ronin-exploits 0.2.1 → 0.3.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (187) hide show
  1. data.tar.gz.sig +0 -0
  2. data/History.txt +122 -0
  3. data/Manifest.txt +110 -20
  4. data/README.txt +112 -31
  5. data/Rakefile +12 -1
  6. data/bin/ronin-exploit +12 -0
  7. data/bin/ronin-exploits +1 -1
  8. data/bin/ronin-gen-binary-payload +12 -0
  9. data/bin/ronin-gen-exploit +12 -0
  10. data/bin/ronin-gen-ftp-exploit +12 -0
  11. data/bin/ronin-gen-http-exploit +12 -0
  12. data/bin/ronin-gen-local-exploit +12 -0
  13. data/bin/ronin-gen-nops +12 -0
  14. data/bin/ronin-gen-payload +12 -0
  15. data/bin/ronin-gen-remote-exploit +12 -0
  16. data/bin/ronin-gen-remote-tcp-exploit +12 -0
  17. data/bin/ronin-gen-remote-udp-exploit +12 -0
  18. data/bin/ronin-gen-shellcode +12 -0
  19. data/bin/ronin-gen-web-exploit +12 -0
  20. data/bin/ronin-payload +1 -1
  21. data/bin/ronin-payloads +1 -1
  22. data/lib/ronin/controls.rb +23 -0
  23. data/lib/ronin/controls/behaviors.rb +133 -0
  24. data/lib/ronin/{payloads/helpers → controls}/exceptions.rb +2 -4
  25. data/lib/ronin/{payloads/arch.rb → controls/exceptions/not_implemented.rb} +3 -8
  26. data/lib/ronin/controls/exceptions/program_not_found.rb +27 -0
  27. data/lib/ronin/controls/file_system.rb +145 -0
  28. data/lib/ronin/{exploits/os.rb → controls/helpers.rb} +12 -13
  29. data/lib/ronin/controls/helpers/command_exec.rb +143 -0
  30. data/lib/ronin/controls/helpers/dir_create.rb +42 -0
  31. data/lib/ronin/controls/helpers/dir_listing.rb +62 -0
  32. data/lib/ronin/controls/helpers/dir_remove.rb +42 -0
  33. data/lib/ronin/controls/helpers/file_ctime.rb +52 -0
  34. data/lib/ronin/controls/helpers/file_mtime.rb +53 -0
  35. data/lib/ronin/controls/helpers/file_ownership.rb +53 -0
  36. data/lib/ronin/controls/helpers/file_read.rb +62 -0
  37. data/lib/ronin/controls/helpers/file_remove.rb +51 -0
  38. data/lib/ronin/controls/helpers/file_write.rb +62 -0
  39. data/lib/ronin/controls/helpers/memory_read.rb +39 -0
  40. data/lib/ronin/controls/helpers/memory_write.rb +39 -0
  41. data/lib/ronin/exploits.rb +0 -2
  42. data/lib/ronin/exploits/{allow.rb → control.rb} +5 -9
  43. data/lib/ronin/exploits/exceptions.rb +1 -2
  44. data/lib/ronin/exploits/exceptions/exception.rb +27 -0
  45. data/lib/ronin/exploits/exceptions/exploit_not_built.rb +3 -3
  46. data/lib/ronin/exploits/exceptions/payload_size.rb +3 -3
  47. data/lib/ronin/exploits/exceptions/restricted_char.rb +3 -3
  48. data/lib/ronin/exploits/exceptions/target_data_missing.rb +3 -3
  49. data/lib/ronin/exploits/exceptions/target_unspecified.rb +3 -3
  50. data/lib/ronin/exploits/exceptions/unknown_helper.rb +3 -3
  51. data/lib/ronin/exploits/exploit.rb +449 -92
  52. data/lib/ronin/exploits/exploit_author.rb +2 -3
  53. data/lib/ronin/exploits/ftp.rb +7 -2
  54. data/lib/ronin/exploits/helpers.rb +0 -2
  55. data/lib/ronin/exploits/helpers/binary.rb +11 -5
  56. data/lib/ronin/exploits/helpers/buffer_overflow.rb +38 -25
  57. data/lib/ronin/exploits/helpers/file_based.rb +29 -30
  58. data/lib/ronin/exploits/helpers/format_string.rb +34 -24
  59. data/lib/ronin/exploits/helpers/padding.rb +33 -16
  60. data/lib/ronin/exploits/http.rb +9 -4
  61. data/lib/ronin/exploits/local.rb +8 -2
  62. data/lib/ronin/exploits/remote.rb +8 -2
  63. data/lib/ronin/exploits/remote_tcp.rb +26 -8
  64. data/lib/ronin/exploits/remote_udp.rb +26 -8
  65. data/lib/ronin/exploits/target.rb +41 -30
  66. data/lib/ronin/exploits/targets.rb +0 -2
  67. data/lib/ronin/exploits/targets/buffer_overflow.rb +0 -2
  68. data/lib/ronin/exploits/targets/format_string.rb +0 -2
  69. data/lib/ronin/exploits/verifiers.rb +45 -16
  70. data/lib/ronin/exploits/version.rb +1 -3
  71. data/lib/ronin/exploits/web.rb +18 -6
  72. data/lib/ronin/generators/exploits.rb +23 -0
  73. data/lib/ronin/generators/exploits/exploit.rb +70 -0
  74. data/lib/ronin/generators/exploits/ftp.rb +42 -0
  75. data/lib/ronin/generators/exploits/http.rb +42 -0
  76. data/lib/ronin/generators/exploits/local.rb +42 -0
  77. data/lib/ronin/generators/exploits/remote.rb +42 -0
  78. data/lib/ronin/generators/exploits/remote_tcp.rb +44 -0
  79. data/lib/ronin/generators/exploits/remote_udp.rb +44 -0
  80. data/lib/ronin/{exploits/arch.rb → generators/exploits/static.rb} +5 -9
  81. data/lib/ronin/generators/exploits/web.rb +45 -0
  82. data/lib/ronin/generators/payloads.rb +23 -0
  83. data/lib/ronin/generators/payloads/binary_payload.rb +42 -0
  84. data/lib/ronin/generators/payloads/nops.rb +42 -0
  85. data/lib/ronin/generators/payloads/payload.rb +66 -0
  86. data/lib/ronin/generators/payloads/shellcode.rb +42 -0
  87. data/lib/ronin/generators/payloads/static.rb +30 -0
  88. data/lib/ronin/model/has_default_port.rb +6 -6
  89. data/lib/ronin/model/targets_arch.rb +18 -7
  90. data/lib/ronin/model/targets_os.rb +18 -8
  91. data/lib/ronin/model/targets_product.rb +68 -0
  92. data/lib/ronin/payloads.rb +0 -2
  93. data/lib/ronin/payloads/asm_payload.rb +8 -2
  94. data/lib/ronin/payloads/binary_payload.rb +8 -2
  95. data/lib/ronin/payloads/control.rb +1 -5
  96. data/lib/ronin/payloads/encoders.rb +1 -2
  97. data/lib/ronin/payloads/encoders/encoder.rb +92 -0
  98. data/lib/ronin/payloads/encoders/xor.rb +4 -6
  99. data/lib/ronin/payloads/exceptions.rb +1 -2
  100. data/lib/ronin/payloads/{helpers/exceptions/not_implemented.rb → exceptions/exception.rb} +1 -5
  101. data/lib/ronin/payloads/{helpers/exceptions/program_not_found.rb → exceptions/not_implemented.rb} +3 -5
  102. data/lib/ronin/payloads/exceptions/unknown_helper.rb +3 -3
  103. data/lib/ronin/payloads/has_payload.rb +111 -0
  104. data/lib/ronin/payloads/helpers.rb +1 -4
  105. data/lib/ronin/payloads/helpers/chained.rb +61 -0
  106. data/lib/ronin/payloads/helpers/rpc.rb +31 -21
  107. data/lib/ronin/payloads/nops.rb +7 -2
  108. data/lib/ronin/payloads/payload.rb +144 -85
  109. data/lib/ronin/payloads/payload_author.rb +2 -3
  110. data/lib/ronin/payloads/shellcode.rb +8 -5
  111. data/lib/ronin/payloads/web_payload.rb +8 -2
  112. data/lib/ronin/ui/command_line/commands/exploit.rb +193 -0
  113. data/lib/ronin/ui/command_line/commands/exploits.rb +102 -25
  114. data/lib/ronin/ui/command_line/commands/gen_binary_payload.rb +34 -0
  115. data/lib/ronin/ui/command_line/commands/gen_exploit.rb +34 -0
  116. data/lib/ronin/ui/command_line/commands/gen_ftp_exploit.rb +34 -0
  117. data/lib/ronin/ui/command_line/commands/gen_http_exploit.rb +34 -0
  118. data/lib/ronin/ui/command_line/commands/gen_local_exploit.rb +34 -0
  119. data/lib/ronin/{exploits/license.rb → ui/command_line/commands/gen_nops.rb} +8 -8
  120. data/lib/ronin/ui/command_line/commands/gen_payload.rb +34 -0
  121. data/lib/ronin/ui/command_line/commands/gen_remote_exploit.rb +34 -0
  122. data/lib/ronin/ui/command_line/commands/gen_remote_tcp_exploit.rb +34 -0
  123. data/lib/ronin/ui/command_line/commands/gen_remote_udp_exploit.rb +34 -0
  124. data/lib/ronin/ui/command_line/commands/gen_shellcode.rb +34 -0
  125. data/lib/ronin/ui/command_line/commands/gen_web_exploit.rb +34 -0
  126. data/lib/ronin/ui/command_line/commands/payload.rb +73 -50
  127. data/lib/ronin/ui/command_line/commands/payloads.rb +78 -23
  128. data/lib/ronin/vuln/behavior.rb +101 -28
  129. data/spec/controls/behaviors_examples.rb +38 -0
  130. data/spec/exploits/exploit_spec.rb +177 -23
  131. data/spec/exploits/file_based_exploit_spec.rb +16 -7
  132. data/spec/exploits/remote_tcp_spec.rb +1 -1
  133. data/spec/exploits/remote_udp_spec.rb +1 -1
  134. data/spec/generators/exploits/exploit_examples.rb +24 -0
  135. data/spec/generators/exploits/exploit_spec.rb +42 -0
  136. data/spec/generators/exploits/ftp_spec.rb +42 -0
  137. data/spec/generators/exploits/http_spec.rb +42 -0
  138. data/spec/generators/exploits/local_spec.rb +42 -0
  139. data/spec/generators/exploits/remote_spec.rb +42 -0
  140. data/spec/generators/exploits/remote_tcp_spec.rb +47 -0
  141. data/spec/generators/exploits/remote_udp_spec.rb +47 -0
  142. data/spec/generators/exploits/web_spec.rb +52 -0
  143. data/spec/generators/payloads/binary_payload_spec.rb +31 -0
  144. data/spec/generators/payloads/nops_spec.rb +31 -0
  145. data/spec/generators/payloads/payload_examples.rb +16 -0
  146. data/spec/generators/payloads/payload_spec.rb +31 -0
  147. data/spec/generators/payloads/shellcode_spec.rb +31 -0
  148. data/spec/model/models/targets_product_model.rb +11 -0
  149. data/spec/model/targets_arch_spec.rb +11 -1
  150. data/spec/model/targets_os_spec.rb +11 -1
  151. data/spec/model/targets_product_spec.rb +35 -0
  152. data/spec/objects/exploits/{test.rb → simple.rb} +1 -1
  153. data/spec/objects/payloads/{test.rb → simple.rb} +6 -2
  154. data/spec/payloads/encoders/encoder_spec.rb +30 -0
  155. data/spec/payloads/encoders/xor_spec.rb +1 -1
  156. data/spec/payloads/payload_spec.rb +41 -43
  157. data/spec/spec_helper.rb +4 -1
  158. data/static/ronin/generators/exploits/_cache.erb +14 -0
  159. data/static/ronin/generators/exploits/_header.erb +1 -0
  160. data/static/ronin/generators/exploits/_helpers.erb +4 -0
  161. data/static/ronin/generators/exploits/exploit.erb +24 -0
  162. data/static/ronin/generators/exploits/ftp.erb +24 -0
  163. data/static/ronin/generators/exploits/http.erb +26 -0
  164. data/static/ronin/generators/exploits/local.erb +24 -0
  165. data/static/ronin/generators/exploits/remote.erb +24 -0
  166. data/static/ronin/generators/exploits/remote_tcp.erb +26 -0
  167. data/static/ronin/generators/exploits/remote_udp.erb +26 -0
  168. data/static/ronin/generators/exploits/web.erb +28 -0
  169. data/static/ronin/generators/payloads/_cache.erb +10 -0
  170. data/static/ronin/generators/payloads/_header.erb +1 -0
  171. data/static/ronin/generators/payloads/_helpers.erb +2 -0
  172. data/static/ronin/generators/payloads/binary_payload.erb +25 -0
  173. data/static/ronin/generators/payloads/nops.erb +19 -0
  174. data/static/ronin/generators/payloads/payload.erb +25 -0
  175. data/static/ronin/generators/payloads/shellcode.erb +25 -0
  176. data/tasks/spec.rb +1 -0
  177. data/tasks/yard.rb +13 -0
  178. metadata +162 -30
  179. metadata.gz.sig +0 -0
  180. data/TODO.txt +0 -22
  181. data/lib/ronin/exploits/product.rb +0 -34
  182. data/lib/ronin/payloads/encoder.rb +0 -84
  183. data/lib/ronin/payloads/helpers/file_system.rb +0 -187
  184. data/lib/ronin/payloads/helpers/shell.rb +0 -91
  185. data/lib/ronin/payloads/license.rb +0 -34
  186. data/lib/ronin/payloads/os.rb +0 -34
  187. data/spec/payloads/encoder_spec.rb +0 -30
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,7 +17,6 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
23
21
 
24
22
  require 'ronin/author'
@@ -27,7 +25,8 @@ module Ronin
27
25
  module Payloads
28
26
  class PayloadAuthor < Author
29
27
 
30
- belongs_to :payload
28
+ # The payload the author wrote
29
+ belongs_to :payload, :nullable => true
31
30
 
32
31
  end
33
32
  end
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,18 +17,22 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
23
21
 
24
22
  require 'ronin/payloads/binary_payload'
25
- require 'ronin/payloads/helpers/shell'
26
23
 
27
24
  module Ronin
28
25
  module Payloads
29
26
  class Shellcode < ASMPayload
30
27
 
31
- include Helpers::Shell
32
-
28
+ #
29
+ # Creates a new Ronin::Payloads::Shellcode object using the given
30
+ # _block_.
31
+ #
32
+ # ronin_shellcode do
33
+ # ...
34
+ # end
35
+ #
33
36
  contextify :ronin_shellcode
34
37
 
35
38
  end
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,7 +17,6 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
23
21
 
24
22
  require 'ronin/payloads/payload'
@@ -28,6 +26,14 @@ module Ronin
28
26
  module Payloads
29
27
  class WebPayload < Payload
30
28
 
29
+ #
30
+ # Creates a new Ronin::Payloads::WebPayload object using the given
31
+ # _block_.
32
+ #
33
+ # ronin_web_payload do
34
+ # ...
35
+ # end
36
+ #
31
37
  contextify :ronin_web_payload
32
38
 
33
39
  end
@@ -0,0 +1,193 @@
1
+ #
2
+ # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
3
+ # payload crafting functionality.
4
+ #
5
+ # Copyright (c) 2007-2009 Hal Brodigan (postmodern.mod3 at gmail.com)
6
+ #
7
+ # This program is free software; you can redistribute it and/or modify
8
+ # it under the terms of the GNU General Public License as published by
9
+ # the Free Software Foundation; either version 2 of the License, or
10
+ # (at your option) any later version.
11
+ #
12
+ # This program is distributed in the hope that it will be useful,
13
+ # but WITHOUT ANY WARRANTY; without even the implied warranty of
14
+ # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15
+ # GNU General Public License for more details.
16
+ #
17
+ # You should have received a copy of the GNU General Public License
18
+ # along with this program; if not, write to the Free Software
19
+ # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
20
+ #
21
+
22
+ require 'ronin/ui/command_line/command'
23
+ require 'ronin/exploits'
24
+ require 'ronin/payloads'
25
+ require 'ronin/database'
26
+
27
+ require 'parameters/parser'
28
+
29
+ module Ronin
30
+ module UI
31
+ module CommandLine
32
+ module Commands
33
+ class Exploit < Command
34
+
35
+ desc "exploit [options]", "Builds and deploys an exploit"
36
+ method_option :database, :type => :string, :default => Database.config, :aliases => '-D'
37
+
38
+ # exploit options
39
+ method_option :name, :type => :string, :aliases => '-n'
40
+ method_option :version, :type => :string, :aliases => '-V'
41
+ method_option :params, :type => :array, :default => [], :aliases => '-p'
42
+ method_option :host, :type => :string
43
+ method_option :port, :type => :numeric
44
+ method_option :local_host, :type => :string
45
+ method_option :local_port, :type => :numeric
46
+ method_option :dry_run, :type => :boolean, :default => false
47
+ method_option :raw_payload, :type => :string
48
+ method_option :file, :type => :string, :aliases => '-f'
49
+
50
+ # target options
51
+ method_option :target, :type => :numeric, :alias => '-t'
52
+ method_option :target_arch, :type => :string, :aliases => '-a'
53
+ method_option :target_os, :type => :string, :aliases => '-o'
54
+ method_option :target_product, :type => :string
55
+ method_option :target_version, :type => :string
56
+
57
+ # payload options
58
+ method_option :payload_name, :type => :string, :aliases => '--payload -P'
59
+ method_option :payload_version, :type => :string
60
+ method_option :payload_file, :type => :string
61
+
62
+ def default
63
+ Database.setup(options[:database])
64
+
65
+ # Load the exploit
66
+ if options[:file]
67
+ load_exploit!
68
+ else
69
+ find_exploit!
70
+ end
71
+
72
+ unless @exploit
73
+ print_error "Could not find the specified exploit"
74
+ exit -1
75
+ end
76
+
77
+ if options[:target]
78
+ unless exploit.use_target!(options[:target])
79
+ print_error "Invalid target index: #{options[:target]}"
80
+ exit -1
81
+ end
82
+ elsif (options[:target_arch] || options[:target_os] ||
83
+ options[:target_product] || options[:target_version])
84
+ exploit.use_target! do |target|
85
+ if (options[:target_arch] && target.arch)
86
+ next unless target.arch.name == options[:target_arch]
87
+ end
88
+
89
+ if (options[:target_os] && target.os)
90
+ next unless target.os.name == options[:target_os]
91
+ end
92
+
93
+ if (options[:target_product] && target.product)
94
+ next unless target.product.name.include?(options[:target_product])
95
+ end
96
+
97
+ if (options[:target_version] && target.product)
98
+ next unless target.product.version == options[:target_version]
99
+ end
100
+
101
+ true
102
+ end
103
+ end
104
+
105
+ if options[:raw_payload]
106
+ exploit.raw_payload = options[:raw_payload]
107
+ elsif options[:payload_file]
108
+ load_payload!
109
+ elsif options[:payload_name]
110
+ find_payload!
111
+ end
112
+
113
+ params = Parameters::Parser.parse(options[:params])
114
+ params[:host] = options[:host] if options[:host]
115
+ params[:port] = options[:port] if options[:port]
116
+ params[:local_host] = options[:local_host] if options[:local_host]
117
+ params[:local_port] = options[:local_port] if options[:local_port]
118
+ params[:dry_run] = options.dry_run?
119
+
120
+ begin
121
+ @exploit.exploit!(params)
122
+ rescue Parameters::MissingParam,
123
+ Exploits::Exception,
124
+ Payloads::Exception => e
125
+ print_error(e.message)
126
+ end
127
+ end
128
+
129
+ protected
130
+
131
+ def load_exploit!
132
+ @exploit = Exploits::Exploit.load_from(options[:file])
133
+ end
134
+
135
+ def find_exploit!
136
+ @exploit = Exploits::Exploit.load_first do
137
+ if options[:name]
138
+ exploits = exploits.named(options[:name])
139
+ end
140
+
141
+ if options[:describing]
142
+ exploits = exploits.describing(options[:describing])
143
+ end
144
+
145
+ if options[:version]
146
+ exploits = exploits.revision(options[:version])
147
+ end
148
+
149
+ if options[:license]
150
+ exploits = exploits.licensed_under(options[:license])
151
+ end
152
+
153
+ if options[:arch]
154
+ exploits = exploits.targeting_arch(options[:arch])
155
+ end
156
+
157
+ if options[:os]
158
+ exploits = exploits.targeting_os(options[:os])
159
+ end
160
+
161
+ exploits
162
+ end
163
+ end
164
+
165
+ def load_payload!
166
+ unless @exploit.use_payload_from!(options[:payload_file])
167
+ print_error "Could not load a compatible payload for the exploit!"
168
+ end
169
+ end
170
+
171
+ def find_payload!
172
+ @exploit.use_payload! do |payloads|
173
+ if options[:payload_name]
174
+ payloads = payloads.named(options[:payload_name])
175
+ end
176
+
177
+ if options[:payload_version]
178
+ payloads = payloads.revision(options[:payload_version])
179
+ end
180
+
181
+ payloads
182
+ end
183
+
184
+ unless @exploit.payload
185
+ print_error "Could not find a compatible payload for the exploit!"
186
+ exit -1
187
+ end
188
+ end
189
+ end
190
+ end
191
+ end
192
+ end
193
+ end
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,7 +17,6 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
23
21
 
24
22
  require 'ronin/ui/command_line/command'
@@ -32,42 +30,121 @@ module Ronin
32
30
  module Commands
33
31
  class Exploits < Command
34
32
 
35
- def defaults
36
- @query = {}
33
+ desc "exploits [options]", "Lists available exploits"
34
+ method_option :database, :type => :string, :default => Database.config, :aliases => '-D'
35
+ method_option :name, :type => :string, :aliases => '-n'
36
+ method_option :version, :type => :string, :aliases => '-V'
37
+ method_option :describing, :stype => :string, :aliases => '-d'
38
+ method_option :status, :type => :string, :aliases => '-s'
39
+ method_option :license, :type => :string, :aliases => '-l'
40
+ method_option :arch, :type => :string, :aliases => '-a'
41
+ method_option :os, :type => :string, :aliases => '-o'
42
+ method_option :product, :type => :string, :aliases => '-p'
43
+ method_option :verbose, :type => :boolean, :aliases => '-v'
44
+
45
+ def default
46
+ Database.setup(options[:database])
47
+
48
+ exploits = Ronin::Exploits::Exploit.all
49
+
50
+ if options[:name]
51
+ exploits = exploits.named(options[:name])
52
+ end
53
+
54
+ if options[:version]
55
+ exploits = exploits.revision(options[:version])
56
+ end
57
+
58
+ if options[:describing]
59
+ exploits = exploits.describing(options[:describing])
60
+ end
61
+
62
+ if options[:license]
63
+ exploits = exploits.licensed_under(options[:license])
64
+ end
65
+
66
+ if options[:status]
67
+ exploits = exploits.all(:status => options[:status].to_sym)
68
+ end
69
+
70
+ if options[:arch]
71
+ exploits = exploits.targeting_arch(options[:arch])
72
+ end
73
+
74
+ if options[:os]
75
+ exploits = exploits.targeting_os(options[:os])
76
+ end
77
+
78
+ if options[:product]
79
+ exploits = exploits.targeting_product(options[:product])
80
+ end
81
+
82
+ if exploits.empty?
83
+ print_error "Could not find similar exploits"
84
+ exit -1
85
+ end
86
+
87
+ if options.verbose?
88
+ exploits.each { |exploit| print_exploit(exploit) }
89
+ else
90
+ exploits.each { |exploit| puts " #{exploit}" }
91
+ end
37
92
  end
38
93
 
39
- def define_options(opts)
40
- opts.usage = '[options]'
94
+ protected
41
95
 
42
- opts.options do
43
- opts.on('-D','--database URI','The URI for the database') do |uri|
44
- Database.config = uri.to_s
45
- end
96
+ def print_exploit(exploit)
97
+ print_hash(
98
+ exploit.humanize_attributes(:exclude => [:description]),
99
+ :title => "Exploit: #{exploit}"
100
+ )
46
101
 
47
- opts.on('-n','--name NAME','Search for exploits with the similar NAME') do |name|
48
- @query[:name.like] = name.to_s
102
+ indent do
103
+ if exploit.description
104
+ puts "Description:\n\n"
105
+ indent do
106
+ exploit.description.each_line { |line| puts line }
107
+ end
108
+ puts "\n"
49
109
  end
50
110
 
51
- opts.on('-v','--version VERSION','Search for exploits with the similar VERSION') do |version|
52
- @query[:version.like] = version.to_s
111
+ unless exploit.authors.empty?
112
+ exploit.authors.each do |author|
113
+ print_hash(author.humanize_attributes, :title => 'Author')
114
+ end
53
115
  end
54
116
 
55
- opts.on('-s','--status STATUS','Search for exploits with the STATUS (potential, proven or weaponized)') do |status|
56
- @query[:status] = status.to_sym
117
+ unless exploit.behaviors.empty?
118
+ print_array(exploit.behaviors, :title => 'Controls')
57
119
  end
58
- end
59
- end
60
120
 
61
- def arguments(*args)
62
- Database.setup
121
+ unless exploit.targets.empty?
122
+ exploit.targets.each do |target|
123
+ attributes = target.humanize_attributes(:exclude => [:data])
124
+ attributes['Arch'] = target.arch if target.arch
125
+ attributes['OS'] = target.os if target.os
126
+ attributes['Product'] = target.product if target.product
63
127
 
64
- exploits = Ronin::Exploits::Exploit.all(@query)
128
+ print_hash(attributes, :title => 'Target')
65
129
 
66
- if exploits.empty?
67
- fail("could not find similar exploits")
68
- end
130
+ unless target.data.empty?
131
+ print_title("Target Data")
132
+
133
+ indent do
134
+ target.data.each do |name,value|
135
+ puts "#{name} [#{value.inspect}]"
136
+ end
137
+ end
138
+ end
139
+ end
140
+ end
141
+
142
+ attempt { exploit.load_original! }
69
143
 
70
- exploits.each { |exploit| puts " #{exploit}" }
144
+ unless exploit.params.empty?
145
+ print_array(exploit.params.values, :title => 'Parameters')
146
+ end
147
+ end
71
148
  end
72
149
 
73
150
  end
@@ -0,0 +1,34 @@
1
+ #
2
+ # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
3
+ # payload crafting functionality.
4
+ #
5
+ # Copyright (c) 2007-2009 Hal Brodigan (postmodern.mod3 at gmail.com)
6
+ #
7
+ # This program is free software; you can redistribute it and/or modify
8
+ # it under the terms of the GNU General Public License as published by
9
+ # the Free Software Foundation; either version 2 of the License, or
10
+ # (at your option) any later version.
11
+ #
12
+ # This program is distributed in the hope that it will be useful,
13
+ # but WITHOUT ANY WARRANTY; without even the implied warranty of
14
+ # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15
+ # GNU General Public License for more details.
16
+ #
17
+ # You should have received a copy of the GNU General Public License
18
+ # along with this program; if not, write to the Free Software
19
+ # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
20
+ #
21
+
22
+ require 'ronin/generators/payloads/binary_payload'
23
+
24
+ module Ronin
25
+ module UI
26
+ module CommandLine
27
+ module Commands
28
+ class GenBinaryPayload < Generators::Payloads::BinaryPayload
29
+
30
+ end
31
+ end
32
+ end
33
+ end
34
+ end