Commit Graph

449 Commits

Author SHA1 Message Date
adfoster-r7 d225d4663c Land #16413, update local exploit suggester 2022-05-25 13:24:11 +01:00
sjanusz 6b1faf0e0e Add 'run' commands to Local Exploit Suggester docs 2022-05-25 12:05:06 +01:00
sjanusz 7734161ffc Update Local Exploit Suggester documentation 2022-05-24 14:48:40 +01:00
bwatters 1fe04caadd Land #16406, Create get_bookmarks.rb
Merge branch 'land-16406' into upstream-master
2022-05-13 13:42:31 -05:00
Jack Heysel 7be74eca8b Updated spacing 2022-04-21 11:52:27 -07:00
Jack Heysel f011e923e2 Fixed docs 2022-04-21 11:45:26 -07:00
Jack Heysel d8542ad2b5 Changed vprint to print update docs 2022-04-21 11:35:33 -07:00
Jack Heysel 5411b6b909 Added docs 2022-04-21 09:24:13 -07:00
jerrelgordon 9b03e74484 Documentation for get_bookmarks module 2022-04-05 22:49:12 -04:00
RadioLogic e8d18a65dd Updated module documentation using msftidy 2022-03-29 08:36:36 -04:00
RadioLogic d3d9acf1e4 Added documentation for module in docs folder 2022-03-27 16:02:34 -04:00
Jake Baines e7810acb1e Pulled offsets out of dll into module. Auto-find lsass.exe when pid is 0 2021-12-18 10:56:46 -08:00
Jake Baines deab4ce90e Initial commit of Dellicious port 2021-12-08 07:33:16 -08:00
Christophe De La Fuente 1befd545e3 Land #15558, add module to access a sessions filesystem in a browser 2021-10-25 18:37:42 +02:00
adfoster-r7 9f0804cbfb Fix Meterpreter spelling mistake 2021-10-12 23:40:43 +01:00
Jay Turla f5edbffb74 Update diagnostic_state.md 2021-10-04 07:30:45 +08:00
Jay Turla 3e3cbb5c4e Update diagnostic_state.md 2021-10-04 01:38:15 +08:00
Jay Turla 8bdbf99c80 Add Diagnostic State Module
## Introduction
This module will keep the vehicle in a diagnostic state on rounds by sending tester present packet.

## Verification Steps

Fire up virtual CAN bus:

1. `sudo modprobe can`
2. `sudo modprobe vcan`
3. `sudo ip link add dev vcan0 type vcan`
4. `sudo ip link set up vcan0`

Launch msf:

5. Start `msfconsole`
6. `use auxiliary/server/local_hwbridge`
7. `set uripath testbus`
8. `run`
9. `use auxiliary/client/hwbridge/connect`
10. `set targeturi testbus`

## Options

```
Module options (post/hardware/automotive/diagnostic_state):

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   ARBID    0x7DF            no        CAN ID to perform ECU Hard Reset
   CANBUS                    no        CAN Bus to perform scan on, defaults to connected bus
   ROUNDS   500              yes       Number of executed rounds
   SESSION                   yes       The session to run this module on.
```

## Scenarios
You can test this module doing a candump and you should receive a response for each can frame in a loop at 0x7E8 when running UDS Simulator.

```
msf5 auxiliary(client/hwbridge/connect) > run
[*] Running module against 127.0.0.1

[*] Attempting to connect to 127.0.0.1...
[*] Hardware bridge interface session 1 opened (127.0.0.1 -> 127.0.0.1) at 2019-09-11 04:59:40 -0700
[+] HWBridge session established
[*] HW Specialty: {"automotive"=>true}  Capabilities: {"can"=>true, "custom_methods"=>true}
[!] NOTICE:  You are about to leave the matrix.  All actions performed on this hardware bridge
[!]          could have real world consequences.  Use this module in a controlled testing
[!]          environment and with equipment you are authorized to perform testing on.
[*] Auxiliary module execution completed
msf5 auxiliary(client/hwbridge/connect) > sessions

Active sessions
===============

  Id  Name  Type                   Information  Connection
  --  ----  ----                   -----------  ----------
  1         hwbridge cmd/hardware  automotive   127.0.0.1 -> 127.0.0.1 (127.0.0.1)

msf5 auxiliary(client/hwbridge/connect) > sessions -i 1
[*] Starting interaction with 1...

hwbridge > run post/hardware/automotive/diagnostic_state canbus=vcan0

[*] Putting the vehicle in a diagnostic state...
[*] In order to keep the vehicle in this state, you need to continuously send a packet to let the vehicle know that a diagnostic technician is present.
hwbridge >
```

You can use candump to verify the CAN messages being sent:

```
─$ candump vcan0
└─$ candump vcan0
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E

-- snippet --
```

UDS Server Output
```
└─$ ./uds-server -v -V "PWN3D" vcan0
Using CAN interface vcan0
Fuzz level set to: 0
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E

-- snippet --
```
2021-10-04 01:35:31 +08:00
adfoster-r7 26e317d093 Land #15707, Add ECU Hard Reset for hwbridge 2021-09-28 19:18:46 +01:00
Kazuyoshi Maruta 32d45c07fe Add xchat.md 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta 09ed5b671e Add xchat.rb, Add kmeleon.md 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta 37cc6e540e Add modules, Rename a module 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta c1742a23b9 Update wording on Module documentation. Replace EXTRACT_CREDENTIALS_FROM_FILE with EXTRACT_DATA 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta 6a8782f388 Update module documentation. 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta cc50f75a09 Update line.md 2021-09-27 12:26:52 -05:00
KazuCyber 858c05b476 Update documentation/modules/post/windows/gather/credentials/aim.md
Co-authored-by: Brendan <bwatters@rapid7.com>
2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta dc6f6a8f25 Packrat: 29 post exploitation modules 2021-09-27 12:26:52 -05:00
Jay Turla 05703c1918 Update ecu_hard_reset.md 2021-09-27 19:19:46 +08:00
Jay Turla f60c492cf1 Add ECU Hard Reset for hwbridge 2021-09-27 18:58:39 +08:00
Tim W 30f1a0cd7b add documentation 2021-09-23 13:02:17 +01:00
Grant Willcox e94d3bf260 Fix minor documentation change 2021-09-03 12:55:51 -05:00
Grant Willcox e62f5e3011 Update documentation to reflect latest changes and update module to check files exist and bail if they don't, including when uploading a custom image 2021-09-03 12:55:45 -05:00
Grant Willcox 3334fce5e8 Fix up initial documentation concerns 2021-09-03 12:55:44 -05:00
Your Name 817904a916 Add Geutebruck Post Exploitation Module 2021-09-03 12:55:39 -05:00
Spencer McIntyre dba3db741a Land #15462, [CVE-2021-36934] HiveNightmare 2021-07-29 12:53:48 -04:00
Spencer McIntyre 36cc2fd7e5 Rename an option and update docs for HiveNightmare 2021-07-29 12:07:56 -04:00
Yann Castel fb99af1152 Add post module for HiveNightmare
correct CVE id

Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb

Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>

Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>

Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>

Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>

use of vars_get + delete payload after use

initial commit

Update hivenightmare_windows_sam_leak.rb

using railgun to read files + specific index option

Update hivenightmare_windows_sam_leak.rb

post module + add description + add documentation

Delete wp_plugin_modern_events_calendar_rce.rb

Delete wp_plugin_modern_events_calendar_rce.md

add scenario in doc

Update windows_sam_hivenightmare.md

Update windows_sam_hivenightmare.rb

Update modules/post/windows/gather/credentials/windows_sam_hivenightmare.rb

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>

minor changes

msftidy

Update modules/post/windows/gather/credentials/windows_sam_hivenightmare.rb

Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2021-07-29 11:54:31 -04:00
Christophe De La Fuente 8b4bce35ca Fix issues from rubocop and msftidy_docs.rb 2021-07-09 15:47:11 +02:00
Christophe De La Fuente 5a71e7b0ee Merge remote-tracking branch 'upstream/pr/15154' into HEAD 2021-07-09 15:32:04 +02:00
adfoster-r7 f26d0b676a Land #14984 - OSX Post exploitation .gitignore retrieval 2021-05-26 00:50:43 +01:00
bwatters 8266f2ffdc Land #15113, post gather module for saltstack salt #15113
Merge branch 'land-15113' into upstream-master
2021-05-17 15:33:20 -05:00
Ashley Donaldson 0836f77754 Added documentation for the memory dump module 2021-05-05 19:12:13 +10:00
Ashley Donaldson 14f9414e94 Added instructions to help understand how to use the extracted data 2021-05-03 13:22:19 +10:00
Ashley Donaldson f0a442b77d Retrieve configured kerberos ticket location before retrieving tickets
Rather than assume that file-configured kerberos tickets will be at /tmp/krb5_*, let's check the config file.
Also allows us to give more meaningful error messages and point people in the direction of where to look if it doesn't work.
2021-05-03 13:07:45 +10:00
h00die 2c76671436 add windows minion file 2021-05-02 10:01:06 -04:00
h00die 2c0c7791a0 more error handling, updated docs 2021-05-02 08:19:43 -04:00
Ashley Donaldson 86a7b7b915 Forked a long time ago, so let's get it closer to the main branch 2021-05-02 14:23:56 +10:00
h00die fde1696ae2 windows and osx updates 2021-04-30 20:59:54 -04:00
Spencer McIntyre 95e59f514c Land #15021, add KOFFEE exploit for CVE-2020-8539 2021-04-23 09:25:16 -04:00
Spencer McIntyre 50873d3d88 Fix some typos and markdown formatting 2021-04-23 09:24:38 -04:00