2018-03-01 01:01:42 +08:00
|
|
|
import logging
|
2018-02-28 20:10:01 +08:00
|
|
|
import os
|
|
|
|
import struct
|
2018-02-28 22:24:40 +08:00
|
|
|
import subprocess
|
2018-02-28 20:10:01 +08:00
|
|
|
import sys
|
|
|
|
|
2018-03-01 01:01:42 +08:00
|
|
|
import time
|
|
|
|
|
2018-02-28 20:10:01 +08:00
|
|
|
import monkeyfs
|
|
|
|
from config import WormConfiguration
|
|
|
|
from control import ControlClient
|
|
|
|
from exploit.tools import build_monkey_commandline_explicitly
|
2018-03-04 23:05:43 +08:00
|
|
|
from model import MONKEY_CMDLINE_WINDOWS
|
2018-02-28 20:10:01 +08:00
|
|
|
|
|
|
|
__author__ = 'itay.mizeretz'
|
|
|
|
|
2018-03-01 01:01:42 +08:00
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
|
2018-02-28 20:10:01 +08:00
|
|
|
if "win32" == sys.platform:
|
|
|
|
from win32process import DETACHED_PROCESS
|
|
|
|
else:
|
|
|
|
DETACHED_PROCESS = 0
|
|
|
|
|
|
|
|
|
|
|
|
class WindowsUpgrader(object):
|
|
|
|
@staticmethod
|
|
|
|
def is_64bit_os():
|
|
|
|
return os.environ.has_key('PROGRAMFILES(X86)')
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def is_64bit_python():
|
|
|
|
return struct.calcsize("P") == 8
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def is_windows_os():
|
|
|
|
return sys.platform.startswith("win")
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def should_upgrade():
|
|
|
|
return WindowsUpgrader.is_windows_os() and WindowsUpgrader.is_64bit_os() \
|
|
|
|
and not WindowsUpgrader.is_64bit_python()
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def upgrade(opts):
|
|
|
|
monkey_64_path = ControlClient.download_monkey_exe_by_os(True, False)
|
|
|
|
with monkeyfs.open(monkey_64_path, "rb") as downloaded_monkey_file:
|
|
|
|
monkey_bin = downloaded_monkey_file.read()
|
2018-03-04 23:05:43 +08:00
|
|
|
with open(WormConfiguration.dropper_target_path_win_64, 'wb') as written_monkey_file:
|
2018-02-28 20:10:01 +08:00
|
|
|
written_monkey_file.write(monkey_bin)
|
|
|
|
|
2018-02-28 22:24:40 +08:00
|
|
|
depth = int(opts.depth) if opts.depth is not None else None
|
2018-02-28 20:10:01 +08:00
|
|
|
monkey_options = build_monkey_commandline_explicitly(
|
2018-03-04 23:05:43 +08:00
|
|
|
opts.parent, opts.tunnel, opts.server, depth)
|
2018-02-28 20:10:01 +08:00
|
|
|
|
2018-03-04 23:05:43 +08:00
|
|
|
monkey_cmdline = MONKEY_CMDLINE_WINDOWS % {
|
|
|
|
'monkey_path': WormConfiguration.dropper_target_path_win_64} + monkey_options
|
2018-02-28 20:10:01 +08:00
|
|
|
|
2018-02-28 22:24:40 +08:00
|
|
|
monkey_process = subprocess.Popen(monkey_cmdline, shell=True,
|
|
|
|
stdin=None, stdout=None, stderr=None,
|
|
|
|
close_fds=True, creationflags=DETACHED_PROCESS)
|
2018-03-01 01:01:42 +08:00
|
|
|
|
|
|
|
LOG.info("Executed 64bit monkey process (PID=%d) with command line: %s",
|
|
|
|
monkey_process.pid, monkey_cmdline)
|
|
|
|
|
|
|
|
time.sleep(3)
|
|
|
|
if monkey_process.poll() is not None:
|
|
|
|
LOG.warn("Seems like monkey died too soon")
|