ronin-exploits 0.2.1 → 0.3.0
Sign up to get free protection for your applications and to get access to all the features.
- data.tar.gz.sig +0 -0
- data/History.txt +122 -0
- data/Manifest.txt +110 -20
- data/README.txt +112 -31
- data/Rakefile +12 -1
- data/bin/ronin-exploit +12 -0
- data/bin/ronin-exploits +1 -1
- data/bin/ronin-gen-binary-payload +12 -0
- data/bin/ronin-gen-exploit +12 -0
- data/bin/ronin-gen-ftp-exploit +12 -0
- data/bin/ronin-gen-http-exploit +12 -0
- data/bin/ronin-gen-local-exploit +12 -0
- data/bin/ronin-gen-nops +12 -0
- data/bin/ronin-gen-payload +12 -0
- data/bin/ronin-gen-remote-exploit +12 -0
- data/bin/ronin-gen-remote-tcp-exploit +12 -0
- data/bin/ronin-gen-remote-udp-exploit +12 -0
- data/bin/ronin-gen-shellcode +12 -0
- data/bin/ronin-gen-web-exploit +12 -0
- data/bin/ronin-payload +1 -1
- data/bin/ronin-payloads +1 -1
- data/lib/ronin/controls.rb +23 -0
- data/lib/ronin/controls/behaviors.rb +133 -0
- data/lib/ronin/{payloads/helpers → controls}/exceptions.rb +2 -4
- data/lib/ronin/{payloads/arch.rb → controls/exceptions/not_implemented.rb} +3 -8
- data/lib/ronin/controls/exceptions/program_not_found.rb +27 -0
- data/lib/ronin/controls/file_system.rb +145 -0
- data/lib/ronin/{exploits/os.rb → controls/helpers.rb} +12 -13
- data/lib/ronin/controls/helpers/command_exec.rb +143 -0
- data/lib/ronin/controls/helpers/dir_create.rb +42 -0
- data/lib/ronin/controls/helpers/dir_listing.rb +62 -0
- data/lib/ronin/controls/helpers/dir_remove.rb +42 -0
- data/lib/ronin/controls/helpers/file_ctime.rb +52 -0
- data/lib/ronin/controls/helpers/file_mtime.rb +53 -0
- data/lib/ronin/controls/helpers/file_ownership.rb +53 -0
- data/lib/ronin/controls/helpers/file_read.rb +62 -0
- data/lib/ronin/controls/helpers/file_remove.rb +51 -0
- data/lib/ronin/controls/helpers/file_write.rb +62 -0
- data/lib/ronin/controls/helpers/memory_read.rb +39 -0
- data/lib/ronin/controls/helpers/memory_write.rb +39 -0
- data/lib/ronin/exploits.rb +0 -2
- data/lib/ronin/exploits/{allow.rb → control.rb} +5 -9
- data/lib/ronin/exploits/exceptions.rb +1 -2
- data/lib/ronin/exploits/exceptions/exception.rb +27 -0
- data/lib/ronin/exploits/exceptions/exploit_not_built.rb +3 -3
- data/lib/ronin/exploits/exceptions/payload_size.rb +3 -3
- data/lib/ronin/exploits/exceptions/restricted_char.rb +3 -3
- data/lib/ronin/exploits/exceptions/target_data_missing.rb +3 -3
- data/lib/ronin/exploits/exceptions/target_unspecified.rb +3 -3
- data/lib/ronin/exploits/exceptions/unknown_helper.rb +3 -3
- data/lib/ronin/exploits/exploit.rb +449 -92
- data/lib/ronin/exploits/exploit_author.rb +2 -3
- data/lib/ronin/exploits/ftp.rb +7 -2
- data/lib/ronin/exploits/helpers.rb +0 -2
- data/lib/ronin/exploits/helpers/binary.rb +11 -5
- data/lib/ronin/exploits/helpers/buffer_overflow.rb +38 -25
- data/lib/ronin/exploits/helpers/file_based.rb +29 -30
- data/lib/ronin/exploits/helpers/format_string.rb +34 -24
- data/lib/ronin/exploits/helpers/padding.rb +33 -16
- data/lib/ronin/exploits/http.rb +9 -4
- data/lib/ronin/exploits/local.rb +8 -2
- data/lib/ronin/exploits/remote.rb +8 -2
- data/lib/ronin/exploits/remote_tcp.rb +26 -8
- data/lib/ronin/exploits/remote_udp.rb +26 -8
- data/lib/ronin/exploits/target.rb +41 -30
- data/lib/ronin/exploits/targets.rb +0 -2
- data/lib/ronin/exploits/targets/buffer_overflow.rb +0 -2
- data/lib/ronin/exploits/targets/format_string.rb +0 -2
- data/lib/ronin/exploits/verifiers.rb +45 -16
- data/lib/ronin/exploits/version.rb +1 -3
- data/lib/ronin/exploits/web.rb +18 -6
- data/lib/ronin/generators/exploits.rb +23 -0
- data/lib/ronin/generators/exploits/exploit.rb +70 -0
- data/lib/ronin/generators/exploits/ftp.rb +42 -0
- data/lib/ronin/generators/exploits/http.rb +42 -0
- data/lib/ronin/generators/exploits/local.rb +42 -0
- data/lib/ronin/generators/exploits/remote.rb +42 -0
- data/lib/ronin/generators/exploits/remote_tcp.rb +44 -0
- data/lib/ronin/generators/exploits/remote_udp.rb +44 -0
- data/lib/ronin/{exploits/arch.rb → generators/exploits/static.rb} +5 -9
- data/lib/ronin/generators/exploits/web.rb +45 -0
- data/lib/ronin/generators/payloads.rb +23 -0
- data/lib/ronin/generators/payloads/binary_payload.rb +42 -0
- data/lib/ronin/generators/payloads/nops.rb +42 -0
- data/lib/ronin/generators/payloads/payload.rb +66 -0
- data/lib/ronin/generators/payloads/shellcode.rb +42 -0
- data/lib/ronin/generators/payloads/static.rb +30 -0
- data/lib/ronin/model/has_default_port.rb +6 -6
- data/lib/ronin/model/targets_arch.rb +18 -7
- data/lib/ronin/model/targets_os.rb +18 -8
- data/lib/ronin/model/targets_product.rb +68 -0
- data/lib/ronin/payloads.rb +0 -2
- data/lib/ronin/payloads/asm_payload.rb +8 -2
- data/lib/ronin/payloads/binary_payload.rb +8 -2
- data/lib/ronin/payloads/control.rb +1 -5
- data/lib/ronin/payloads/encoders.rb +1 -2
- data/lib/ronin/payloads/encoders/encoder.rb +92 -0
- data/lib/ronin/payloads/encoders/xor.rb +4 -6
- data/lib/ronin/payloads/exceptions.rb +1 -2
- data/lib/ronin/payloads/{helpers/exceptions/not_implemented.rb → exceptions/exception.rb} +1 -5
- data/lib/ronin/payloads/{helpers/exceptions/program_not_found.rb → exceptions/not_implemented.rb} +3 -5
- data/lib/ronin/payloads/exceptions/unknown_helper.rb +3 -3
- data/lib/ronin/payloads/has_payload.rb +111 -0
- data/lib/ronin/payloads/helpers.rb +1 -4
- data/lib/ronin/payloads/helpers/chained.rb +61 -0
- data/lib/ronin/payloads/helpers/rpc.rb +31 -21
- data/lib/ronin/payloads/nops.rb +7 -2
- data/lib/ronin/payloads/payload.rb +144 -85
- data/lib/ronin/payloads/payload_author.rb +2 -3
- data/lib/ronin/payloads/shellcode.rb +8 -5
- data/lib/ronin/payloads/web_payload.rb +8 -2
- data/lib/ronin/ui/command_line/commands/exploit.rb +193 -0
- data/lib/ronin/ui/command_line/commands/exploits.rb +102 -25
- data/lib/ronin/ui/command_line/commands/gen_binary_payload.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_ftp_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_http_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_local_exploit.rb +34 -0
- data/lib/ronin/{exploits/license.rb → ui/command_line/commands/gen_nops.rb} +8 -8
- data/lib/ronin/ui/command_line/commands/gen_payload.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_remote_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_remote_tcp_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_remote_udp_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_shellcode.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_web_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/payload.rb +73 -50
- data/lib/ronin/ui/command_line/commands/payloads.rb +78 -23
- data/lib/ronin/vuln/behavior.rb +101 -28
- data/spec/controls/behaviors_examples.rb +38 -0
- data/spec/exploits/exploit_spec.rb +177 -23
- data/spec/exploits/file_based_exploit_spec.rb +16 -7
- data/spec/exploits/remote_tcp_spec.rb +1 -1
- data/spec/exploits/remote_udp_spec.rb +1 -1
- data/spec/generators/exploits/exploit_examples.rb +24 -0
- data/spec/generators/exploits/exploit_spec.rb +42 -0
- data/spec/generators/exploits/ftp_spec.rb +42 -0
- data/spec/generators/exploits/http_spec.rb +42 -0
- data/spec/generators/exploits/local_spec.rb +42 -0
- data/spec/generators/exploits/remote_spec.rb +42 -0
- data/spec/generators/exploits/remote_tcp_spec.rb +47 -0
- data/spec/generators/exploits/remote_udp_spec.rb +47 -0
- data/spec/generators/exploits/web_spec.rb +52 -0
- data/spec/generators/payloads/binary_payload_spec.rb +31 -0
- data/spec/generators/payloads/nops_spec.rb +31 -0
- data/spec/generators/payloads/payload_examples.rb +16 -0
- data/spec/generators/payloads/payload_spec.rb +31 -0
- data/spec/generators/payloads/shellcode_spec.rb +31 -0
- data/spec/model/models/targets_product_model.rb +11 -0
- data/spec/model/targets_arch_spec.rb +11 -1
- data/spec/model/targets_os_spec.rb +11 -1
- data/spec/model/targets_product_spec.rb +35 -0
- data/spec/objects/exploits/{test.rb → simple.rb} +1 -1
- data/spec/objects/payloads/{test.rb → simple.rb} +6 -2
- data/spec/payloads/encoders/encoder_spec.rb +30 -0
- data/spec/payloads/encoders/xor_spec.rb +1 -1
- data/spec/payloads/payload_spec.rb +41 -43
- data/spec/spec_helper.rb +4 -1
- data/static/ronin/generators/exploits/_cache.erb +14 -0
- data/static/ronin/generators/exploits/_header.erb +1 -0
- data/static/ronin/generators/exploits/_helpers.erb +4 -0
- data/static/ronin/generators/exploits/exploit.erb +24 -0
- data/static/ronin/generators/exploits/ftp.erb +24 -0
- data/static/ronin/generators/exploits/http.erb +26 -0
- data/static/ronin/generators/exploits/local.erb +24 -0
- data/static/ronin/generators/exploits/remote.erb +24 -0
- data/static/ronin/generators/exploits/remote_tcp.erb +26 -0
- data/static/ronin/generators/exploits/remote_udp.erb +26 -0
- data/static/ronin/generators/exploits/web.erb +28 -0
- data/static/ronin/generators/payloads/_cache.erb +10 -0
- data/static/ronin/generators/payloads/_header.erb +1 -0
- data/static/ronin/generators/payloads/_helpers.erb +2 -0
- data/static/ronin/generators/payloads/binary_payload.erb +25 -0
- data/static/ronin/generators/payloads/nops.erb +19 -0
- data/static/ronin/generators/payloads/payload.erb +25 -0
- data/static/ronin/generators/payloads/shellcode.erb +25 -0
- data/tasks/spec.rb +1 -0
- data/tasks/yard.rb +13 -0
- metadata +162 -30
- metadata.gz.sig +0 -0
- data/TODO.txt +0 -22
- data/lib/ronin/exploits/product.rb +0 -34
- data/lib/ronin/payloads/encoder.rb +0 -84
- data/lib/ronin/payloads/helpers/file_system.rb +0 -187
- data/lib/ronin/payloads/helpers/shell.rb +0 -91
- data/lib/ronin/payloads/license.rb +0 -34
- data/lib/ronin/payloads/os.rb +0 -34
- data/spec/payloads/encoder_spec.rb +0 -30
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,7 +17,6 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
23
21
|
|
24
22
|
require 'ronin/author'
|
@@ -27,7 +25,8 @@ module Ronin
|
|
27
25
|
module Payloads
|
28
26
|
class PayloadAuthor < Author
|
29
27
|
|
30
|
-
|
28
|
+
# The payload the author wrote
|
29
|
+
belongs_to :payload, :nullable => true
|
31
30
|
|
32
31
|
end
|
33
32
|
end
|
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,18 +17,22 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
23
21
|
|
24
22
|
require 'ronin/payloads/binary_payload'
|
25
|
-
require 'ronin/payloads/helpers/shell'
|
26
23
|
|
27
24
|
module Ronin
|
28
25
|
module Payloads
|
29
26
|
class Shellcode < ASMPayload
|
30
27
|
|
31
|
-
|
32
|
-
|
28
|
+
#
|
29
|
+
# Creates a new Ronin::Payloads::Shellcode object using the given
|
30
|
+
# _block_.
|
31
|
+
#
|
32
|
+
# ronin_shellcode do
|
33
|
+
# ...
|
34
|
+
# end
|
35
|
+
#
|
33
36
|
contextify :ronin_shellcode
|
34
37
|
|
35
38
|
end
|
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,7 +17,6 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
23
21
|
|
24
22
|
require 'ronin/payloads/payload'
|
@@ -28,6 +26,14 @@ module Ronin
|
|
28
26
|
module Payloads
|
29
27
|
class WebPayload < Payload
|
30
28
|
|
29
|
+
#
|
30
|
+
# Creates a new Ronin::Payloads::WebPayload object using the given
|
31
|
+
# _block_.
|
32
|
+
#
|
33
|
+
# ronin_web_payload do
|
34
|
+
# ...
|
35
|
+
# end
|
36
|
+
#
|
31
37
|
contextify :ronin_web_payload
|
32
38
|
|
33
39
|
end
|
@@ -0,0 +1,193 @@
|
|
1
|
+
#
|
2
|
+
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
3
|
+
# payload crafting functionality.
|
4
|
+
#
|
5
|
+
# Copyright (c) 2007-2009 Hal Brodigan (postmodern.mod3 at gmail.com)
|
6
|
+
#
|
7
|
+
# This program is free software; you can redistribute it and/or modify
|
8
|
+
# it under the terms of the GNU General Public License as published by
|
9
|
+
# the Free Software Foundation; either version 2 of the License, or
|
10
|
+
# (at your option) any later version.
|
11
|
+
#
|
12
|
+
# This program is distributed in the hope that it will be useful,
|
13
|
+
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
14
|
+
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
15
|
+
# GNU General Public License for more details.
|
16
|
+
#
|
17
|
+
# You should have received a copy of the GNU General Public License
|
18
|
+
# along with this program; if not, write to the Free Software
|
19
|
+
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
20
|
+
#
|
21
|
+
|
22
|
+
require 'ronin/ui/command_line/command'
|
23
|
+
require 'ronin/exploits'
|
24
|
+
require 'ronin/payloads'
|
25
|
+
require 'ronin/database'
|
26
|
+
|
27
|
+
require 'parameters/parser'
|
28
|
+
|
29
|
+
module Ronin
|
30
|
+
module UI
|
31
|
+
module CommandLine
|
32
|
+
module Commands
|
33
|
+
class Exploit < Command
|
34
|
+
|
35
|
+
desc "exploit [options]", "Builds and deploys an exploit"
|
36
|
+
method_option :database, :type => :string, :default => Database.config, :aliases => '-D'
|
37
|
+
|
38
|
+
# exploit options
|
39
|
+
method_option :name, :type => :string, :aliases => '-n'
|
40
|
+
method_option :version, :type => :string, :aliases => '-V'
|
41
|
+
method_option :params, :type => :array, :default => [], :aliases => '-p'
|
42
|
+
method_option :host, :type => :string
|
43
|
+
method_option :port, :type => :numeric
|
44
|
+
method_option :local_host, :type => :string
|
45
|
+
method_option :local_port, :type => :numeric
|
46
|
+
method_option :dry_run, :type => :boolean, :default => false
|
47
|
+
method_option :raw_payload, :type => :string
|
48
|
+
method_option :file, :type => :string, :aliases => '-f'
|
49
|
+
|
50
|
+
# target options
|
51
|
+
method_option :target, :type => :numeric, :alias => '-t'
|
52
|
+
method_option :target_arch, :type => :string, :aliases => '-a'
|
53
|
+
method_option :target_os, :type => :string, :aliases => '-o'
|
54
|
+
method_option :target_product, :type => :string
|
55
|
+
method_option :target_version, :type => :string
|
56
|
+
|
57
|
+
# payload options
|
58
|
+
method_option :payload_name, :type => :string, :aliases => '--payload -P'
|
59
|
+
method_option :payload_version, :type => :string
|
60
|
+
method_option :payload_file, :type => :string
|
61
|
+
|
62
|
+
def default
|
63
|
+
Database.setup(options[:database])
|
64
|
+
|
65
|
+
# Load the exploit
|
66
|
+
if options[:file]
|
67
|
+
load_exploit!
|
68
|
+
else
|
69
|
+
find_exploit!
|
70
|
+
end
|
71
|
+
|
72
|
+
unless @exploit
|
73
|
+
print_error "Could not find the specified exploit"
|
74
|
+
exit -1
|
75
|
+
end
|
76
|
+
|
77
|
+
if options[:target]
|
78
|
+
unless exploit.use_target!(options[:target])
|
79
|
+
print_error "Invalid target index: #{options[:target]}"
|
80
|
+
exit -1
|
81
|
+
end
|
82
|
+
elsif (options[:target_arch] || options[:target_os] ||
|
83
|
+
options[:target_product] || options[:target_version])
|
84
|
+
exploit.use_target! do |target|
|
85
|
+
if (options[:target_arch] && target.arch)
|
86
|
+
next unless target.arch.name == options[:target_arch]
|
87
|
+
end
|
88
|
+
|
89
|
+
if (options[:target_os] && target.os)
|
90
|
+
next unless target.os.name == options[:target_os]
|
91
|
+
end
|
92
|
+
|
93
|
+
if (options[:target_product] && target.product)
|
94
|
+
next unless target.product.name.include?(options[:target_product])
|
95
|
+
end
|
96
|
+
|
97
|
+
if (options[:target_version] && target.product)
|
98
|
+
next unless target.product.version == options[:target_version]
|
99
|
+
end
|
100
|
+
|
101
|
+
true
|
102
|
+
end
|
103
|
+
end
|
104
|
+
|
105
|
+
if options[:raw_payload]
|
106
|
+
exploit.raw_payload = options[:raw_payload]
|
107
|
+
elsif options[:payload_file]
|
108
|
+
load_payload!
|
109
|
+
elsif options[:payload_name]
|
110
|
+
find_payload!
|
111
|
+
end
|
112
|
+
|
113
|
+
params = Parameters::Parser.parse(options[:params])
|
114
|
+
params[:host] = options[:host] if options[:host]
|
115
|
+
params[:port] = options[:port] if options[:port]
|
116
|
+
params[:local_host] = options[:local_host] if options[:local_host]
|
117
|
+
params[:local_port] = options[:local_port] if options[:local_port]
|
118
|
+
params[:dry_run] = options.dry_run?
|
119
|
+
|
120
|
+
begin
|
121
|
+
@exploit.exploit!(params)
|
122
|
+
rescue Parameters::MissingParam,
|
123
|
+
Exploits::Exception,
|
124
|
+
Payloads::Exception => e
|
125
|
+
print_error(e.message)
|
126
|
+
end
|
127
|
+
end
|
128
|
+
|
129
|
+
protected
|
130
|
+
|
131
|
+
def load_exploit!
|
132
|
+
@exploit = Exploits::Exploit.load_from(options[:file])
|
133
|
+
end
|
134
|
+
|
135
|
+
def find_exploit!
|
136
|
+
@exploit = Exploits::Exploit.load_first do
|
137
|
+
if options[:name]
|
138
|
+
exploits = exploits.named(options[:name])
|
139
|
+
end
|
140
|
+
|
141
|
+
if options[:describing]
|
142
|
+
exploits = exploits.describing(options[:describing])
|
143
|
+
end
|
144
|
+
|
145
|
+
if options[:version]
|
146
|
+
exploits = exploits.revision(options[:version])
|
147
|
+
end
|
148
|
+
|
149
|
+
if options[:license]
|
150
|
+
exploits = exploits.licensed_under(options[:license])
|
151
|
+
end
|
152
|
+
|
153
|
+
if options[:arch]
|
154
|
+
exploits = exploits.targeting_arch(options[:arch])
|
155
|
+
end
|
156
|
+
|
157
|
+
if options[:os]
|
158
|
+
exploits = exploits.targeting_os(options[:os])
|
159
|
+
end
|
160
|
+
|
161
|
+
exploits
|
162
|
+
end
|
163
|
+
end
|
164
|
+
|
165
|
+
def load_payload!
|
166
|
+
unless @exploit.use_payload_from!(options[:payload_file])
|
167
|
+
print_error "Could not load a compatible payload for the exploit!"
|
168
|
+
end
|
169
|
+
end
|
170
|
+
|
171
|
+
def find_payload!
|
172
|
+
@exploit.use_payload! do |payloads|
|
173
|
+
if options[:payload_name]
|
174
|
+
payloads = payloads.named(options[:payload_name])
|
175
|
+
end
|
176
|
+
|
177
|
+
if options[:payload_version]
|
178
|
+
payloads = payloads.revision(options[:payload_version])
|
179
|
+
end
|
180
|
+
|
181
|
+
payloads
|
182
|
+
end
|
183
|
+
|
184
|
+
unless @exploit.payload
|
185
|
+
print_error "Could not find a compatible payload for the exploit!"
|
186
|
+
exit -1
|
187
|
+
end
|
188
|
+
end
|
189
|
+
end
|
190
|
+
end
|
191
|
+
end
|
192
|
+
end
|
193
|
+
end
|
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,7 +17,6 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
23
21
|
|
24
22
|
require 'ronin/ui/command_line/command'
|
@@ -32,42 +30,121 @@ module Ronin
|
|
32
30
|
module Commands
|
33
31
|
class Exploits < Command
|
34
32
|
|
35
|
-
|
36
|
-
|
33
|
+
desc "exploits [options]", "Lists available exploits"
|
34
|
+
method_option :database, :type => :string, :default => Database.config, :aliases => '-D'
|
35
|
+
method_option :name, :type => :string, :aliases => '-n'
|
36
|
+
method_option :version, :type => :string, :aliases => '-V'
|
37
|
+
method_option :describing, :stype => :string, :aliases => '-d'
|
38
|
+
method_option :status, :type => :string, :aliases => '-s'
|
39
|
+
method_option :license, :type => :string, :aliases => '-l'
|
40
|
+
method_option :arch, :type => :string, :aliases => '-a'
|
41
|
+
method_option :os, :type => :string, :aliases => '-o'
|
42
|
+
method_option :product, :type => :string, :aliases => '-p'
|
43
|
+
method_option :verbose, :type => :boolean, :aliases => '-v'
|
44
|
+
|
45
|
+
def default
|
46
|
+
Database.setup(options[:database])
|
47
|
+
|
48
|
+
exploits = Ronin::Exploits::Exploit.all
|
49
|
+
|
50
|
+
if options[:name]
|
51
|
+
exploits = exploits.named(options[:name])
|
52
|
+
end
|
53
|
+
|
54
|
+
if options[:version]
|
55
|
+
exploits = exploits.revision(options[:version])
|
56
|
+
end
|
57
|
+
|
58
|
+
if options[:describing]
|
59
|
+
exploits = exploits.describing(options[:describing])
|
60
|
+
end
|
61
|
+
|
62
|
+
if options[:license]
|
63
|
+
exploits = exploits.licensed_under(options[:license])
|
64
|
+
end
|
65
|
+
|
66
|
+
if options[:status]
|
67
|
+
exploits = exploits.all(:status => options[:status].to_sym)
|
68
|
+
end
|
69
|
+
|
70
|
+
if options[:arch]
|
71
|
+
exploits = exploits.targeting_arch(options[:arch])
|
72
|
+
end
|
73
|
+
|
74
|
+
if options[:os]
|
75
|
+
exploits = exploits.targeting_os(options[:os])
|
76
|
+
end
|
77
|
+
|
78
|
+
if options[:product]
|
79
|
+
exploits = exploits.targeting_product(options[:product])
|
80
|
+
end
|
81
|
+
|
82
|
+
if exploits.empty?
|
83
|
+
print_error "Could not find similar exploits"
|
84
|
+
exit -1
|
85
|
+
end
|
86
|
+
|
87
|
+
if options.verbose?
|
88
|
+
exploits.each { |exploit| print_exploit(exploit) }
|
89
|
+
else
|
90
|
+
exploits.each { |exploit| puts " #{exploit}" }
|
91
|
+
end
|
37
92
|
end
|
38
93
|
|
39
|
-
|
40
|
-
opts.usage = '[options]'
|
94
|
+
protected
|
41
95
|
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
|
96
|
+
def print_exploit(exploit)
|
97
|
+
print_hash(
|
98
|
+
exploit.humanize_attributes(:exclude => [:description]),
|
99
|
+
:title => "Exploit: #{exploit}"
|
100
|
+
)
|
46
101
|
|
47
|
-
|
48
|
-
|
102
|
+
indent do
|
103
|
+
if exploit.description
|
104
|
+
puts "Description:\n\n"
|
105
|
+
indent do
|
106
|
+
exploit.description.each_line { |line| puts line }
|
107
|
+
end
|
108
|
+
puts "\n"
|
49
109
|
end
|
50
110
|
|
51
|
-
|
52
|
-
|
111
|
+
unless exploit.authors.empty?
|
112
|
+
exploit.authors.each do |author|
|
113
|
+
print_hash(author.humanize_attributes, :title => 'Author')
|
114
|
+
end
|
53
115
|
end
|
54
116
|
|
55
|
-
|
56
|
-
|
117
|
+
unless exploit.behaviors.empty?
|
118
|
+
print_array(exploit.behaviors, :title => 'Controls')
|
57
119
|
end
|
58
|
-
end
|
59
|
-
end
|
60
120
|
|
61
|
-
|
62
|
-
|
121
|
+
unless exploit.targets.empty?
|
122
|
+
exploit.targets.each do |target|
|
123
|
+
attributes = target.humanize_attributes(:exclude => [:data])
|
124
|
+
attributes['Arch'] = target.arch if target.arch
|
125
|
+
attributes['OS'] = target.os if target.os
|
126
|
+
attributes['Product'] = target.product if target.product
|
63
127
|
|
64
|
-
|
128
|
+
print_hash(attributes, :title => 'Target')
|
65
129
|
|
66
|
-
|
67
|
-
|
68
|
-
|
130
|
+
unless target.data.empty?
|
131
|
+
print_title("Target Data")
|
132
|
+
|
133
|
+
indent do
|
134
|
+
target.data.each do |name,value|
|
135
|
+
puts "#{name} [#{value.inspect}]"
|
136
|
+
end
|
137
|
+
end
|
138
|
+
end
|
139
|
+
end
|
140
|
+
end
|
141
|
+
|
142
|
+
attempt { exploit.load_original! }
|
69
143
|
|
70
|
-
|
144
|
+
unless exploit.params.empty?
|
145
|
+
print_array(exploit.params.values, :title => 'Parameters')
|
146
|
+
end
|
147
|
+
end
|
71
148
|
end
|
72
149
|
|
73
150
|
end
|
@@ -0,0 +1,34 @@
|
|
1
|
+
#
|
2
|
+
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
3
|
+
# payload crafting functionality.
|
4
|
+
#
|
5
|
+
# Copyright (c) 2007-2009 Hal Brodigan (postmodern.mod3 at gmail.com)
|
6
|
+
#
|
7
|
+
# This program is free software; you can redistribute it and/or modify
|
8
|
+
# it under the terms of the GNU General Public License as published by
|
9
|
+
# the Free Software Foundation; either version 2 of the License, or
|
10
|
+
# (at your option) any later version.
|
11
|
+
#
|
12
|
+
# This program is distributed in the hope that it will be useful,
|
13
|
+
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
14
|
+
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
15
|
+
# GNU General Public License for more details.
|
16
|
+
#
|
17
|
+
# You should have received a copy of the GNU General Public License
|
18
|
+
# along with this program; if not, write to the Free Software
|
19
|
+
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
20
|
+
#
|
21
|
+
|
22
|
+
require 'ronin/generators/payloads/binary_payload'
|
23
|
+
|
24
|
+
module Ronin
|
25
|
+
module UI
|
26
|
+
module CommandLine
|
27
|
+
module Commands
|
28
|
+
class GenBinaryPayload < Generators::Payloads::BinaryPayload
|
29
|
+
|
30
|
+
end
|
31
|
+
end
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|