Updated to get re-enable database support in msfconsole

This commit is contained in:
TrustedSec 2013-12-11 13:09:51 -05:00
parent 87a235b3a5
commit 644433578f
8 changed files with 9 additions and 9 deletions

View file

@ -73,7 +73,7 @@ if trigger == 2 or trigger == 3:
filewrite.write("set lport " + line[2] + "\n")
filewrite.write("exploit -j")
filewrite.close()
subprocess.Popen("ruby %s/msfconsole -L -n -r %s/meta_config" % (msf_path, setdir), shell=True).wait()
subprocess.Popen("ruby %s/msfconsole -L -r %s/meta_config" % (msf_path, setdir), shell=True).wait()
else:
print_warning("cancelling...")
sleep (2)

View file

@ -256,7 +256,7 @@ if exploit == "dll_hijacking":
if not os.path.isfile(setdir + "/fileformat.file" % (setdir)):
print_info("This may take a few to load MSF...")
try:
child1=pexpect.spawn("ruby %s/msfconsole -L -n -r %s/meta_config" % (meta_path,setdir))
child1=pexpect.spawn("ruby %s/msfconsole -L -r %s/meta_config" % (meta_path,setdir))
except:
try:
child1.close()

View file

@ -27,7 +27,7 @@ if choice == "YES":
if os.path.isfile(setdir + "/meta_config_multipyinjector"):
listen_path = (setdir + "/meta_config_multipyinjector")
subprocess.Popen("ruby %s/msfconsole -L -n -r %s" % (meta_path,listen_path), shell=True).wait()
subprocess.Popen("ruby %s/msfconsole -L -r %s" % (meta_path,listen_path), shell=True).wait()
# if we did select the set payload as our option
if os.path.isfile(setdir + "/set.payload"):

View file

@ -229,7 +229,7 @@ def print_error(message):
print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC
def get_version():
define_version = '5.4.2'
define_version = '5.4.3'
return define_version
class create_menu:

View file

@ -486,7 +486,7 @@ try:
meta_config = "meta_config"
if os.path.isfile(setdir + "/meta_config_multipyinjector"):
meta_config = "meta_config_multipyinjector"
child1=pexpect.spawn("ruby %s/msfconsole -L -n -r %s/%s" % (msf_path,setdir,meta_config))
child1=pexpect.spawn("ruby %s/msfconsole -L -r %s/%s" % (msf_path,setdir,meta_config))
# check if we want to deliver emails or track users that click the link
webattack_email = check_config("WEBATTACK_EMAIL=").lower()
if webattack_email == "on" or track_email == "on":

View file

@ -398,7 +398,7 @@ if not os.path.isfile(setdir + "/template.zip"):
if not os.path.isfile(setdir + "/unc_config"):
print_error("Sorry, you did not generate your payload through SET, this option is not supported.")
if os.path.isfile(setdir + "/unc_config"):
child=pexpect.spawn("ruby %s/msfconsole -L -n -r %s/unc_config" % (meta_path,setdir))
child=pexpect.spawn("ruby %s/msfconsole -L -r %s/unc_config" % (meta_path,setdir))
try: child.interact()
except Exception: child.close()
@ -418,7 +418,7 @@ if not os.path.isfile(setdir + "/template.zip"):
filewrite.write("set ExitOnSession false\n")
filewrite.write("exploit -j\n\n")
filewrite.close()
child=pexpect.spawn("ruby %s/msfconsole -L -n -r %s/meta_config" % (meta_path,setdir))
child=pexpect.spawn("ruby %s/msfconsole -L -r %s/meta_config" % (meta_path,setdir))
try:
child.interact()
except Exception:

View file

@ -56,7 +56,7 @@ if powershell_menu_choice != "99":
filewrite.write("use multi/handler\nset payload windows/meterpreter/reverse_tcp\nset lport %s\nset LHOST 0.0.0.0\nexploit -j" % (port))
filewrite.close()
msf_path = meta_path()
subprocess.Popen("ruby %s/msfconsole -L -n -r %s/reports/powershell/powershell.rc" % (msf_path, setdir), shell=True).wait()
subprocess.Popen("ruby %s/msfconsole -L -r %s/reports/powershell/powershell.rc" % (msf_path, setdir), shell=True).wait()
print_status("Powershell files can be found under %s/reports/powershell/" % (setdir))
return_continue()

View file

@ -133,7 +133,7 @@ if payload_counter == 1:
print bcolors.BLUE + "[*] This may take a few to load MSF..." + bcolors.ENDC
try:
if operating_system != "windows":
child1=pexpect.spawn("ruby %s/msfconsole -L -n -r %s/meta_config" % (msf_path,setdir))
child1=pexpect.spawn("ruby %s/msfconsole -L -r %s/meta_config" % (msf_path,setdir))
child1.interact()
except:
if operating_system != "windows":