Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- met = include_lib("/lib/metaxploit.so")
- if not met then
- met = include_lib(get_shell.host_computer.current_path + "/metaxploit.so")
- end if
- lib = null
- if params[0] == "-l" then
- lib = met.load(params[1])
- else if params[1] == "-p" then
- lib = met.net_use(params[0], params[2].to_int).dump_lib
- else
- lib = met.net_use(params[0]).dump_lib
- end if
- testAddress = function(lib, address)
- info = met.scan_address(lib, address)
- info = info.replace("decompiling source...", "")
- info = info.replace("searching unsecure values...", "")
- info = info.split("\n\n")
- Vuln = {"name":"", "req":[]}
- vulns_ls = []
- for s_vuln in info
- if s_vuln.len == 0 or s_vuln.indexOf("Unsafe check") < 0 then
- continue
- end if
- parts = s_vuln.split("\n")
- vuln = parts[0]
- vuln = vuln.replace("</b>. Buffer", "<b>")
- vuln = vuln.split("<b>")[1]
- vulns = slice(parts, 1, parts.len)
- vul = new Vuln
- vul.name = vuln
- vul.req = vulns
- vulns_ls.push(vul)
- end for
- print()
- print("||||||||||||||||")
- print("Checking vulns for address " + address + " ...")
- for vuln in vulns_ls
- print("Testing <b>" + vuln.name + "</b>...")
- print("Requirements: ")
- for req in vuln.req
- print(req)
- end for
- print()
- res = lib.overflow(address, vuln.name)
- print(res)
- print("--------------------")
- end for
- end function
- last = params[params.len-1]
- if last[0] == "0" then
- testAddress(lib, last)
- else
- fl = get_shell.host_computer.File(last)
- addresses = fl.content.split(",")
- print(addresses)
- for address in addresses
- address = address.replace("""", "").trim
- //print(address)
- testAddress(lib, address)
- end for
- end if
Add Comment
Please, Sign In to add comment