Skip to content

Conversation

VakarisZ
Copy link
Contributor

Feature / Fixes

Changed elastic according to WebRCE framework
Prepared commands for exploiting windows
Exploits both windows and linux. Tested on windows10 and ubuntu, elastic 1.4.2

@itaymmguardicore itaymmguardicore self-requested a review August 8, 2018 07:44
@VakarisZ VakarisZ force-pushed the elastic_with_framework branch from 715daf8 to 47160c1 Compare August 18, 2018 13:50
@@ -34,197 +35,68 @@ class ElasticGroovyExploiter(HostExploiter):

DOWNLOAD_TIMEOUT = 300 # copied from rdpgrinder

# Both commands are prepared for use in future development
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

remove these commands and use the ones on model_init_.py

return False
# Extra escaping required:
config = copy.deepcopy(self._config)
config.dropper_target_path_win_32 = r"C:\\\\Windows\\\\monkey32.exe"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is not good for 2 reasons:

  1. your point was to just escape everything, so just do it (replace '' with '\'). That way if the target path actually changes, we won't have to change it in here as well.
  2. you're deep copying the entire config just for escaping 2 values for a temporary use. Find another way to do this. Consider changing check_remote_files' parameters.


def exploit_host(self):
# self.exploit_host_linux()
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

commented out code

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants