metasploit-framework/modules/encoders/cmd/ifs.rb

49 lines
1.1 KiB
Ruby
Raw Normal View History

##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Encoder
2013-08-30 21:28:54 +00:00
# Below normal ranking because this will produce incorrect code a lot of
# the time.
Rank = LowRanking
def initialize
super(
'Name' => 'Generic ${IFS} Substitution Command Encoder',
'Description' => %q{
This encoder uses standard Bourne shell variable substitution
to avoid spaces without being overly fancy.
},
'Author' => 'egypt',
'Arch' => ARCH_CMD,
'Platform' => 'unix',
'EncoderType' => Msf::Encoder::Type::CmdUnixIfs)
2013-08-30 21:28:54 +00:00
end
#
# Encodes the payload
#
def encode_block(state, buf)
# Skip encoding for empty badchars
if state.badchars.length == 0
return buf
end
# Skip encoding unless space is a badchar
unless state.badchars.include?(" ")
return buf
end
2013-08-30 21:28:54 +00:00
buf.gsub!(/\s/, '${IFS}')
return buf
end
end