metasploit-framework/modules/post/windows/manage/exec_powershell.rb

62 lines
1.8 KiB
Ruby
Raw Normal View History

2015-05-21 04:32:31 +00:00
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
require 'rex'
require 'msf/core/post/windows/powershell'
class Metasploit3 < Msf::Post
2015-05-20 23:08:50 +00:00
include Msf::Post::Windows::Powershell
2015-05-20 23:08:50 +00:00
def initialize(info={})
super(update_info(info,
'Name' => "Windows Powershell Execution Post Module",
'Description' => %q{
This module will execute a powershell script in a meterpreter session.
The user may also enter text substitutions to be made in memory before execution.
Setting VERBOSE to true will output both the script prior to execution and the results.
},
'License' => MSF_LICENSE,
'Platform' => ['windows'],
'SessionTypes' => ['meterpreter'],
'Author' => [
'Nicholas Nam (nick[at]executionflow.org)', # original meterpreter script
'RageLtMan' # post module and libs
]
))
2015-05-20 23:08:50 +00:00
register_options(
[
OptString.new( 'SCRIPT', [true, 'Path to the PS script or command string to execute' ]),
], self.class)
2015-05-20 23:08:50 +00:00
register_advanced_options(
[
OptString.new('SUBSTITUTIONS', [false, 'Script subs in gsub format - original,sub;original,sub' ]),
], self.class)
2015-05-20 23:08:50 +00:00
end
2015-05-20 23:08:50 +00:00
def run
2015-05-20 23:08:50 +00:00
# Make sure we meet the requirements before running the script, note no need to return
# unless error
raise "Powershell not available" if ! have_powershell?
# Preprocess the Powershell::Script object with substitions from Exploit::Powershell
script = make_subs(read_script(datstore['SCRIPT']),process_subs(datstore['SUBSTITUTIONS']))
# Execute in session
2015-05-20 23:08:50 +00:00
print_status psh_exec(script)
print_good('Finished!')
end
end