Some service yarddoc
This commit is contained in:
parent
1a3b319262
commit
897ad6f963
|
@ -51,6 +51,9 @@ module Exploit::Remote::SMB::Psexec
|
|||
# instead of all the ghetto "rescue ::Exception" madness
|
||||
# @param command [String] Should be a valid windows command
|
||||
# @param disconnect [Boolean] Disconnect afterwards
|
||||
# @param service_description [String] Service Description
|
||||
# @param service_name [String] Service Name
|
||||
# @param display_name [Strnig] Display Name
|
||||
# @return [Boolean] Whether everything went well
|
||||
def psexec(command, disconnect=true, service_description=nil, service_name=nil, display_name=nil)
|
||||
simple.connect("\\\\#{datastore['RHOST']}\\IPC$")
|
||||
|
|
|
@ -412,6 +412,12 @@ require 'msf/core/exe/segment_injector'
|
|||
return pe
|
||||
end
|
||||
|
||||
|
||||
# Splits a string into a number of assembly push operations
|
||||
#
|
||||
# @param string [String] string to be used
|
||||
#
|
||||
# @return [String] null terminated string as assembly push ops
|
||||
def self.string_to_pushes(string)
|
||||
str = string.dup
|
||||
# Align string to 4 bytes
|
||||
|
@ -512,6 +518,17 @@ require 'msf/core/exe/segment_injector'
|
|||
exe_sub_method(code,opts)
|
||||
end
|
||||
|
||||
# Embeds shellcode within a Windows PE file implementing the Windows
|
||||
# service control methods.
|
||||
#
|
||||
# @param framework [Object]
|
||||
# @param code [String] shellcode to be embedded
|
||||
# @option opts [Boolean] :sub_method use substitution technique with a
|
||||
# service template PE
|
||||
# @option opts [String] :servicename name of the service, not used in
|
||||
# substituion technique
|
||||
#
|
||||
# @return [String] Windows Service PE file
|
||||
def self.to_win32pe_service(framework, code, opts={})
|
||||
if opts[:sub_method]
|
||||
# Allow the user to specify their own service EXE template
|
||||
|
|
Loading…
Reference in New Issue