Add UI for PXE attack reset.

git-svn-id: file:///home/svn/framework3/trunk@13753 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Matt Weeks 2011-09-18 20:44:16 +00:00
parent 10bf0fbe84
commit 1d2ddc55e8
2 changed files with 12 additions and 0 deletions

View File

@ -66,6 +66,7 @@ class Metasploit3 < Msf::Exploit::Remote
OptString.new('TFTPROOT', [ false, 'The TFTP root directory to serve files from' ]),
OptString.new('SRVHOST', [ false, 'The IP of the DHCP server' ]),
OptString.new('NETMASK', [ false, 'The netmask of the local subnet', '255.255.255.0' ]),
OptBool.new('RESETPXE', [ true, 'Resets the server to re-exploit already targeted hosts', false ]),
OptString.new('DHCPIPSTART', [ false, 'The first IP to give out' ]),
OptString.new('DHCPIPEND', [ false, 'The last IP to give out' ])
], self.class)
@ -92,6 +93,11 @@ class Metasploit3 < Msf::Exploit::Remote
if not client.lanattacks
print_status("Loading lanattacks extension...")
client.core.use("lanattacks")
else
if datastore['RESETPXE']
print_status("Resetting PXE attack...")
client.lanattacks.reset_dhcp
end
end
print_status("Loading DHCP options...")

View File

@ -43,6 +43,7 @@ class Metasploit3 < Msf::Post
OptString.new('TFTPROOT', [ false, 'The TFTP root directory to serve files from' ]),
OptString.new('SRVHOST', [ false, 'The IP of the DHCP server' ]),
OptString.new('NETMASK', [ false, 'The netmask of the local subnet', '255.255.255.0' ]),
OptBool.new('RESETPXE', [ true, 'Resets the server to re-exploit already targeted hosts', false ]),
OptString.new('DHCPIPSTART', [ false, 'The first IP to give out' ]),
OptString.new('DHCPIPEND', [ false, 'The last IP to give out' ])
], self.class)
@ -55,6 +56,11 @@ class Metasploit3 < Msf::Post
if not client.lanattacks
print_status("Loading lanattacks extension...")
client.core.use("lanattacks")
else
if datastore['RESETPXE']
print_status("Resetting PXE attack...")
client.lanattacks.reset_dhcp
end
end
#Not setting these options (using autodetect)