Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- import_code("/dev/sources/OsInt.src");
- metaxploit = include_lib("/lib/metaxploit.so");
- if params.len == 1 then
- target = metaxploit.net_use(params[0]);
- else if params.len == 2 then
- target = metaxploit.net_use(params[0],params[1].to_int);
- else
- print("Usage: dump [ip] [opt: port]");
- end if
- print(target);
- Lib = target.dump_lib;
- Name = Lib.lib_name;
- Version = Lib.version;
- hacks = [];
- code = md5(Name + Version);
- dbpath = "/var/exploit/db/" + code;
- db = get_shell.host_computer.File(dbpath).get_files;
- for exploit in db
- data = exploit.get_content;
- data = data.split(" ");
- // name-0 version-1 address-2 buffer-3 arg-4 type-5
- if Name == data[0].split(":")[1] and Version == data[1].split(":")[1] then
- hack = {"address":data[2].split(":")[1],"buffer":data[3].split(":")[1],"arg":data[4].split(":")[1],"type":data[5].split(":")[1]};
- hacks.push(hack);
- end if
- end for
- menu = function(table,lib)
- choice_number = 1;
- for item in table
- print("[" + choice_number + "] address:" + item.address + " unsafe_string:" + item.buffer + " arg:" + item.arg + " type:" + item.type);
- choice_number = choice_number + 1;
- end for
- user_choice = user_input("Select an exploit to launch against the target:");
- if (user_choice.to_int - 1) <= table.len and user_choice.to_int != 0 then
- x = table[user_choice.to_int - 1];
- y = lib.overflow(x.address,x.buffer,x.arg);
- if typeof(y) == "shell" then
- y.start_terminal;
- else if typeof(y) == "computer" then
- DumpPasswd(y);
- DumpSocial(y);
- end if
- end if
- menu(table,lib);
- end function
- menu(hacks,Lib);
Advertisement
Add Comment
Please, Sign In to add comment