ronin-exploits 0.2.1 → 0.3.0
Sign up to get free protection for your applications and to get access to all the features.
- data.tar.gz.sig +0 -0
- data/History.txt +122 -0
- data/Manifest.txt +110 -20
- data/README.txt +112 -31
- data/Rakefile +12 -1
- data/bin/ronin-exploit +12 -0
- data/bin/ronin-exploits +1 -1
- data/bin/ronin-gen-binary-payload +12 -0
- data/bin/ronin-gen-exploit +12 -0
- data/bin/ronin-gen-ftp-exploit +12 -0
- data/bin/ronin-gen-http-exploit +12 -0
- data/bin/ronin-gen-local-exploit +12 -0
- data/bin/ronin-gen-nops +12 -0
- data/bin/ronin-gen-payload +12 -0
- data/bin/ronin-gen-remote-exploit +12 -0
- data/bin/ronin-gen-remote-tcp-exploit +12 -0
- data/bin/ronin-gen-remote-udp-exploit +12 -0
- data/bin/ronin-gen-shellcode +12 -0
- data/bin/ronin-gen-web-exploit +12 -0
- data/bin/ronin-payload +1 -1
- data/bin/ronin-payloads +1 -1
- data/lib/ronin/controls.rb +23 -0
- data/lib/ronin/controls/behaviors.rb +133 -0
- data/lib/ronin/{payloads/helpers → controls}/exceptions.rb +2 -4
- data/lib/ronin/{payloads/arch.rb → controls/exceptions/not_implemented.rb} +3 -8
- data/lib/ronin/controls/exceptions/program_not_found.rb +27 -0
- data/lib/ronin/controls/file_system.rb +145 -0
- data/lib/ronin/{exploits/os.rb → controls/helpers.rb} +12 -13
- data/lib/ronin/controls/helpers/command_exec.rb +143 -0
- data/lib/ronin/controls/helpers/dir_create.rb +42 -0
- data/lib/ronin/controls/helpers/dir_listing.rb +62 -0
- data/lib/ronin/controls/helpers/dir_remove.rb +42 -0
- data/lib/ronin/controls/helpers/file_ctime.rb +52 -0
- data/lib/ronin/controls/helpers/file_mtime.rb +53 -0
- data/lib/ronin/controls/helpers/file_ownership.rb +53 -0
- data/lib/ronin/controls/helpers/file_read.rb +62 -0
- data/lib/ronin/controls/helpers/file_remove.rb +51 -0
- data/lib/ronin/controls/helpers/file_write.rb +62 -0
- data/lib/ronin/controls/helpers/memory_read.rb +39 -0
- data/lib/ronin/controls/helpers/memory_write.rb +39 -0
- data/lib/ronin/exploits.rb +0 -2
- data/lib/ronin/exploits/{allow.rb → control.rb} +5 -9
- data/lib/ronin/exploits/exceptions.rb +1 -2
- data/lib/ronin/exploits/exceptions/exception.rb +27 -0
- data/lib/ronin/exploits/exceptions/exploit_not_built.rb +3 -3
- data/lib/ronin/exploits/exceptions/payload_size.rb +3 -3
- data/lib/ronin/exploits/exceptions/restricted_char.rb +3 -3
- data/lib/ronin/exploits/exceptions/target_data_missing.rb +3 -3
- data/lib/ronin/exploits/exceptions/target_unspecified.rb +3 -3
- data/lib/ronin/exploits/exceptions/unknown_helper.rb +3 -3
- data/lib/ronin/exploits/exploit.rb +449 -92
- data/lib/ronin/exploits/exploit_author.rb +2 -3
- data/lib/ronin/exploits/ftp.rb +7 -2
- data/lib/ronin/exploits/helpers.rb +0 -2
- data/lib/ronin/exploits/helpers/binary.rb +11 -5
- data/lib/ronin/exploits/helpers/buffer_overflow.rb +38 -25
- data/lib/ronin/exploits/helpers/file_based.rb +29 -30
- data/lib/ronin/exploits/helpers/format_string.rb +34 -24
- data/lib/ronin/exploits/helpers/padding.rb +33 -16
- data/lib/ronin/exploits/http.rb +9 -4
- data/lib/ronin/exploits/local.rb +8 -2
- data/lib/ronin/exploits/remote.rb +8 -2
- data/lib/ronin/exploits/remote_tcp.rb +26 -8
- data/lib/ronin/exploits/remote_udp.rb +26 -8
- data/lib/ronin/exploits/target.rb +41 -30
- data/lib/ronin/exploits/targets.rb +0 -2
- data/lib/ronin/exploits/targets/buffer_overflow.rb +0 -2
- data/lib/ronin/exploits/targets/format_string.rb +0 -2
- data/lib/ronin/exploits/verifiers.rb +45 -16
- data/lib/ronin/exploits/version.rb +1 -3
- data/lib/ronin/exploits/web.rb +18 -6
- data/lib/ronin/generators/exploits.rb +23 -0
- data/lib/ronin/generators/exploits/exploit.rb +70 -0
- data/lib/ronin/generators/exploits/ftp.rb +42 -0
- data/lib/ronin/generators/exploits/http.rb +42 -0
- data/lib/ronin/generators/exploits/local.rb +42 -0
- data/lib/ronin/generators/exploits/remote.rb +42 -0
- data/lib/ronin/generators/exploits/remote_tcp.rb +44 -0
- data/lib/ronin/generators/exploits/remote_udp.rb +44 -0
- data/lib/ronin/{exploits/arch.rb → generators/exploits/static.rb} +5 -9
- data/lib/ronin/generators/exploits/web.rb +45 -0
- data/lib/ronin/generators/payloads.rb +23 -0
- data/lib/ronin/generators/payloads/binary_payload.rb +42 -0
- data/lib/ronin/generators/payloads/nops.rb +42 -0
- data/lib/ronin/generators/payloads/payload.rb +66 -0
- data/lib/ronin/generators/payloads/shellcode.rb +42 -0
- data/lib/ronin/generators/payloads/static.rb +30 -0
- data/lib/ronin/model/has_default_port.rb +6 -6
- data/lib/ronin/model/targets_arch.rb +18 -7
- data/lib/ronin/model/targets_os.rb +18 -8
- data/lib/ronin/model/targets_product.rb +68 -0
- data/lib/ronin/payloads.rb +0 -2
- data/lib/ronin/payloads/asm_payload.rb +8 -2
- data/lib/ronin/payloads/binary_payload.rb +8 -2
- data/lib/ronin/payloads/control.rb +1 -5
- data/lib/ronin/payloads/encoders.rb +1 -2
- data/lib/ronin/payloads/encoders/encoder.rb +92 -0
- data/lib/ronin/payloads/encoders/xor.rb +4 -6
- data/lib/ronin/payloads/exceptions.rb +1 -2
- data/lib/ronin/payloads/{helpers/exceptions/not_implemented.rb → exceptions/exception.rb} +1 -5
- data/lib/ronin/payloads/{helpers/exceptions/program_not_found.rb → exceptions/not_implemented.rb} +3 -5
- data/lib/ronin/payloads/exceptions/unknown_helper.rb +3 -3
- data/lib/ronin/payloads/has_payload.rb +111 -0
- data/lib/ronin/payloads/helpers.rb +1 -4
- data/lib/ronin/payloads/helpers/chained.rb +61 -0
- data/lib/ronin/payloads/helpers/rpc.rb +31 -21
- data/lib/ronin/payloads/nops.rb +7 -2
- data/lib/ronin/payloads/payload.rb +144 -85
- data/lib/ronin/payloads/payload_author.rb +2 -3
- data/lib/ronin/payloads/shellcode.rb +8 -5
- data/lib/ronin/payloads/web_payload.rb +8 -2
- data/lib/ronin/ui/command_line/commands/exploit.rb +193 -0
- data/lib/ronin/ui/command_line/commands/exploits.rb +102 -25
- data/lib/ronin/ui/command_line/commands/gen_binary_payload.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_ftp_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_http_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_local_exploit.rb +34 -0
- data/lib/ronin/{exploits/license.rb → ui/command_line/commands/gen_nops.rb} +8 -8
- data/lib/ronin/ui/command_line/commands/gen_payload.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_remote_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_remote_tcp_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_remote_udp_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_shellcode.rb +34 -0
- data/lib/ronin/ui/command_line/commands/gen_web_exploit.rb +34 -0
- data/lib/ronin/ui/command_line/commands/payload.rb +73 -50
- data/lib/ronin/ui/command_line/commands/payloads.rb +78 -23
- data/lib/ronin/vuln/behavior.rb +101 -28
- data/spec/controls/behaviors_examples.rb +38 -0
- data/spec/exploits/exploit_spec.rb +177 -23
- data/spec/exploits/file_based_exploit_spec.rb +16 -7
- data/spec/exploits/remote_tcp_spec.rb +1 -1
- data/spec/exploits/remote_udp_spec.rb +1 -1
- data/spec/generators/exploits/exploit_examples.rb +24 -0
- data/spec/generators/exploits/exploit_spec.rb +42 -0
- data/spec/generators/exploits/ftp_spec.rb +42 -0
- data/spec/generators/exploits/http_spec.rb +42 -0
- data/spec/generators/exploits/local_spec.rb +42 -0
- data/spec/generators/exploits/remote_spec.rb +42 -0
- data/spec/generators/exploits/remote_tcp_spec.rb +47 -0
- data/spec/generators/exploits/remote_udp_spec.rb +47 -0
- data/spec/generators/exploits/web_spec.rb +52 -0
- data/spec/generators/payloads/binary_payload_spec.rb +31 -0
- data/spec/generators/payloads/nops_spec.rb +31 -0
- data/spec/generators/payloads/payload_examples.rb +16 -0
- data/spec/generators/payloads/payload_spec.rb +31 -0
- data/spec/generators/payloads/shellcode_spec.rb +31 -0
- data/spec/model/models/targets_product_model.rb +11 -0
- data/spec/model/targets_arch_spec.rb +11 -1
- data/spec/model/targets_os_spec.rb +11 -1
- data/spec/model/targets_product_spec.rb +35 -0
- data/spec/objects/exploits/{test.rb → simple.rb} +1 -1
- data/spec/objects/payloads/{test.rb → simple.rb} +6 -2
- data/spec/payloads/encoders/encoder_spec.rb +30 -0
- data/spec/payloads/encoders/xor_spec.rb +1 -1
- data/spec/payloads/payload_spec.rb +41 -43
- data/spec/spec_helper.rb +4 -1
- data/static/ronin/generators/exploits/_cache.erb +14 -0
- data/static/ronin/generators/exploits/_header.erb +1 -0
- data/static/ronin/generators/exploits/_helpers.erb +4 -0
- data/static/ronin/generators/exploits/exploit.erb +24 -0
- data/static/ronin/generators/exploits/ftp.erb +24 -0
- data/static/ronin/generators/exploits/http.erb +26 -0
- data/static/ronin/generators/exploits/local.erb +24 -0
- data/static/ronin/generators/exploits/remote.erb +24 -0
- data/static/ronin/generators/exploits/remote_tcp.erb +26 -0
- data/static/ronin/generators/exploits/remote_udp.erb +26 -0
- data/static/ronin/generators/exploits/web.erb +28 -0
- data/static/ronin/generators/payloads/_cache.erb +10 -0
- data/static/ronin/generators/payloads/_header.erb +1 -0
- data/static/ronin/generators/payloads/_helpers.erb +2 -0
- data/static/ronin/generators/payloads/binary_payload.erb +25 -0
- data/static/ronin/generators/payloads/nops.erb +19 -0
- data/static/ronin/generators/payloads/payload.erb +25 -0
- data/static/ronin/generators/payloads/shellcode.erb +25 -0
- data/tasks/spec.rb +1 -0
- data/tasks/yard.rb +13 -0
- metadata +162 -30
- metadata.gz.sig +0 -0
- data/TODO.txt +0 -22
- data/lib/ronin/exploits/product.rb +0 -34
- data/lib/ronin/payloads/encoder.rb +0 -84
- data/lib/ronin/payloads/helpers/file_system.rb +0 -187
- data/lib/ronin/payloads/helpers/shell.rb +0 -91
- data/lib/ronin/payloads/license.rb +0 -34
- data/lib/ronin/payloads/os.rb +0 -34
- data/spec/payloads/encoder_spec.rb +0 -30
data/lib/ronin/exploits/http.rb
CHANGED
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,11 +17,10 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
23
21
|
|
24
22
|
require 'ronin/exploits/remote_tcp'
|
25
|
-
require 'ronin/
|
23
|
+
require 'ronin/network/helpers/http'
|
26
24
|
|
27
25
|
module Ronin
|
28
26
|
module Exploits
|
@@ -31,8 +29,15 @@ module Ronin
|
|
31
29
|
# Default port to connect to
|
32
30
|
DEFAULT_PORT = 80
|
33
31
|
|
34
|
-
include
|
32
|
+
include Network::Helpers::HTTP
|
35
33
|
|
34
|
+
#
|
35
|
+
# Creates a new Ronin::Exploits::HTTP object using the given _block_.
|
36
|
+
#
|
37
|
+
# ronin_http_exploit do
|
38
|
+
# ...
|
39
|
+
# end
|
40
|
+
#
|
36
41
|
contextify :ronin_http_exploit
|
37
42
|
|
38
43
|
# Default port to connect to
|
data/lib/ronin/exploits/local.rb
CHANGED
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,7 +17,6 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
23
21
|
|
24
22
|
require 'ronin/exploits/exploit'
|
@@ -27,6 +25,14 @@ module Ronin
|
|
27
25
|
module Exploits
|
28
26
|
class Local < Exploit
|
29
27
|
|
28
|
+
#
|
29
|
+
# Creates a new Ronin::Exploits::Local object using the given
|
30
|
+
# _block_.
|
31
|
+
#
|
32
|
+
# ronin_local_exploit do
|
33
|
+
# ...
|
34
|
+
# end
|
35
|
+
#
|
30
36
|
contextify :ronin_local_exploit
|
31
37
|
|
32
38
|
end
|
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,7 +17,6 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
23
21
|
|
24
22
|
require 'ronin/exploits/exploit'
|
@@ -27,6 +25,14 @@ module Ronin
|
|
27
25
|
module Exploits
|
28
26
|
class Remote < Exploit
|
29
27
|
|
28
|
+
#
|
29
|
+
# Creates a new Ronin::Exploits::Remote object using the given
|
30
|
+
# _block_.
|
31
|
+
#
|
32
|
+
# ronin_remote_exploit do
|
33
|
+
# ...
|
34
|
+
# end
|
35
|
+
#
|
30
36
|
contextify :ronin_remote_exploit
|
31
37
|
|
32
38
|
end
|
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,32 +17,39 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
23
21
|
|
24
22
|
require 'ronin/exploits/remote'
|
25
23
|
require 'ronin/model/has_default_port'
|
26
|
-
require 'ronin/
|
24
|
+
require 'ronin/network/helpers/tcp'
|
27
25
|
|
28
26
|
module Ronin
|
29
27
|
module Exploits
|
30
28
|
class RemoteTCP < Remote
|
31
29
|
|
32
30
|
include Model::HasDefaultPort
|
33
|
-
include
|
31
|
+
include Network::Helpers::TCP
|
34
32
|
|
33
|
+
#
|
34
|
+
# Creates a new Ronin::Exploits::RemoteTCP object using the given
|
35
|
+
# _block_.
|
36
|
+
#
|
37
|
+
# ronin_remote_tcp_exploit do
|
38
|
+
# ...
|
39
|
+
# end
|
40
|
+
#
|
35
41
|
contextify :ronin_remote_tcp_exploit
|
36
42
|
|
37
|
-
#
|
43
|
+
# Remote host to connect to
|
38
44
|
parameter :host, :description => 'TCP remote host'
|
39
45
|
|
40
|
-
#
|
46
|
+
# Remote port to connect to
|
41
47
|
parameter :port, :description => 'TCP remote port'
|
42
48
|
|
43
|
-
#
|
49
|
+
# Local host to bind to
|
44
50
|
parameter :local_host, :description => 'TCP local host'
|
45
51
|
|
46
|
-
#
|
52
|
+
# Local port to bind to
|
47
53
|
parameter :local_port, :description => 'TCP local port'
|
48
54
|
|
49
55
|
#
|
@@ -58,6 +64,18 @@ module Ronin
|
|
58
64
|
#
|
59
65
|
# Verifies and deploys the TCP remote exploit.
|
60
66
|
#
|
67
|
+
# @yield [exploit]
|
68
|
+
# If a block is given, it will be passed the deployed exploit.
|
69
|
+
#
|
70
|
+
# @yieldparam [RemoteTCP] exploit
|
71
|
+
# The deployed exploit.
|
72
|
+
#
|
73
|
+
# @return [RemoteTCP]
|
74
|
+
# The deployed exploit.
|
75
|
+
#
|
76
|
+
# @raise [ExploitNotBuilt]
|
77
|
+
# The exploit has not been built, and cannot be deployed.
|
78
|
+
#
|
61
79
|
def deploy!(&block)
|
62
80
|
@port ||= self.default_port
|
63
81
|
|
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,32 +17,39 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
23
21
|
|
24
22
|
require 'ronin/exploits/remote'
|
25
23
|
require 'ronin/model/has_default_port'
|
26
|
-
require 'ronin/
|
24
|
+
require 'ronin/network/helpers/udp'
|
27
25
|
|
28
26
|
module Ronin
|
29
27
|
module Exploits
|
30
28
|
class RemoteUDP < Remote
|
31
29
|
|
32
30
|
include Model::HasDefaultPort
|
33
|
-
include
|
31
|
+
include Network::Helpers::UDP
|
34
32
|
|
33
|
+
#
|
34
|
+
# Creates a new Ronin::Exploits::RemoteUDP object using the given
|
35
|
+
# _block_.
|
36
|
+
#
|
37
|
+
# ronin_remote_udp_exploit do
|
38
|
+
# ...
|
39
|
+
# end
|
40
|
+
#
|
35
41
|
contextify :ronin_remote_udp_exploit
|
36
42
|
|
37
|
-
#
|
43
|
+
# Remote host to connect to
|
38
44
|
parameter :host, :description => 'UDP remote host'
|
39
45
|
|
40
|
-
#
|
46
|
+
# Remote port to connect to
|
41
47
|
parameter :port, :description => 'UDP remote port'
|
42
48
|
|
43
|
-
#
|
49
|
+
# Local host to bind to
|
44
50
|
parameter :local_host, :description => 'UDP local host'
|
45
51
|
|
46
|
-
#
|
52
|
+
# Local port to bind to
|
47
53
|
parameter :local_port, :description => 'UDP local port'
|
48
54
|
|
49
55
|
#
|
@@ -58,6 +64,18 @@ module Ronin
|
|
58
64
|
#
|
59
65
|
# Verifies and deploys the UDP remote exploit.
|
60
66
|
#
|
67
|
+
# @yield [exploit]
|
68
|
+
# If a block is given, it will be passed the deployed exploit.
|
69
|
+
#
|
70
|
+
# @yieldparam [RemoteUDP] exploit
|
71
|
+
# The deployed exploit.
|
72
|
+
#
|
73
|
+
# @return [RemoteUDP]
|
74
|
+
# The deployed exploit.
|
75
|
+
#
|
76
|
+
# @raise [ExploitNotBuilt]
|
77
|
+
# The exploit has not been built, and cannot be deployed.
|
78
|
+
#
|
61
79
|
def deploy!(&block)
|
62
80
|
@port ||= self.default_port
|
63
81
|
|
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,13 +17,12 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
23
21
|
|
24
22
|
require 'ronin/exploits/exceptions/target_data_missing'
|
25
|
-
require 'ronin/exploits/product'
|
26
23
|
require 'ronin/model/targets_arch'
|
27
24
|
require 'ronin/model/targets_os'
|
25
|
+
require 'ronin/model/targets_product'
|
28
26
|
require 'ronin/model'
|
29
27
|
|
30
28
|
require 'dm-types/yaml'
|
@@ -36,6 +34,7 @@ module Ronin
|
|
36
34
|
include Model
|
37
35
|
include Model::TargetsArch
|
38
36
|
include Model::TargetsOS
|
37
|
+
include Model::TargetsProduct
|
39
38
|
|
40
39
|
# Primary key
|
41
40
|
property :id, Serial
|
@@ -43,9 +42,6 @@ module Ronin
|
|
43
42
|
# Target comments
|
44
43
|
property :description, String
|
45
44
|
|
46
|
-
# Targeted product
|
47
|
-
belongs_to :product
|
48
|
-
|
49
45
|
# The exploit the target belongs to
|
50
46
|
belongs_to :exploit
|
51
47
|
|
@@ -53,8 +49,16 @@ module Ronin
|
|
53
49
|
property :data, Yaml, :default => {}
|
54
50
|
|
55
51
|
#
|
56
|
-
# Creates a new ExploitTarget object
|
57
|
-
#
|
52
|
+
# Creates a new ExploitTarget object
|
53
|
+
#
|
54
|
+
# @param [Hash] attributes
|
55
|
+
# Additional attributes to create the target with.
|
56
|
+
#
|
57
|
+
# @yield [target]
|
58
|
+
# If a block is given, it will be passed the new target object.
|
59
|
+
#
|
60
|
+
# @yieldparam [Target] target
|
61
|
+
# The newly created target object.
|
58
62
|
#
|
59
63
|
def initialize(attributes={},&block)
|
60
64
|
super(attributes)
|
@@ -63,42 +67,39 @@ module Ronin
|
|
63
67
|
end
|
64
68
|
|
65
69
|
#
|
66
|
-
#
|
67
|
-
# given, a new Product object will be created from the given
|
68
|
-
# _arguments_ and associated with the target.
|
70
|
+
# Searches for target data with the matching name.
|
69
71
|
#
|
70
|
-
#
|
71
|
-
#
|
72
|
-
#
|
73
|
-
# target.product(:name => 'Apache', :version => '1.3.3.7')
|
74
|
-
# # => #<Ronin::Product type=Ronin::Product id=nil name="Apache"
|
75
|
-
# # version="1.3.3.7" vendor="Apache">
|
76
|
-
#
|
77
|
-
def product(*arguments)
|
78
|
-
unless arguments.empty?
|
79
|
-
return self.product = Product.first_or_create(*arguments)
|
80
|
-
else
|
81
|
-
return product_association
|
82
|
-
end
|
83
|
-
end
|
84
|
-
|
72
|
+
# @param [Symbol, String] name
|
73
|
+
# The name to search for.
|
85
74
|
#
|
86
|
-
#
|
87
|
-
#
|
75
|
+
# @return [Boolean]
|
76
|
+
# Specifies whether the target contains data with the matching name.
|
88
77
|
#
|
89
78
|
def has?(name)
|
90
79
|
self.data.has_key?(name.to_sym)
|
91
80
|
end
|
92
81
|
|
93
82
|
#
|
94
|
-
# Returns the target data with the
|
83
|
+
# Returns the target data with the matching name.
|
84
|
+
#
|
85
|
+
# @param [Symbol, String] name
|
86
|
+
# The name of the target data to retrieve.
|
87
|
+
#
|
88
|
+
# @return [Object, nil]
|
89
|
+
# The target data.
|
95
90
|
#
|
96
91
|
def [](name)
|
97
92
|
self.data[name.to_sym]
|
98
93
|
end
|
99
94
|
|
100
95
|
#
|
101
|
-
# Sets the target data with the
|
96
|
+
# Sets the target data with the matching name.
|
97
|
+
#
|
98
|
+
# @param [Symbol, String] name
|
99
|
+
# The name of the target data to set.
|
100
|
+
#
|
101
|
+
# @param [Object] value
|
102
|
+
# The value to set for the target data.
|
102
103
|
#
|
103
104
|
def []=(name,value)
|
104
105
|
self.data[name.to_sym] = value
|
@@ -109,6 +110,16 @@ module Ronin
|
|
109
110
|
#
|
110
111
|
# Provides transparent access to the target data Hash.
|
111
112
|
#
|
113
|
+
# @raise [TargetDataMissing]
|
114
|
+
# The target does not have data associated with the specified name.
|
115
|
+
#
|
116
|
+
# @example
|
117
|
+
# target.ip
|
118
|
+
# # => 0xff8025a0
|
119
|
+
#
|
120
|
+
# @example
|
121
|
+
# target.ip = 0x41414141
|
122
|
+
#
|
112
123
|
def method_missing(name,*arguments,&block)
|
113
124
|
unless block
|
114
125
|
name = name.to_s
|
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,7 +17,6 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
23
21
|
|
24
22
|
require 'ronin/exploits/targets/buffer_overflow'
|
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,7 +17,6 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
23
21
|
|
24
22
|
require 'ronin/exploits/target'
|
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,7 +17,6 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
23
21
|
|
24
22
|
require 'ronin/exploits/target'
|
@@ -1,5 +1,4 @@
|
|
1
1
|
#
|
2
|
-
#--
|
3
2
|
# Ronin Exploits - A Ruby library for Ronin that provides exploitation and
|
4
3
|
# payload crafting functionality.
|
5
4
|
#
|
@@ -18,15 +17,19 @@
|
|
18
17
|
# You should have received a copy of the GNU General Public License
|
19
18
|
# along with this program; if not, write to the Free Software
|
20
19
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
21
|
-
#++
|
22
20
|
#
|
21
|
+
|
23
22
|
module Ronin
|
24
23
|
module Exploits
|
25
24
|
module Verifiers
|
26
25
|
#
|
27
|
-
# Verifies that a target has been selected.
|
28
|
-
#
|
29
|
-
#
|
26
|
+
# Verifies that a target has been selected.
|
27
|
+
#
|
28
|
+
# @return [true]
|
29
|
+
# Specifies that a target has been selected.
|
30
|
+
#
|
31
|
+
# @raise [TargetUnspecified]
|
32
|
+
# No suitable target was provided.
|
30
33
|
#
|
31
34
|
def verify_target!
|
32
35
|
if target.nil?
|
@@ -38,43 +41,69 @@ module Ronin
|
|
38
41
|
|
39
42
|
#
|
40
43
|
# Verifies that the selected target has an arch property.
|
41
|
-
#
|
42
|
-
#
|
43
|
-
#
|
44
|
+
#
|
45
|
+
# @return [true]
|
46
|
+
# Specifies that an architecture is being targeted by the currently
|
47
|
+
# selected target.
|
48
|
+
#
|
49
|
+
# @raise [TargetDataMissing]
|
50
|
+
# A valid Arch was expected from the current target.
|
44
51
|
#
|
45
52
|
def verify_arch!
|
46
53
|
if arch.nil?
|
47
54
|
raise(TargetDataMissing,"no suitable arch was provided",caller)
|
48
55
|
end
|
56
|
+
|
57
|
+
return true
|
49
58
|
end
|
50
59
|
|
51
60
|
#
|
52
61
|
# Verifies that the selected target has an os property.
|
53
|
-
#
|
54
|
-
#
|
55
|
-
#
|
62
|
+
#
|
63
|
+
# @return [true]
|
64
|
+
# Specifies that an OS is being targeted by the currently selected
|
65
|
+
# target.
|
66
|
+
#
|
67
|
+
# @raise [TargetDataMissing]
|
68
|
+
# A valid OS was expected from the current target.
|
56
69
|
#
|
57
70
|
def verify_os!
|
58
71
|
if os.nil?
|
59
72
|
raise(TargetDataMissing,"no suitable os was provided",caller)
|
60
73
|
end
|
74
|
+
|
75
|
+
return true
|
61
76
|
end
|
62
77
|
|
63
78
|
#
|
64
79
|
# Verifies that the selected target has an product property.
|
65
|
-
#
|
66
|
-
#
|
67
|
-
#
|
80
|
+
#
|
81
|
+
# @return [true]
|
82
|
+
# Specifies that a product is being targeted by the currently
|
83
|
+
# selected target.
|
84
|
+
#
|
85
|
+
# @raise [TargetDataMissing]
|
86
|
+
# A valid product was expected from the current target.
|
68
87
|
#
|
69
88
|
def verify_product!
|
70
89
|
if product.nil?
|
71
90
|
raise(TargetDataMissing,"no suitable product was provided",caller)
|
72
91
|
end
|
92
|
+
|
93
|
+
return true
|
73
94
|
end
|
74
95
|
|
75
96
|
#
|
76
|
-
#
|
77
|
-
#
|
97
|
+
# Reviews text for restricted characters.
|
98
|
+
#
|
99
|
+
# @param [String] text
|
100
|
+
# The text to review for restricted characters.
|
101
|
+
#
|
102
|
+
# @return [true]
|
103
|
+
# Specifies that the text does not contain restricted characters.
|
104
|
+
#
|
105
|
+
# @raise [RestrictedChar]
|
106
|
+
# A restricted character was found in the specified text.
|
78
107
|
#
|
79
108
|
def verify_restricted!(text)
|
80
109
|
found = @restricted_chars.select { |char|
|