mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2025-04-04 06:46:08 +00:00
Multiple bug fixes reported and resolved
This commit is contained in:
parent
787609775c
commit
b61fd361a0
4 changed files with 28 additions and 23 deletions
|
@ -1,3 +1,10 @@
|
|||
~~~~~~~~~~~~~~~~
|
||||
version 5.4.8
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
||||
* fixed setdir not defined in SMS spoofing
|
||||
* fixed an issue that would cause powershell injection to assign port of false under some circumstances
|
||||
|
||||
~~~~~~~~~~~~~~~~
|
||||
version 5.4.7
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
|
|
@ -229,7 +229,7 @@ def print_error(message):
|
|||
print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC
|
||||
|
||||
def get_version():
|
||||
define_version = '5.4.7'
|
||||
define_version = '5.4.8'
|
||||
return define_version
|
||||
|
||||
class create_menu:
|
||||
|
|
|
@ -11,8 +11,6 @@ stage_encoding = check_config("STAGE_ENCODING=").lower()
|
|||
if stage_encoding == "off": stage_encoding = "false"
|
||||
else: stage_encoding = "true"
|
||||
|
||||
|
||||
|
||||
# check to see if we are just generating powershell code
|
||||
powershell_solo = check_options("POWERSHELL_SOLO")
|
||||
|
||||
|
@ -120,7 +118,7 @@ if multi_injection == "on":
|
|||
filewrite.write("\nuse exploit/multi/handler\n")
|
||||
if auto_migrate == "ON":
|
||||
filewrite.write("set AutoRunScript post/windows/manage/smart_migrate\n")
|
||||
filewrite.write("set PAYLOAD %s\nset LHOST %s\nset EnableStageEncoding %s\nset LPORT %s\nset ExitOnSession false\nexploit -j\n\n" % (powershell_inject_x86, ipaddr, ports, stage_encoding))
|
||||
filewrite.write("set PAYLOAD %s\nset LHOST %s\nset EnableStageEncoding %s\nset LPORT %s\nset ExitOnSession false\nexploit -j\n\n" % (powershell_inject_x86, ipaddr, stage_encoding, ports))
|
||||
filewrite.close()
|
||||
|
||||
# if we aren't using multi pyinjector
|
||||
|
@ -136,7 +134,7 @@ if multi_injection == "on":
|
|||
filewrite.write("\nuse exploit/multi/handler\n")
|
||||
if auto_migrate == "ON":
|
||||
filewrite.write("set AutoRunScript post/windows/manage/smart_migrate\n")
|
||||
filewrite.write("set PAYLOAD %s\nset LHOST %s\nset EnableStageEncoding %s\nset ExitOnSession false\nset LPORT %s\nexploit -j\n\n" % (powershell_inject_x86, ipaddr, ports, stage_encoding))
|
||||
filewrite.write("set PAYLOAD %s\nset LHOST %s\nset EnableStageEncoding %s\nset ExitOnSession false\nset LPORT %s\nexploit -j\n\n" % (powershell_inject_x86, ipaddr, stage_encoding, ports))
|
||||
filewrite.close()
|
||||
|
||||
# here we do everything if pyinjection or multi pyinjection was specified
|
||||
|
|
|
@ -4,7 +4,7 @@ from SMSProviders import *
|
|||
import re
|
||||
import glob
|
||||
import os
|
||||
from src.core import setcore as core
|
||||
from src.core.setcore import *
|
||||
|
||||
def launch():
|
||||
while 1:
|
||||
|
@ -14,7 +14,7 @@ def launch():
|
|||
|
||||
99. Cancel and return to SMS Spoofing Menu
|
||||
""")
|
||||
template_choice = raw_input(core.setprompt(["7"], "Use a predefined template or craft a one time SMS?"))
|
||||
template_choice = raw_input(setprompt(["7"], "Use a predefined template or craft a one time SMS?"))
|
||||
# if predefined template go here
|
||||
if template_choice == '1':
|
||||
# set path for
|
||||
|
@ -52,7 +52,7 @@ def launch():
|
|||
print line[1]+": "+line2
|
||||
|
||||
# allow user to select template
|
||||
choice=raw_input(core.setprompt(["7"], "Select template"))
|
||||
choice=raw_input(setprompt(["7"], "Select template"))
|
||||
for line in fileread:
|
||||
# split based off of space
|
||||
line=line.split(" ")
|
||||
|
@ -82,8 +82,8 @@ def launch():
|
|||
break;
|
||||
if template_choice == '2':
|
||||
try:
|
||||
origin = raw_input(core.setprompt(["7"], "Source number phone"))
|
||||
body = raw_input(core.setprompt(["7"], "Body of the message, hit return for a new line. Control+c when finished"))
|
||||
origin = raw_input(setprompt(["7"], "Source number phone"))
|
||||
body = raw_input(setprompt(["7"], "Body of the message, hit return for a new line. Control+c when finished"))
|
||||
while body != 'sdfsdfihdsfsodhdsofh':
|
||||
try:
|
||||
body+=("\n")
|
||||
|
@ -110,7 +110,7 @@ your own.
|
|||
|
||||
99. Cancel and return to SMS Spoofing Menu
|
||||
""")
|
||||
service_option = raw_input(core.setprompt(["7"], ""))
|
||||
service_option = raw_input(setprompt(["7"], ""))
|
||||
# exit
|
||||
if service_option == '1':
|
||||
break
|
||||
|
@ -129,33 +129,33 @@ your own.
|
|||
for to in phones:
|
||||
send_sohoos_sms(to.rstrip(), origin.rstrip(), body.rstrip())
|
||||
# Finish here then return to main menu
|
||||
core.print_status("SET has completed!")
|
||||
core.return_continue()
|
||||
print_status("SET has completed!")
|
||||
return_continue()
|
||||
|
||||
#Lleida.net service
|
||||
if service_option == '2':
|
||||
user = raw_input(core.setprompt(["7"], "Your Lleida.net user"))
|
||||
password = raw_input(core.setprompt(["7"], "Your Lleida.net password"))
|
||||
email = raw_input(core.setprompt(["7"], "Email for the receipt (optional)"))
|
||||
user = raw_input(setprompt(["7"], "Your Lleida.net user"))
|
||||
password = raw_input(setprompt(["7"], "Your Lleida.net password"))
|
||||
email = raw_input(setprompt(["7"], "Email for the receipt (optional)"))
|
||||
for to in phones:
|
||||
send_lleidanet_sms(to.rstrip(), origin.rstrip(), body.rstrip(), user, password, email)
|
||||
# Finish here then return to main menu
|
||||
core.print_status("SET has completed!")
|
||||
core.return_continue()
|
||||
print_status("SET has completed!")
|
||||
return_continue()
|
||||
|
||||
#SMSGANG service
|
||||
if service_option == '3':
|
||||
pincode = raw_input(core.setprompt(["7"], "Your SMSGANG pincode"))
|
||||
pincode = raw_input(setprompt(["7"], "Your SMSGANG pincode"))
|
||||
for to in phones:
|
||||
send_smsgang_sms(to.rstrip(), origin.rstrip(), body.rstrip(), pincode)
|
||||
# Finish here then return to main menu
|
||||
core.print_status("SET has completed!")
|
||||
core.return_continue()
|
||||
print_status("SET has completed!")
|
||||
return_continue()
|
||||
|
||||
#Andriod Emulator service
|
||||
if service_option == '4':
|
||||
for to in phones:
|
||||
send_android_emu_sms(origin.rstrip(), body.rstrip())
|
||||
# Finish here then return to main menu
|
||||
core.print_status("SET has completed!")
|
||||
core.return_continue()
|
||||
print_status("SET has completed!")
|
||||
return_continue()
|
||||
|
|
Loading…
Add table
Reference in a new issue