Commit Graph

50062 Commits

Author SHA1 Message Date
Brent Cook 9736e8252c Merge branch 'master' into land-11038- 2018-12-21 16:31:53 -06:00
Brent Cook 620c411d1f
Land #11160, Add CMDSTAGER::SSL datastore option 2018-12-21 15:33:19 -06:00
Metasploit 8f61fe457a
automatic module_metadata_base.json update 2018-12-21 13:16:16 -08:00
William Vu b4ff3b544f Add CMDSTAGER::SSL datastore option
It has come to my attention that since I added the HTTP(S) command
stagers, no one has used HTTPS. This is probably why.

The CmdStager options hash takes precedence over any datastore options.
2018-12-21 14:51:49 -06:00
Brent Cook 2e8e927a93
Land #11156, Add CmdStager to erlang_cookie_rce 2018-12-21 14:43:49 -06:00
William Vu 5cff330a38
Land #11128, Rex::Exploitation::CmdStagerFetch 2018-12-21 14:16:57 -06:00
William Vu d499c657ab Bump Gemfile.lock and LICENSE_GEMS 2018-12-21 14:16:25 -06:00
Jacob Robles 2e6f471f54
Land #11155, Fix typo 2018-12-21 08:15:51 -06:00
Jacob Robles 4bc871c499
Add CmdStager to erlang_cookie_rce 2018-12-21 07:33:37 -06:00
Garvit Dewan 3021a05553
Fix typo in report.rb 2018-12-21 17:51:46 +05:30
Green-m 06de47ce68
Enhance the command auto-complete in aux. 2018-12-21 18:03:57 +08:00
Metasploit 0471d69c16
automatic module_metadata_base.json update 2018-12-20 15:39:02 -08:00
Brent Cook b83c6ad496
Land #11149, fix a PTY leak in Python Meterpreter 2018-12-20 17:30:42 -06:00
Matthew Kienow 1280b0de20
Land #11150, make requirements check more verbose 2018-12-20 15:38:25 -05:00
Metasploit 1676f7306a
Weekly dependency update 2018-12-20 12:22:02 -08:00
asoto-r7 c2c8066f09
msfdb: Reverted back to unless and nil? 2018-12-20 13:28:47 -06:00
asoto-r7 30b914e4f0
msfdb: Added verbosity to 'missing requirements' error 2018-12-20 12:07:35 -06:00
Quentin Kaiser bf2de42077 Now supports all version of Consul. 2018-12-20 18:56:07 +01:00
Quentin Kaiser 0389262034 Merge branch 'consul_exec' of github.com:QKaiser/metasploit-framework into consul_exec 2018-12-20 18:41:56 +01:00
Quentin Kaiser 2919b970cd Implement execution checks with a timeout limit so we don't leave zombie checks running in background. 2018-12-20 18:41:35 +01:00
Quentin Kaiser d399562d7c Implement execution checks with a timeout limit so we don't leave zombie checks running in background. 2018-12-20 18:41:00 +01:00
Quentin Kaiser ba5c40db77 No need for CVE field. 2018-12-20 18:18:53 +01:00
Quentin Kaiser 594103e7c3 Update documentation to set up testing environment with Docker. 2018-12-20 13:52:06 +01:00
Metasploit 6204d0595e
automatic module_metadata_base.json update 2018-12-19 20:45:41 -08:00
William Vu 5af05ad976
Land #11143, nc -j fix for cups_root_file_read 2018-12-19 22:37:00 -06:00
Jeffrey Martin bf4bb0a5b9
bump metasploit-payloads gem
Update metasploit-payloads gem to 1.3.57 to pick up
fix for Python Meterpreter PTY Leak from rapid7/metasploit-payloads#319
2018-12-19 18:19:24 -06:00
Metasploit 0a7464e7d2
automatic module_metadata_base.json update 2018-12-19 11:19:52 -08:00
asoto-r7 d601837e03
Land #10401, java_jmx_server scanner for Java JMX MBean servers 2018-12-19 13:12:03 -06:00
asoto-r7 b52a4f91ac
java_jmx_scanner: Final draft of documentation 2018-12-19 13:10:21 -06:00
asoto-r7 50b7d93a18
java_jmx_scanner: Incorporate @bcoles suggestions 2018-12-19 12:56:53 -06:00
Metasploit 3232b60ede
automatic module_metadata_base.json update 2018-12-19 09:52:48 -08:00
Wei Chen f7eb3452be
Land #11083, set user agent in Windows reverse_http(s) stagers 2018-12-19 11:38:12 -06:00
Brent Cook 09f9b887b9 don't bother handholding the empty string 2018-12-19 10:52:51 -06:00
Metasploit a4af89bb75
automatic module_metadata_base.json update 2018-12-19 06:31:13 -08:00
Jacob Robles 6921b79890
Land #11089, Erlang cookie rce exploit module 2018-12-19 08:02:40 -06:00
Jacob Robles 5bfdc7009c
Minor Doc Changes 2018-12-19 07:58:32 -06:00
William Vu 1b8b3bbb95 Update nc -j check in cups_root_file_read 2018-12-18 17:38:33 -06:00
asoto-r7 51ce96a2b4
Merge branch 'jmx_scanner' of https://github.com/sgorbaty/metasploit-framework into sgorbaty-jmx_scanner 2018-12-18 16:05:03 -06:00
Milton-Valencia bb758f9a61 I didn't forget msftidy I swear 2018-12-18 14:55:12 -06:00
Milton-Valencia 8a2a605a99 added targets 2018-12-18 14:50:57 -06:00
Quentin Kaiser 2c0c9bf3c5 Merge branch 'consul_service_exec' of github.com:QKaiser/metasploit-framework into consul_service_exec 2018-12-18 19:42:38 +01:00
Quentin Kaiser ef8601aa71 Bail early if we receive an unexpected response. 2018-12-18 19:42:26 +01:00
Brendan Coles 552b13c91d
Randomized service length.
Co-Authored-By: QKaiser <QKaiser@users.noreply.github.com>
2018-12-18 19:38:04 +01:00
Quentin Kaiser 4ee7bdee6c Merge branch 'consul_service_exec' of github.com:QKaiser/metasploit-framework into consul_service_exec 2018-12-18 19:33:51 +01:00
Quentin Kaiser b3563b1bc2 Cleaner version of check function thanks to @bcoles. 2018-12-18 19:33:30 +01:00
Brendan Coles 5e134d7d8d
Update modules/exploits/multi/misc/consul_service_exec.rb
Co-Authored-By: QKaiser <QKaiser@users.noreply.github.com>
2018-12-18 19:27:19 +01:00
Brendan Coles 5192c081ee
Update modules/exploits/multi/misc/consul_service_exec.rb
Co-Authored-By: QKaiser <QKaiser@users.noreply.github.com>
2018-12-18 19:27:08 +01:00
Quentin Kaiser 6ad40deac3 print_status will never throw a JSON::ParseError exception. 2018-12-18 19:15:13 +01:00
Pedro Ribeiro 1e88ce9a3d
Edit the comments to -84 2018-12-18 16:33:44 +00:00
Pedro Ribeiro 05218654f4
adjust the offset to -84 2018-12-18 16:30:47 +00:00