50 lines
1.0 KiB
Ruby
50 lines
1.0 KiB
Ruby
##
|
|
# This module requires Metasploit: http://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
require 'rex/proto/dhcp'
|
|
|
|
class MetasploitModule < Msf::Auxiliary
|
|
include Msf::Exploit::Remote::DHCPServer
|
|
include Msf::Auxiliary::Report
|
|
|
|
def initialize
|
|
super(
|
|
'Name' => 'DHCP Server',
|
|
'Description' => %q{
|
|
This module provides a DHCP service
|
|
},
|
|
'Author' => [ 'scriptjunkie', 'apconole@yahoo.com' ],
|
|
'License' => MSF_LICENSE,
|
|
'Actions' =>
|
|
[
|
|
[ 'Service' ]
|
|
],
|
|
'PassiveActions' =>
|
|
[
|
|
'Service'
|
|
],
|
|
'DefaultAction' => 'Service'
|
|
)
|
|
|
|
end
|
|
|
|
def run
|
|
@dhcp = Rex::Proto::DHCP::Server.new(datastore)
|
|
|
|
print_status("Starting DHCP server...")
|
|
@dhcp.start
|
|
add_socket(@dhcp.sock)
|
|
|
|
# Wait for finish..
|
|
while @dhcp.thread.alive?
|
|
select(nil, nil, nil, 2)
|
|
end
|
|
|
|
print_status("Stopping DHCP server...")
|
|
@dhcp.stop
|
|
end
|
|
|
|
end
|