fixup for the exploit sample
git-svn-id: file:///home/svn/framework3/trunk@13923 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
7c0a643eb3
commit
aa89c07fa8
|
@ -31,7 +31,7 @@ parser.on("--project PROJECT") do |x|
|
|||
end
|
||||
|
||||
parser.on("--targets TARGETS") do |x|
|
||||
opts[:targets] = [x]
|
||||
opts[:targets] = x
|
||||
end
|
||||
|
||||
parser.on("--speed SPEED") do |x|
|
||||
|
@ -123,26 +123,27 @@ if not @rpc.token
|
|||
end
|
||||
|
||||
# Store the user's settings
|
||||
project = opts[:project] || usage(parser),
|
||||
targets = opts[:targets] || usage(parser),
|
||||
rank = opts[:rank] || usage(parser),
|
||||
speed = opts[:speed] || usage(parser),
|
||||
blacklist = opts[:blacklist],
|
||||
whitelist_ports = opts[:whitelist_ports],
|
||||
blacklist_ports = opts[:blacklist_ports],
|
||||
exploit_timeout = opts[:exploit_timeout],
|
||||
limit_sessions = opts[:limit_sessions],
|
||||
ignore_fragile_devices = opts[:ignore_fragile_devices],
|
||||
filter_by_os = opts[:filter_by_os],
|
||||
only_match = opts[:only_match], #dry run?
|
||||
match_vulns = opts[:match_vulns] || true,
|
||||
match_ports = opts[:match_ports] || true,
|
||||
payload_method = opts[:payload_method],
|
||||
payload_type = opts[:payload_type],
|
||||
payload_ports = opts[:payload_ports],
|
||||
evasion_level_tcp = opts[:evasion_level_tcp],
|
||||
evasion_level_app = opts[:evasion_level_app],
|
||||
module_filter = opts[:module_filter]
|
||||
project = opts[:project] || usage(parser)
|
||||
targets = opts[:targets] || usage(parser)
|
||||
rank = opts[:rank] || usage(parser)
|
||||
speed = opts[:speed] || usage(parser)
|
||||
blacklist = opts[:blacklist]
|
||||
whitelist_ports = opts[:whitelist_ports]
|
||||
blacklist_ports = opts[:blacklist_ports]
|
||||
exploit_timeout = opts[:exploit_timeout] || 5
|
||||
limit_sessions = opts[:limit_sessions] || false
|
||||
ignore_fragile_devices = opts[:ignore_fragile_devices] || false
|
||||
filter_by_os = opts[:filter_by_os] || false
|
||||
only_match = opts[:only_match] || true #dry run
|
||||
match_vulns = opts[:match_vulns] || true
|
||||
match_ports = opts[:match_ports] || true
|
||||
payload_method = opts[:payload_method] || "auto"
|
||||
payload_type = opts[:payload_type] || "meterpreter"
|
||||
payload_ports = opts[:payload_ports] || "4000-5000"
|
||||
evasion_level_tcp = opts[:evasion_level_tcp] || 1
|
||||
evasion_level_app = opts[:evasion_level_app] || 1
|
||||
module_filter = opts[:module_filter] || ""
|
||||
#===
|
||||
|
||||
# Get the default user
|
||||
user = @rpc.call("pro.default_admin_user")['username']
|
||||
|
@ -161,7 +162,7 @@ task = @rpc.call("pro.start_exploit", {
|
|||
'DS_LimitSessions' => limit_sessions,
|
||||
'DS_IgnoreFragileDevices' => ignore_fragile_devices,
|
||||
'DS_FilterByOS' => filter_by_os,
|
||||
'DS_OnlyMatch' => only_match, #dry run?
|
||||
'DS_OnlyMatch' => only_match,
|
||||
'DS_MATCH_VULNS' => match_vulns,
|
||||
'DS_MATCH_PORTS' => match_ports,
|
||||
'DS_PAYLOAD_METHOD' => payload_method,
|
||||
|
|
Loading…
Reference in New Issue