Commit Graph

63120 Commits

Author SHA1 Message Date
Grant Willcox a1bca89899
Land #16075, post/multi/manage/sudo: Abort if session type is Meterpreter 2022-01-20 11:05:40 -06:00
VanSnitza 899fbfcb85
Update modbusclient.rb 2022-01-20 17:36:02 +01:00
VanSnitza b3fb678055
Update modules/auxiliary/scanner/scada/modbusclient.rb
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2022-01-20 17:16:24 +01:00
Spencer McIntyre 579627f5c7 Update docs, note OS X support 2022-01-20 10:47:11 -05:00
VanSnitza 2f76c602f2
Update modbusclient.rb 2022-01-20 16:37:11 +01:00
Spencer McIntyre ba469a4b2c Add version detection to the Unifi exploit 2022-01-20 09:26:48 -05:00
Brendan Coles a31052afbd post/multi/manage/sudo: Abort if session type is Meterpreter 2022-01-20 12:44:29 +00:00
VanSnitza 0765b1ffb1
Update modules/auxiliary/scanner/scada/modbusclient.rb
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2022-01-20 11:42:06 +01:00
Metasploit d52f039fa6
automatic module_metadata_base.json update 2022-01-19 16:51:50 -06:00
Spencer McIntyre 3d80a46e67 Check the HTTP response from the trigger 2022-01-19 17:51:31 -05:00
Spencer McIntyre ef344d9d12 Add the Unifi Log4Shell RCE exploit 2022-01-19 17:51:31 -05:00
bwatters 4cf3ae352c
Land #16050, Log4Shell: vCenter RCE
Merge branch 'land-16050' into upstream-master
2022-01-19 16:30:33 -06:00
Grant Willcox bccee15c97
Land #15991, Unlock pcaprub 2022-01-19 16:03:44 -06:00
Jeffrey Martin 238113d93d
unlock pcaprub
Updated gem has been released with Ruby 3 support.
2022-01-19 15:35:02 -06:00
Grant Willcox a7bb8d0480
Land #16029, Fix OptPath options with empty strings 2022-01-19 13:08:34 -06:00
Metasploit 4067ced73d
automatic module_metadata_base.json update 2022-01-19 11:19:12 -06:00
Grant Willcox 8bb3e39fd7
Land #16036, Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution 2022-01-19 10:58:42 -06:00
Metasploit 92f7043e56
automatic module_metadata_base.json update 2022-01-19 10:45:25 -06:00
Grant Willcox 66cff164cf
Land #16063, local_admin_search_enum: Fix typo: @domain_controller 2022-01-19 10:24:59 -06:00
Brendan Coles ee2feb1207 Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution 2022-01-19 00:04:15 +00:00
namaenonaimumei 4bb292497f
Merge pull request #2 from h00die/landing-16054
cracker refactor around jtr
2022-01-19 07:43:04 +09:00
Metasploit 8943704319
automatic module_metadata_base.json update 2022-01-18 16:34:27 -06:00
bwatters bed80e1ee5
Land #15727, Add error handing to rdp_web_login.py to handle malformed NetNTLM messages
Merge branch 'land-15727' into upstream-master
2022-01-18 16:14:07 -06:00
Spencer McIntyre c446e83e67 Parse the NTLM Type 1 message 2022-01-18 16:43:10 -05:00
Grant Willcox 50eabd3de0 Add further input validation 2022-01-18 16:43:10 -05:00
Grant Willcox bbc789e91a Apply additional error handling and improve quality of error messages 2022-01-18 16:43:10 -05:00
Alex 9c83c7c2b7 Added error handling to catch malformed NTML hashes
As mentioned in #15720 with some NTML responses the code crashes, unable to enumerate the domain. To prevent this behavior a try and except block was added, to inform the user about the crash.
2022-01-18 16:43:10 -05:00
Metasploit 1931df766e
automatic module_metadata_base.json update 2022-01-18 14:07:21 -06:00
Grant Willcox 8852eaa6b8
Land #16049 - Reference Fixes 2022-01-18 13:46:25 -06:00
Brendan Coles c29e30c58e local_admin_search_enum: Fix typo: @domain_controller 2022-01-18 15:08:30 +00:00
h00die f6d3788d25 fix spec for cracker 2022-01-18 04:42:49 -05:00
Metasploit 7a49a91110
automatic module_metadata_base.json update 2022-01-18 01:16:39 -06:00
Tim W dd66b83f39
Land #16058, fix stack trace in local_exploit_suggester when session is invalid 2022-01-18 06:55:22 +00:00
h00die d01594a570 spec not working quite right 2022-01-17 17:40:35 -05:00
h00die 7a7b009161 add more smarts to nolog for jtr 2022-01-17 15:33:41 -05:00
Brendan Coles 2bb5edac9e local_exploit_suggester: Print session_host if session is valid 2022-01-16 03:24:41 +00:00
Jake Baines 4ebb702405
Added an exploit for Grandstream UCM62xx IP PBX (CVE-2020-5722) 2022-01-15 12:46:56 -08:00
Metasploit ad9517b81d
Bump version of framework to 6.1.26 2022-01-14 09:32:56 -06:00
Spencer McIntyre 96a5d656bd Final cleanups and reference updates 2022-01-14 08:41:37 -05:00
namaenonaimumei 85aab39dbd
Fix syntax error for --nolog 2022-01-14 07:14:47 +09:00
Spencer McIntyre 3f04b80d8b Add vCenter Log4Shell docs 2022-01-13 14:50:28 -05:00
Metasploit e4fa044cbf
automatic module_metadata_base.json update 2022-01-13 13:35:39 -06:00
space-r7 383ada6ae2
Land #16016, fix RHOSTS in dcerpc scanner 2022-01-13 13:15:24 -06:00
Pedro Ribeiro 053fbe2a28 fix cisco advisory links 2022-01-13 18:55:39 +00:00
Pedro Ribeiro ea00da0a03 fix NUUO advisory links 2022-01-13 18:54:56 +00:00
Pedro Ribeiro 09d6b1388c fix kaseya links 2022-01-13 18:47:11 +00:00
Pedro Ribeiro b08e22a153 fix nvrmini reset link 2022-01-13 18:43:41 +00:00
Spencer McIntyre d5c83b41f9 Cleanup the vCenter Log4Shell exploit 2022-01-13 11:57:00 -05:00
Spencer McIntyre 7b1398f0ae Allow overriding check module datastore options 2022-01-13 11:51:39 -05:00
Metasploit 3cb35e0590
automatic module_metadata_base.json update 2022-01-13 10:30:34 -06:00