jheysel-r7

Results 32 comments of jheysel-r7

Hey @h00die, thanks for the contribution. Just wondering if you have any update on this? No worries if not. I might spin up one of the ISOs bcoles mentioned and...

> > Setting up this software was.... an exercise in frustration. I know I kept step by step notes and module docs, but I can't seem to find them. I'm...

# Release Notes This PR adds a module which exploits several authenticated sqli in VICIdial (CVE-2022-34876, CVE-2022-34877, CVE-2022-34878)

@red0xff, thanks so much for the contributions, they are all very appreciated. I've merged them into this PR. I made one small change to `get_user_hashes`, just to print them out...

> Seems like the request/response pattern here might not be working given we are going up into the 668 for the binary here? > > ``` > #################### > #...

Thanks for the enhancement! LGTM 👍 ``` msf6 exploit(windows/misc/remote_mouse_rce) > run [*] Started reverse TCP handler on 172.16.199.1:4444 [*] 172.16.199.137:1978 - Running automatic check ("set AutoCheck false" to disable) [+]...

# Release Notes This PR updates version checking for the recent Remote mouse RCE module and updates the docs with a vulnerable version download link

Thank you @3V3RYONE for the great enhancement also for working with and responding to all the comments made by my colleagues! I've reviewed the PR and followed the verification steps...

_Good news everyone!_ We've gotten word for our purposes, LGPL and GPLv2 are acceptable. Testing checks out 👍 thanks for the contribution! ``` msf6 auxiliary(scanner/ssh/ssh_login) > run rhosts=172.16.199.132 rport=4444 username=msfuser...