metasploit-runner 0.1.1 → 0.1.3
Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: ed708546d491150bc795b5633b9359043c960ce3
|
4
|
+
data.tar.gz: cfeda943c27e25482178e6d466ec539e1da30f19
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 9f01160bb2c7fcb6ba1e5d4893f094ef2c7c204c8647c19a98e40d976674884d3c36590fe31ffc1f8554c0b73a2d082f9bdb159ae729417089a23c08e6ff747c
|
7
|
+
data.tar.gz: 3e0c5d8f5b832d482f97bf3721f6a157d2100123a5d18d7aace600a39866c29c4217b47ebf606e97b06aa3f2bc2803a3ad60d1ca423bb1cf524d087eec57b6f3
|
data/lib/metasploit/exploit.rb
CHANGED
@@ -50,17 +50,13 @@ module Metasploit
|
|
50
50
|
end
|
51
51
|
|
52
52
|
def self.do_metasploit_audit(rpc_client, run_details)
|
53
|
-
|
54
53
|
audit = rpc_client.call('pro.start_webaudit', run_details.get_audit_options)
|
55
54
|
|
56
|
-
|
57
55
|
wait_for_task_to_stop_running(rpc_client, CONSTANTS::AUDIT_MESSAGE, audit['task_id'])
|
58
56
|
end
|
59
57
|
|
60
58
|
def self.do_metasploit_exploit(rpc_client, run_details)
|
61
|
-
|
62
|
-
|
63
|
-
if run_details.use_os_filter == true
|
59
|
+
if run_details.use_os_filter
|
64
60
|
puts CONSTANTS::USING_OS_FILTER_MESSAGE
|
65
61
|
else
|
66
62
|
puts CONSTANTS::NO_OS_FILTER
|
@@ -15,7 +15,7 @@ class ExploitRunDescription
|
|
15
15
|
self.workspace_name = workspace_name
|
16
16
|
self.nexpose_console_name = nexpose_console_name
|
17
17
|
@@device_ip_to_scan_value = device_ip_to_scan
|
18
|
-
|
18
|
+
self.use_os_filter = use_os_filter
|
19
19
|
end
|
20
20
|
|
21
21
|
def verify
|
@@ -91,7 +91,7 @@ class ExploitRunDescription
|
|
91
91
|
end
|
92
92
|
|
93
93
|
def use_os_filter
|
94
|
-
(@@use_os_filter_value
|
94
|
+
self.to_bool(@@use_os_filter_value)
|
95
95
|
end
|
96
96
|
|
97
97
|
|
@@ -99,4 +99,8 @@ class ExploitRunDescription
|
|
99
99
|
(value_to_check.nil? || value_to_check.empty?) ? default : value_to_check
|
100
100
|
end
|
101
101
|
|
102
|
+
def to_bool(str)
|
103
|
+
str == 'true'
|
104
|
+
end
|
105
|
+
|
102
106
|
end
|
@@ -8,7 +8,7 @@ describe 'exploit_run_description' do
|
|
8
8
|
@expected_port = '3791'
|
9
9
|
@expected_uri = '/api/1.1'
|
10
10
|
@expected_ssl = false
|
11
|
-
@expected_os_filter =
|
11
|
+
@expected_os_filter = false
|
12
12
|
@expected_workspace_name = 'workspacename'
|
13
13
|
@expected_nexpose_console_name = 'nexpose_console_name'
|
14
14
|
@expected_webscan_task_id = '12'
|
data/spec/exploit_spec.rb
CHANGED
@@ -12,8 +12,8 @@ describe 'exploit' do
|
|
12
12
|
@expected_port = '3791'
|
13
13
|
@expected_uri = '/api/1.1'
|
14
14
|
@expected_ssl = false
|
15
|
-
@expected_use_os_filter =
|
16
|
-
@expected_no_os_filter =
|
15
|
+
@expected_use_os_filter = false
|
16
|
+
@expected_no_os_filter = true
|
17
17
|
@expected_workspace_name = 'workspacename'
|
18
18
|
@expected_nexpose_console_name = 'nexpose_console_name'
|
19
19
|
@expected_webscan_task_id = '12'
|
@@ -319,7 +319,7 @@ describe 'exploit' do
|
|
319
319
|
"DS_LimitSessions" => @expected_session_limit,
|
320
320
|
"DS_MATCH_VULNS" => @expected_match_vulns,
|
321
321
|
"DS_MATCH_PORTS" => @expected_match_ports,
|
322
|
-
"DS_FilterByOS" =>
|
322
|
+
"DS_FilterByOS" => @expected_use_os_filter})
|
323
323
|
|
324
324
|
Metasploit::Exploit.start(@expected_connection, @expected_port, @expected_uri, @expected_ssl, @expected_token, @expected_workspace_name, @expected_nexpose_console_name, @mock_device_ip_to_scan, true)
|
325
325
|
end
|