module Msf module Handler # Options and methods needed for all handlers that listen for a connection # from the payload. module Reverse autoload :Comm, 'msf/core/handler/reverse/comm' autoload :SSL, 'msf/core/handler/reverse/ssl' def initialize(info = {}) super register_options( [ Opt::LHOST, Opt::LPORT(4444) ], Msf::Handler::Reverse) register_advanced_options( [ OptPort.new('ReverseListenerBindPort', [false, 'The port to bind to on the local system if different from LPORT']), OptBool.new('ReverseAllowProxy', [ true, 'Allow reverse tcp even with Proxies specified. Connect back will NOT go through proxy but directly to LHOST', false]), ], Msf::Handler::Reverse ) end # A list of addresses to attempt to bind, in preferred order. # # @return [Array] a two-element array. The first element will be # the address that `datastore['LHOST']` resolves to, the second will # be the INADDR_ANY address for IPv4 or IPv6, depending on the version # of the first element. def bind_addresses # Switch to IPv6 ANY address if the LHOST is also IPv6 addr = Rex::Socket.resolv_nbo(datastore['LHOST']) # First attempt to bind LHOST. If that fails, the user probably has # something else listening on that interface. Try again with ANY_ADDR. any = (addr.length == 4) ? "0.0.0.0" : "::0" addrs = [ Rex::Socket.addr_ntoa(addr), any ] if not datastore['ReverseListenerBindAddress'].to_s.empty? # Only try to bind to this specific interface addrs = [ datastore['ReverseListenerBindAddress'] ] # Pick the right "any" address if either wildcard is used addrs[0] = any if (addrs[0] == "0.0.0.0" or addrs == "::0") end addrs end # @return [Integer] def bind_port port = datastore['ReverseListenerBindPort'].to_i (port > 0) ? port : datastore['LPORT'].to_i end # # Starts the listener but does not actually attempt # to accept a connection. Throws socket exceptions # if it fails to start the listener. # def setup_handler if datastore['Proxies'] and not datastore['ReverseAllowProxy'] raise RuntimeError, "TCP connect-back payloads cannot be used with Proxies. Use 'set ReverseAllowProxy true' to override this behaviour." end ex = false comm = select_comm local_port = bind_port bind_addresses.each do |ip| begin self.listener_sock = Rex::Socket::TcpServer.create( 'LocalHost' => ip, 'LocalPort' => local_port, 'Comm' => comm, 'Context' => { 'Msf' => framework, 'MsfPayload' => self, 'MsfExploit' => assoc_exploit }) rescue ex = $! print_error("Handler failed to bind to #{ip}:#{local_port}:- #{comm} -") else ex = false via = via_string_for_ip(ip, comm) print_status("Started #{human_name} handler on #{ip}:#{local_port} #{via}") break end end raise ex if (ex) end end end end