/me feels slapped around
git-svn-id: file:///home/svn/incoming/trunk@3226 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
043b81a400
commit
f2582ac38e
|
@ -0,0 +1,39 @@
|
|||
module Msf
|
||||
|
||||
###
|
||||
#
|
||||
# This module allows a compatible exploit to be called once for every valid target,
|
||||
# in succession, until no targets are left.
|
||||
#
|
||||
###
|
||||
module Exploit::BruteTargets
|
||||
|
||||
|
||||
# Compatible exploit modules define a method call exploit_target, which is called once
|
||||
# for every target in the list. The very first target should always be a stub for enabling
|
||||
# the brute force mode.
|
||||
|
||||
def exploit(*args)
|
||||
# Brute force through every available target
|
||||
if (not datastore['TARGET'] or datastore['TARGET'].to_i == 0)
|
||||
|
||||
print_status("Brute forcing with #{(targets.length - 1).to_s} possible targets")
|
||||
|
||||
targets.each_index do |i|
|
||||
next if i == 0
|
||||
|
||||
print_status("Trying target #{targets[i].name}...")
|
||||
exploit_target(targets[i])
|
||||
end
|
||||
|
||||
# Otherwise, only try the specified target
|
||||
else
|
||||
exploit_target(target())
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
|
||||
|
||||
end
|
||||
end
|
Loading…
Reference in New Issue