From 106d397dee372f8e4fb3a6686e892541b1146c16 Mon Sep 17 00:00:00 2001 From: Ramon de C Valle Date: Fri, 24 Jan 2025 00:38:20 +0000 Subject: [PATCH] Auto commit changes --- _data/modules.yml | 18 +++++++++--------- .../singles/linux/ppc/shell_bind_tcp.rb | 2 +- .../singles/linux/ppc/shell_find_port.rb | 2 +- .../singles/linux/ppc/shell_reverse_tcp.rb | 2 +- .../singles/linux/ppc64/shell_bind_tcp.rb | 2 +- .../singles/linux/ppc64/shell_find_port.rb | 2 +- .../singles/linux/ppc64/shell_reverse_tcp.rb | 2 +- .../singles/linux/x86/shell_bind_tcp.rb | 2 +- .../singles/linux/x86/shell_find_port.rb | 2 +- .../singles/linux/x86/shell_reverse_tcp.rb | 2 +- 10 files changed, 18 insertions(+), 18 deletions(-) diff --git a/_data/modules.yml b/_data/modules.yml index 197f803..af13e51 100644 --- a/_data/modules.yml +++ b/_data/modules.yml @@ -29,32 +29,32 @@ - description: Connect back to attacker and spawn a command shell name: payload/linux/ppc64/shell_reverse_tcp published: 2008-11-13 01:57:53.000000000 Z - updated: 2021-01-05 14:59:46.000000000 Z + updated: 2025-01-14 14:31:03.000000000 Z vulnerabilities: [] - description: Spawn a shell on an established connection name: payload/linux/ppc64/shell_find_port published: 2008-11-13 01:57:53.000000000 Z - updated: 2021-01-05 14:59:46.000000000 Z + updated: 2025-01-14 14:31:03.000000000 Z vulnerabilities: [] - description: Listen for a connection and spawn a command shell name: payload/linux/ppc64/shell_bind_tcp published: 2008-11-13 01:57:53.000000000 Z - updated: 2021-01-05 14:59:46.000000000 Z + updated: 2025-01-14 14:31:03.000000000 Z vulnerabilities: [] - description: Connect back to attacker and spawn a command shell name: payload/linux/ppc/shell_reverse_tcp published: 2008-11-13 01:57:53.000000000 Z - updated: 2021-01-05 14:59:46.000000000 Z + updated: 2024-12-19 17:13:55.000000000 Z vulnerabilities: [] - description: Spawn a shell on an established connection name: payload/linux/ppc/shell_find_port published: 2008-11-13 01:57:53.000000000 Z - updated: 2021-01-05 14:59:46.000000000 Z + updated: 2024-12-19 17:13:55.000000000 Z vulnerabilities: [] - description: Listen for a connection and spawn a command shell name: payload/linux/ppc/shell_bind_tcp published: 2008-11-13 01:57:53.000000000 Z - updated: 2021-01-05 14:59:46.000000000 Z + updated: 2024-12-19 17:13:55.000000000 Z vulnerabilities: [] - description: This module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the TALLOC chunk overwrite method (credit Ramon @@ -69,12 +69,12 @@ - description: Connect back to attacker and spawn a command shell name: payload/linux/x86/shell_reverse_tcp published: 2008-10-19 21:03:39.000000000 Z - updated: 2022-11-04 00:33:03.000000000 Z + updated: 2025-01-14 14:31:03.000000000 Z vulnerabilities: [] - description: Spawn a shell on an established connection name: payload/linux/x86/shell_find_port published: 2008-10-19 21:03:39.000000000 Z - updated: 2021-01-05 14:59:46.000000000 Z + updated: 2025-01-14 14:31:03.000000000 Z vulnerabilities: [] - description: This module exploits a buffer overflow vulnerability in adm_build_path() function of sadmind daemon. The distributed system administration daemon (sadmind) @@ -170,7 +170,7 @@ - description: Listen for a connection and spawn a command shell name: payload/linux/x86/shell_bind_tcp published: 2007-07-31 02:10:49.000000000 Z - updated: 2021-01-05 14:59:46.000000000 Z + updated: 2025-01-14 14:31:03.000000000 Z vulnerabilities: [] - description: Connect back to attacker and spawn a command shell name: payload/bsd/x86/shell_reverse_tcp diff --git a/modules/payloads/singles/linux/ppc/shell_bind_tcp.rb b/modules/payloads/singles/linux/ppc/shell_bind_tcp.rb index d40e531..6935f80 100644 --- a/modules/payloads/singles/linux/ppc/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/ppc/shell_bind_tcp.rb @@ -9,7 +9,7 @@ module MetasploitModule CachedSize = 223 include Msf::Payload::Single - include Msf::Payload::Linux + include Msf::Payload::Linux::Ppc::Prepends include Msf::Sessions::CommandShellOptions def initialize(info = {}) diff --git a/modules/payloads/singles/linux/ppc/shell_find_port.rb b/modules/payloads/singles/linux/ppc/shell_find_port.rb index 5246b98..5f9a1e4 100644 --- a/modules/payloads/singles/linux/ppc/shell_find_port.rb +++ b/modules/payloads/singles/linux/ppc/shell_find_port.rb @@ -9,7 +9,7 @@ module MetasploitModule CachedSize = 171 include Msf::Payload::Single - include Msf::Payload::Linux + include Msf::Payload::Linux::Ppc::Prepends include Msf::Sessions::CommandShellOptions def initialize(info = {}) diff --git a/modules/payloads/singles/linux/ppc/shell_reverse_tcp.rb b/modules/payloads/singles/linux/ppc/shell_reverse_tcp.rb index 42777fb..38b79f0 100644 --- a/modules/payloads/singles/linux/ppc/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/ppc/shell_reverse_tcp.rb @@ -9,7 +9,7 @@ module MetasploitModule CachedSize = 183 include Msf::Payload::Single - include Msf::Payload::Linux + include Msf::Payload::Linux::Ppc::Prepends include Msf::Sessions::CommandShellOptions def initialize(info = {}) diff --git a/modules/payloads/singles/linux/ppc64/shell_bind_tcp.rb b/modules/payloads/singles/linux/ppc64/shell_bind_tcp.rb index 7f52841..ccc8449 100644 --- a/modules/payloads/singles/linux/ppc64/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/ppc64/shell_bind_tcp.rb @@ -9,7 +9,7 @@ module MetasploitModule CachedSize = 223 include Msf::Payload::Single - include Msf::Payload::Linux + include Msf::Payload::Linux::Ppc::Prepends include Msf::Sessions::CommandShellOptions def initialize(info = {}) diff --git a/modules/payloads/singles/linux/ppc64/shell_find_port.rb b/modules/payloads/singles/linux/ppc64/shell_find_port.rb index d1e046e..ed1926b 100644 --- a/modules/payloads/singles/linux/ppc64/shell_find_port.rb +++ b/modules/payloads/singles/linux/ppc64/shell_find_port.rb @@ -9,7 +9,7 @@ module MetasploitModule CachedSize = 171 include Msf::Payload::Single - include Msf::Payload::Linux + include Msf::Payload::Linux::Ppc::Prepends include Msf::Sessions::CommandShellOptions def initialize(info = {}) diff --git a/modules/payloads/singles/linux/ppc64/shell_reverse_tcp.rb b/modules/payloads/singles/linux/ppc64/shell_reverse_tcp.rb index 6b66f82..1a22c6d 100644 --- a/modules/payloads/singles/linux/ppc64/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/ppc64/shell_reverse_tcp.rb @@ -9,7 +9,7 @@ module MetasploitModule CachedSize = 183 include Msf::Payload::Single - include Msf::Payload::Linux + include Msf::Payload::Linux::Ppc::Prepends include Msf::Sessions::CommandShellOptions def initialize(info = {}) diff --git a/modules/payloads/singles/linux/x86/shell_bind_tcp.rb b/modules/payloads/singles/linux/x86/shell_bind_tcp.rb index f1e8d10..bb2fee5 100644 --- a/modules/payloads/singles/linux/x86/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/x86/shell_bind_tcp.rb @@ -9,7 +9,7 @@ module MetasploitModule CachedSize = 78 include Msf::Payload::Single - include Msf::Payload::Linux + include Msf::Payload::Linux::X86::Prepends include Msf::Sessions::CommandShellOptions def initialize(info = {}) diff --git a/modules/payloads/singles/linux/x86/shell_find_port.rb b/modules/payloads/singles/linux/x86/shell_find_port.rb index 9ad0de7..9e5b550 100644 --- a/modules/payloads/singles/linux/x86/shell_find_port.rb +++ b/modules/payloads/singles/linux/x86/shell_find_port.rb @@ -9,7 +9,7 @@ module MetasploitModule CachedSize = 62 include Msf::Payload::Single - include Msf::Payload::Linux + include Msf::Payload::Linux::X86::Prepends include Msf::Sessions::CommandShellOptions def initialize(info = {}) diff --git a/modules/payloads/singles/linux/x86/shell_reverse_tcp.rb b/modules/payloads/singles/linux/x86/shell_reverse_tcp.rb index 92a4c2d..643b407 100644 --- a/modules/payloads/singles/linux/x86/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/x86/shell_reverse_tcp.rb @@ -9,7 +9,7 @@ module MetasploitModule CachedSize = 68 include Msf::Payload::Single - include Msf::Payload::Linux + include Msf::Payload::Linux::X86::Prepends include Msf::Sessions::CommandShellOptions def initialize(info = {})