metasploit-framework/lib/msf/core/post/file.rb

102 lines
1.9 KiB
Ruby

module Msf
class Post
module File
#
# Writes a given string to a file specified
#
def file_local_write(file2wrt, data2wrt)
if not ::File.exists?(file2wrt)
::FileUtils.touch(file2wrt)
end
output = ::File.open(file2wrt, "a")
data2wrt.each_line do |d|
output.puts(d)
end
output.close
end
#
# Returns a MD5 checksum of a given local file
#
def file_local_digestmd5(file2md5)
if not ::File.exists?(file2md5)
raise "File #{file2md5} does not exists!"
else
require 'digest/md5'
chksum = nil
chksum = Digest::MD5.hexdigest(::File.open(file2md5, "rb") { |f| f.read})
return chksum
end
end
#
# Returns a SHA1 checksum of a given local file
#
def file_local_digestsha1(file2sha1)
if not ::File.exists?(file2sha1)
raise "File #{file2sha1} does not exists!"
else
require 'digest/sha1'
chksum = nil
chksum = Digest::SHA1.hexdigest(::File.open(file2sha1, "rb") { |f| f.read})
return chksum
end
end
#
# Returns a SHA256 checksum of a given local file
#
def file_local_digestsha2(file2sha2)
if not ::File.exists?(file2sha2)
raise "File #{file2sha2} does not exists!"
else
require 'digest/sha2'
chksum = nil
chksum = Digest::SHA256.hexdigest(::File.open(file2sha2, "rb") { |f| f.read})
return chksum
end
end
#
# Platform-agnostic file read. Returns contents of remote file +file_name+
# as a String.
#
def read_file(file_name)
return false if file_name.length > 0
data = nil
if session.type == "meterpreter"
data = read_file_meterpreter(file_name)
elsif session.respond_to? :shell_command_token
data = session.shell_command_token("cat '#{file_name}'")
end
data
end
protected
#
# Meterpreter-specific file read. Returns contents of remote file
# +file_name+ as a String
#
def read_file_meterpreter(file_name)
fd = session.fs.file.new(file_name, "rb")
data = ''
begin
until fd.eof?
data << fd.read
end
ensure
fd.close
end
data
end
end
end
end