ronin-exploits 0.2.1 → 0.3.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (187) hide show
  1. data.tar.gz.sig +0 -0
  2. data/History.txt +122 -0
  3. data/Manifest.txt +110 -20
  4. data/README.txt +112 -31
  5. data/Rakefile +12 -1
  6. data/bin/ronin-exploit +12 -0
  7. data/bin/ronin-exploits +1 -1
  8. data/bin/ronin-gen-binary-payload +12 -0
  9. data/bin/ronin-gen-exploit +12 -0
  10. data/bin/ronin-gen-ftp-exploit +12 -0
  11. data/bin/ronin-gen-http-exploit +12 -0
  12. data/bin/ronin-gen-local-exploit +12 -0
  13. data/bin/ronin-gen-nops +12 -0
  14. data/bin/ronin-gen-payload +12 -0
  15. data/bin/ronin-gen-remote-exploit +12 -0
  16. data/bin/ronin-gen-remote-tcp-exploit +12 -0
  17. data/bin/ronin-gen-remote-udp-exploit +12 -0
  18. data/bin/ronin-gen-shellcode +12 -0
  19. data/bin/ronin-gen-web-exploit +12 -0
  20. data/bin/ronin-payload +1 -1
  21. data/bin/ronin-payloads +1 -1
  22. data/lib/ronin/controls.rb +23 -0
  23. data/lib/ronin/controls/behaviors.rb +133 -0
  24. data/lib/ronin/{payloads/helpers → controls}/exceptions.rb +2 -4
  25. data/lib/ronin/{payloads/arch.rb → controls/exceptions/not_implemented.rb} +3 -8
  26. data/lib/ronin/controls/exceptions/program_not_found.rb +27 -0
  27. data/lib/ronin/controls/file_system.rb +145 -0
  28. data/lib/ronin/{exploits/os.rb → controls/helpers.rb} +12 -13
  29. data/lib/ronin/controls/helpers/command_exec.rb +143 -0
  30. data/lib/ronin/controls/helpers/dir_create.rb +42 -0
  31. data/lib/ronin/controls/helpers/dir_listing.rb +62 -0
  32. data/lib/ronin/controls/helpers/dir_remove.rb +42 -0
  33. data/lib/ronin/controls/helpers/file_ctime.rb +52 -0
  34. data/lib/ronin/controls/helpers/file_mtime.rb +53 -0
  35. data/lib/ronin/controls/helpers/file_ownership.rb +53 -0
  36. data/lib/ronin/controls/helpers/file_read.rb +62 -0
  37. data/lib/ronin/controls/helpers/file_remove.rb +51 -0
  38. data/lib/ronin/controls/helpers/file_write.rb +62 -0
  39. data/lib/ronin/controls/helpers/memory_read.rb +39 -0
  40. data/lib/ronin/controls/helpers/memory_write.rb +39 -0
  41. data/lib/ronin/exploits.rb +0 -2
  42. data/lib/ronin/exploits/{allow.rb → control.rb} +5 -9
  43. data/lib/ronin/exploits/exceptions.rb +1 -2
  44. data/lib/ronin/exploits/exceptions/exception.rb +27 -0
  45. data/lib/ronin/exploits/exceptions/exploit_not_built.rb +3 -3
  46. data/lib/ronin/exploits/exceptions/payload_size.rb +3 -3
  47. data/lib/ronin/exploits/exceptions/restricted_char.rb +3 -3
  48. data/lib/ronin/exploits/exceptions/target_data_missing.rb +3 -3
  49. data/lib/ronin/exploits/exceptions/target_unspecified.rb +3 -3
  50. data/lib/ronin/exploits/exceptions/unknown_helper.rb +3 -3
  51. data/lib/ronin/exploits/exploit.rb +449 -92
  52. data/lib/ronin/exploits/exploit_author.rb +2 -3
  53. data/lib/ronin/exploits/ftp.rb +7 -2
  54. data/lib/ronin/exploits/helpers.rb +0 -2
  55. data/lib/ronin/exploits/helpers/binary.rb +11 -5
  56. data/lib/ronin/exploits/helpers/buffer_overflow.rb +38 -25
  57. data/lib/ronin/exploits/helpers/file_based.rb +29 -30
  58. data/lib/ronin/exploits/helpers/format_string.rb +34 -24
  59. data/lib/ronin/exploits/helpers/padding.rb +33 -16
  60. data/lib/ronin/exploits/http.rb +9 -4
  61. data/lib/ronin/exploits/local.rb +8 -2
  62. data/lib/ronin/exploits/remote.rb +8 -2
  63. data/lib/ronin/exploits/remote_tcp.rb +26 -8
  64. data/lib/ronin/exploits/remote_udp.rb +26 -8
  65. data/lib/ronin/exploits/target.rb +41 -30
  66. data/lib/ronin/exploits/targets.rb +0 -2
  67. data/lib/ronin/exploits/targets/buffer_overflow.rb +0 -2
  68. data/lib/ronin/exploits/targets/format_string.rb +0 -2
  69. data/lib/ronin/exploits/verifiers.rb +45 -16
  70. data/lib/ronin/exploits/version.rb +1 -3
  71. data/lib/ronin/exploits/web.rb +18 -6
  72. data/lib/ronin/generators/exploits.rb +23 -0
  73. data/lib/ronin/generators/exploits/exploit.rb +70 -0
  74. data/lib/ronin/generators/exploits/ftp.rb +42 -0
  75. data/lib/ronin/generators/exploits/http.rb +42 -0
  76. data/lib/ronin/generators/exploits/local.rb +42 -0
  77. data/lib/ronin/generators/exploits/remote.rb +42 -0
  78. data/lib/ronin/generators/exploits/remote_tcp.rb +44 -0
  79. data/lib/ronin/generators/exploits/remote_udp.rb +44 -0
  80. data/lib/ronin/{exploits/arch.rb → generators/exploits/static.rb} +5 -9
  81. data/lib/ronin/generators/exploits/web.rb +45 -0
  82. data/lib/ronin/generators/payloads.rb +23 -0
  83. data/lib/ronin/generators/payloads/binary_payload.rb +42 -0
  84. data/lib/ronin/generators/payloads/nops.rb +42 -0
  85. data/lib/ronin/generators/payloads/payload.rb +66 -0
  86. data/lib/ronin/generators/payloads/shellcode.rb +42 -0
  87. data/lib/ronin/generators/payloads/static.rb +30 -0
  88. data/lib/ronin/model/has_default_port.rb +6 -6
  89. data/lib/ronin/model/targets_arch.rb +18 -7
  90. data/lib/ronin/model/targets_os.rb +18 -8
  91. data/lib/ronin/model/targets_product.rb +68 -0
  92. data/lib/ronin/payloads.rb +0 -2
  93. data/lib/ronin/payloads/asm_payload.rb +8 -2
  94. data/lib/ronin/payloads/binary_payload.rb +8 -2
  95. data/lib/ronin/payloads/control.rb +1 -5
  96. data/lib/ronin/payloads/encoders.rb +1 -2
  97. data/lib/ronin/payloads/encoders/encoder.rb +92 -0
  98. data/lib/ronin/payloads/encoders/xor.rb +4 -6
  99. data/lib/ronin/payloads/exceptions.rb +1 -2
  100. data/lib/ronin/payloads/{helpers/exceptions/not_implemented.rb → exceptions/exception.rb} +1 -5
  101. data/lib/ronin/payloads/{helpers/exceptions/program_not_found.rb → exceptions/not_implemented.rb} +3 -5
  102. data/lib/ronin/payloads/exceptions/unknown_helper.rb +3 -3
  103. data/lib/ronin/payloads/has_payload.rb +111 -0
  104. data/lib/ronin/payloads/helpers.rb +1 -4
  105. data/lib/ronin/payloads/helpers/chained.rb +61 -0
  106. data/lib/ronin/payloads/helpers/rpc.rb +31 -21
  107. data/lib/ronin/payloads/nops.rb +7 -2
  108. data/lib/ronin/payloads/payload.rb +144 -85
  109. data/lib/ronin/payloads/payload_author.rb +2 -3
  110. data/lib/ronin/payloads/shellcode.rb +8 -5
  111. data/lib/ronin/payloads/web_payload.rb +8 -2
  112. data/lib/ronin/ui/command_line/commands/exploit.rb +193 -0
  113. data/lib/ronin/ui/command_line/commands/exploits.rb +102 -25
  114. data/lib/ronin/ui/command_line/commands/gen_binary_payload.rb +34 -0
  115. data/lib/ronin/ui/command_line/commands/gen_exploit.rb +34 -0
  116. data/lib/ronin/ui/command_line/commands/gen_ftp_exploit.rb +34 -0
  117. data/lib/ronin/ui/command_line/commands/gen_http_exploit.rb +34 -0
  118. data/lib/ronin/ui/command_line/commands/gen_local_exploit.rb +34 -0
  119. data/lib/ronin/{exploits/license.rb → ui/command_line/commands/gen_nops.rb} +8 -8
  120. data/lib/ronin/ui/command_line/commands/gen_payload.rb +34 -0
  121. data/lib/ronin/ui/command_line/commands/gen_remote_exploit.rb +34 -0
  122. data/lib/ronin/ui/command_line/commands/gen_remote_tcp_exploit.rb +34 -0
  123. data/lib/ronin/ui/command_line/commands/gen_remote_udp_exploit.rb +34 -0
  124. data/lib/ronin/ui/command_line/commands/gen_shellcode.rb +34 -0
  125. data/lib/ronin/ui/command_line/commands/gen_web_exploit.rb +34 -0
  126. data/lib/ronin/ui/command_line/commands/payload.rb +73 -50
  127. data/lib/ronin/ui/command_line/commands/payloads.rb +78 -23
  128. data/lib/ronin/vuln/behavior.rb +101 -28
  129. data/spec/controls/behaviors_examples.rb +38 -0
  130. data/spec/exploits/exploit_spec.rb +177 -23
  131. data/spec/exploits/file_based_exploit_spec.rb +16 -7
  132. data/spec/exploits/remote_tcp_spec.rb +1 -1
  133. data/spec/exploits/remote_udp_spec.rb +1 -1
  134. data/spec/generators/exploits/exploit_examples.rb +24 -0
  135. data/spec/generators/exploits/exploit_spec.rb +42 -0
  136. data/spec/generators/exploits/ftp_spec.rb +42 -0
  137. data/spec/generators/exploits/http_spec.rb +42 -0
  138. data/spec/generators/exploits/local_spec.rb +42 -0
  139. data/spec/generators/exploits/remote_spec.rb +42 -0
  140. data/spec/generators/exploits/remote_tcp_spec.rb +47 -0
  141. data/spec/generators/exploits/remote_udp_spec.rb +47 -0
  142. data/spec/generators/exploits/web_spec.rb +52 -0
  143. data/spec/generators/payloads/binary_payload_spec.rb +31 -0
  144. data/spec/generators/payloads/nops_spec.rb +31 -0
  145. data/spec/generators/payloads/payload_examples.rb +16 -0
  146. data/spec/generators/payloads/payload_spec.rb +31 -0
  147. data/spec/generators/payloads/shellcode_spec.rb +31 -0
  148. data/spec/model/models/targets_product_model.rb +11 -0
  149. data/spec/model/targets_arch_spec.rb +11 -1
  150. data/spec/model/targets_os_spec.rb +11 -1
  151. data/spec/model/targets_product_spec.rb +35 -0
  152. data/spec/objects/exploits/{test.rb → simple.rb} +1 -1
  153. data/spec/objects/payloads/{test.rb → simple.rb} +6 -2
  154. data/spec/payloads/encoders/encoder_spec.rb +30 -0
  155. data/spec/payloads/encoders/xor_spec.rb +1 -1
  156. data/spec/payloads/payload_spec.rb +41 -43
  157. data/spec/spec_helper.rb +4 -1
  158. data/static/ronin/generators/exploits/_cache.erb +14 -0
  159. data/static/ronin/generators/exploits/_header.erb +1 -0
  160. data/static/ronin/generators/exploits/_helpers.erb +4 -0
  161. data/static/ronin/generators/exploits/exploit.erb +24 -0
  162. data/static/ronin/generators/exploits/ftp.erb +24 -0
  163. data/static/ronin/generators/exploits/http.erb +26 -0
  164. data/static/ronin/generators/exploits/local.erb +24 -0
  165. data/static/ronin/generators/exploits/remote.erb +24 -0
  166. data/static/ronin/generators/exploits/remote_tcp.erb +26 -0
  167. data/static/ronin/generators/exploits/remote_udp.erb +26 -0
  168. data/static/ronin/generators/exploits/web.erb +28 -0
  169. data/static/ronin/generators/payloads/_cache.erb +10 -0
  170. data/static/ronin/generators/payloads/_header.erb +1 -0
  171. data/static/ronin/generators/payloads/_helpers.erb +2 -0
  172. data/static/ronin/generators/payloads/binary_payload.erb +25 -0
  173. data/static/ronin/generators/payloads/nops.erb +19 -0
  174. data/static/ronin/generators/payloads/payload.erb +25 -0
  175. data/static/ronin/generators/payloads/shellcode.erb +25 -0
  176. data/tasks/spec.rb +1 -0
  177. data/tasks/yard.rb +13 -0
  178. metadata +162 -30
  179. metadata.gz.sig +0 -0
  180. data/TODO.txt +0 -22
  181. data/lib/ronin/exploits/product.rb +0 -34
  182. data/lib/ronin/payloads/encoder.rb +0 -84
  183. data/lib/ronin/payloads/helpers/file_system.rb +0 -187
  184. data/lib/ronin/payloads/helpers/shell.rb +0 -91
  185. data/lib/ronin/payloads/license.rb +0 -34
  186. data/lib/ronin/payloads/os.rb +0 -34
  187. data/spec/payloads/encoder_spec.rb +0 -30
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,11 +17,10 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
23
21
 
24
22
  require 'ronin/exploits/remote_tcp'
25
- require 'ronin/sessions/http'
23
+ require 'ronin/network/helpers/http'
26
24
 
27
25
  module Ronin
28
26
  module Exploits
@@ -31,8 +29,15 @@ module Ronin
31
29
  # Default port to connect to
32
30
  DEFAULT_PORT = 80
33
31
 
34
- include Sessions::HTTP
32
+ include Network::Helpers::HTTP
35
33
 
34
+ #
35
+ # Creates a new Ronin::Exploits::HTTP object using the given _block_.
36
+ #
37
+ # ronin_http_exploit do
38
+ # ...
39
+ # end
40
+ #
36
41
  contextify :ronin_http_exploit
37
42
 
38
43
  # Default port to connect to
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,7 +17,6 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
23
21
 
24
22
  require 'ronin/exploits/exploit'
@@ -27,6 +25,14 @@ module Ronin
27
25
  module Exploits
28
26
  class Local < Exploit
29
27
 
28
+ #
29
+ # Creates a new Ronin::Exploits::Local object using the given
30
+ # _block_.
31
+ #
32
+ # ronin_local_exploit do
33
+ # ...
34
+ # end
35
+ #
30
36
  contextify :ronin_local_exploit
31
37
 
32
38
  end
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,7 +17,6 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
23
21
 
24
22
  require 'ronin/exploits/exploit'
@@ -27,6 +25,14 @@ module Ronin
27
25
  module Exploits
28
26
  class Remote < Exploit
29
27
 
28
+ #
29
+ # Creates a new Ronin::Exploits::Remote object using the given
30
+ # _block_.
31
+ #
32
+ # ronin_remote_exploit do
33
+ # ...
34
+ # end
35
+ #
30
36
  contextify :ronin_remote_exploit
31
37
 
32
38
  end
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,32 +17,39 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
23
21
 
24
22
  require 'ronin/exploits/remote'
25
23
  require 'ronin/model/has_default_port'
26
- require 'ronin/sessions/tcp'
24
+ require 'ronin/network/helpers/tcp'
27
25
 
28
26
  module Ronin
29
27
  module Exploits
30
28
  class RemoteTCP < Remote
31
29
 
32
30
  include Model::HasDefaultPort
33
- include Sessions::TCP
31
+ include Network::Helpers::TCP
34
32
 
33
+ #
34
+ # Creates a new Ronin::Exploits::RemoteTCP object using the given
35
+ # _block_.
36
+ #
37
+ # ronin_remote_tcp_exploit do
38
+ # ...
39
+ # end
40
+ #
35
41
  contextify :ronin_remote_tcp_exploit
36
42
 
37
- # remote host to connect to
43
+ # Remote host to connect to
38
44
  parameter :host, :description => 'TCP remote host'
39
45
 
40
- # remote port to connect to
46
+ # Remote port to connect to
41
47
  parameter :port, :description => 'TCP remote port'
42
48
 
43
- # local host to bind to
49
+ # Local host to bind to
44
50
  parameter :local_host, :description => 'TCP local host'
45
51
 
46
- # local port to bind to
52
+ # Local port to bind to
47
53
  parameter :local_port, :description => 'TCP local port'
48
54
 
49
55
  #
@@ -58,6 +64,18 @@ module Ronin
58
64
  #
59
65
  # Verifies and deploys the TCP remote exploit.
60
66
  #
67
+ # @yield [exploit]
68
+ # If a block is given, it will be passed the deployed exploit.
69
+ #
70
+ # @yieldparam [RemoteTCP] exploit
71
+ # The deployed exploit.
72
+ #
73
+ # @return [RemoteTCP]
74
+ # The deployed exploit.
75
+ #
76
+ # @raise [ExploitNotBuilt]
77
+ # The exploit has not been built, and cannot be deployed.
78
+ #
61
79
  def deploy!(&block)
62
80
  @port ||= self.default_port
63
81
 
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,32 +17,39 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
23
21
 
24
22
  require 'ronin/exploits/remote'
25
23
  require 'ronin/model/has_default_port'
26
- require 'ronin/sessions/udp'
24
+ require 'ronin/network/helpers/udp'
27
25
 
28
26
  module Ronin
29
27
  module Exploits
30
28
  class RemoteUDP < Remote
31
29
 
32
30
  include Model::HasDefaultPort
33
- include Sessions::UDP
31
+ include Network::Helpers::UDP
34
32
 
33
+ #
34
+ # Creates a new Ronin::Exploits::RemoteUDP object using the given
35
+ # _block_.
36
+ #
37
+ # ronin_remote_udp_exploit do
38
+ # ...
39
+ # end
40
+ #
35
41
  contextify :ronin_remote_udp_exploit
36
42
 
37
- # remote host to connect to
43
+ # Remote host to connect to
38
44
  parameter :host, :description => 'UDP remote host'
39
45
 
40
- # remote port to connect to
46
+ # Remote port to connect to
41
47
  parameter :port, :description => 'UDP remote port'
42
48
 
43
- # local host to bind to
49
+ # Local host to bind to
44
50
  parameter :local_host, :description => 'UDP local host'
45
51
 
46
- # local port to bind to
52
+ # Local port to bind to
47
53
  parameter :local_port, :description => 'UDP local port'
48
54
 
49
55
  #
@@ -58,6 +64,18 @@ module Ronin
58
64
  #
59
65
  # Verifies and deploys the UDP remote exploit.
60
66
  #
67
+ # @yield [exploit]
68
+ # If a block is given, it will be passed the deployed exploit.
69
+ #
70
+ # @yieldparam [RemoteUDP] exploit
71
+ # The deployed exploit.
72
+ #
73
+ # @return [RemoteUDP]
74
+ # The deployed exploit.
75
+ #
76
+ # @raise [ExploitNotBuilt]
77
+ # The exploit has not been built, and cannot be deployed.
78
+ #
61
79
  def deploy!(&block)
62
80
  @port ||= self.default_port
63
81
 
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,13 +17,12 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
23
21
 
24
22
  require 'ronin/exploits/exceptions/target_data_missing'
25
- require 'ronin/exploits/product'
26
23
  require 'ronin/model/targets_arch'
27
24
  require 'ronin/model/targets_os'
25
+ require 'ronin/model/targets_product'
28
26
  require 'ronin/model'
29
27
 
30
28
  require 'dm-types/yaml'
@@ -36,6 +34,7 @@ module Ronin
36
34
  include Model
37
35
  include Model::TargetsArch
38
36
  include Model::TargetsOS
37
+ include Model::TargetsProduct
39
38
 
40
39
  # Primary key
41
40
  property :id, Serial
@@ -43,9 +42,6 @@ module Ronin
43
42
  # Target comments
44
43
  property :description, String
45
44
 
46
- # Targeted product
47
- belongs_to :product
48
-
49
45
  # The exploit the target belongs to
50
46
  belongs_to :exploit
51
47
 
@@ -53,8 +49,16 @@ module Ronin
53
49
  property :data, Yaml, :default => {}
54
50
 
55
51
  #
56
- # Creates a new ExploitTarget object with the given _attributes_
57
- # and the given _block_.
52
+ # Creates a new ExploitTarget object
53
+ #
54
+ # @param [Hash] attributes
55
+ # Additional attributes to create the target with.
56
+ #
57
+ # @yield [target]
58
+ # If a block is given, it will be passed the new target object.
59
+ #
60
+ # @yieldparam [Target] target
61
+ # The newly created target object.
58
62
  #
59
63
  def initialize(attributes={},&block)
60
64
  super(attributes)
@@ -63,42 +67,39 @@ module Ronin
63
67
  end
64
68
 
65
69
  #
66
- # Returns the Product if no _arguments_ are given. If _arguments_ are
67
- # given, a new Product object will be created from the given
68
- # _arguments_ and associated with the target.
70
+ # Searches for target data with the matching name.
69
71
  #
70
- # target.product
71
- # # => nil
72
- #
73
- # target.product(:name => 'Apache', :version => '1.3.3.7')
74
- # # => #<Ronin::Product type=Ronin::Product id=nil name="Apache"
75
- # # version="1.3.3.7" vendor="Apache">
76
- #
77
- def product(*arguments)
78
- unless arguments.empty?
79
- return self.product = Product.first_or_create(*arguments)
80
- else
81
- return product_association
82
- end
83
- end
84
-
72
+ # @param [Symbol, String] name
73
+ # The name to search for.
85
74
  #
86
- # Returns +true+ if the target contains data with the specified
87
- # _name_, returns +false+ otherwise.
75
+ # @return [Boolean]
76
+ # Specifies whether the target contains data with the matching name.
88
77
  #
89
78
  def has?(name)
90
79
  self.data.has_key?(name.to_sym)
91
80
  end
92
81
 
93
82
  #
94
- # Returns the target data with the specified _name_.
83
+ # Returns the target data with the matching name.
84
+ #
85
+ # @param [Symbol, String] name
86
+ # The name of the target data to retrieve.
87
+ #
88
+ # @return [Object, nil]
89
+ # The target data.
95
90
  #
96
91
  def [](name)
97
92
  self.data[name.to_sym]
98
93
  end
99
94
 
100
95
  #
101
- # Sets the target data with the specified _name_ and _value_.
96
+ # Sets the target data with the matching name.
97
+ #
98
+ # @param [Symbol, String] name
99
+ # The name of the target data to set.
100
+ #
101
+ # @param [Object] value
102
+ # The value to set for the target data.
102
103
  #
103
104
  def []=(name,value)
104
105
  self.data[name.to_sym] = value
@@ -109,6 +110,16 @@ module Ronin
109
110
  #
110
111
  # Provides transparent access to the target data Hash.
111
112
  #
113
+ # @raise [TargetDataMissing]
114
+ # The target does not have data associated with the specified name.
115
+ #
116
+ # @example
117
+ # target.ip
118
+ # # => 0xff8025a0
119
+ #
120
+ # @example
121
+ # target.ip = 0x41414141
122
+ #
112
123
  def method_missing(name,*arguments,&block)
113
124
  unless block
114
125
  name = name.to_s
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,7 +17,6 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
23
21
 
24
22
  require 'ronin/exploits/targets/buffer_overflow'
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,7 +17,6 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
23
21
 
24
22
  require 'ronin/exploits/target'
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,7 +17,6 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
23
21
 
24
22
  require 'ronin/exploits/target'
@@ -1,5 +1,4 @@
1
1
  #
2
- #--
3
2
  # Ronin Exploits - A Ruby library for Ronin that provides exploitation and
4
3
  # payload crafting functionality.
5
4
  #
@@ -18,15 +17,19 @@
18
17
  # You should have received a copy of the GNU General Public License
19
18
  # along with this program; if not, write to the Free Software
20
19
  # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21
- #++
22
20
  #
21
+
23
22
  module Ronin
24
23
  module Exploits
25
24
  module Verifiers
26
25
  #
27
- # Verifies that a target has been selected. If a target has not been
28
- # selected, a TargetUnspecified exception will be raised, otherwise
29
- # +true+ will be returned.
26
+ # Verifies that a target has been selected.
27
+ #
28
+ # @return [true]
29
+ # Specifies that a target has been selected.
30
+ #
31
+ # @raise [TargetUnspecified]
32
+ # No suitable target was provided.
30
33
  #
31
34
  def verify_target!
32
35
  if target.nil?
@@ -38,43 +41,69 @@ module Ronin
38
41
 
39
42
  #
40
43
  # Verifies that the selected target has an arch property.
41
- # If the selected target does not have an arch property, a
42
- # TargetDataMissing exception will be raised, otherwise
43
- # +true+ will be return.
44
+ #
45
+ # @return [true]
46
+ # Specifies that an architecture is being targeted by the currently
47
+ # selected target.
48
+ #
49
+ # @raise [TargetDataMissing]
50
+ # A valid Arch was expected from the current target.
44
51
  #
45
52
  def verify_arch!
46
53
  if arch.nil?
47
54
  raise(TargetDataMissing,"no suitable arch was provided",caller)
48
55
  end
56
+
57
+ return true
49
58
  end
50
59
 
51
60
  #
52
61
  # Verifies that the selected target has an os property.
53
- # If the selected target does not have an os property, a
54
- # TargetDataMissing exception will be raised, otherwise
55
- # +true+ will be return.
62
+ #
63
+ # @return [true]
64
+ # Specifies that an OS is being targeted by the currently selected
65
+ # target.
66
+ #
67
+ # @raise [TargetDataMissing]
68
+ # A valid OS was expected from the current target.
56
69
  #
57
70
  def verify_os!
58
71
  if os.nil?
59
72
  raise(TargetDataMissing,"no suitable os was provided",caller)
60
73
  end
74
+
75
+ return true
61
76
  end
62
77
 
63
78
  #
64
79
  # Verifies that the selected target has an product property.
65
- # If the selected target does not have an product property, a
66
- # TargetDataMissing exception will be raised, otherwise
67
- # +true+ will be return.
80
+ #
81
+ # @return [true]
82
+ # Specifies that a product is being targeted by the currently
83
+ # selected target.
84
+ #
85
+ # @raise [TargetDataMissing]
86
+ # A valid product was expected from the current target.
68
87
  #
69
88
  def verify_product!
70
89
  if product.nil?
71
90
  raise(TargetDataMissing,"no suitable product was provided",caller)
72
91
  end
92
+
93
+ return true
73
94
  end
74
95
 
75
96
  #
76
- # Raises a RestrictedChar exception if the specified _text_ contains
77
- # any restricted characters, returns +true+ otherwise.
97
+ # Reviews text for restricted characters.
98
+ #
99
+ # @param [String] text
100
+ # The text to review for restricted characters.
101
+ #
102
+ # @return [true]
103
+ # Specifies that the text does not contain restricted characters.
104
+ #
105
+ # @raise [RestrictedChar]
106
+ # A restricted character was found in the specified text.
78
107
  #
79
108
  def verify_restricted!(text)
80
109
  found = @restricted_chars.select { |char|