mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2025-02-17 05:48:46 +00:00
Fix for powershell injection
This commit is contained in:
parent
0ef8a82a1c
commit
a7b0858e89
2 changed files with 9 additions and 2 deletions
|
@ -1,3 +1,10 @@
|
|||
~~~~~~~~~~~~~~~~
|
||||
version 6.1.2
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
||||
* fixed powershell injection where payload would not properly generate when using pyinjector
|
||||
* fixed menu option error when using multi-attack vector
|
||||
|
||||
~~~~~~~~~~~~~~~~
|
||||
version 6.1.1
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
|
|
@ -230,7 +230,7 @@ def print_error(message):
|
|||
print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC
|
||||
|
||||
def get_version():
|
||||
define_version = '6.1.1'
|
||||
define_version = '6.1.2'
|
||||
return define_version
|
||||
|
||||
class create_menu:
|
||||
|
@ -1193,7 +1193,7 @@ def generate_powershell_alphanumeric_payload(payload,ipaddr,port, payload2):
|
|||
|
||||
# generate our shellcode first
|
||||
shellcode = metasploit_shellcode(payload, ipaddr, port)
|
||||
if not "reverse_http" or "reverse_https" in payload:
|
||||
if not "reverse_http" in payload or not "reverse_https" in payload:
|
||||
shellcode = shellcode_replace(ipaddr, port, shellcode).rstrip()
|
||||
# sub in \x for 0x
|
||||
shellcode = re.sub("\\\\x", "0x", shellcode)
|
||||
|
|
Loading…
Add table
Reference in a new issue