metasploit-framework/lib/msf/base/simple/auxiliary.rb

123 lines
2.4 KiB
Ruby
Raw Normal View History

module Msf
module Simple
###
#
# A simplified auxiliary wrapper.
#
###
module Auxiliary
include Module
#
# Wraps the auxiliary process in a simple single method. The options
# hash can have the following values passed in it:
#
# Action
#
# The selected action name.
#
# OptionStr
#
# A string of comma separated option values that should be imported into
# the datastore.
#
# Options
#
# A hash of values to be imported directly into the datastore.
#
# LocalInput
#
# The local input handle that data can be read in from.
#
# LocalOutput
#
# The local output through which data can be displayed.
#
# RunAsJob
#
# Whether or not the exploit should be run in the context of a background
# job.
#
def self.run_simple(mod, opts = {})
# Import options from the OptionStr or Option hash.
mod._import_extra_options(opts)
# Verify the ACTION
if (mod.actions.length > 0 and not mod.action)
raise MissingActionError, "You must specify a valid Action", caller
end
# Verify the options
mod.options.validate(mod.datastore)
# Initialize user interaction
if(not opts['Quiet'])
mod.init_ui(opts['LocalInput'],opts['LocalOutput'])
else
mod.init_ui(nil, nil)
end
if(mod.passive? or opts['RunAsJob'])
mod.framework.jobs.start_bg_job(
"Auxiliary: #{mod.refname}",
mod,
Proc.new { |mod| self.job_run_proc(mod) },
Proc.new { |mod| self.job_cleanup_proc(mod) }
)
else
self.job_run_proc(mod)
self.job_cleanup_proc(mod)
end
end
#
# Calls the class method.
#
def run_simple(opts = {})
Msf::Simple::Auxiliary.run_simple(self, opts)
end
protected
#
# Job run proc, sets up the module and kicks it off.
#
def self.job_run_proc(mod)
begin
mod.setup
mod.run
rescue ::Exception => e
mod.print_error("Auxiliary failed: #{e.class} #{e}")
if(e.class.to_s != 'Msf::OptionValidateError')
mod.print_error("Call stack:")
e.backtrace.each do |line|
break if line =~ /lib.msf.base.simple.auxiliary.rb/
mod.print_error(" #{line}")
end
end
elog("Auxiliary failed: #{e.class} #{e}", 'core', LEV_0)
dlog("Call stack:\n#{$@.join("\n")}", 'core', LEV_3)
mod.cleanup
return
end
end
#
# Clean up the module after the job completes.
#
def self.job_cleanup_proc(mod)
# Allow the exploit to cleanup after itself, that messy bugger.
mod.cleanup
end
end
end
end