Grant Willcox
a1bca89899
Land #16075 , post/multi/manage/sudo: Abort if session type is Meterpreter
2022-01-20 11:05:40 -06:00
VanSnitza
899fbfcb85
Update modbusclient.rb
2022-01-20 17:36:02 +01:00
VanSnitza
b3fb678055
Update modules/auxiliary/scanner/scada/modbusclient.rb
...
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2022-01-20 17:16:24 +01:00
Spencer McIntyre
579627f5c7
Update docs, note OS X support
2022-01-20 10:47:11 -05:00
VanSnitza
2f76c602f2
Update modbusclient.rb
2022-01-20 16:37:11 +01:00
Spencer McIntyre
ba469a4b2c
Add version detection to the Unifi exploit
2022-01-20 09:26:48 -05:00
Brendan Coles
a31052afbd
post/multi/manage/sudo: Abort if session type is Meterpreter
2022-01-20 12:44:29 +00:00
VanSnitza
0765b1ffb1
Update modules/auxiliary/scanner/scada/modbusclient.rb
...
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2022-01-20 11:42:06 +01:00
Metasploit
d52f039fa6
automatic module_metadata_base.json update
2022-01-19 16:51:50 -06:00
Spencer McIntyre
3d80a46e67
Check the HTTP response from the trigger
2022-01-19 17:51:31 -05:00
Spencer McIntyre
ef344d9d12
Add the Unifi Log4Shell RCE exploit
2022-01-19 17:51:31 -05:00
bwatters
4cf3ae352c
Land #16050 , Log4Shell: vCenter RCE
...
Merge branch 'land-16050' into upstream-master
2022-01-19 16:30:33 -06:00
Grant Willcox
bccee15c97
Land #15991 , Unlock pcaprub
2022-01-19 16:03:44 -06:00
Jeffrey Martin
238113d93d
unlock pcaprub
...
Updated gem has been released with Ruby 3 support.
2022-01-19 15:35:02 -06:00
Grant Willcox
a7bb8d0480
Land #16029 , Fix OptPath options with empty strings
2022-01-19 13:08:34 -06:00
Metasploit
4067ced73d
automatic module_metadata_base.json update
2022-01-19 11:19:12 -06:00
Grant Willcox
8bb3e39fd7
Land #16036 , Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution
2022-01-19 10:58:42 -06:00
Metasploit
92f7043e56
automatic module_metadata_base.json update
2022-01-19 10:45:25 -06:00
Grant Willcox
66cff164cf
Land #16063 , local_admin_search_enum: Fix typo: @domain_controller
2022-01-19 10:24:59 -06:00
Brendan Coles
ee2feb1207
Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution
2022-01-19 00:04:15 +00:00
namaenonaimumei
4bb292497f
Merge pull request #2 from h00die/landing-16054
...
cracker refactor around jtr
2022-01-19 07:43:04 +09:00
Metasploit
8943704319
automatic module_metadata_base.json update
2022-01-18 16:34:27 -06:00
bwatters
bed80e1ee5
Land #15727 , Add error handing to rdp_web_login.py to handle malformed NetNTLM messages
...
Merge branch 'land-15727' into upstream-master
2022-01-18 16:14:07 -06:00
Spencer McIntyre
c446e83e67
Parse the NTLM Type 1 message
2022-01-18 16:43:10 -05:00
Grant Willcox
50eabd3de0
Add further input validation
2022-01-18 16:43:10 -05:00
Grant Willcox
bbc789e91a
Apply additional error handling and improve quality of error messages
2022-01-18 16:43:10 -05:00
Alex
9c83c7c2b7
Added error handling to catch malformed NTML hashes
...
As mentioned in #15720 with some NTML responses the code crashes, unable to enumerate the domain. To prevent this behavior a try and except block was added, to inform the user about the crash.
2022-01-18 16:43:10 -05:00
Metasploit
1931df766e
automatic module_metadata_base.json update
2022-01-18 14:07:21 -06:00
Grant Willcox
8852eaa6b8
Land #16049 - Reference Fixes
2022-01-18 13:46:25 -06:00
Brendan Coles
c29e30c58e
local_admin_search_enum: Fix typo: @domain_controller
2022-01-18 15:08:30 +00:00
h00die
f6d3788d25
fix spec for cracker
2022-01-18 04:42:49 -05:00
Metasploit
7a49a91110
automatic module_metadata_base.json update
2022-01-18 01:16:39 -06:00
Tim W
dd66b83f39
Land #16058 , fix stack trace in local_exploit_suggester when session is invalid
2022-01-18 06:55:22 +00:00
h00die
d01594a570
spec not working quite right
2022-01-17 17:40:35 -05:00
h00die
7a7b009161
add more smarts to nolog for jtr
2022-01-17 15:33:41 -05:00
Brendan Coles
2bb5edac9e
local_exploit_suggester: Print session_host if session is valid
2022-01-16 03:24:41 +00:00
Jake Baines
4ebb702405
Added an exploit for Grandstream UCM62xx IP PBX (CVE-2020-5722)
2022-01-15 12:46:56 -08:00
Metasploit
ad9517b81d
Bump version of framework to 6.1.26
2022-01-14 09:32:56 -06:00
Spencer McIntyre
96a5d656bd
Final cleanups and reference updates
2022-01-14 08:41:37 -05:00
namaenonaimumei
85aab39dbd
Fix syntax error for --nolog
2022-01-14 07:14:47 +09:00
Spencer McIntyre
3f04b80d8b
Add vCenter Log4Shell docs
2022-01-13 14:50:28 -05:00
Metasploit
e4fa044cbf
automatic module_metadata_base.json update
2022-01-13 13:35:39 -06:00
space-r7
383ada6ae2
Land #16016 , fix RHOSTS in dcerpc scanner
2022-01-13 13:15:24 -06:00
Pedro Ribeiro
053fbe2a28
fix cisco advisory links
2022-01-13 18:55:39 +00:00
Pedro Ribeiro
ea00da0a03
fix NUUO advisory links
2022-01-13 18:54:56 +00:00
Pedro Ribeiro
09d6b1388c
fix kaseya links
2022-01-13 18:47:11 +00:00
Pedro Ribeiro
b08e22a153
fix nvrmini reset link
2022-01-13 18:43:41 +00:00
Spencer McIntyre
d5c83b41f9
Cleanup the vCenter Log4Shell exploit
2022-01-13 11:57:00 -05:00
Spencer McIntyre
7b1398f0ae
Allow overriding check module datastore options
2022-01-13 11:51:39 -05:00
Metasploit
3cb35e0590
automatic module_metadata_base.json update
2022-01-13 10:30:34 -06:00