Jan Rude
Jan Rude
> @whoot, I just wanted to check if you need any help on this. > > We would like to move forward with your 3 Syncovery modules (#16991 and #16992),...
Hi, any suggestion on how to fix this?
> > Hi, any suggestion on how to fix this? > > The tests are failing due to a `msftidy` violation: > > ``` > --- Checking new and changed...
> As @adfoster-r7 [commented](https://github.com/rapid7/metasploit-framework/pull/16991#discussion_r966054175), I also believe it is possible to take advantage of the scanner framework for this. As an example, this [module](https://github.com/rapid7/metasploit-framework/blob/37ef992eb72ffa2a11639bb1953d59743bc67cff/modules/auxiliary/scanner/misc/freeswitch_event_socket_login.rb) performs a brute force with only...
@lrhys @xyliutw @wsch-wa Cloudscraper does not work anymore either...
Are there even modules which interact with the target domain? I mean all results are coming from search engines, arent they?
Alright, thanks for clarification. This stuff is indeed not easy to spot. Passive mode would be great!
I did some testing: **1. WMIC** `wmic qfe list full /format:table` Gives basically the same output of KBs as systeminfo **2. PowerShell** `Get-WmiObject -Class "win32_quickfixengineering" | Select-Object -Property "Description", "HotfixID",...
Combined, cleaned and sorted list could be achieved like this: ```bash # Update Client Install History $install_history = (Get-Package -Force).Name | Select-String -Pattern '(KB\d+)' -AllMatches | ForEach-Object {$_.Matches.Groups[0].Value} # win32_quickfixengineering...
Just read the output: all information is listed in /root/.msf4/logs/framework.log If you would have done that you would know, that you have to do the following to make it work:...