mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-05 14:57:30 +01:00
44c8ee4614
git-svn-id: file:///home/svn/framework3/trunk@4292 4d416f70-5f16-0410-b530-b9f4589650da
55 lines
1.3 KiB
Ruby
Executable File
55 lines
1.3 KiB
Ruby
Executable File
#!/usr/bin/env ruby
|
|
#
|
|
# This user interface provides users with a command console interface to the
|
|
# framework.
|
|
#
|
|
|
|
msfbase = File.symlink?(__FILE__) ? File.readlink(__FILE__) : __FILE__
|
|
$:.unshift(File.join(File.dirname(msfbase), 'lib'))
|
|
require 'rex'
|
|
|
|
|
|
msfroot = File.join(File.dirname(msfbase), 'data', 'msfweb')
|
|
Dir.chdir(msfroot)
|
|
|
|
msfserv = File.join('script', 'server')
|
|
|
|
# Declare the argument parser for msfweb
|
|
arguments = Rex::Parser::Arguments.new(
|
|
"-a" => [ true, "Bind to this IP address instead of loopback" ],
|
|
"-p" => [ true, "Bind to this port instead of 55555" ],
|
|
# "-v" => [ true, "A number between 0 and 3 that controls log verbosity" ],
|
|
"-d" => [ false, "Daemonize the web server" ],
|
|
"-h" => [ false, "Help banner" ])
|
|
|
|
opts = {}
|
|
background = false
|
|
|
|
# Parse command line arguments.
|
|
arguments.parse(ARGV) { |opt, idx, val|
|
|
case opt
|
|
when "-a"
|
|
opts['ServerHost'] = val
|
|
when "-p"
|
|
opts['ServerPort'] = val
|
|
when "-v"
|
|
opts['LogLevel'] = val
|
|
when "-d"
|
|
background = true
|
|
when "-h"
|
|
print(
|
|
"\nUsage: msfweb <options>\n" +
|
|
arguments.usage)
|
|
exit
|
|
end
|
|
}
|
|
|
|
system(
|
|
"ruby",
|
|
msfserv,
|
|
'-p', (opts['ServerPort'] || '55555'),
|
|
'-b', (opts['ServerHost'] || '127.0.0.1'),
|
|
(background ? '-d' : '')
|
|
)
|
|
|