Files
metasploit-gs/msfcli
T

262 lines
7.4 KiB
Ruby
Raw Normal View History

2005-12-17 06:46:23 +00:00
#!/usr/bin/env ruby
# -*- coding: binary -*-
2005-11-28 21:38:48 +00:00
#
2010-05-03 17:13:09 +00:00
# $Id$
#
2005-11-28 21:38:48 +00:00
# This user interface allows users to interact with the framework through a
# command line interface (CLI) rather than having to use a prompting console
# or web-based interface.
#
2010-05-03 17:13:09 +00:00
# $Revision$
#
2005-10-02 05:47:52 +00:00
msfbase = __FILE__
while File.symlink?(msfbase)
msfbase = File.expand_path(File.readlink(msfbase), File.dirname(msfbase))
end
2012-02-04 00:32:37 -06:00
$:.unshift(File.expand_path(File.join(File.dirname(msfbase), 'lib')))
require 'fastlib'
2012-04-15 23:35:38 -05:00
require 'msfenv'
2011-11-23 23:10:43 -06:00
$:.unshift(ENV['MSF_LOCAL_LIB']) if ENV['MSF_LOCAL_LIB']
2005-10-02 05:47:52 +00:00
require 'rex'
require 'msf/ui'
require 'msf/base'
2010-05-03 17:13:09 +00:00
Indent = ' '
2005-10-02 05:47:52 +00:00
def usage (str = nil, extra = nil)
tbl = Rex::Ui::Text::Table.new(
'Header' => "Usage: #{$0} <exploit_name> <option=value> [mode]",
'Indent' => 4,
'Columns' => ['Mode', 'Description']
)
tbl << ['(H)elp', "You're looking at it baby!"]
tbl << ['(S)ummary', 'Show information about this module']
tbl << ['(O)ptions', 'Show available options for this module']
tbl << ['(A)dvanced', 'Show available advanced options for this module']
tbl << ['(I)DS Evasion', 'Show available ids evasion options for this module']
tbl << ['(P)ayloads', 'Show available payloads for this module']
2007-02-15 07:33:40 +00:00
tbl << ['(T)argets', 'Show available targets for this exploit module']
tbl << ['(AC)tions', 'Show available actions for this auxiliary module']
tbl << ['(C)heck', 'Run the check routine of the selected module']
tbl << ['(E)xecute', 'Execute the selected module']
$stdout.puts "Error: #{str}\n\n" if str
$stdout.puts tbl.to_s + "\n"
$stdout.puts extra + "\n" if extra
exit
end
# Handle the help option before loading modules
exploit_name = ARGV.shift
exploit = nil
module_class = "exploit"
if(exploit_name == "-h")
usage()
end
# Initialize the simplified framework instance.
$stderr.puts "[*] Please wait while we load the module tree..."
$framework = Msf::Simple::Framework.create
2012-10-04 16:32:12 -05:00
if ($framework.modules.module_load_error_by_path.length > 0)
2011-10-23 12:04:41 +00:00
print("Warning: The following modules could not be loaded!\n\n")
2012-10-04 16:32:12 -05:00
$framework.modules.module_load_error_by_path.each do |path, error|
print("\t#{path}: #{error}\n\n")
2011-10-23 12:04:41 +00:00
end
end
2009-03-07 23:15:53 +00:00
if (not exploit_name)
ext = ''
2010-05-03 17:13:09 +00:00
2005-12-15 05:07:14 +00:00
tbl = Rex::Ui::Text::Table.new(
'Header' => 'Exploits',
'Indent' => 4,
'Columns' => [ 'Name', 'Description' ])
$framework.exploits.each_module { |name, mod|
tbl << [ 'exploit/' + name, mod.new.name ]
2005-12-15 05:07:14 +00:00
}
ext << tbl.to_s + "\n"
2010-05-03 17:13:09 +00:00
tbl = Rex::Ui::Text::Table.new(
'Header' => 'Auxiliary',
'Indent' => 4,
'Columns' => [ 'Name', 'Description' ])
2005-12-15 05:07:14 +00:00
$framework.auxiliary.each_module { |name, mod|
tbl << [ 'auxiliary/' + name, mod.new.name ]
}
2010-05-03 17:13:09 +00:00
ext << tbl.to_s + "\n"
2010-05-03 17:13:09 +00:00
usage(nil, ext)
2005-10-02 05:47:52 +00:00
end
2008-10-04 20:46:54 +00:00
# Process special var/val pairs...
Msf::Ui::Common.process_cli_arguments($framework, ARGV)
# Determine what type of module it is
case exploit_name
when /exploit\/(.*)/
exploit = $framework.exploits.create($1)
module_class = 'exploit'
2010-05-03 17:13:09 +00:00
when /auxiliary\/(.*)/
exploit = $framework.auxiliary.create($1)
module_class = 'auxiliary'
else
exploit = $framework.exploits.create(exploit_name)
if exploit == nil
# Try falling back on aux modules
exploit = $framework.auxiliary.create(exploit_name)
module_class = 'auxiliary'
end
end
2005-10-02 05:47:52 +00:00
2008-10-04 20:46:54 +00:00
2005-10-02 05:47:52 +00:00
if (exploit == nil)
usage("Invalid module: #{exploit_name}")
2005-10-02 05:47:52 +00:00
end
2006-02-04 23:59:17 +00:00
exploit.init_ui(
2010-05-03 17:13:09 +00:00
Rex::Ui::Text::Input::Stdio.new,
2006-02-04 23:59:17 +00:00
Rex::Ui::Text::Output::Stdio.new
)
2010-05-03 17:13:09 +00:00
2006-01-05 22:20:28 +00:00
# Evalulate the command (default to "help")
mode = ARGV.pop || 'h'
2005-10-02 05:47:52 +00:00
# Import options
exploit.datastore.import_options_from_s(ARGV.join('_|_'), '_|_')
2005-10-02 05:47:52 +00:00
# Initialize associated modules
payload = nil
encoder = nil
nop = nil
if (exploit.datastore['PAYLOAD'])
payload = $framework.payloads.create(exploit.datastore['PAYLOAD'])
2009-04-03 12:54:58 +00:00
if (payload != nil)
payload.datastore.import_options_from_s(ARGV.join('_|_'), '_|_')
2009-04-03 12:54:58 +00:00
end
end
if (exploit.datastore['ENCODER'])
encoder = $framework.encoders.create(exploit.datastore['ENCODER'])
2009-04-03 12:54:58 +00:00
if (encoder != nil)
encoder.datastore.import_options_from_s(ARGV.join('_|_'), '_|_')
2009-04-03 12:54:58 +00:00
end
end
if (exploit.datastore['NOP'])
nop = $framework.nops.create(exploit.datastore['NOP'])
2009-04-03 12:54:58 +00:00
if (nop != nil)
nop.datastore.import_options_from_s(ARGV.join('_|_'), '_|_')
2009-04-03 12:54:58 +00:00
end
end
2005-10-02 05:47:52 +00:00
case mode.downcase
when 'h'
usage
2005-10-02 05:47:52 +00:00
when "s"
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_module(exploit, Indent))
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_module(payload, Indent)) if payload
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_module(encoder, Indent)) if encoder
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_module(nop, Indent)) if nop
2010-05-03 17:13:09 +00:00
2005-10-02 05:47:52 +00:00
when "o"
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_options(exploit, Indent))
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_options(payload, Indent)) if payload
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_options(encoder, Indent)) if encoder
2010-05-03 17:13:09 +00:00
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_options(nop, Indent)) if nop
2005-10-02 05:47:52 +00:00
when "a"
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_advanced_options(exploit, Indent))
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_advanced_options(payload, Indent)) if payload
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_advanced_options(encoder, Indent)) if encoder
2010-05-03 17:13:09 +00:00
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_advanced_options(nop, Indent)) if nop
2006-01-05 03:57:12 +00:00
when "i"
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_evasion_options(exploit, Indent))
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_evasion_options(payload, Indent)) if payload
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_evasion_options(encoder, Indent)) if encoder
2010-05-03 17:13:09 +00:00
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_evasion_options(nop, Indent)) if nop
2005-10-02 05:47:52 +00:00
when "p"
if (module_class == 'exploit')
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_compatible_payloads(exploit, Indent, "Compatible payloads"))
else
$stdout.puts("\nError: This type of module does not support payloads")
end
2005-10-02 05:47:52 +00:00
when "t"
if (module_class == 'exploit')
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_exploit_targets(exploit, Indent))
else
$stdout.puts("\nError: This type of module does not support targets")
2010-05-03 17:13:09 +00:00
end
2007-02-15 07:33:40 +00:00
when "ac"
if (module_class == 'auxiliary')
$stdout.puts("\n" + Msf::Serializer::ReadableText.dump_auxiliary_actions(exploit, Indent))
else
$stdout.puts("\nError: This type of module does not support actions")
2010-05-03 17:13:09 +00:00
end
2005-10-02 05:47:52 +00:00
when "c"
if (module_class == 'exploit')
begin
2007-03-17 19:39:30 +00:00
if (code = exploit.check_simple(
'LocalInput' => Rex::Ui::Text::Input::Stdio.new,
'LocalOutput' => Rex::Ui::Text::Output::Stdio.new))
stat = (code == Msf::Exploit::CheckCode::Vulnerable) ? '[+]' : '[*]'
$stdout.puts("#{stat} #{code[1]}")
else
$stderr.puts("Check failed: The state could not be determined.")
end
rescue
$stderr.puts("Check failed: #{$!}")
2005-10-02 05:47:52 +00:00
end
else
$stdout.puts("\nError: This type of module does not support the check feature")
2005-10-02 05:47:52 +00:00
end
when "e"
con = Msf::Ui::Console::Driver.new(
Msf::Ui::Console::Driver::DefaultPrompt,
Msf::Ui::Console::Driver::DefaultPromptChar,
2011-10-23 12:04:41 +00:00
{
'Framework' => $framework
}
)
con.run_single("use #{module_class}/#{exploit.refname}")
2011-10-23 12:04:41 +00:00
ARGV.each do |arg|
k,v = arg.split("=", 2)
con.run_single("set #{k} #{v}")
2005-10-02 05:47:52 +00:00
end
con.run_single("exploit")
2011-10-23 12:04:41 +00:00
# If we have sessions or jobs, keep running
if $framework.sessions.length > 0 or $framework.jobs.length > 0
con.run
else
con.run_single("quit")
2010-05-03 17:13:09 +00:00
end
else
usage("Invalid mode #{mode}")
2005-10-02 05:47:52 +00:00
end
$stdout.puts