forked from rapid7/metasploit-framework
-
Notifications
You must be signed in to change notification settings - Fork 9
Add module docs, credit #1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ghost
pushed a commit
that referenced
this pull request
Sep 24, 2016
…pt-fix Fixed interactive password prompt issue
jennamagius
pushed a commit
that referenced
this pull request
Nov 16, 2016
…ug_fix Fixed false positive bug in Oracle TNS Listener Checker module
jennamagius
pushed a commit
that referenced
this pull request
Nov 16, 2016
Added user logging into the db and humored rubocop
ghost
pushed a commit
that referenced
this pull request
Apr 20, 2017
Initial cleanup for rapid7#7604
ghost
pushed a commit
that referenced
this pull request
Apr 20, 2017
ghost
pushed a commit
that referenced
this pull request
Apr 20, 2017
Please the rubocop gods (unless they are dumb)
ghost
pushed a commit
that referenced
this pull request
Apr 20, 2017
Convert to CmdStager for R7000 exploit
ghost
pushed a commit
that referenced
this pull request
Apr 20, 2017
Update freesshd_authbypass to use CmdStager fully
ghost
pushed a commit
that referenced
this pull request
May 17, 2017
Pass msftidy for moxa_credentials_recovery.rb
ghost
pushed a commit
that referenced
this pull request
Jan 26, 2018
bypassuac_injection_winsxs updates and documents
ghost
pushed a commit
that referenced
this pull request
Jan 26, 2018
Hi @todb-r7 By setting TARGET_URL to `www.google.com` the module works, but in vulnerable browser the address bar would display like `http://192.168.1.102:9090/www.google.com` ` msf auxiliary(samsung_browser_sop_bypass) > [*] Using URL: http://192.168.1.102:9090/ [*] Server started. [*] 192.168.1.100: Request 'GET /' [*] 192.168.1.100: Attempting to spoof origin for www.google.com [*] 192.168.1.100: Request 'GET /favicon.ico' [*] 192.168.1.100: Attempting to spoof origin for www.google.com [*] 192.168.1.100: Request 'GET /www.google.com' [*] 192.168.1.100: Attempting to spoof origin for www.google.com [*] 192.168.1.100: Request 'GET /favicon.ico' [*] 192.168.1.100: Attempting to spoof origin for www.google.com [*] 192.168.1.100: Request 'GET /favicon.ico' [*] 192.168.1.100: Attempting to spoof origin for www.google.com [+] 192.168.1.100: Collected credential for 'www.google.com' test:test `
ghost
pushed a commit
that referenced
this pull request
Jan 26, 2018
Adds exploit module for CVE-2017-17411
ghost
pushed a commit
that referenced
this pull request
Mar 29, 2018
Make db_nmap Work With Remote Data Service
ghost
pushed a commit
that referenced
this pull request
Mar 29, 2018
This is a repackaging effort for the work i originally pushed in 6035. This segment of the PR provides UDP session handlers for bind and reverse sessions, a Windows Metasm stager (really the TCP stager with a small change), and a pair of socat payloads for testing simple UDP shells. Netcat or any scripting language with a sockets library is sufficient to use these sessions as they are stateless and simple. Testing of this PR requires rex/core #1 and rex/socket #2 The SSL testing which was being done on 6035 is backed out, left for a later time when we can do DTLS properly.
ghost
pushed a commit
that referenced
this pull request
Mar 29, 2018
Use drdos mixin for memcached amp module
ghost
pushed a commit
that referenced
this pull request
Jul 23, 2018
when I ran this module for linux/aarch64/meterpreter_reverse_tcp for payload running in termux, it was obvious that without root the commands will return error, It still created empty files in `.msf4/loot`
```
msf5 post(linux/gather/enum_network) > run
[*] Running module against localhost.localdomain
[*] Module running as /system/bin/sh: /usr/bin/whoami: not found
[+] Info:
[+]
[+] Linux localhost 3.10.84-perf+ #1 SMP PREEMPT Tue Oct 24 01:07:25 CST 2017 aarch64 Android
[*] Collecting data...
[+] /system/bin/sh: /sbin/route: not found
[-] Failed to open file: /etc/ssh/sshd_config: core_channel_open: Operation failed: 1
[-] unable to get data for Network config
[+] Network config stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_735775.txt
[-] unable to get data for Route table
[+] Route table stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_599334.txt
[-] unable to get data for Firewall config
[+] Firewall config stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_790893.txt
[-] unable to get data for DNS config
[+] DNS config stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_867340.txt
[-] unable to get data for SSHD config
[+] SSHD config stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_900906.txt [-] unable to get data for Host file
[+] Host file stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_179877.txt
[-] unable to get data for Active connections
[+] Active connections stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_656035.txt [-] unable to get data for Wireless information
[+] Wireless information stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_168144.txt
[-] unable to get data for Listening ports
[+] Listening ports stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_999548.txt [-] unable to get data for If-Up/If-Down
[+] If-Up/If-Down stored in /data/data/com.termux/files/home/.msf4/loot/20180505105107_default_127.0.0.1_linux.enum.netwo_860869.txt
[*] Post module execution completed
msf5 post(linux/gather/enum_network) >
```
ghost
pushed a commit
that referenced
this pull request
Jul 23, 2018
Refactor zsh payloads, set the Variable CachedSize to 99
ghost
pushed a commit
that referenced
this pull request
Jul 23, 2018
exploit/linux/http/apache_couchdb_cmd_exec fixes some problems.
ghost
pushed a commit
that referenced
this pull request
Nov 8, 2019
Use Python instead of platform-dependent code
ghost
pushed a commit
that referenced
this pull request
Nov 8, 2019
add more examples for http_title
ghost
pushed a commit
that referenced
this pull request
Jan 7, 2020
This pull request was closed.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Hi, here are docs so 'info -d' shows some of the background for this module and example execution.
Also, it seems right to give wwebb-r7 credit for doing the foundational ASA hacking post and the initial module.