Skip to content

Instantly share code, notes, and snippets.

@wchen-r7
Created July 27, 2015 19:49
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save wchen-r7/1c3e745444f1913c7ea3 to your computer and use it in GitHub Desktop.
Save wchen-r7/1c3e745444f1913c7ea3 to your computer and use it in GitHub Desktop.
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::CmdStager
def initialize(info = {})
super(update_info(info,
'Name' => 'Test',
'Description' => %q{
XXXXX
},
'Author' =>
[
'Test'
],
'License' => MSF_LICENSE,
'Platform' => 'linux',
'References' => [ ['URL', 'XXX'] ],
'DisclosureDate' => 'Jun 12 2015',
'Payload' => { 'DisableNops' => true },
'Platform' => 'linux',
'Arch' => ARCH_MIPSLE,
'Targets' => [ [ 'Universal', {} ] ],
'DefaultTarget' => 0
))
end
def exploit
print_status("#{peer} - calling execute_cmdstager")
execute_cmdstager(
:flavor => :echo,
:linemax => 95
)
end
def execute_command(cmd,opts)
print_status("#{peer} - Called execute_command")
end
end
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment