Files
metasploit-gs/lib/msf/core/auxiliary/command_shell.rb
T
2021-06-30 09:51:52 -04:00

68 lines
1.5 KiB
Ruby

# -*- coding: binary -*-
module Msf
###
#
# This module provides methods for scanning modules that yield
# Command Shell sessions.
#
###
module Auxiliary::CommandShell
include Msf::Sessions::CommandShellOptions
#
# Ghetto
#
module CRLFLineEndings
def put(str, opts={})
return super if not str
super(str.strip + "\r\n", opts)
end
def write(str, opts={})
return super if not str
super(str.strip + "\r\n", opts)
end
end
def start_session(obj, info, ds_merge, crlf = false, sock = nil, sess = nil)
if crlf
# Windows telnet server requires \r\n line endings and it doesn't
# seem to affect anything else.
obj.sock.extend(CRLFLineEndings)
end
sock ||= obj.sock
sess ||= Msf::Sessions::CommandShell.new(sock)
sess.set_from_exploit(obj)
sess.info = info
# Clean up the stored data
sess.exploit_datastore.merge!(ds_merge)
# Prevent the socket from being closed
obj.sockets.delete(sock)
obj.sock = nil if obj.respond_to? :sock
framework.sessions.register(sess)
sess.process_autoruns(datastore)
# Notify the framework that we have a new session opening up...
# Don't let errant event handlers kill our session
begin
framework.events.on_session_open(sess)
rescue ::Exception => e
wlog("Exception in on_session_open event handler: #{e.class}: #{e}")
wlog("Call Stack\n#{e.backtrace.join("\n")}")
end
sess
end
end
end