Adds the Exploit::Remote::Ip mixin

git-svn-id: file:///home/svn/framework3/trunk@5566 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2008-07-22 19:12:05 +00:00
parent a52530f647
commit ca7c8b0f68
2 changed files with 118 additions and 0 deletions

View File

@ -225,6 +225,7 @@ class Exploit < Msf::Module
# Protocol # Protocol
require 'msf/core/exploit/tcp' require 'msf/core/exploit/tcp'
require 'msf/core/exploit/udp' require 'msf/core/exploit/udp'
require 'msf/core/exploit/ip'
require 'msf/core/exploit/smb' require 'msf/core/exploit/smb'
require 'msf/core/exploit/ftp' require 'msf/core/exploit/ftp'
require 'msf/core/exploit/http' require 'msf/core/exploit/http'

117
lib/msf/core/exploit/ip.rb Normal file
View File

@ -0,0 +1,117 @@
module Msf
###
#
# This module provides methods for communicating with a host over UDP
#
###
module Exploit::Remote::Ip
#
# Initializes an instance of an exploit module that sends
# raw IP datagrams.
#
def initialize(info = {})
super
register_options(
[
Opt::RHOST,
], Msf::Exploit::Remote::Ip)
end
#
# Creates an IP socket for communicating with a remote host
#
def connect_ip(global = true, opts={})
begin
nsock = Rex::Socket::Ip.create(
'Context' =>
{
'Msf' => framework,
'MsfExploit' => self,
})
# Set this socket to the global socket as necessary
self.ip_sock = nsock if (global)
# Add this socket to the list of sockets created by this exploit
sockets << nsock
return nsock
rescue ::Exception => e
print_line(" ")
print_error(
"This module is configured to use a raw IP socket. " +
"On Unix systems, only the root user is allowed to create raw sockets." +
"Please run the framework as root to use this module."
)
print_line(" ")
nil
end
end
#
# Closes the IP socket
#
def disconnect_ip(nsock = self.ip_sock)
begin
if (nsock)
nsock.close
end
rescue IOError
end
if (nsock == ip_sock)
self.ip_sock = nil
end
# Remove this socket from the list of sockets created by this exploit
sockets.delete(nsock)
end
#
# Claims the IP socket if the payload so desires.
# No exploits use raw socket payloads yet...
#
def handler(nsock = self.ip_sock)
true
end
#
# Performs cleanup, closes the socket if necessary
#
def cleanup
super
disconnect_ip
end
#
# Sends a datagram to the host specified in RHOST
#
def ip_write(dgram)
return nil if not ip_sock
ip_sock.sendto(dgram, rhost)
end
##
#
# Wrappers for getters
#
##
#
# Returns the target host
#
def rhost
datastore['RHOST']
end
protected
attr_accessor :ip_sock
end
end