1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-09-18 14:00:12 +02:00

and the bins, tiny modification to the ruby side and update the README.

git-svn-id: file:///home/svn/framework3/trunk@8891 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Stephen Fewer 2010-03-24 00:03:32 +00:00
parent 9a4293c445
commit 75661291fa
5 changed files with 27 additions and 11 deletions

2
README
View File

@ -37,7 +37,7 @@ This license does not apply to the following components:
corresponding header files in the source tree
- The Packet Sniffer SDK (MicroOLAP) library embedded into the Meterpreter
Sniffer extension. HD Moore has a single-seat developer license.
- The vncdll.dll and vncdll.x64.dll binaries and their associated source code (modified TightVNC)
- The modified TightVNC binaries and their associated source code.
- The icons used by msfweb that were not created by Metasploit
- The Bit-Struct library located under lib/bit-struct
- The Byakugan plugin located under external/source/byakugan

Binary file not shown.

Binary file not shown.

View File

@ -12,7 +12,7 @@ require 'msf/base/sessions/vncinject'
module Metasploit3
include Msf::Payload::Windows::ReflectiveDllInject
def initialize(info = {})
super(update_info(info,
'Name' => 'VNC Server (Reflective Injection)',
@ -20,7 +20,7 @@ module Metasploit3
'Description' => 'Inject a VNC Dll via a reflective loader (staged)',
'Author' => [ 'sf' ],
'Session' => Msf::Sessions::VncInject ))
# Override the DLL path with the path to the meterpreter server DLL
register_options(
@ -48,11 +48,17 @@ module Metasploit3
register_advanced_options(
[
OptBool.new('DisableCourtesyShell',
[
false,
"Disables the Metasploit Courtesy shell",
false
])
[
false,
"Disables the Metasploit Courtesy shell",
false
]),
OptBool.new('DisableSessionTracking',
[
false,
"Disables the VNC payload from following the active session as users log in an out of the input desktop",
false
])
], self.class)
options.remove_option('DLL')
end
@ -71,6 +77,8 @@ module Metasploit3
flags |= 1 if (datastore['DisableCourtesyShell'])
flags |= 2 if (datastore['DisableSessionTracking'])
# Transmit the one byte flag
session.rstream.put([ flags ].pack('C'))

View File

@ -21,7 +21,7 @@ require 'msf/base/sessions/vncinject'
module Metasploit3
include Msf::Payload::Windows::ReflectiveDllInject_x64
def initialize(info = {})
super(update_info(info,
'Name' => 'Windows x64 VNC Server (Reflective Injection)',
@ -29,7 +29,7 @@ module Metasploit3
'Description' => 'Inject a VNC Dll via a reflective loader (Windows x64) (staged)',
'Author' => [ 'sf' ],
'Session' => Msf::Sessions::VncInject ))
# Override the DLL path with the path to the meterpreter server DLL
register_options(
@ -61,6 +61,12 @@ module Metasploit3
false,
"Disables the Metasploit Courtesy shell",
false
]),
OptBool.new('DisableSessionTracking',
[
false,
"Disables the VNC payload from following the active session as users log in an out of the input desktop",
false
])
], self.class)
options.remove_option('DLL')
@ -79,7 +85,9 @@ module Metasploit3
flags = 0
flags |= 1 if (datastore['DisableCourtesyShell'])
flags |= 2 if (datastore['DisableSessionTracking'])
# Transmit the one byte flag
session.rstream.put([ flags ].pack('C'))