Bug fixes and additions for 4.4.5 release

This commit is contained in:
trustedsec 2013-02-16 17:13:49 -05:00
parent 3e980204d2
commit 87299a4763
8 changed files with 17 additions and 12 deletions

View file

@ -1,3 +1,9 @@
~~~~~~~~~~~~~~~~
version 4.4.5
~~~~~~~~~~~~~~~~
* fixed a bug that would cause the reports directory to not be active
~~~~~~~~~~~~~~~~
version 4.4.4
~~~~~~~~~~~~~~~~

3
set
View file

@ -9,6 +9,9 @@ import sys
import shutil
import re
if not os.path.isdir("reports/"):
os.makedirs("reports")
# check to see if we have python-pycrypto
try:
from Crypto.Cipher import AES

View file

@ -715,7 +715,7 @@ try:
filewrite.write("set ExitOnSession false\n")
if auto_migrate == "ON":
filewrite.write("set AutoRunScript migrate -f\n")
filewrite.write("set AutoRunScript post/windows/manage/smart_migrate\n")
# config option for using multiscript meterpreter
if meterpreter_multi == "ON":

View file

@ -223,7 +223,7 @@ def print_error(message):
print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC
def get_version():
define_version = '4.4.4'
define_version = '4.4.5'
return define_version
class create_menu:

View file

@ -153,7 +153,7 @@ if choice == "YES":
fileopen = file("src/program_junk/port.options", "r")
port = fileopen.read()
filewrite = file("src/program_junk/metasploit.answers", "w")
filewrite.write("use multi/handler\nset payload %s\nset LHOST %s\nset LPORT %s\nset AutoRunScript migrate -f\nexploit -j" % (payload,ipaddr,port))
filewrite.write("use multi/handler\nset payload %s\nset LHOST %s\nset LPORT %s\nset AutoRunScript post/windows/manage/smart_migrate\nexploit -j" % (payload,ipaddr,port))
filewrite.close()
print "[*] Launching Metasploit...."
try:

View file

@ -159,7 +159,7 @@ if meterpreter_multi == "ON":
# auto migration
if auto_migrate == "ON":
filewrite.write("set AutoRunScript migrate -f\n")
filewrite.write("set AutoRunScript post/windows/manage/smart_migrate\n")
filewrite.write("exploit -j\n\n")
filewrite.close()

View file

@ -488,12 +488,10 @@ def ssl_server(HandlerClass = SETHandler,ServerClass = SecureHTTPServer):
if track_email == "on": webattack_email = "on"
# if emailer webattack, spawn email questions
if webattack_email == "on":
#try:
import src.phishing.smtp.client.smtp_web
#except Exception, e:
# print e
# reload(src.phishing.smtp.client.smtp_web)
# pause = raw_input("TEST")
try:
import src.phishing.smtp.client.smtp_web
except Exception, e:
reload(src.phishing.smtp.client.smtp_web)
# see if we're tabnabbing or multiattack
fileopen=file("src/program_junk/attack_vector", "r")

View file

@ -379,8 +379,6 @@ if harvester == "on" or tabnabbing == "on" or webjacking == "on":
except: import tabnabbing
# if the harvester is on set the multi_harvester flag
sys.path.append("src/webattack/harvester")
#try: reload(harvester)
#except: import harvester
if java_applet == "on" or meta_attack == "on":
pexpect_flag="on"
a=subprocess.Popen("python src/webattack/harvester/harvester.py", shell=True)