Files
metasploit-gs/lib/msf/ui/console/command_dispatcher/exploit.rb
T

203 lines
4.8 KiB
Ruby
Raw Normal View History

2005-07-10 07:15:20 +00:00
module Msf
module Ui
module Console
module CommandDispatcher
2005-11-15 15:11:43 +00:00
###
#
# Exploit module command dispatcher.
#
###
2005-07-10 07:15:20 +00:00
class Exploit
2005-07-14 20:36:34 +00:00
include Msf::Ui::Console::ModuleCommandDispatcher
@@exploit_opts = Rex::Parser::Arguments.new(
"-e" => [ true, "The payload encoder to use. If none is specified, ENCODER is used." ],
"-h" => [ false, "Help banner." ],
2007-02-10 06:54:03 +00:00
"-j" => [ false, "Run in the context of a job." ],
"-n" => [ true, "The NOP generator to use. If none is specified, NOP is used." ],
"-o" => [ true, "A comma separated list of options in VAR=VAL format." ],
"-p" => [ true, "The payload to use. If none is specified, PAYLOAD is used." ],
2005-07-14 20:36:34 +00:00
"-t" => [ true, "The target index to use. If none is specified, TARGET is used." ],
"-z" => [ false, "Do not interact with the session after successful exploitation." ])
2005-11-15 15:11:43 +00:00
#
# Returns the hash of exploit module specific commands.
#
def commands
{
2005-10-10 00:30:14 +00:00
"check" => "Check to see if a target is vulnerable",
"exploit" => "Launch an exploit attempt",
"rcheck" => "Reloads the module and checks if the target is vulnerable",
"rexploit" => "Reloads the module and launches an exploit attempt",
}
end
2005-11-15 15:11:43 +00:00
#
# Returns the name of the command dispatcher.
#
2005-07-14 20:18:36 +00:00
def name
"Exploit"
end
2005-07-14 20:36:34 +00:00
#
2005-11-15 15:11:43 +00:00
# Checks to see if a target is vulnerable.
2005-07-14 20:36:34 +00:00
#
def cmd_check(*args)
2007-01-30 04:48:35 +00:00
defanged?
2005-07-14 20:36:34 +00:00
begin
2007-01-30 04:48:35 +00:00
2007-03-17 19:39:30 +00:00
code = mod.check_simple(
'LocalInput' => driver.input,
'LocalOutput' => driver.output)
2005-07-14 20:36:34 +00:00
if (code)
stat = '[*]'
if (code == Msf::Exploit::CheckCode::Vulnerable)
stat = '[+]'
end
print_line(stat + ' ' + code[1])
else
print_error(
"Check failed: The state could not be determined.")
end
rescue
2007-03-17 19:39:30 +00:00
log_error("Check failed: #{$!}")
2005-07-14 20:36:34 +00:00
end
end
#
2005-11-15 15:11:43 +00:00
# Launches an exploitation attempt.
#
def cmd_exploit(*args)
2007-01-30 04:48:35 +00:00
defanged?
opt_str = nil
2005-07-14 20:36:34 +00:00
payload = mod.datastore['PAYLOAD']
encoder = mod.datastore['ENCODER']
target = mod.datastore['TARGET']
nop = mod.datastore['NOP']
bg = false
jobify = false
# Always run passive exploits in the background
if (mod.passive?)
jobify = true
end
2005-07-14 20:36:34 +00:00
@@exploit_opts.parse(args) { |opt, idx, val|
case opt
when '-e'
encoder = val
when '-j'
jobify = true
when '-n'
nop = val
when '-o'
opt_str = val
when '-p'
payload = val
when '-t'
target = val.to_i
when '-z'
bg = true
2005-07-14 20:36:34 +00:00
when '-h'
print(
"Usage: exploit [options]\n\n" +
"Launches an exploitation attempt.\n" +
@@exploit_opts.usage)
return false
end
}
begin
session = mod.exploit_simple(
'Encoder' => encoder,
'Payload' => payload,
'Target' => target,
'Nop' => nop,
'OptionStr' => opt_str,
'LocalInput' => driver.input,
'LocalOutput' => driver.output,
'RunAsJob' => jobify)
rescue ::Interrupt
raise $!
rescue ::Exception => e
# All exceptions should be handled below this layer
nil
end
# If we were given a session, let's see what we can do with it
if (session)
2008-10-10 05:01:49 +00:00
# If we aren't told to run in the background and the session can be
2005-07-17 02:14:15 +00:00
# interacted with, start interacting with it by issuing the session
# interaction command.
if (bg == false and session.interactive?)
print_line
driver.run_single("sessions -q -i #{session.sid}")
# Otherwise, log that we created a session
else
print_status("Session #{session.sid} created in the background.")
end
# If we ran the exploit as a job, indicate such so the user doesn't
# wonder what's up.
elsif (jobify)
print_status("Exploit running as background job.")
# Worst case, the exploit ran but we got no session, bummer.
else
2006-03-30 15:06:41 +00:00
print_status("Exploit completed, but no session was created.")
end
end
2005-10-10 00:30:14 +00:00
#
2005-11-15 15:11:43 +00:00
# Reloads an exploit module and checks the target to see if it's
# vulnerable.
2005-10-10 00:30:14 +00:00
#
def cmd_rcheck(*args)
omod = self.mod
self.mod = framework.modules.reload_module(mod)
if(not self.mod)
print_status("Failed to reload module: #{framework.modules.failed[omod.file_path]}")
self.mod = omod
return
end
self.mod.init_ui(driver.input, driver.output)
cmd_check(*args)
2005-10-10 00:30:14 +00:00
end
#
2005-11-15 15:11:43 +00:00
# Reloads an exploit module and launches an exploit.
2005-10-10 00:30:14 +00:00
#
def cmd_rexploit(*args)
if mod.job_id
print_status("Stopping existing job...")
framework.jobs.stop_job(mod.job_id)
mod.job_id = nil
end
omod = self.mod
self.mod = framework.modules.reload_module(mod)
if(not self.mod)
print_status("Failed to reload module: #{framework.modules.failed[omod.file_path]}")
self.mod = omod
return
end
self.mod.init_ui(driver.input, driver.output)
2005-10-10 00:30:14 +00:00
cmd_exploit(*args)
2005-10-10 00:30:14 +00:00
end
2005-07-10 07:15:20 +00:00
end
end end end end