pwn 0.4.902 → 0.4.903
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +2 -2
- data/lib/pwn/plugins/sock.rb +10 -10
- data/lib/pwn/version.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 5de6a96d91343303cae09ae5d5974c7f8752b2086f98923d850bef95811ef16f
|
4
|
+
data.tar.gz: 12ae5821ad2b2f6d6a629e3f249e35236d67f789cf010ac645e336f4d898132e
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 61e12bd6d032128a250b2ac594f9eab034e63b705c1627096b218fe0eb279eb10b4988b184849bd8fbbeaf735dcd67ffca0c071ccb38b23cb48db5fe9d35652d
|
7
|
+
data.tar.gz: 3a33790b6c7760d180ff303b0234cef343b2f1efb4aefa032ef1121e17d3439b5a14080536fab6005b360f32b00c7ef746c3cdeb571f68658d931fe827d7a0a1
|
data/README.md
CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.2.2@pwn
|
|
37
37
|
$ rvm list gemsets
|
38
38
|
$ gem install --verbose pwn
|
39
39
|
$ pwn
|
40
|
-
pwn[v0.4.
|
40
|
+
pwn[v0.4.903]:001 >>> PWN.help
|
41
41
|
```
|
42
42
|
|
43
43
|
[![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
|
@@ -52,7 +52,7 @@ $ rvm use ruby-3.2.2@pwn
|
|
52
52
|
$ gem uninstall --all --executables pwn
|
53
53
|
$ gem install --verbose pwn
|
54
54
|
$ pwn
|
55
|
-
pwn[v0.4.
|
55
|
+
pwn[v0.4.903]:001 >>> PWN.help
|
56
56
|
```
|
57
57
|
|
58
58
|
|
data/lib/pwn/plugins/sock.rb
CHANGED
@@ -32,8 +32,8 @@ module PWN
|
|
32
32
|
tls_min_version = OpenSSL::SSL::TLS1_VERSION if tls_min_version.nil?
|
33
33
|
# tls_version Values can be Displayed via:
|
34
34
|
# OpenSSL::SSL::SSLContext::METHODS
|
35
|
-
tls_version = 'TLSv1' if tls_version.nil?
|
36
|
-
tls_version = nil if tls_min_version == OpenSSL::SSL::TLS1_3_VERSION
|
35
|
+
# tls_version = 'TLSv1' if tls_version.nil?
|
36
|
+
# tls_version = nil if tls_min_version == OpenSSL::SSL::TLS1_3_VERSION
|
37
37
|
cipher_tls = 'TLSv1.0' if cipher_tls.nil?
|
38
38
|
|
39
39
|
case protocol
|
@@ -42,8 +42,8 @@ module PWN
|
|
42
42
|
sock = TCPSocket.open(target, port)
|
43
43
|
tls_context = OpenSSL::SSL::SSLContext.new
|
44
44
|
tls_context.set_params(verify_mode: OpenSSL::SSL::VERIFY_NONE)
|
45
|
-
tls_context.verify_hostname = false
|
46
|
-
tls_context.ssl_version = tls_version
|
45
|
+
# tls_context.verify_hostname = false
|
46
|
+
# tls_context.ssl_version = tls_version
|
47
47
|
tls_context.min_version = tls_min_version
|
48
48
|
tls_context.ciphers = tls_context.ciphers.select { |c| c[1] == cipher_tls }
|
49
49
|
tls_sock = OpenSSL::SSL::SSLSocket.new(sock, tls_context)
|
@@ -63,18 +63,18 @@ module PWN
|
|
63
63
|
case tls_min_version
|
64
64
|
when OpenSSL::SSL::TLS1_VERSION
|
65
65
|
puts 'Attempting OpenSSL::SSL::TLS1_1_VERSION...'
|
66
|
-
tls_version = 'TLSv1_1'
|
66
|
+
# tls_version = 'TLSv1_1'
|
67
67
|
cipher_tls = 'TLSv1.0'
|
68
68
|
tls_min_version = OpenSSL::SSL::TLS1_1_VERSION
|
69
69
|
when OpenSSL::SSL::TLS1_1_VERSION
|
70
70
|
puts 'Attempting OpenSSL::SSL::TLS1_2_VERSION...'
|
71
|
-
tls_version = 'TLSv1_2'
|
71
|
+
# tls_version = 'TLSv1_2'
|
72
72
|
cipher_tls = 'TLSv1.2'
|
73
73
|
tls_min_version = OpenSSL::SSL::TLS1_2_VERSION
|
74
|
-
|
75
|
-
|
76
|
-
|
77
|
-
|
74
|
+
when OpenSSL::SSL::TLS1_2_VERSION
|
75
|
+
puts 'Attempting OpenSSL::SSL::TLS1_3_VERSION...'
|
76
|
+
cipher_tls = 'TLSv1.3'
|
77
|
+
tls_min_version = OpenSSL::SSL::TLS1_3_VERSION
|
78
78
|
else
|
79
79
|
tls_min_version = :abort
|
80
80
|
end
|
data/lib/pwn/version.rb
CHANGED