6
Add the PHPMailer Argument Injection exploit
2016-12-29 17:17:06 -05:00
William Vu
9d0ada9b83
Land #7749 , make drb_remote_codeexec great again
2016-12-28 06:11:48 -06:00