Agent: Use exploiter options in WebRCE

This commit is contained in:
Ilija Lazoroski 2022-02-23 17:06:07 +01:00 committed by Shreya Malviya
parent 67083fe336
commit 1223e2acf3
1 changed files with 6 additions and 6 deletions

View File

@ -43,9 +43,9 @@ class WebRCE(HostExploiter):
self.monkey_target_paths = monkey_target_paths
else:
self.monkey_target_paths = {
"linux": self._config.dropper_target_path_linux,
"win32": self._config.dropper_target_path_win_32,
"win64": self._config.dropper_target_path_win_64,
"linux": self.options["dropper_target_path_linux"],
"win32": self.options["dropper_target_path_win_32"],
"win64": self.options["dropper_target_path_win_64"],
}
self.HTTP = [str(port) for port in self._config.HTTP_PORTS]
self.vulnerable_urls = []
@ -467,15 +467,15 @@ class WebRCE(HostExploiter):
logger.error("Target's OS was either unidentified or not supported. Aborting")
return False
if self.host.os["type"] == "linux":
return self._config.dropper_target_path_linux
return self.options["dropper_target_path_linux"]
if self.host.os["type"] == "windows":
try:
# remove now or when 32-bit binaries are removed?
if self.host.os["machine"] == WIN_ARCH_64:
return self._config.dropper_target_path_win_64
return self.options["dropper_target_path_win_64"]
except KeyError:
logger.debug("Target's machine type was not set. Using win-32 dropper path.")
return self._config.dropper_target_path_win_32
return self.options["dropper_target_path_win_32"]
def get_target_url(self):
"""