Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/spec/file_fixtures/modules/exploits/existing_auto_target.rb
Views: 11623
1class MetasploitModule < Msf::Exploit::Remote2include Exploit::Remote::Tcp34Rank = ManualRanking56def initialize(info = {})7super(update_info(info,8'Name' => 'Exploit With Existing Automatic Target',9'Description' => %q{ This module is a test bed for automatic targeting when there is already an auto target. },10'Author' => [ 'thelightcosine' ],11'License' => MSF_LICENSE,12'Privileged' => true,13'DefaultOptions' =>14{15'WfsDelay' => 10,16'EXITFUNC' => 'thread'17},18'Payload' =>19{20'Space' => 3072,21'DisableNops' => true22},23'Platform' => 'win',24'Arch' => [ARCH_X86, ARCH_X64],25'Targets' =>26[27['Automatic Targeting', { 'auto' => true }],28['Windows 2000 Universal',29{30'Ret' => 0x001f1cb0,31'Scratch' => 0x00020408,32}33], # JMP EDI SVCHOST.EXE3435#36# Standard return-to-ESI without NX bypass37# Warning: DO NOT CHANGE THE OFFSET OF THIS TARGET38#39['Windows XP SP0/SP1 Universal',40{41'Ret' => 0x01001361,42'Scratch' => 0x00020408,43}44], # JMP ESI SVCHOST.EXE4546# Standard return-to-ESI without NX bypass47['Windows 2003 SP0 Universal',48{49'Ret' => 0x0100129e,50'Scratch' => 0x00020408,51}52], # JMP ESI SVCHOST.EXE53# Metasploit's NX bypass for XP SP2/SP354['Windows XP SP3 English (NX)',55{56'Ret' => 0x6f88f807,57'DisableNX' => 0x6f8917c2,58'Scratch' => 0x0002040859}60]6162],63'DisclosureDate' => '1999-01-01'64))65end6667def exploit68print_status("This exploit doesn't actually do anything")6970end717273end7475