2005-12-17 06:46:23 +00:00
|
|
|
#!/usr/bin/env ruby
|
2005-11-28 21:38:48 +00:00
|
|
|
#
|
|
|
|
# This user interface allows users to interact with the framework through a
|
|
|
|
# command line interface (CLI) rather than having to use a prompting console
|
|
|
|
# or web-based interface.
|
|
|
|
#
|
2005-10-02 05:47:52 +00:00
|
|
|
|
2006-07-31 15:36:08 +00:00
|
|
|
msfbase = File.symlink?(__FILE__) ? File.readlink(__FILE__) : __FILE__
|
|
|
|
$:.unshift(File.join(File.dirname(msfbase), 'lib'))
|
2005-10-02 05:47:52 +00:00
|
|
|
|
|
|
|
require 'rex'
|
|
|
|
require 'msf/ui'
|
|
|
|
require 'msf/base'
|
|
|
|
|
|
|
|
Indent = ' '
|
|
|
|
|
|
|
|
# Initialize the simplified framework instance.
|
|
|
|
$framework = Msf::Simple::Framework.create
|
|
|
|
|
2007-02-15 21:14:11 +00:00
|
|
|
if ($framework.modules.failed.length > 0)
|
|
|
|
print("Warning: The following modules could not be loaded!\n\n")
|
|
|
|
$framework.modules.failed.each_pair do |file, err|
|
|
|
|
print("\t#{file}: #{err.to_s}\n\n")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2006-01-10 16:07:45 +00:00
|
|
|
def usage (str = nil, extra = nil)
|
|
|
|
tbl = Rex::Ui::Text::Table.new(
|
|
|
|
'Header' => "Usage: #{$0} <exploit_name> <option=value> [mode]",
|
|
|
|
'Indent' => 4,
|
|
|
|
'Columns' => ['Mode', 'Description']
|
|
|
|
)
|
|
|
|
|
2006-09-14 05:33:47 +00:00
|
|
|
tbl << ['(H)elp', "You're looking at it baby!"]
|
|
|
|
tbl << ['(S)ummary', 'Show information about this module']
|
|
|
|
tbl << ['(O)ptions', 'Show available options for this module']
|
|
|
|
tbl << ['(A)dvanced', 'Show available advanced options for this module']
|
|
|
|
tbl << ['(I)DS Evasion', 'Show available ids evasion options for this module']
|
|
|
|
tbl << ['(P)ayloads', 'Show available payloads for this module']
|
2007-02-15 07:33:40 +00:00
|
|
|
tbl << ['(T)argets', 'Show available targets for this exploit module']
|
|
|
|
tbl << ['(AC)tions', 'Show available actions for this auxiliary module']
|
2006-09-14 05:33:47 +00:00
|
|
|
tbl << ['(C)heck', 'Run the check routine of the selected module']
|
|
|
|
tbl << ['(E)xecute', 'Execute the selected module']
|
2006-01-10 16:07:45 +00:00
|
|
|
|
|
|
|
$stdout.puts "Error: #{str}\n\n" if str
|
|
|
|
$stdout.puts tbl.to_s + "\n"
|
|
|
|
$stdout.puts extra + "\n" if extra
|
|
|
|
|
|
|
|
exit
|
|
|
|
end
|
|
|
|
|
2006-01-05 22:20:28 +00:00
|
|
|
if (ARGV.length < 1)
|
2006-09-14 05:33:47 +00:00
|
|
|
ext = ''
|
|
|
|
|
2005-12-15 05:07:14 +00:00
|
|
|
tbl = Rex::Ui::Text::Table.new(
|
|
|
|
'Header' => 'Exploits',
|
|
|
|
'Indent' => 4,
|
|
|
|
'Columns' => [ 'Name', 'Description' ])
|
|
|
|
|
|
|
|
$framework.exploits.each_module { |name, mod|
|
2006-09-14 05:33:47 +00:00
|
|
|
tbl << [ 'exploit/' + name, mod.new.name ]
|
2005-12-15 05:07:14 +00:00
|
|
|
}
|
2006-09-14 05:33:47 +00:00
|
|
|
ext << tbl.to_s + "\n"
|
|
|
|
|
|
|
|
tbl = Rex::Ui::Text::Table.new(
|
|
|
|
'Header' => 'Auxiliary',
|
|
|
|
'Indent' => 4,
|
|
|
|
'Columns' => [ 'Name', 'Description' ])
|
2005-12-15 05:07:14 +00:00
|
|
|
|
2006-09-14 05:33:47 +00:00
|
|
|
$framework.auxiliary.each_module { |name, mod|
|
|
|
|
tbl << [ 'auxiliary/' + name, mod.new.name ]
|
|
|
|
}
|
|
|
|
|
|
|
|
ext << tbl.to_s + "\n"
|
|
|
|
|
|
|
|
usage(nil, ext)
|
2005-10-02 05:47:52 +00:00
|
|
|
end
|
|
|
|
|
2006-09-14 05:33:47 +00:00
|
|
|
# Get the module name we'll be using
|
2005-10-02 05:47:52 +00:00
|
|
|
exploit_name = ARGV.shift
|
2006-09-14 05:33:47 +00:00
|
|
|
exploit = nil
|
|
|
|
module_class = nil
|
|
|
|
|
2007-02-18 12:27:17 +00:00
|
|
|
# Process special var/val pairs...
|
|
|
|
Msf::Ui::Common.process_cli_arguments($framework, ARGV)
|
|
|
|
|
2006-09-14 05:33:47 +00:00
|
|
|
# Determine what type of module it is
|
|
|
|
case exploit_name
|
|
|
|
when /exploit\/(.*)/
|
|
|
|
exploit = $framework.exploits.create($1)
|
|
|
|
module_class = 'exploit'
|
|
|
|
|
|
|
|
when /auxiliary\/(.*)/
|
|
|
|
exploit = $framework.auxiliary.create($1)
|
|
|
|
module_class = 'auxiliary'
|
2007-02-18 12:27:17 +00:00
|
|
|
|
|
|
|
else
|
|
|
|
exploit = $framework.exploits.create(exploit_name)
|
|
|
|
|
2006-09-14 05:33:47 +00:00
|
|
|
end
|
2005-10-02 05:47:52 +00:00
|
|
|
|
|
|
|
if (exploit == nil)
|
2006-09-14 05:33:47 +00:00
|
|
|
usage("Invalid module: #{exploit_name}")
|
2005-10-02 05:47:52 +00:00
|
|
|
end
|
|
|
|
|
2006-02-04 23:59:17 +00:00
|
|
|
exploit.init_ui(
|
|
|
|
Rex::Ui::Text::Input::Stdio.new,
|
|
|
|
Rex::Ui::Text::Output::Stdio.new
|
|
|
|
)
|
|
|
|
|
2006-01-05 22:20:28 +00:00
|
|
|
# Evalulate the command (default to "help")
|
|
|
|
mode = ARGV.pop || 'h'
|
2005-10-02 05:47:52 +00:00
|
|
|
|
|
|
|
# Import options
|
2006-03-16 16:33:32 +00:00
|
|
|
exploit.datastore.import_options_from_s(ARGV.join('_|_'), '_|_')
|
2005-10-02 05:47:52 +00:00
|
|
|
|
|
|
|
case mode.downcase
|
2006-01-10 16:07:45 +00:00
|
|
|
when 'h'
|
|
|
|
usage
|
2005-10-02 05:47:52 +00:00
|
|
|
when "s"
|
|
|
|
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_module(exploit, Indent))
|
|
|
|
when "o"
|
|
|
|
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_options(exploit, Indent))
|
|
|
|
when "a"
|
|
|
|
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_advanced_options(exploit, Indent))
|
2006-01-05 03:57:12 +00:00
|
|
|
when "i"
|
|
|
|
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_evasion_options(exploit, Indent))
|
2005-10-02 05:47:52 +00:00
|
|
|
when "p"
|
2006-09-14 05:33:47 +00:00
|
|
|
if (module_class == 'exploit')
|
|
|
|
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_compatible_payloads(exploit, Indent, "Compatible payloads"))
|
|
|
|
else
|
|
|
|
$stdout.puts("\nError: This type of module does not support payloads")
|
|
|
|
end
|
2005-10-02 05:47:52 +00:00
|
|
|
when "t"
|
2006-09-14 05:33:47 +00:00
|
|
|
if (module_class == 'exploit')
|
|
|
|
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_exploit_targets(exploit, Indent))
|
|
|
|
else
|
|
|
|
$stdout.puts("\nError: This type of module does not support targets")
|
|
|
|
end
|
2007-02-15 07:33:40 +00:00
|
|
|
when "ac"
|
2006-09-14 05:33:47 +00:00
|
|
|
if (module_class == 'auxiliary')
|
|
|
|
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_auxiliary_actions(exploit, Indent))
|
|
|
|
else
|
|
|
|
$stdout.puts("\nError: This type of module does not support actions")
|
|
|
|
end
|
2005-10-02 05:47:52 +00:00
|
|
|
when "c"
|
2006-09-14 05:33:47 +00:00
|
|
|
if (module_class == 'exploit')
|
|
|
|
begin
|
|
|
|
if (code = exploit.check)
|
|
|
|
stat = (code == Msf::Exploit::CheckCode::Vulnerable) ? '[+]' : '[*]'
|
|
|
|
|
|
|
|
$stdout.puts("#{stat} #{code[1]}")
|
|
|
|
else
|
|
|
|
$stderr.puts("Check failed: The state could not be determined.")
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
$stderr.puts("Check failed: #{$!}")
|
2005-10-02 05:47:52 +00:00
|
|
|
end
|
2006-09-14 05:33:47 +00:00
|
|
|
else
|
|
|
|
$stdout.puts("\nError: This type of module does not support the check feature")
|
2005-10-02 05:47:52 +00:00
|
|
|
end
|
|
|
|
when "e"
|
2006-09-14 05:33:47 +00:00
|
|
|
|
|
|
|
case module_class
|
|
|
|
when 'exploit'
|
|
|
|
begin
|
|
|
|
session = exploit.exploit_simple(
|
|
|
|
'Encoder' => exploit.datastore['ENCODER'],
|
|
|
|
'Target' => exploit.datastore['TARGET'],
|
|
|
|
'Payload' => exploit.datastore['PAYLOAD'],
|
|
|
|
'Nop' => exploit.datastore['NOP'],
|
|
|
|
'LocalInput' => Rex::Ui::Text::Input::Stdio.new,
|
|
|
|
'LocalOutput' => Rex::Ui::Text::Output::Stdio.new,
|
|
|
|
'ForceBlocking' => true)
|
|
|
|
|
|
|
|
if (session)
|
|
|
|
$stdout.puts("[*] #{session.desc} session #{session.name} opened (#{session.tunnel_to_s})\n\n")
|
|
|
|
|
|
|
|
session.init_ui(
|
|
|
|
Rex::Ui::Text::Input::Stdio.new,
|
|
|
|
Rex::Ui::Text::Output::Stdio.new)
|
|
|
|
|
|
|
|
session.interact
|
|
|
|
end
|
|
|
|
|
|
|
|
rescue
|
|
|
|
$stderr.puts("Exploit failed: #{$!}")
|
|
|
|
$stderr.puts("Backtrace:")
|
|
|
|
$stderr.puts($!.backtrace.join("\n"))
|
2005-10-02 05:47:52 +00:00
|
|
|
end
|
2006-09-14 05:33:47 +00:00
|
|
|
when 'auxiliary'
|
|
|
|
begin
|
|
|
|
session = exploit.run_simple(
|
|
|
|
'Encoder' => exploit.datastore['ENCODER'],
|
|
|
|
'Action' => exploit.datastore['ACTION'],
|
|
|
|
'LocalInput' => Rex::Ui::Text::Input::Stdio.new,
|
|
|
|
'LocalOutput' => Rex::Ui::Text::Output::Stdio.new,
|
|
|
|
'ForceBlocking' => true)
|
|
|
|
|
|
|
|
if (session)
|
|
|
|
$stdout.puts("[*] #{session.desc} session #{session.name} opened (#{session.tunnel_to_s})\n\n")
|
|
|
|
|
|
|
|
session.init_ui(
|
|
|
|
Rex::Ui::Text::Input::Stdio.new,
|
|
|
|
Rex::Ui::Text::Output::Stdio.new)
|
|
|
|
|
|
|
|
session.interact
|
|
|
|
end
|
|
|
|
|
|
|
|
rescue
|
|
|
|
$stderr.puts("Auxiliary failed: #{$!}")
|
|
|
|
$stderr.puts("Backtrace:")
|
|
|
|
$stderr.puts($!.backtrace.join("\n"))
|
|
|
|
end
|
2005-10-02 05:47:52 +00:00
|
|
|
end
|
2006-01-10 16:07:45 +00:00
|
|
|
else
|
|
|
|
usage("Invalid mode #{mode}")
|
2005-10-02 05:47:52 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
$stdout.puts
|