6d1e7bdaa5
created 4 cmd stagers (instead of just one): CmdStagerVBS, CmdStagerDebugAsm, CmdStagerDebugWrite, CmdStagerTFTP created a TFTPServer mixin created Msf::Exploit::EXE mixin to generate executables updated all uses of CmdStager to use CmdStagerVBS for the time being add exploit for cve-2001-0333 using CmdStagerTFTP updated tftp server to wait for transfers to finish (up to 30 seconds) before shutting down write debug.exe stager stub in 16-bit assembly (used in CmdStagerDebugAsm) git-svn-id: file:///home/svn/framework3/trunk@9375 4d416f70-5f16-0410-b530-b9f4589650da
39 lines
545 B
Ruby
39 lines
545 B
Ruby
##
|
|
# $Id$
|
|
##
|
|
|
|
require 'rex/proto/tftp'
|
|
|
|
module Msf
|
|
|
|
###
|
|
#
|
|
# This mixin provides a TFTPServer
|
|
#
|
|
###
|
|
module Exploit::TFTPServer
|
|
|
|
def initialize(info = {})
|
|
super
|
|
|
|
@tftp = nil
|
|
end
|
|
|
|
def start_service(tag, exe)
|
|
@tftp = Rex::Proto::TFTP::Server.new
|
|
@tftp.register_file(tag, exe)
|
|
print_status("Starting TFTP server to host \"#{tag}\" (#{exe.length} bytes)") if datastore['VERBOSE']
|
|
@tftp.start
|
|
@tftp
|
|
end
|
|
|
|
def stop_service
|
|
print_status("Stopping TFTP server") if datastore['VERBOSE']
|
|
@tftp.stop
|
|
end
|
|
|
|
attr_accessor :tftp
|
|
end
|
|
|
|
end
|