Metasploit
fde4d4ae22
Bump version of framework to 6.2.8
2022-07-14 12:09:54 -05:00
Jeffrey Martin
c675c104d3
LAnd #16771 , Fix msfconsole crashing with openssl3
2022-07-14 11:06:48 -05:00
adfoster-r7
1103f525a6
Stop msfconsole crashing with openssl3
2022-07-14 12:05:01 +01:00
adfoster-r7
44e4714b9b
Land #16764 , Rex::Proto::Http: Add evasion options to shuffle GET / POST parameters
2022-07-11 14:17:07 +01:00
bcoles
39f288bfe3
Rex::Proto::Http: Add evasion options to shuffle GET / POST parameters
2022-07-11 01:37:41 +10:00
Spencer McIntyre
728cf97f6e
Land #16718 , Fix run_as module on x64 systems
2022-07-08 09:22:22 -04:00
Metasploit
887db0b76e
Bump version of framework to 6.2.7
2022-07-07 12:04:37 -05:00
adfoster-r7
5b8680ee91
Land #16567 from h00die/juniper_enhancements
...
Juniper config processor enhancements
2022-07-05 12:06:34 +01:00
Jack Heysel
3a4276ad33
Land #16716 Expose URIPATH option for HTTP stagers
...
This fix exposes the CMDSTAGER::URIPATH option
for HTTP stagers
2022-07-04 21:11:01 -04:00
Spencer McIntyre
2f1949d021
Land #16731 , Use proper permissions when opening a process
2022-07-01 13:40:48 -04:00
Christophe De La Fuente
b40dd95d4f
Land #16723 , Add FreeSwitch Login auxiliary module
2022-07-01 16:57:34 +02:00
space-r7
ecb09864d3
make sure generic permission is actually set
2022-06-30 13:27:51 -05:00
Metasploit
a172fa0da0
Bump version of framework to 6.2.6
2022-06-30 12:05:30 -05:00
krastanoel
4f64d098dc
Apply suggestions from code review
...
Use include instead of regex and rescue stream closed error
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com >
2022-06-30 14:04:39 +07:00
Christophe De La Fuente
0e3fdd0799
Fix from code review
2022-06-29 19:18:47 +02:00
krastanoel
da63fbbad4
Add FreeSwitch Login auxiliary module
2022-06-28 20:13:24 +07:00
bcoles
66009ca5e5
Exploit::CmdStager: Expose CMDSTAGER::URIPATH option for HTTP stagers
2022-06-25 23:49:47 +10:00
Metasploit
911092007c
Bump version of framework to 6.2.5
2022-06-23 14:56:43 -05:00
Spencer McIntyre
fb3d349969
Land #16676 , Add 6th getsystem technique
2022-06-23 15:14:52 -04:00
space-r7
7983f878a8
Land #16597 , psh cmd adapter fix for encrypt shell
2022-06-21 09:47:05 -05:00
Grant Willcox
b10386ba08
Land #16650 , Add #read_from_file for MSSQL and PostgreSQL, fix the MySQL implementation
2022-06-17 14:58:22 -05:00
Redouane NIBOUCHA
d47d1bc259
Remove newlines from base64 output on MySQL also
2022-06-17 00:51:52 +02:00
Metasploit
3f433b0c24
Bump version of framework to 6.2.4
2022-06-16 12:09:14 -05:00
Grant Willcox
be45688dbc
Land #16602 , Fix error when service is already running and update exception documentation in lib/msf/core/post/windows/services.rb
2022-06-16 10:59:35 -05:00
Grant Willcox
c94f22cebe
Add in fixes from discussion and also update documentation to correctly note what functions can raise
2022-06-15 19:28:31 -05:00
Christophe De La Fuente
f804a58970
Add getsystem technique 6 Named Pipe Impersonation (Efs variant - AKA EfsPotato)
2022-06-14 15:31:15 +02:00
Metasploit
f2e1dca061
Bump version of framework to 6.2.3
2022-06-09 12:03:55 -05:00
kalidor
b292586fb3
Avoid exception 'TypeError exception class/object expected'
2022-06-09 11:58:01 +02:00
Grant Willcox
63822f6e37
Land #16651 , [SQLi library] Ensure the encoder is always used in the #test_vulnerable methods
2022-06-08 17:15:22 -05:00
Redouane NIBOUCHA
88036a7f1f
Check for nil before using the decoder in test_vulnerable
2022-06-08 22:00:03 +02:00
Jack Heysel
67ea2bc23c
Land #16630 Fix duplicate ntlm hash storage
...
Net-NTLM (v1 and v2) hashes were being duplicated when
stored in the database due to the unique data in the challenge
dispite being the same. This fixes that issue
2022-06-08 14:07:34 -04:00
jheysel-r7
1a7cbe5b4f
Update lib/msf/core/exploit/remote/smb/server/hash_capture.rb
2022-06-08 13:45:57 -04:00
Grant Willcox
a983bbd8ba
Land #16615 , Solicited multicast-address creation bugfix
2022-06-07 14:41:52 -05:00
jheysel-r7
2b99967d0c
Merge branch 'master' into fix/duplicate-netntlm
2022-06-07 11:42:51 -04:00
Redouane NIBOUCHA
5331c343a0
Use the encoder in all the #test_vulnerable methods from the common class
2022-06-06 23:13:26 +02:00
Redouane NIBOUCHA
6d9c789f4d
Add method #read_from_file for MSSQL and PostgreSQL, and update the MySQL #read_from_file method
2022-06-06 23:07:25 +02:00
adfoster-r7
6e9765992c
Fix smb named pipe pivot crash
2022-06-06 13:00:42 +01:00
Metasploit
e79161c236
Bump version of framework to 6.2.2
2022-06-02 12:05:08 -05:00
Jack Heysel
8ccc1ebf91
Land PR #16628 , Log ntlm_session hashes
...
This PR fixes the logging and storing of
NTLM session hashes
2022-06-02 11:20:37 -04:00
Grant Willcox
44a22ab720
Land #16640 , Patch LDAP for sychronous reads
2022-06-01 16:12:09 -05:00
space-r7
6d3ccab1be
Land #16435 , add Microsoft SQL Server sqli support
2022-06-01 10:27:48 -05:00
Christophe De La Fuente
dac355d9cf
Land #16492 , nfs_mount more intelligent mountability
2022-05-31 11:56:19 +02:00
h00die
b8cebe0dbe
nfs mount more intelligent
2022-05-30 09:47:00 -04:00
h00die
264085b63c
juniper lib updates
2022-05-29 15:55:18 -04:00
Spencer McIntyre
adcf45b0ff
Fix the arch in #handle_connection too
...
This fixes an issue with the adated peinject stage which supported both
x86 and x64 via a library that checked its own #arch.
2022-05-27 16:42:14 -04:00
Spencer McIntyre
a47b3fe694
Don't report duplicate Net-NTLM hashes
2022-05-27 14:13:06 -04:00
Spencer McIntyre
0c481ed9c9
Patch LDAP for synchronous reads
2022-05-27 10:57:28 -04:00
Spencer McIntyre
1e5f86703f
Report the correct JtR type
2022-05-27 10:16:02 -04:00
Spencer McIntyre
862c6a94a2
Log ntlm_session hashes too
...
Despite being called ntlm_session, these hashes are capable of being
cracked as the John 'netntlm' format. Additionally the format is
reported as NTLMv1-SSP in similar tools.
2022-05-27 10:07:39 -04:00
Metasploit
a1613d6070
Bump version of framework to 6.2.1
2022-05-26 12:04:57 -05:00