Land #6083, autofilter fixes for aggro modules

bug/bundler_fix
William Vu 2015-10-14 00:14:20 -05:00
commit c1b6de90a0
No known key found for this signature in database
GPG Key ID: 68BD00CE25866743
13 changed files with 53 additions and 0 deletions

View File

@ -277,4 +277,8 @@ class Metasploit4 < Msf::Exploit::Remote
send_response(cli, @pl)
end
def autofilter
true
end
end

View File

@ -107,6 +107,10 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
def autofilter
true
end
def exploit
@pl = generate_payload_exe
if @pl.blank?

View File

@ -148,6 +148,10 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
def autofilter
true
end
#task scheduler is pretty bad at handling binary files and likes to mess up our meterpreter :-(
#instead we use a CFML filedropper to embed our payload and execute it.
#this also removes the dependancy of using the probe.cfm to execute the file.

View File

@ -326,6 +326,10 @@ class Metasploit3 < Msf::Exploit::Remote
res
end
def autofilter
true
end
# Try to autodetect the target platform
def detect_platform(res)
if (res.body =~ /<td.*?OSName.*?(Linux|FreeBSD|Windows).*?<\/td>/m)

View File

@ -170,6 +170,10 @@ class Metasploit3 < Msf::Exploit::Remote
send_response(cli, @pl)
end
def autofilter
true
end
def upload_payload
print_status "#{peer} - Uploading payload ..."
path = "/#{@local_path}#{@payload_dir}#{@payload_name}"

View File

@ -343,6 +343,10 @@ class Metasploit3 < Msf::Exploit::Remote
send_response(cli, @pl)
end
def autofilter
true
end
# wait for the data to be sent
def wait_payload
print_status("#{rhost}:#{rport} - Waiting for the victim to request the payload...")

View File

@ -552,4 +552,9 @@ class Metasploit3 < Msf::Exploit::Remote
register_files_for_cleanup("c:\\#{@down_file}.exe")
end
end
def autofilter
true
end
end

View File

@ -93,6 +93,10 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
def autofilter
return true
end
def check
connect

View File

@ -59,6 +59,10 @@ class Metasploit3 < Msf::Exploit::Remote
send_response(cli, data)
end
def autofilter
true
end
def check
res = send_request_cgi({
'uri' => '/search',

View File

@ -146,4 +146,8 @@ class Metasploit3 < Msf::Exploit::Remote
send_not_found(cli)
end
def autofilter
true
end
end

View File

@ -63,6 +63,10 @@ class Metasploit3 < Msf::Exploit::Remote
"#{get_uri}.php"
end
def autofilter
true
end
def call_payload(file_name)
res = send_request_cgi({
'method' => 'GET',

View File

@ -81,6 +81,10 @@ class Metasploit3 < Msf::Exploit::Remote
remove_resource(get_resource)
end
def autofilter
true
end
def primer
file_name = rand_text_alpha(rand(10)+5)
file_ext = '.vbs'

View File

@ -74,6 +74,10 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
def autofilter
true
end
def process_get(cli, request)
if request.uri =~ /#{@basename}(\d)\.bcl/
print_status("GET => Payload")