From 2262e810482e1441ba739729341a5ec36f4af8ab Mon Sep 17 00:00:00 2001 From: Thorsten Sick Date: Thu, 14 Oct 2021 09:55:26 +0200 Subject: [PATCH] Fixing metasploit getuid and switchign to new system --- .../metasploit_getuid.py | 18 ++++++------------ 1 file changed, 6 insertions(+), 12 deletions(-) diff --git a/plugins/default/metasploit_attacks/metasploit_getuid_t1033/metasploit_getuid.py b/plugins/default/metasploit_attacks/metasploit_getuid_t1033/metasploit_getuid.py index d468e0d..7d9bb38 100644 --- a/plugins/default/metasploit_attacks/metasploit_getuid_t1033/metasploit_getuid.py +++ b/plugins/default/metasploit_attacks/metasploit_getuid_t1033/metasploit_getuid.py @@ -3,7 +3,6 @@ # A plugin to nmap targets slow motion, to evade sensors from plugins.base.attack import AttackPlugin, Requirement -from app.metasploit import MetasploitInstant class MetasploitGetuidPlugin(AttackPlugin): @@ -33,18 +32,13 @@ class MetasploitGetuidPlugin(AttackPlugin): payload_name = "babymetal.exe" target = self.targets[0] - metasploit = MetasploitInstant(self.metasploit_password, - attack_logger=self.attack_logger, - attacker=self.attacker_machine_plugin, - username=self.metasploit_user) + self.metasploit.smart_infect(target, + payload=payload_type, + outfile=payload_name, + format="exe", + architecture="x64") - metasploit.smart_infect(target, - payload=payload_type, - outfile=payload_name, - format="exe", - architecture="x64") - - uid = metasploit.getuid(target) + uid = self.metasploit.getuid(target) print(f"UID: {uid}") return res