Land #6083, autofilter fixes for aggro modules
commit
c1b6de90a0
|
@ -277,4 +277,8 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
send_response(cli, @pl)
|
||||
end
|
||||
|
||||
def autofilter
|
||||
true
|
||||
end
|
||||
|
||||
end
|
||||
|
|
|
@ -107,6 +107,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
end
|
||||
|
||||
def autofilter
|
||||
true
|
||||
end
|
||||
|
||||
def exploit
|
||||
@pl = generate_payload_exe
|
||||
if @pl.blank?
|
||||
|
|
|
@ -148,6 +148,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
end
|
||||
|
||||
def autofilter
|
||||
true
|
||||
end
|
||||
|
||||
#task scheduler is pretty bad at handling binary files and likes to mess up our meterpreter :-(
|
||||
#instead we use a CFML filedropper to embed our payload and execute it.
|
||||
#this also removes the dependancy of using the probe.cfm to execute the file.
|
||||
|
|
|
@ -326,6 +326,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
res
|
||||
end
|
||||
|
||||
def autofilter
|
||||
true
|
||||
end
|
||||
|
||||
# Try to autodetect the target platform
|
||||
def detect_platform(res)
|
||||
if (res.body =~ /<td.*?OSName.*?(Linux|FreeBSD|Windows).*?<\/td>/m)
|
||||
|
|
|
@ -170,6 +170,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
send_response(cli, @pl)
|
||||
end
|
||||
|
||||
def autofilter
|
||||
true
|
||||
end
|
||||
|
||||
def upload_payload
|
||||
print_status "#{peer} - Uploading payload ..."
|
||||
path = "/#{@local_path}#{@payload_dir}#{@payload_name}"
|
||||
|
|
|
@ -343,6 +343,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
send_response(cli, @pl)
|
||||
end
|
||||
|
||||
def autofilter
|
||||
true
|
||||
end
|
||||
|
||||
# wait for the data to be sent
|
||||
def wait_payload
|
||||
print_status("#{rhost}:#{rport} - Waiting for the victim to request the payload...")
|
||||
|
|
|
@ -552,4 +552,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
register_files_for_cleanup("c:\\#{@down_file}.exe")
|
||||
end
|
||||
end
|
||||
|
||||
def autofilter
|
||||
true
|
||||
end
|
||||
|
||||
end
|
||||
|
|
|
@ -93,6 +93,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
end
|
||||
|
||||
def autofilter
|
||||
return true
|
||||
end
|
||||
|
||||
def check
|
||||
connect
|
||||
|
||||
|
|
|
@ -59,6 +59,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
send_response(cli, data)
|
||||
end
|
||||
|
||||
def autofilter
|
||||
true
|
||||
end
|
||||
|
||||
def check
|
||||
res = send_request_cgi({
|
||||
'uri' => '/search',
|
||||
|
|
|
@ -146,4 +146,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
send_not_found(cli)
|
||||
end
|
||||
|
||||
def autofilter
|
||||
true
|
||||
end
|
||||
|
||||
end
|
||||
|
|
|
@ -63,6 +63,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
"#{get_uri}.php"
|
||||
end
|
||||
|
||||
def autofilter
|
||||
true
|
||||
end
|
||||
|
||||
def call_payload(file_name)
|
||||
res = send_request_cgi({
|
||||
'method' => 'GET',
|
||||
|
|
|
@ -81,6 +81,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
remove_resource(get_resource)
|
||||
end
|
||||
|
||||
def autofilter
|
||||
true
|
||||
end
|
||||
|
||||
def primer
|
||||
file_name = rand_text_alpha(rand(10)+5)
|
||||
file_ext = '.vbs'
|
||||
|
|
|
@ -74,6 +74,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
end
|
||||
|
||||
def autofilter
|
||||
true
|
||||
end
|
||||
|
||||
def process_get(cli, request)
|
||||
if request.uri =~ /#{@basename}(\d)\.bcl/
|
||||
print_status("GET => Payload")
|
||||
|
|
Loading…
Reference in New Issue