New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update commvault_cmd_exec module documentation #9389
Conversation
|
I'm currently mid-wipe on my msf box, but since its only docs and it can wait a few days, I can take care of this |
|
Thank you. A few days is no problem for me. Please take your time. |
| According to public documentation, the data is protected by installing agent software on the | ||
| physical or virtual hosts, which use the OS or application native APIs to protect data in a | ||
| consistent state. Production data is processed by the agent on client computers and backuped | ||
| up through a data manager (the MediaAgent) to disk, tape, or cloud storage. All data |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
backuped up ?
| .text:000000018015A0D2 jz loc_18015A220 | ||
| ``` | ||
|
|
||
| However, if you don't call one of these processes, the ```exeCmd``` will assume you want to run your |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
exeCmd should probably be execCmd
| ``` | ||
|
|
||
| It is unclear whether allowing an arbitrary custom process is intentional or not, it is unsafe | ||
| anyway considering the cvd process binds to 0.0.0.0, so anybody can access to it under the context |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can gain access to it
|
Thanks @bcoles. I just fixed the typos. |
|
my adventures in reformatting, using a windows boot loader (so windows can update again, damn you microsoft), and getting everything to work right with kali have gone miraculously wrong. I'm now file carving my drive to recover my unsubmitted msf modules (luckily @bcoles has posted 2 he developed). If someone else wants to land this, be my guest, its going to be a little while longer. It's hard to see through the tears. |
Release NotesDocumentation has been added for the exploits/windows/misc/commvault_cmd_exec module. |
This PR updates the module documentation for windows/misc/commvault_cmd_exec. I created the notes while testing and reviewing #9340.
Verification
info -dto make sure you can see the documentation.