Merge branch 'master' of https://github.com/rapid7/metasploit-framework
commit
9e3053f24d
|
@ -54,7 +54,8 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
|
|
||||||
def run_host(ip)
|
def run_host(ip)
|
||||||
|
|
||||||
connect_login
|
c = connect_login
|
||||||
|
return if not c
|
||||||
|
|
||||||
path = datastore['TRAVERSAL'] + datastore['PATH']
|
path = datastore['TRAVERSAL'] + datastore['PATH']
|
||||||
|
|
||||||
|
|
|
@ -91,7 +91,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
connect_login
|
c = connect_login
|
||||||
|
return if not c
|
||||||
|
|
||||||
myhost = datastore['LHOST'] == '0.0.0.0' ? Rex::Socket.source_address : datastore['LHOST']
|
myhost = datastore['LHOST'] == '0.0.0.0' ? Rex::Socket.source_address : datastore['LHOST']
|
||||||
|
|
||||||
|
|
|
@ -70,7 +70,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
connect_login
|
c = connect_login
|
||||||
|
return if not c
|
||||||
|
|
||||||
sploit = "\n" * 671 + rand_text_english(3, payload_badchars)
|
sploit = "\n" * 671 + rand_text_english(3, payload_badchars)
|
||||||
sploit << [target.ret].pack('V') + make_nops(40) + payload.encoded
|
sploit << [target.ret].pack('V') + make_nops(40) + payload.encoded
|
||||||
|
|
|
@ -47,7 +47,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
connect_login
|
c = connect_login
|
||||||
|
return if not c
|
||||||
|
|
||||||
print_status("Trying target #{target.name}...")
|
print_status("Trying target #{target.name}...")
|
||||||
|
|
||||||
|
|
|
@ -51,7 +51,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
connect_login
|
c = connect_login
|
||||||
|
return if not c
|
||||||
|
|
||||||
buf = make_nops(3047)
|
buf = make_nops(3047)
|
||||||
buf[2043, 4] = [ target.ret ].pack('V')
|
buf[2043, 4] = [ target.ret ].pack('V')
|
||||||
|
|
|
@ -173,7 +173,8 @@ For now, that will have to be done manually.
|
||||||
end
|
end
|
||||||
|
|
||||||
# proceed with chosen target...
|
# proceed with chosen target...
|
||||||
connect_login
|
c = connect_login
|
||||||
|
return if not c
|
||||||
|
|
||||||
# '<ip>\n PWD '
|
# '<ip>\n PWD '
|
||||||
ip_length = Rex::Socket.source_address(datastore['RHOST']).length
|
ip_length = Rex::Socket.source_address(datastore['RHOST']).length
|
||||||
|
|
|
@ -76,7 +76,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
connect_login
|
c = connect_login
|
||||||
|
return if not c
|
||||||
|
|
||||||
print_status("Trying target #{target.name}...")
|
print_status("Trying target #{target.name}...")
|
||||||
|
|
||||||
|
|
|
@ -67,7 +67,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
connect_login
|
c = connect_login
|
||||||
|
return if not c
|
||||||
|
|
||||||
eggoptions =
|
eggoptions =
|
||||||
{
|
{
|
||||||
|
|
|
@ -129,8 +129,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
|
c = connect_login
|
||||||
connect_login
|
return if not c
|
||||||
|
|
||||||
print_status("Trying target #{target.name}...")
|
print_status("Trying target #{target.name}...")
|
||||||
|
|
||||||
|
|
|
@ -52,7 +52,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
connect_login
|
c = connect_login
|
||||||
|
return if not c
|
||||||
|
|
||||||
print_status("Trying target #{target.name}...")
|
print_status("Trying target #{target.name}...")
|
||||||
|
|
||||||
|
|
|
@ -145,7 +145,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
print_status("Selected Target: #{my_target.name}")
|
print_status("Selected Target: #{my_target.name}")
|
||||||
connect_login
|
c = connect_login
|
||||||
|
return if not c
|
||||||
|
|
||||||
rop_chain = create_rop_chain(target['ver'])
|
rop_chain = create_rop_chain(target['ver'])
|
||||||
rop = rop_chain.unpack('C*').join(',')
|
rop = rop_chain.unpack('C*').join(',')
|
||||||
|
|
|
@ -50,7 +50,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
connect_login
|
c = connect_login
|
||||||
|
return if not c
|
||||||
|
|
||||||
sploit = "/" + make_nops(525 - payload.encoded.length)
|
sploit = "/" + make_nops(525 - payload.encoded.length)
|
||||||
sploit << payload.encoded + [target.ret].pack('V')
|
sploit << payload.encoded + [target.ret].pack('V')
|
||||||
|
|
|
@ -62,7 +62,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
connect_login
|
c = connect_login
|
||||||
|
return if not c
|
||||||
|
|
||||||
print_status("Trying target #{target.name}...")
|
print_status("Trying target #{target.name}...")
|
||||||
|
|
||||||
|
|
|
@ -56,7 +56,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
connect_login
|
c = connect_login
|
||||||
|
return if not c
|
||||||
|
|
||||||
print_status("Trying target #{target.name}...")
|
print_status("Trying target #{target.name}...")
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue