update modules to use is_system? to ensure SID is used to verify when running in certain languages in Windows
git-svn-id: file:///home/svn/framework3/trunk@11999 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
89795f1784
commit
4031daa1fb
|
@ -12,10 +12,12 @@
|
|||
require 'msf/core'
|
||||
require 'rex'
|
||||
require 'msf/core/post/file'
|
||||
require 'msf/core/post/windows/accounts'
|
||||
|
||||
class Metasploit3 < Msf::Post
|
||||
|
||||
include Msf::Post::File
|
||||
include Msf::Post::Priv
|
||||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
|
@ -239,7 +241,8 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
#Get user(s)
|
||||
usernames = []
|
||||
if (uid = session.sys.config.getuid) == "NT AUTHORITY\\SYSTEM"
|
||||
uid = session.sys.config.getuid
|
||||
if is_system?
|
||||
print_status("running as SYSTEM, extracting user list...")
|
||||
print_error("(Automatic decryption will not be possible. You might want to manually migrate, or \"set MIGRATE true\")")
|
||||
session.fs.dir.foreach(@profiles_path) do |u|
|
||||
|
|
|
@ -12,10 +12,12 @@
|
|||
require 'msf/core'
|
||||
require 'rex'
|
||||
require 'msf/core/post/windows/registry'
|
||||
require 'msf/core/post/windows/accounts'
|
||||
|
||||
class Metasploit3 < Msf::Post
|
||||
|
||||
include Msf::Post::Registry
|
||||
include Msf::Post::Priv
|
||||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
|
@ -45,7 +47,7 @@ class Metasploit3 < Msf::Post
|
|||
profilepath = "\\My Documents\\WindowsPowerShell\\"
|
||||
end
|
||||
|
||||
if user == "NT AUTHORITY\\SYSTEM"
|
||||
if is_system?
|
||||
print_status("Running as SYSTEM extracting user list..")
|
||||
session.fs.dir.foreach(path4users) do |u|
|
||||
userinfo = {}
|
||||
|
|
|
@ -12,10 +12,12 @@
|
|||
require 'msf/core'
|
||||
require 'rex'
|
||||
require 'msf/core/post/windows/registry'
|
||||
require 'msf/core/post/windows/accounts'
|
||||
|
||||
class Metasploit3 < Msf::Post
|
||||
|
||||
include Msf::Post::Registry
|
||||
include Msf::Post::Priv
|
||||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
|
@ -132,8 +134,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
# Enumerate shares being offered
|
||||
enum_conf_shares() if datastore["CURRENT"]
|
||||
user = session.sys.config.getuid
|
||||
if user != "NT AUTHORITY\\SYSTEM"
|
||||
if is_system?
|
||||
mount_history = enum_recent_mounts("HKEY_CURRENT_USER")
|
||||
run_history = enum_run_unc("HKEY_CURRENT_USER")
|
||||
else
|
||||
|
|
Loading…
Reference in New Issue