Fixed two bugs that caused powershell to error out when selecting through the menu

This commit is contained in:
trustedsec 2013-02-11 10:36:18 -05:00
parent c219fd9d30
commit 67d819a671
4 changed files with 13 additions and 1 deletions

View file

@ -1,3 +1,10 @@
~~~~~~~~~~~~~~~~
version 4.4.4
~~~~~~~~~~~~~~~~
* fixed a powershell bug that would cause an error if not specifying port 443
* added an additional prompt if generating the powershell shellcode alphanumeric injection through the menu and not through java applet
~~~~~~~~~~~~~~~~
version 4.4.3
~~~~~~~~~~~~~~~~

View file

@ -223,7 +223,7 @@ def print_error(message):
print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC
def get_version():
define_version = '4.4.3'
define_version = '4.4.4'
return define_version
class create_menu:

View file

@ -43,6 +43,7 @@ if not os.path.isfile("%s/src/program_junk/meta_config_multipyinjector" % (defin
if not os.path.isfile("%s/src/program_junk/port.options" % (definepath)):
port=raw_input(setprompt(["4"], "Enter the port for Metasploit to listen on for powershell [443]"))
if port == "": port = "443"
print_status("Generating x64-based powershell injection code...")
x64 = ""

View file

@ -49,6 +49,10 @@ if powershell_menu_choice != "99":
if os.path.isfile("%s/src/program_junk/port.options" % (definepath)):
fileopen = file("%s/src/program_junk/port.options" % (definepath), "r")
port = fileopen.read()
if not os.path.isfile("%s/src/program_junk/port.options" % (definepath)):
port=raw_input(setprompt(["4"], "Enter the port for Metasploit to listen on for powershell [443]"))
if port == "": port = "443"
choice = yesno_prompt("0","Do you want to start the listener now [yes/no]: ")
if choice == 'NO':