Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions documentation/modules/exploit/aix/local/xorg_x11_server.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,11 +34,11 @@ This table lists all vulnerable Xorg versions:

## Options

**SESSION**
### SESSION

Which session to use, which can be viewed with `sessions`

**WritableDir**
### WritableDir

A writable directory file system path. (default: `/tmp`)

Expand Down
2 changes: 1 addition & 1 deletion documentation/modules/exploit/android/local/janus.md
Original file line number Diff line number Diff line change
Expand Up @@ -77,7 +77,7 @@ Number of signers: 1

## Options

**PACKAGE**
### PACKAGE

Select a package to infect. A list of packages can be obtained by running `app_list` on meterpreter. Using `ALL` will
loop through all packages and attempt to exploit them until successful. This can take a while, and cause lots of data to be
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,11 +34,11 @@

## Options

**SESSION**
### SESSION

Which session to use, which can be viewed with `sessions`

**WritableDir**
### WritableDir

A writable directory file system path. (default: `/tmp`)

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@

## Options

**SESSION**
### SESSION

Which session to use, which can be viewed with `sessions`

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@

## Options

**ASUSWRTPORT**
### ASUSWRTPORT

AsusWRT HTTP portal port (default: `80`)

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,12 +24,22 @@ https://software.cisco.com/download/release.html?mdfid=286259687&softwareid=2862

## Options

**USERNAME** The username for Cisco Firepower Management console.
### USERNAME

**PASSWORD** The password for Cisco Firepower Management console.
The username for Cisco Firepower Management console.

**NEWSSHUSER** The SSH account to create. By default, this is random.
### PASSWORD

**NEWSSHPASS** The SSH password for the new account. By default, this is also random.
The password for Cisco Firepower Management console.

**SSHPORT** In case for some reason, the SSH changed, otherwise this is 22 by default.
### NEWSSHUSER

The SSH account to create. By default, this is random.

### NEWSSHPASS

The SSH password for the new account. By default, this is also random.

### SSHPORT

In case for some reason, the SSH changed, otherwise this is 22 by default.
12 changes: 6 additions & 6 deletions documentation/modules/exploit/linux/http/cisco_rv32x_rce.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,30 +39,30 @@ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2

## Options

**RHOSTS**
### RHOSTS

Configure the remote vulnerable system.

**RPORT**
### RPORT

Configure the TCP port of the HTTP/HTTPS management web interface.

**USE_SSL**
### USE_SSL

This flag controls whether the remote management web interface is accessible
via HTTPS or not. Should be false for HTTP and true for HTTPS.

**PAYLOAD**
### PAYLOAD

Configure the Metasploit payload that you want to stage. Must be for MIPS64
arch. Set payload Options accordingly.

**SRVHOST**
### SRVHOST

The module stages the payload via a web server. This is the binding interface
IP. Default can be set to 0.0.0.0.

**HTTPDelay**
### HTTPDelay

This configures how long the module should wait for the incoming HTTP
connection to the HTTP stager.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -75,8 +75,10 @@ ddev launch

The module has the following option:

- **ASSET_ID**: This option is required for older versions of Craft CMS, particularly in the 3.x series.
It specifies the asset ID for the Craft CMS instance. For 3.x versions, this ID must be set correctly to exploit the vulnerability.
### ASSET_ID

This option is required for older versions of Craft CMS, particularly in the 3.x series.
It specifies the asset ID for the Craft CMS instance. For 3.x versions, this ID must be set correctly to exploit the vulnerability.

For example, if you are targeting a Craft CMS version from the `>= 3.0.0`, `< 3.9.14`, make sure to specify the correct `ASSET_ID`.
This is necessary for successful exploitation when dealing with these versions.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ gcc ./cgitest.c -o cgi-bin/cgitest

## Options

**TARGET_URI**
### TARGET_URI

Optional. The full path to a CGI endpoint on the target server.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,23 +18,23 @@ Tested on 2.7.18.0503.

## Options

**RPORT**
### RPORT

Set this to the port for the REST API, usually 8081.

**WEBUI_PORT**
### WEBUI_PORT

Set this to the port for the web UI, usually 8443.

**TOKEN**
### TOKEN

Set this to the service token. Defaults to `AuroraSdnToken37`.

**USERNAME**
### USERNAME

Set this to the service username. Defaults to `sdn`.

**PASSWORD**
### PASSWORD

Set this to the service password. Defaults to `skyline`.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,11 +16,11 @@

## Options

**PASSWORD**
### PASSWORD

Password is set at install. May be blank, 'admin', or 'ipfire'.

**CMD**
### CMD

This is the command to run on the system.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ This module has been verified against:

## Options

**PASSWORD**
### PASSWORD

Password is set at install. May be blank, 'admin', or 'ipfire'.

Expand All @@ -45,4 +45,4 @@ This module has been verified against:
uid=99(nobody) gid=99(nobody) groups=99(nobody),16(dialout),23(squid)
whoami
nobody
```
```
Original file line number Diff line number Diff line change
Expand Up @@ -20,10 +20,10 @@

## Options

**USERNAME**
### USERNAME
Username of the administrative user you are authenticating to the web portal as.

**PASSWORD**
### PASSWORD
Password for the administrative user you are authenticating to the web portal as.

## Scenarios
Expand Down
4 changes: 2 additions & 2 deletions documentation/modules/exploit/linux/http/ipfire_proxy_exec.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@

## Options

**PASSWORD**
### PASSWORD

Password is set at install. May be blank, 'admin', or 'ipfire'.

Expand All @@ -44,4 +44,4 @@
uid=99(nobody) gid=99(nobody) groups=99(nobody),16(dialout),23(squid)
whoami
nobody
```
```
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@

## Options

**PAYLOAD**
### PAYLOAD

The `generic` and `netcat` payload types are valid.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -30,11 +30,11 @@ anyway.

## Options

**USER_ID**
### USER_ID

If you wish to exploit a particular ```USER_ID```, that can be specified here. Default is 1, which is most likely the admin account.

**API_TOKEN**
### API_TOKEN

The SQLi included only works for MySQL, which should work in most cases. However, if you experience a different backend, you can enumerate the user
table via sqlmap: ```sqlmap -u "http://[ip]/nagiosxi/includes/components/nagiosim/nagiosim.php?mode=resolve&host=a&service=" -p service -T xi_users --dump```.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,15 +17,15 @@

## Options

**USERNAME**
### USERNAME

The `USERNAME` option sets the username to authenticate the request with.
The command injection will __not__ succeed if the username and password are not correct.
The default username for NETGEAR Routers is `admin`. If you don't know the credentials,
your best bet will be to use the default username and password.


**PASSWORD**
### PASSWORD

The `PASSWORD`options sets the password to authenticate the request with.
The command injection will __not__ succeed if the username and password are not correct.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ Netgear R7000 and R6400 routers running firmware version `1.0.7.2_1.1.93` and po

## Options

**PAYLOAD**
### PAYLOAD

The valid payloads are `meterpreter` payloads _only_. The payload uses the `wget` flavor and pipes the downloaded binary to `sh`

Expand Down
6 changes: 3 additions & 3 deletions documentation/modules/exploit/linux/http/op5_config_exec.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,11 +24,11 @@ Just a few quick notes on setting up a vulnerable lab with this software.

## Options

**PASSWORD**
### PASSWORD

Password is 'monitor' by default.

**USERNAME**
### USERNAME

Documentation was unclear on this. Installing just the app, the
username was 'monitor' by default. However it looks like if you
Expand Down Expand Up @@ -60,4 +60,4 @@ Just a few quick notes on setting up a vulnerable lab with this software.
monitor
id
uid=299(monitor) gid=48(apache) groups=48(apache),14(uucp),488(smstools) context=system_u:system_r:initrc_t:s0
```
```
Original file line number Diff line number Diff line change
Expand Up @@ -26,11 +26,11 @@ Launch metasploit and set the appropriate options:

## Options

**USERNAME**
### USERNAME

The username for Pandora FMS.

**PASSWORD**
### PASSWORD

The password for Pandora FMS.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,9 +24,9 @@ This VM is not generally available, but the specific disk image used was `PA-VM-

## Options

**CBHOST** The callback listener address if the default is not accurate (port forwarding, etc)
### CBHOST The callback listener address if the default is not accurate (port forwarding, etc)

**CBPORT** The callback listener port
### CBPORT The callback listener port


## Scenarios
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -312,7 +312,7 @@ Make sure `php-imap` is installed and enabled. Create `imap.php` with the follo

## Options

**TARGETURI**
### TARGETURI

The URI for the target. This may change by target. Default is ` `.
Prestashop should be the admin URI, similar to `/admin2769gx8k3`.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Id Name

## Options

**SID**
### SID

Set this to a valid administrator session ID. Typically retrieved using
the `auxiliary/gather/pulse_secure_file_disclosure` module.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,11 +36,11 @@

## Options

**USERNAME**
### USERNAME

Username for the application. (default: `admin`)

**PASSWORD**
### PASSWORD

Password for the application. (default: `admin`)

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,15 +32,15 @@

## Options

**HttpUsername**
### HttpUsername

Username for HTTP basic auth which is set in the conf file(optional)

**HttpPassword**
### HttpPassword

Password for HTTP basic auth which is set in the conf file(optional)

**TARGETURI**
### TARGETURI

The path to the XML-RPC endpoint

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ vs

## Options

**PASSWORD**
### PASSWORD

Password is set at first login. Default for admin is 'admin'.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,9 @@ according to the [UnRAID Getting Started](https://wiki.unraid.net/UnRAID_6/Getti

## Options

**TARGETURI** : The URI of the Unraid application
### TARGETURI

The URI of the Unraid application

## Scenarios

Expand Down
Loading
Loading