Files
metasploit-gs/modules/exploits/linux
Matt Andreko b7b1ddf1e8 Sercomm Exploit module fixes
Added targets for 8 specific targets that I've tested: Cisco WAP4410N,
Honeywell WAP-PL2 IP Camera, Netgear DG834, Netgear DG834G, Netgear
DG834PN, Netgear DGN1000, Netgear DSG835, Netgear WPNT834
Added functionality to the CmdStagerEcho mix-in to support encoding via
octal instead of hex based on the :enc_type option. This is because many
devices would not output hex encoded values properly.
Added options on a per-target basis for the PackFormat (endian pack()
values for communication), UploadPath (because /tmp wasn't always
writable), and PayloadEncode (previously mentioned octal encoding
option)
Note for some reason, some devices communicate over one endianness, but
then require a payload for the other endianess. I'm not sure what's
causing this, but if those specific combinations are not used, the
exploit fails. More research may be required for this.
2014-01-13 16:58:32 -05:00
..
2013-10-15 13:51:57 -05:00
2013-10-15 13:51:57 -05:00
2014-01-07 13:01:10 -06:00
2013-10-15 13:51:57 -05:00
2013-11-05 13:51:45 -06:00
2013-10-15 13:51:57 -05:00
2014-01-13 16:58:32 -05:00
2013-10-15 13:51:57 -05:00
2013-10-15 13:51:57 -05:00
2013-10-15 13:51:57 -05:00
2013-10-15 13:51:57 -05:00
2013-10-15 13:51:57 -05:00
2013-11-18 11:27:32 -06:00
2013-10-15 14:07:48 -05:00
2013-10-15 13:51:57 -05:00
2013-10-15 14:14:15 -05:00