Brent Cook
0d0356ccdd
Land #11126 , Update sessions through the DBManager
2018-12-26 13:15:43 -06:00
Metasploit
10be720843
automatic module_metadata_base.json update
2018-12-25 19:45:11 -08:00
Green-m
69e7956adf
Land #11174 , Fix platform bug when upgrade shell.
...
The platform on windows powershell should be 'win', rather than
'windows', this bug leads to failure when upgrade powershell session
to meterpreter.
2018-12-26 11:31:39 +08:00
L
ee7120d63a
fixed post/multi/manage/shell_to_meterpreter
2018-12-25 15:00:39 +08:00
Metasploit
a457973702
automatic module_metadata_base.json update
2018-12-21 15:14:24 -08:00
Brent Cook
b9742802aa
Land #11137 , Clean up linux/local/vmware_alsa_config exploit module
2018-12-21 17:04:11 -06:00
Brent Cook
af60cb642e
Land #11038 , add REG_MULTI_SZ support for Meterpreter registry reads
2018-12-21 17:00:16 -06:00
Brent Cook
69d882eb54
bump payloads with REG_MULTI_SZ support
2018-12-21 16:53:51 -06:00
Brent Cook
9736e8252c
Merge branch 'master' into land-11038-
2018-12-21 16:31:53 -06:00
Brent Cook
620c411d1f
Land #11160 , Add CMDSTAGER::SSL datastore option
2018-12-21 15:33:19 -06:00
Metasploit
8f61fe457a
automatic module_metadata_base.json update
2018-12-21 13:16:16 -08:00
William Vu
b4ff3b544f
Add CMDSTAGER::SSL datastore option
...
It has come to my attention that since I added the HTTP(S) command
stagers, no one has used HTTPS. This is probably why.
The CmdStager options hash takes precedence over any datastore options.
2018-12-21 14:51:49 -06:00
Brent Cook
2e8e927a93
Land #11156 , Add CmdStager to erlang_cookie_rce
2018-12-21 14:43:49 -06:00
William Vu
5cff330a38
Land #11128 , Rex::Exploitation::CmdStagerFetch
2018-12-21 14:16:57 -06:00
William Vu
d499c657ab
Bump Gemfile.lock and LICENSE_GEMS
2018-12-21 14:16:25 -06:00
Jacob Robles
2e6f471f54
Land #11155 , Fix typo
2018-12-21 08:15:51 -06:00
Jacob Robles
4bc871c499
Add CmdStager to erlang_cookie_rce
2018-12-21 07:33:37 -06:00
Garvit Dewan
3021a05553
Fix typo in report.rb
2018-12-21 17:51:46 +05:30
Metasploit
0471d69c16
automatic module_metadata_base.json update
2018-12-20 15:39:02 -08:00
Brent Cook
b83c6ad496
Land #11149 , fix a PTY leak in Python Meterpreter
2018-12-20 17:30:42 -06:00
Matthew Kienow
1280b0de20
Land #11150 , make requirements check more verbose
2018-12-20 15:38:25 -05:00
Metasploit
1676f7306a
Weekly dependency update
2018-12-20 12:22:02 -08:00
asoto-r7
c2c8066f09
msfdb: Reverted back to unless and nil?
2018-12-20 13:28:47 -06:00
asoto-r7
30b914e4f0
msfdb: Added verbosity to 'missing requirements' error
2018-12-20 12:07:35 -06:00
Metasploit
6204d0595e
automatic module_metadata_base.json update
2018-12-19 20:45:41 -08:00
William Vu
5af05ad976
Land #11143 , nc -j fix for cups_root_file_read
2018-12-19 22:37:00 -06:00
Jeffrey Martin
bf4bb0a5b9
bump metasploit-payloads gem
...
Update metasploit-payloads gem to 1.3.57 to pick up
fix for Python Meterpreter PTY Leak from rapid7/metasploit-payloads#319
2018-12-19 18:19:24 -06:00
Metasploit
0a7464e7d2
automatic module_metadata_base.json update
2018-12-19 11:19:52 -08:00
asoto-r7
d601837e03
Land #10401 , java_jmx_server scanner for Java JMX MBean servers
2018-12-19 13:12:03 -06:00
asoto-r7
b52a4f91ac
java_jmx_scanner: Final draft of documentation
2018-12-19 13:10:21 -06:00
asoto-r7
50b7d93a18
java_jmx_scanner: Incorporate @bcoles suggestions
2018-12-19 12:56:53 -06:00
Metasploit
3232b60ede
automatic module_metadata_base.json update
2018-12-19 09:52:48 -08:00
Wei Chen
f7eb3452be
Land #11083 , set user agent in Windows reverse_http(s) stagers
2018-12-19 11:38:12 -06:00
Brent Cook
09f9b887b9
don't bother handholding the empty string
2018-12-19 10:52:51 -06:00
Metasploit
a4af89bb75
automatic module_metadata_base.json update
2018-12-19 06:31:13 -08:00
Jacob Robles
6921b79890
Land #11089 , Erlang cookie rce exploit module
2018-12-19 08:02:40 -06:00
Jacob Robles
5bfdc7009c
Minor Doc Changes
2018-12-19 07:58:32 -06:00
William Vu
1b8b3bbb95
Update nc -j check in cups_root_file_read
2018-12-18 17:38:33 -06:00
asoto-r7
51ce96a2b4
Merge branch 'jmx_scanner' of https://github.com/sgorbaty/metasploit-framework into sgorbaty-jmx_scanner
2018-12-18 16:05:03 -06:00
Milton-Valencia
bb758f9a61
I didn't forget msftidy I swear
2018-12-18 14:55:12 -06:00
Milton-Valencia
8a2a605a99
added targets
2018-12-18 14:50:57 -06:00
Wei Chen
847e3232ab
Land #11102 , remove old metasm remnants
2018-12-18 08:53:53 -06:00
Metasploit
483a3618ae
automatic module_metadata_base.json update
2018-12-17 19:32:00 -08:00
Brent Cook
fc2d217c0a
Land #11135 , strip comments from source code before uploading it to the target
2018-12-17 21:23:29 -06:00
Brent Cook
333d44186b
Land #11138 , add reverse_tcp mixin for vax payload
2018-12-17 21:17:40 -06:00
Metasploit
595ebf5dc7
automatic module_metadata_base.json update
2018-12-17 12:23:47 -08:00
bwatters
bf13693d37
Land #11101 , temp fix for x64/xor stage encoder
...
Merge branch 'land-11101' into upstream-master
2018-12-17 14:14:55 -06:00
LouDnl
2a69fffa6b
fix for ReverseTcp error
...
Update vax shell_reverse_tcp.rb to fix ReverseTcp NameError
Error:
/opt/metasploit-framework/embedded/framework/modules/payloads/singles/bsd/vax/shell_reverse_tcp.rb:24:in `initialize': uninitialized constant Msf::Handler::ReverseTcp (NameError)
After adding this line the error dissapeared for me and I was able to run msfconsole again.
2018-12-17 19:28:07 +01:00
Metasploit
1b581b0c1f
automatic module_metadata_base.json update
2018-12-17 08:11:04 -08:00
Shelby Pace
2fc501d260
Land #11112 , Fix bpf_priv_esc exploit module
2018-12-17 10:00:50 -06:00