fixup for the exploit sample

git-svn-id: file:///home/svn/framework3/trunk@13923 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Jonathan Cran 2011-10-14 18:52:01 +00:00
parent 7c0a643eb3
commit aa89c07fa8
1 changed files with 23 additions and 22 deletions

View File

@ -31,7 +31,7 @@ parser.on("--project PROJECT") do |x|
end
parser.on("--targets TARGETS") do |x|
opts[:targets] = [x]
opts[:targets] = x
end
parser.on("--speed SPEED") do |x|
@ -123,26 +123,27 @@ if not @rpc.token
end
# Store the user's settings
project = opts[:project] || usage(parser),
targets = opts[:targets] || usage(parser),
rank = opts[:rank] || usage(parser),
speed = opts[:speed] || usage(parser),
blacklist = opts[:blacklist],
whitelist_ports = opts[:whitelist_ports],
blacklist_ports = opts[:blacklist_ports],
exploit_timeout = opts[:exploit_timeout],
limit_sessions = opts[:limit_sessions],
ignore_fragile_devices = opts[:ignore_fragile_devices],
filter_by_os = opts[:filter_by_os],
only_match = opts[:only_match], #dry run?
match_vulns = opts[:match_vulns] || true,
match_ports = opts[:match_ports] || true,
payload_method = opts[:payload_method],
payload_type = opts[:payload_type],
payload_ports = opts[:payload_ports],
evasion_level_tcp = opts[:evasion_level_tcp],
evasion_level_app = opts[:evasion_level_app],
module_filter = opts[:module_filter]
project = opts[:project] || usage(parser)
targets = opts[:targets] || usage(parser)
rank = opts[:rank] || usage(parser)
speed = opts[:speed] || usage(parser)
blacklist = opts[:blacklist]
whitelist_ports = opts[:whitelist_ports]
blacklist_ports = opts[:blacklist_ports]
exploit_timeout = opts[:exploit_timeout] || 5
limit_sessions = opts[:limit_sessions] || false
ignore_fragile_devices = opts[:ignore_fragile_devices] || false
filter_by_os = opts[:filter_by_os] || false
only_match = opts[:only_match] || true #dry run
match_vulns = opts[:match_vulns] || true
match_ports = opts[:match_ports] || true
payload_method = opts[:payload_method] || "auto"
payload_type = opts[:payload_type] || "meterpreter"
payload_ports = opts[:payload_ports] || "4000-5000"
evasion_level_tcp = opts[:evasion_level_tcp] || 1
evasion_level_app = opts[:evasion_level_app] || 1
module_filter = opts[:module_filter] || ""
#===
# Get the default user
user = @rpc.call("pro.default_admin_user")['username']
@ -161,7 +162,7 @@ task = @rpc.call("pro.start_exploit", {
'DS_LimitSessions' => limit_sessions,
'DS_IgnoreFragileDevices' => ignore_fragile_devices,
'DS_FilterByOS' => filter_by_os,
'DS_OnlyMatch' => only_match, #dry run?
'DS_OnlyMatch' => only_match,
'DS_MATCH_VULNS' => match_vulns,
'DS_MATCH_PORTS' => match_ports,
'DS_PAYLOAD_METHOD' => payload_method,