2015-05-20 22:09:28 +00:00
|
|
|
|
2015-05-21 04:32:31 +00:00
|
|
|
##
|
|
|
|
# This module requires Metasploit: http://metasploit.com/download
|
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
2015-05-20 22:09:28 +00:00
|
|
|
##
|
|
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
require 'rex'
|
|
|
|
require 'msf/core/post/windows/powershell'
|
|
|
|
|
|
|
|
class Metasploit3 < Msf::Post
|
2015-05-20 23:08:50 +00:00
|
|
|
include Msf::Post::Windows::Powershell
|
2015-05-20 22:09:28 +00:00
|
|
|
|
2015-05-20 23:08:50 +00:00
|
|
|
def initialize(info={})
|
|
|
|
super(update_info(info,
|
|
|
|
'Name' => "Windows Powershell Execution Post Module",
|
|
|
|
'Description' => %q{
|
|
|
|
This module will execute a powershell script in a meterpreter session.
|
|
|
|
The user may also enter text substitutions to be made in memory before execution.
|
|
|
|
Setting VERBOSE to true will output both the script prior to execution and the results.
|
|
|
|
},
|
|
|
|
'License' => MSF_LICENSE,
|
|
|
|
'Platform' => ['windows'],
|
|
|
|
'SessionTypes' => ['meterpreter'],
|
|
|
|
'Author' => [
|
|
|
|
'Nicholas Nam (nick[at]executionflow.org)', # original meterpreter script
|
|
|
|
'RageLtMan' # post module and libs
|
|
|
|
]
|
|
|
|
))
|
2015-05-20 22:09:28 +00:00
|
|
|
|
2015-05-20 23:08:50 +00:00
|
|
|
register_options(
|
|
|
|
[
|
|
|
|
OptString.new( 'SCRIPT', [true, 'Path to the PS script or command string to execute' ]),
|
|
|
|
], self.class)
|
2015-05-20 22:09:28 +00:00
|
|
|
|
2015-05-20 23:08:50 +00:00
|
|
|
register_advanced_options(
|
|
|
|
[
|
|
|
|
OptString.new('SUBSTITUTIONS', [false, 'Script subs in gsub format - original,sub;original,sub' ]),
|
|
|
|
], self.class)
|
2015-05-20 22:09:28 +00:00
|
|
|
|
2015-05-20 23:08:50 +00:00
|
|
|
end
|
2015-05-20 22:09:28 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
2015-05-20 23:08:50 +00:00
|
|
|
def run
|
2015-05-20 22:09:28 +00:00
|
|
|
|
2015-05-20 23:08:50 +00:00
|
|
|
# Make sure we meet the requirements before running the script, note no need to return
|
|
|
|
# unless error
|
|
|
|
raise "Powershell not available" if ! have_powershell?
|
2015-05-20 22:09:28 +00:00
|
|
|
|
|
|
|
# Preprocess the Powershell::Script object with substitions from Exploit::Powershell
|
|
|
|
script = make_subs(read_script(datstore['SCRIPT']),process_subs(datstore['SUBSTITUTIONS']))
|
|
|
|
|
|
|
|
# Execute in session
|
2015-05-20 23:08:50 +00:00
|
|
|
print_status psh_exec(script)
|
|
|
|
print_good('Finished!')
|
|
|
|
end
|
2015-05-20 22:09:28 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
end
|