Skip to content

Commit

Permalink
Reboot gh-pages
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 committed Apr 19, 2024
0 parents commit bbcef7d
Show file tree
Hide file tree
Showing 3,226 changed files with 2,072,763 additions and 0 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
1 change: 1 addition & 0 deletions 404.html

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions CNAME
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
docs.metasploit.com
40 changes: 40 additions & 0 deletions acceptance-tests/app.js

Large diffs are not rendered by default.

16 changes: 16 additions & 0 deletions acceptance-tests/data/attachments/1340d7f12ab35cde.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
## Load test modules
loadpath test/modules

## Session module
use auxiliary/scanner/mysql/mysql_login

## Set global datastore
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'

## Run command
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306


## Replication commands
use auxiliary/scanner/mysql/mysql_hashdump
run session=4 Verbose=true
14 changes: 14 additions & 0 deletions acceptance-tests/data/attachments/155f6d8182c11fb0.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"required_lines": [
{
"values": [
"(?-mix:\\| \\d+.\\d+.*)"
],
"options": {
}
}
],
"known_failures": [

]
}
14 changes: 14 additions & 0 deletions acceptance-tests/data/attachments/15bc72d619b2d772.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"required_lines": [
{
"values": [
"(?-mix:Saving HashString as Loot)"
],
"options": {
}
}
],
"known_failures": [

]
}
16 changes: 16 additions & 0 deletions acceptance-tests/data/attachments/18e813b6a48c8e2b.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
## Load test modules
loadpath test/modules

## Session module
use auxiliary/scanner/mysql/mysql_login

## Set global datastore
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'

## Run command
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306


## Replication commands
use auxiliary/admin/mysql/mysql_enum
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
14 changes: 14 additions & 0 deletions acceptance-tests/data/attachments/199b1cf2fb24dde8.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"required_lines": [
{
"values": [
"(?-mix:Saving HashString as Loot)"
],
"options": {
}
}
],
"known_failures": [

]
}
14 changes: 14 additions & 0 deletions acceptance-tests/data/attachments/1a0b9d99f4fce892.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"required_lines": [
{
"values": [
"(?-mix:(?-mix:\\d+\\.\\d+\\.\\d+\\.\\d+:\\d+) is running MySQL \\d+.\\d+.*)"
],
"options": {
}
}
],
"known_failures": [

]
}
14 changes: 14 additions & 0 deletions acceptance-tests/data/attachments/1c03078162b1bf3b.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"required_lines": [
{
"values": [
"(?-mix:(?-mix:\\d+\\.\\d+\\.\\d+\\.\\d+:\\d+) is running MySQL \\d+.\\d+.*)"
],
"options": {
}
}
],
"known_failures": [

]
}
16 changes: 16 additions & 0 deletions acceptance-tests/data/attachments/1c09427c12fa7dd.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
## Load test modules
loadpath test/modules

## Session module
use auxiliary/scanner/mysql/mysql_login

## Set global datastore
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'

## Run command
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306


## Replication commands
use auxiliary/scanner/mysql/mysql_hashdump
run session=3 Verbose=true
24 changes: 24 additions & 0 deletions acceptance-tests/data/attachments/1c2800eff4738f9d.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
use auxiliary/scanner/mysql/mysql_login
Stopping all jobs...
msf6 auxiliary(scanner/mysql/mysql_version) > irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session
msf6 auxiliary(scanner/mysql/mysql_login) > run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306
msf6 auxiliary(scanner/mysql/mysql_login) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password'
[*] MySQL session 4 opened (127.0.0.1:37171 -> 127.0.0.1:3306) at 2024-04-19 16:36:47 +0000
use auxiliary/scanner/mysql/mysql_version
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful.
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully.
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/mysql/mysql_login) > run session=4 Verbose=true
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf6 auxiliary(scanner/mysql/mysql_version) > [+] 127.0.0.1:3306 is running MySQL 5.5.42-MariaDB-1~wheezy-log
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
sessions -K
msf6 auxiliary(scanner/mysql/mysql_version) > jobs -K
[*] Killing all sessions...
[*] 127.0.0.1 - MySQL session 4 closed.
msf6 auxiliary(scanner/mysql/mysql_version) >
15 changes: 15 additions & 0 deletions acceptance-tests/data/attachments/1faec60d5a88f1eb.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
use auxiliary/scanner/mysql/mysql_hashdump
Stopping all jobs...
msf6 auxiliary(scanner/mysql/mysql_hashdump) > run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf6 auxiliary(scanner/mysql/mysql_hashdump) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - Logged in to '' with 'root':'password'
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[*] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - querying with 'SELECT @@version'
[*] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - querying with 'SELECT user,password from mysql.user'
[+] 127.0.0.1:3306 - Saving HashString as Loot: root:*2470C0C06DEE42FD1618BB99005ADCA2EC9D1E19
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
sessions -K
msf6 auxiliary(scanner/mysql/mysql_hashdump) > jobs -K
[*] Killing all sessions...
msf6 auxiliary(scanner/mysql/mysql_hashdump) >
24 changes: 24 additions & 0 deletions acceptance-tests/data/attachments/20f64c72e60f4374.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
use auxiliary/scanner/mysql/mysql_login
Stopping all jobs...
msf6 auxiliary(scanner/mysql/mysql_version) > irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session
msf6 auxiliary(scanner/mysql/mysql_login) > run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306
msf6 auxiliary(scanner/mysql/mysql_login) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password'
[*] MySQL session 2 opened (127.0.0.1:35281 -> 127.0.0.1:3306) at 2024-04-19 16:36:47 +0000
use auxiliary/scanner/mysql/mysql_version
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful.
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully.
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/mysql/mysql_login) > run session=2 Verbose=true
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf6 auxiliary(scanner/mysql/mysql_version) > [+] 127.0.0.1:3306 is running MySQL 5.5.42
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
sessions -K
msf6 auxiliary(scanner/mysql/mysql_version) > jobs -K
[*] Killing all sessions...
[*] 127.0.0.1 - MySQL session 2 closed.
msf6 auxiliary(scanner/mysql/mysql_version) >
16 changes: 16 additions & 0 deletions acceptance-tests/data/attachments/2134fcaed365ac94.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
## Load test modules
loadpath test/modules

## Session module
use auxiliary/scanner/mysql/mysql_login

## Set global datastore
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'

## Run command
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306


## Replication commands
use auxiliary/scanner/mysql/mysql_version
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
14 changes: 14 additions & 0 deletions acceptance-tests/data/attachments/222a88ee4af5a0fe.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"required_lines": [
{
"values": [
"(?-mix:Saving HashString as Loot)"
],
"options": {
}
}
],
"known_failures": [

]
}
16 changes: 16 additions & 0 deletions acceptance-tests/data/attachments/2366114807dd1a6c.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
## Load test modules
loadpath test/modules

## Session module
use auxiliary/scanner/mysql/mysql_login

## Set global datastore
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'

## Run command
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306


## Replication commands
use auxiliary/admin/mysql/mysql_sql
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
16 changes: 16 additions & 0 deletions acceptance-tests/data/attachments/2839703d8904e3a3.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
## Load test modules
loadpath test/modules

## Session module
use auxiliary/scanner/mysql/mysql_login

## Set global datastore
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'

## Run command
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306


## Replication commands
use auxiliary/admin/mysql/mysql_sql
run session=1 Verbose=true
14 changes: 14 additions & 0 deletions acceptance-tests/data/attachments/2a72cc3009c0ef32.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"required_lines": [
{
"values": [
"(?-mix:Saving HashString as Loot)"
],
"options": {
}
}
],
"known_failures": [

]
}
16 changes: 16 additions & 0 deletions acceptance-tests/data/attachments/2bdd3e2ff4b8de0.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
## Load test modules
loadpath test/modules

## Session module
use auxiliary/scanner/mysql/mysql_login

## Set global datastore
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'

## Run command
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306


## Replication commands
use auxiliary/scanner/mysql/mysql_version
run session=4 Verbose=true
26 changes: 26 additions & 0 deletions acceptance-tests/data/attachments/2dce5d76f3dcb2fe.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
use auxiliary/scanner/mysql/mysql_login
Stopping all jobs...
msf6 auxiliary(admin/mysql/mysql_sql) > irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session
msf6 auxiliary(scanner/mysql/mysql_login) > run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306
msf6 auxiliary(scanner/mysql/mysql_login) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password'
[*] MySQL session 1 opened (127.0.0.1:46715 -> 127.0.0.1:3306) at 2024-04-19 16:36:47 +0000
use auxiliary/admin/mysql/mysql_sql
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful.
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully.
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/mysql/mysql_login) > run session=1 Verbose=true
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf6 auxiliary(admin/mysql/mysql_sql) > [*] Using existing session 1
[*] Sending statement: 'select version()'...
[*] 127.0.0.1:3306 MySQL - querying with 'select version()'
[*] | 5.5.42 |
[*] Auxiliary module execution completed
sessions -K
msf6 auxiliary(admin/mysql/mysql_sql) > jobs -K
[*] Killing all sessions...
[*] 127.0.0.1 - MySQL session 1 closed.
msf6 auxiliary(admin/mysql/mysql_sql) >
27 changes: 27 additions & 0 deletions acceptance-tests/data/attachments/2eb873cf1d2c9132.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
use auxiliary/scanner/mysql/mysql_login
Stopping all jobs...
msf6 auxiliary(scanner/mysql/mysql_version) > irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session
msf6 auxiliary(scanner/mysql/mysql_login) > run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306
msf6 auxiliary(scanner/mysql/mysql_login) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 8.3.0
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password'
[*] MySQL session 3 opened (127.0.0.1:45215 -> 127.0.0.1:3306) at 2024-04-19 16:36:54 +0000
use post/test/mysql
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful.
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully.
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/mysql/mysql_login) > run session=3 Verbose=true
msf6 post(test/mysql) > [*] Running against session 3
[*] Session type is mysql and platform is Linux
[+] should support the help command
[+] should return a version
[*] Testing complete in 0.04 seconds
[*] Passed: 2; Failed: 0; Skipped: 0
[*] Post module execution completed
sessions -K
msf6 post(test/mysql) > jobs -K
[*] Killing all sessions...
[*] 127.0.0.1 - MySQL session 3 closed.
msf6 post(test/mysql) >
37 changes: 37 additions & 0 deletions acceptance-tests/data/attachments/3a2ad9b8f188997b.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
Calling `DidYouMean::SPELL_CHECKERS.merge!(error_name => spell_checker)' has been deprecated. Please call `DidYouMean.correct_error(error_name, spell_checker)' instead.
Calling `DidYouMean::SPELL_CHECKERS.merge!(error_name => spell_checker)' has been deprecated. Please call `DidYouMean.correct_error(error_name, spell_checker)' instead.
Overriding user environment variable 'OPENSSL_CONF' to enable legacy functions.
msf6 > loadpath test/modules
Loaded 43 modules:
14 auxiliary modules
13 exploit modules
16 post modules
msf6 > features set mysql_session_type true
mysql_session_type => true
[!] Run the save command and restart the console for this feature to take effect.
msf6 > use auxiliary/scanner/mysql/mysql_login
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session
msf6 auxiliary(scanner/mysql/mysql_login) > irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'
msf6 auxiliary(scanner/mysql/mysql_login) > run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password'
[*] MySQL session 1 opened (127.0.0.1:43175 -> 127.0.0.1:3306) at 2024-04-19 16:36:45 +0000
use post/test/mysql
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful.
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully.
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/mysql/mysql_login) > run session=1 Verbose=true
msf6 post(test/mysql) > [*] Running against session 1
[*] Session type is mysql and platform is Linux
[+] should support the help command
[+] should return a version
[*] Testing complete in 0.02 seconds
[*] Passed: 2; Failed: 0; Skipped: 0
[*] Post module execution completed
sessions -K
msf6 post(test/mysql) > jobs -K
[*] Killing all sessions...
[*] 127.0.0.1 - MySQL session 1 closed.
msf6 post(test/mysql) >
Loading

0 comments on commit bbcef7d

Please sign in to comment.