metasploit-framework/lib/msf/ui/console/module_command_dispatcher.rb

175 lines
3.7 KiB
Ruby
Raw Normal View History

# -*- coding: binary -*-
require 'msf/ui/console/command_dispatcher'
module Msf
module Ui
module Console
###
#
# Module-specific command dispatcher.
#
###
module ModuleCommandDispatcher
2013-08-30 21:28:33 +00:00
include Msf::Ui::Console::CommandDispatcher
def commands
{
"pry" => "Open a Pry session on the current module",
"reload" => "Reload the current module from disk",
"check" => "Check to see if a target is vulnerable"
}
end
#
# The active driver module, if any.
#
def mod
return driver.active_module
end
#
# Sets the active driver module.
#
def mod=(m)
self.driver.active_module = m
end
#
# Checks to see if a target is vulnerable.
#
def cmd_check(*args)
defanged?
ip_range_arg = args.shift || ''
hosts = Rex::Socket::RangeWalker.new(ip_range_arg)
if hosts.ranges.blank?
# Check a single rhost
check_simple
else
# Check a range
last_rhost_opt = mod.rhost
begin
hosts.each do |ip|
mod.datastore['RHOST'] = ip
check_simple
end
ensure
# Restore the original rhost if set
mod.datastore['RHOST'] = last_rhost_opt
end
end
end
def check_simple
rhost = mod.rhost
rport = mod.rport
2013-08-30 21:28:33 +00:00
begin
code = mod.check_simple(
'LocalInput' => driver.input,
'LocalOutput' => driver.output)
if (code and code.kind_of?(Array) and code.length > 1)
if (code == Msf::Exploit::CheckCode::Vulnerable)
print_good("#{rhost}:#{rport} - #{code[1]}")
2013-08-30 21:28:33 +00:00
else
print_status("#{rhost}:#{rport} - #{code[1]}")
2013-08-30 21:28:33 +00:00
end
else
print_error("#{rhost}:#{rport} - Check failed: The state could not be determined.")
2013-08-30 21:28:33 +00:00
end
rescue ::Interrupt
raise $!
rescue ::Exception => e
if(e.class.to_s != 'Msf::OptionValidateError')
2014-01-23 16:33:05 +00:00
print_error("Exploit check failed: #{e.class} #{e}")
2013-08-30 21:28:33 +00:00
print_error("Call stack:")
e.backtrace.each do |line|
break if line =~ /lib.msf.base.simple/
print_error(" #{line}")
end
2014-01-23 16:33:05 +00:00
else
print_error("#{rhost}:#{rport} - Exploit check failed: #{e.class} #{e}")
2013-08-30 21:28:33 +00:00
end
end
end
def cmd_pry_help
print_line "Usage: pry"
print_line
print_line "Open a pry session on the current module. Be careful, you"
print_line "can break things."
print_line
end
def cmd_pry(*args)
begin
require 'pry'
rescue LoadError
print_error("Failed to load pry, try 'gem install pry'")
return
end
mod.pry
end
#
# Reloads the active module
#
def cmd_reload(*args)
begin
reload
rescue
log_error("Failed to reload: #{$!}")
end
end
@@reload_opts = Rex::Parser::Arguments.new(
'-k' => [ false, 'Stop the current job before reloading.' ],
'-h' => [ false, 'Help banner.' ])
def cmd_reload_help
print_line "Usage: reload [-k]"
print_line
print_line "Reloads the current module."
print @@reload_opts.usage
end
#
# Reload the current module, optionally stopping existing job
#
def reload(should_stop_job=false)
if should_stop_job and mod.job_id
print_status('Stopping existing job...')
framework.jobs.stop_job(mod.job_id)
mod.job_id = nil
end
print_status('Reloading module...')
original_mod = self.mod
reloaded_mod = framework.modules.reload_module(original_mod)
unless reloaded_mod
error = framework.modules.module_load_error_by_path[original_mod.file_path]
2013-08-30 21:28:33 +00:00
print_error("Failed to reload module: #{error}")
2013-08-30 21:28:33 +00:00
self.mod = original_mod
else
self.mod = reloaded_mod
self.mod.init_ui(driver.input, driver.output)
end
reloaded_mod
2013-08-30 21:28:33 +00:00
end
end
end end end