2012-06-29 05:18:28 +00:00
|
|
|
# -*- coding: binary -*-
|
2011-08-24 21:41:03 +00:00
|
|
|
require 'msf/ui/console/command_dispatcher'
|
|
|
|
|
|
|
|
module Msf
|
|
|
|
module Ui
|
|
|
|
module Console
|
|
|
|
|
|
|
|
###
|
|
|
|
#
|
|
|
|
# Module-specific command dispatcher.
|
|
|
|
#
|
|
|
|
###
|
|
|
|
module ModuleCommandDispatcher
|
|
|
|
|
2013-08-30 21:28:33 +00:00
|
|
|
include Msf::Ui::Console::CommandDispatcher
|
|
|
|
|
|
|
|
def commands
|
|
|
|
{
|
|
|
|
"pry" => "Open a Pry session on the current module",
|
|
|
|
"reload" => "Reload the current module from disk",
|
|
|
|
"check" => "Check to see if a target is vulnerable"
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
#
|
|
|
|
# The active driver module, if any.
|
|
|
|
#
|
|
|
|
def mod
|
|
|
|
return driver.active_module
|
|
|
|
end
|
|
|
|
|
|
|
|
#
|
|
|
|
# Sets the active driver module.
|
|
|
|
#
|
|
|
|
def mod=(m)
|
|
|
|
self.driver.active_module = m
|
|
|
|
end
|
|
|
|
|
|
|
|
#
|
|
|
|
# Checks to see if a target is vulnerable.
|
|
|
|
#
|
|
|
|
def cmd_check(*args)
|
|
|
|
defanged?
|
2014-01-23 06:37:32 +00:00
|
|
|
|
|
|
|
ip_range_arg = args.shift || ''
|
|
|
|
hosts = Rex::Socket::RangeWalker.new(ip_range_arg)
|
|
|
|
|
|
|
|
if hosts.ranges.blank?
|
|
|
|
# Check a single rhost
|
|
|
|
check_simple
|
|
|
|
else
|
|
|
|
# Check a range
|
|
|
|
last_rhost_opt = mod.rhost
|
|
|
|
hosts.each do |ip|
|
|
|
|
mod.datastore['RHOST'] = ip
|
|
|
|
check_simple
|
|
|
|
end
|
|
|
|
|
|
|
|
# Restore the original rhost if set
|
|
|
|
mod.datastore['RHOST'] = last_rhost_opt if last_rhost_opt
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def check_simple
|
|
|
|
rhost = mod.rhost
|
|
|
|
rport = mod.rport
|
|
|
|
|
2013-08-30 21:28:33 +00:00
|
|
|
begin
|
|
|
|
code = mod.check_simple(
|
|
|
|
'LocalInput' => driver.input,
|
|
|
|
'LocalOutput' => driver.output)
|
|
|
|
if (code and code.kind_of?(Array) and code.length > 1)
|
|
|
|
if (code == Msf::Exploit::CheckCode::Vulnerable)
|
2014-01-23 06:37:32 +00:00
|
|
|
print_good("#{rhost}:#{rport} - #{code[1]}")
|
2013-08-30 21:28:33 +00:00
|
|
|
else
|
2014-01-23 06:37:32 +00:00
|
|
|
print_status("#{rhost}:#{rport} - #{code[1]}")
|
2013-08-30 21:28:33 +00:00
|
|
|
end
|
|
|
|
else
|
2014-01-23 06:37:32 +00:00
|
|
|
print_error("#{rhost}:#{rport} - Check failed: The state could not be determined.")
|
2013-08-30 21:28:33 +00:00
|
|
|
end
|
|
|
|
rescue ::Interrupt
|
|
|
|
raise $!
|
|
|
|
rescue ::Exception => e
|
2014-01-23 06:37:32 +00:00
|
|
|
print_error("#{rhost}:#{rport} - Exploit check failed: #{e.class} #{e}")
|
2013-08-30 21:28:33 +00:00
|
|
|
if(e.class.to_s != 'Msf::OptionValidateError')
|
|
|
|
print_error("Call stack:")
|
|
|
|
e.backtrace.each do |line|
|
|
|
|
break if line =~ /lib.msf.base.simple/
|
|
|
|
print_error(" #{line}")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def cmd_pry_help
|
|
|
|
print_line "Usage: pry"
|
|
|
|
print_line
|
|
|
|
print_line "Open a pry session on the current module. Be careful, you"
|
|
|
|
print_line "can break things."
|
|
|
|
print_line
|
|
|
|
end
|
|
|
|
|
|
|
|
def cmd_pry(*args)
|
|
|
|
begin
|
|
|
|
require 'pry'
|
|
|
|
rescue LoadError
|
|
|
|
print_error("Failed to load pry, try 'gem install pry'")
|
|
|
|
return
|
|
|
|
end
|
|
|
|
mod.pry
|
|
|
|
end
|
|
|
|
|
|
|
|
#
|
|
|
|
# Reloads the active module
|
|
|
|
#
|
|
|
|
def cmd_reload(*args)
|
|
|
|
begin
|
|
|
|
reload
|
|
|
|
rescue
|
|
|
|
log_error("Failed to reload: #{$!}")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
@@reload_opts = Rex::Parser::Arguments.new(
|
|
|
|
'-k' => [ false, 'Stop the current job before reloading.' ],
|
|
|
|
'-h' => [ false, 'Help banner.' ])
|
|
|
|
|
|
|
|
def cmd_reload_help
|
|
|
|
print_line "Usage: reload [-k]"
|
|
|
|
print_line
|
|
|
|
print_line "Reloads the current module."
|
|
|
|
print @@reload_opts.usage
|
|
|
|
end
|
|
|
|
|
|
|
|
#
|
|
|
|
# Reload the current module, optionally stopping existing job
|
|
|
|
#
|
|
|
|
def reload(should_stop_job=false)
|
|
|
|
if should_stop_job and mod.job_id
|
|
|
|
print_status('Stopping existing job...')
|
|
|
|
|
|
|
|
framework.jobs.stop_job(mod.job_id)
|
|
|
|
mod.job_id = nil
|
|
|
|
end
|
|
|
|
|
|
|
|
print_status('Reloading module...')
|
|
|
|
|
|
|
|
original_mod = self.mod
|
|
|
|
reloaded_mod = framework.modules.reload_module(original_mod)
|
|
|
|
|
|
|
|
unless reloaded_mod
|
2012-10-04 21:32:12 +00:00
|
|
|
error = framework.modules.module_load_error_by_path[original_mod.file_path]
|
|
|
|
|
2013-08-30 21:28:33 +00:00
|
|
|
print_error("Failed to reload module: #{error}")
|
2012-10-04 21:32:12 +00:00
|
|
|
|
2013-08-30 21:28:33 +00:00
|
|
|
self.mod = original_mod
|
2012-10-04 21:32:12 +00:00
|
|
|
else
|
|
|
|
self.mod = reloaded_mod
|
|
|
|
|
|
|
|
self.mod.init_ui(driver.input, driver.output)
|
|
|
|
end
|
2011-08-24 21:41:03 +00:00
|
|
|
|
2012-10-04 21:32:12 +00:00
|
|
|
reloaded_mod
|
2013-08-30 21:28:33 +00:00
|
|
|
end
|
2011-08-24 21:41:03 +00:00
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
|
|
end end end
|
|
|
|
|