Files
metasploit-gs/lib/msf/core/exploit/tftp.rb
T
Joshua Drake 6d1e7bdaa5 big commit - lots of cmdstager changes
created 4 cmd stagers (instead of just one): CmdStagerVBS, CmdStagerDebugAsm, CmdStagerDebugWrite, CmdStagerTFTP
created a TFTPServer mixin
created Msf::Exploit::EXE mixin to generate executables
updated all uses of CmdStager to use CmdStagerVBS for the time being
add exploit for cve-2001-0333 using CmdStagerTFTP
updated tftp server to wait for transfers to finish (up to 30 seconds) before shutting down
write debug.exe stager stub in 16-bit assembly (used in CmdStagerDebugAsm)


git-svn-id: file:///home/svn/framework3/trunk@9375 4d416f70-5f16-0410-b530-b9f4589650da
2010-05-26 22:39:56 +00:00

39 lines
545 B
Ruby

##
# $Id$
##
require 'rex/proto/tftp'
module Msf
###
#
# This mixin provides a TFTPServer
#
###
module Exploit::TFTPServer
def initialize(info = {})
super
@tftp = nil
end
def start_service(tag, exe)
@tftp = Rex::Proto::TFTP::Server.new
@tftp.register_file(tag, exe)
print_status("Starting TFTP server to host \"#{tag}\" (#{exe.length} bytes)") if datastore['VERBOSE']
@tftp.start
@tftp
end
def stop_service
print_status("Stopping TFTP server") if datastore['VERBOSE']
@tftp.stop
end
attr_accessor :tftp
end
end