mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2024-11-23 21:13:05 +00:00
Bug fixes and additions for 4.4.5 release
This commit is contained in:
parent
3e980204d2
commit
87299a4763
8 changed files with 17 additions and 12 deletions
|
@ -1,3 +1,9 @@
|
|||
~~~~~~~~~~~~~~~~
|
||||
version 4.4.5
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
||||
* fixed a bug that would cause the reports directory to not be active
|
||||
|
||||
~~~~~~~~~~~~~~~~
|
||||
version 4.4.4
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
|
3
set
3
set
|
@ -9,6 +9,9 @@ import sys
|
|||
import shutil
|
||||
import re
|
||||
|
||||
if not os.path.isdir("reports/"):
|
||||
os.makedirs("reports")
|
||||
|
||||
# check to see if we have python-pycrypto
|
||||
try:
|
||||
from Crypto.Cipher import AES
|
||||
|
|
|
@ -715,7 +715,7 @@ try:
|
|||
|
||||
filewrite.write("set ExitOnSession false\n")
|
||||
if auto_migrate == "ON":
|
||||
filewrite.write("set AutoRunScript migrate -f\n")
|
||||
filewrite.write("set AutoRunScript post/windows/manage/smart_migrate\n")
|
||||
|
||||
# config option for using multiscript meterpreter
|
||||
if meterpreter_multi == "ON":
|
||||
|
|
|
@ -223,7 +223,7 @@ def print_error(message):
|
|||
print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC
|
||||
|
||||
def get_version():
|
||||
define_version = '4.4.4'
|
||||
define_version = '4.4.5'
|
||||
return define_version
|
||||
|
||||
class create_menu:
|
||||
|
|
|
@ -153,7 +153,7 @@ if choice == "YES":
|
|||
fileopen = file("src/program_junk/port.options", "r")
|
||||
port = fileopen.read()
|
||||
filewrite = file("src/program_junk/metasploit.answers", "w")
|
||||
filewrite.write("use multi/handler\nset payload %s\nset LHOST %s\nset LPORT %s\nset AutoRunScript migrate -f\nexploit -j" % (payload,ipaddr,port))
|
||||
filewrite.write("use multi/handler\nset payload %s\nset LHOST %s\nset LPORT %s\nset AutoRunScript post/windows/manage/smart_migrate\nexploit -j" % (payload,ipaddr,port))
|
||||
filewrite.close()
|
||||
print "[*] Launching Metasploit...."
|
||||
try:
|
||||
|
|
|
@ -159,7 +159,7 @@ if meterpreter_multi == "ON":
|
|||
|
||||
# auto migration
|
||||
if auto_migrate == "ON":
|
||||
filewrite.write("set AutoRunScript migrate -f\n")
|
||||
filewrite.write("set AutoRunScript post/windows/manage/smart_migrate\n")
|
||||
|
||||
filewrite.write("exploit -j\n\n")
|
||||
filewrite.close()
|
||||
|
|
|
@ -488,12 +488,10 @@ def ssl_server(HandlerClass = SETHandler,ServerClass = SecureHTTPServer):
|
|||
if track_email == "on": webattack_email = "on"
|
||||
# if emailer webattack, spawn email questions
|
||||
if webattack_email == "on":
|
||||
#try:
|
||||
import src.phishing.smtp.client.smtp_web
|
||||
#except Exception, e:
|
||||
# print e
|
||||
# reload(src.phishing.smtp.client.smtp_web)
|
||||
# pause = raw_input("TEST")
|
||||
try:
|
||||
import src.phishing.smtp.client.smtp_web
|
||||
except Exception, e:
|
||||
reload(src.phishing.smtp.client.smtp_web)
|
||||
|
||||
# see if we're tabnabbing or multiattack
|
||||
fileopen=file("src/program_junk/attack_vector", "r")
|
||||
|
|
|
@ -379,8 +379,6 @@ if harvester == "on" or tabnabbing == "on" or webjacking == "on":
|
|||
except: import tabnabbing
|
||||
# if the harvester is on set the multi_harvester flag
|
||||
sys.path.append("src/webattack/harvester")
|
||||
#try: reload(harvester)
|
||||
#except: import harvester
|
||||
if java_applet == "on" or meta_attack == "on":
|
||||
pexpect_flag="on"
|
||||
a=subprocess.Popen("python src/webattack/harvester/harvester.py", shell=True)
|
||||
|
|
Loading…
Reference in a new issue