mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2024-12-01 00:39:09 +00:00
Updated to get re-enable database support in msfconsole
This commit is contained in:
parent
87a235b3a5
commit
644433578f
8 changed files with 9 additions and 9 deletions
|
@ -73,7 +73,7 @@ if trigger == 2 or trigger == 3:
|
|||
filewrite.write("set lport " + line[2] + "\n")
|
||||
filewrite.write("exploit -j")
|
||||
filewrite.close()
|
||||
subprocess.Popen("ruby %s/msfconsole -L -n -r %s/meta_config" % (msf_path, setdir), shell=True).wait()
|
||||
subprocess.Popen("ruby %s/msfconsole -L -r %s/meta_config" % (msf_path, setdir), shell=True).wait()
|
||||
else:
|
||||
print_warning("cancelling...")
|
||||
sleep (2)
|
||||
|
|
|
@ -256,7 +256,7 @@ if exploit == "dll_hijacking":
|
|||
if not os.path.isfile(setdir + "/fileformat.file" % (setdir)):
|
||||
print_info("This may take a few to load MSF...")
|
||||
try:
|
||||
child1=pexpect.spawn("ruby %s/msfconsole -L -n -r %s/meta_config" % (meta_path,setdir))
|
||||
child1=pexpect.spawn("ruby %s/msfconsole -L -r %s/meta_config" % (meta_path,setdir))
|
||||
except:
|
||||
try:
|
||||
child1.close()
|
||||
|
|
|
@ -27,7 +27,7 @@ if choice == "YES":
|
|||
if os.path.isfile(setdir + "/meta_config_multipyinjector"):
|
||||
listen_path = (setdir + "/meta_config_multipyinjector")
|
||||
|
||||
subprocess.Popen("ruby %s/msfconsole -L -n -r %s" % (meta_path,listen_path), shell=True).wait()
|
||||
subprocess.Popen("ruby %s/msfconsole -L -r %s" % (meta_path,listen_path), shell=True).wait()
|
||||
|
||||
# if we did select the set payload as our option
|
||||
if os.path.isfile(setdir + "/set.payload"):
|
||||
|
|
|
@ -229,7 +229,7 @@ def print_error(message):
|
|||
print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC
|
||||
|
||||
def get_version():
|
||||
define_version = '5.4.2'
|
||||
define_version = '5.4.3'
|
||||
return define_version
|
||||
|
||||
class create_menu:
|
||||
|
|
|
@ -486,7 +486,7 @@ try:
|
|||
meta_config = "meta_config"
|
||||
if os.path.isfile(setdir + "/meta_config_multipyinjector"):
|
||||
meta_config = "meta_config_multipyinjector"
|
||||
child1=pexpect.spawn("ruby %s/msfconsole -L -n -r %s/%s" % (msf_path,setdir,meta_config))
|
||||
child1=pexpect.spawn("ruby %s/msfconsole -L -r %s/%s" % (msf_path,setdir,meta_config))
|
||||
# check if we want to deliver emails or track users that click the link
|
||||
webattack_email = check_config("WEBATTACK_EMAIL=").lower()
|
||||
if webattack_email == "on" or track_email == "on":
|
||||
|
|
|
@ -398,7 +398,7 @@ if not os.path.isfile(setdir + "/template.zip"):
|
|||
if not os.path.isfile(setdir + "/unc_config"):
|
||||
print_error("Sorry, you did not generate your payload through SET, this option is not supported.")
|
||||
if os.path.isfile(setdir + "/unc_config"):
|
||||
child=pexpect.spawn("ruby %s/msfconsole -L -n -r %s/unc_config" % (meta_path,setdir))
|
||||
child=pexpect.spawn("ruby %s/msfconsole -L -r %s/unc_config" % (meta_path,setdir))
|
||||
try: child.interact()
|
||||
except Exception: child.close()
|
||||
|
||||
|
@ -418,7 +418,7 @@ if not os.path.isfile(setdir + "/template.zip"):
|
|||
filewrite.write("set ExitOnSession false\n")
|
||||
filewrite.write("exploit -j\n\n")
|
||||
filewrite.close()
|
||||
child=pexpect.spawn("ruby %s/msfconsole -L -n -r %s/meta_config" % (meta_path,setdir))
|
||||
child=pexpect.spawn("ruby %s/msfconsole -L -r %s/meta_config" % (meta_path,setdir))
|
||||
try:
|
||||
child.interact()
|
||||
except Exception:
|
||||
|
|
|
@ -56,7 +56,7 @@ if powershell_menu_choice != "99":
|
|||
filewrite.write("use multi/handler\nset payload windows/meterpreter/reverse_tcp\nset lport %s\nset LHOST 0.0.0.0\nexploit -j" % (port))
|
||||
filewrite.close()
|
||||
msf_path = meta_path()
|
||||
subprocess.Popen("ruby %s/msfconsole -L -n -r %s/reports/powershell/powershell.rc" % (msf_path, setdir), shell=True).wait()
|
||||
subprocess.Popen("ruby %s/msfconsole -L -r %s/reports/powershell/powershell.rc" % (msf_path, setdir), shell=True).wait()
|
||||
|
||||
print_status("Powershell files can be found under %s/reports/powershell/" % (setdir))
|
||||
return_continue()
|
||||
|
|
|
@ -133,7 +133,7 @@ if payload_counter == 1:
|
|||
print bcolors.BLUE + "[*] This may take a few to load MSF..." + bcolors.ENDC
|
||||
try:
|
||||
if operating_system != "windows":
|
||||
child1=pexpect.spawn("ruby %s/msfconsole -L -n -r %s/meta_config" % (msf_path,setdir))
|
||||
child1=pexpect.spawn("ruby %s/msfconsole -L -r %s/meta_config" % (msf_path,setdir))
|
||||
child1.interact()
|
||||
except:
|
||||
if operating_system != "windows":
|
||||
|
|
Loading…
Reference in a new issue