Fix check os supported bug

This commit is contained in:
Itay Mizeretz 2017-10-15 15:11:58 +03:00
parent 5b7a7e52d1
commit bb53606a1b
8 changed files with 8 additions and 12 deletions

View File

@ -20,8 +20,6 @@ LOG = logging.getLogger(__name__)
class ElasticGroovyExploiter(HostExploiter):
_target_os_type = ['linux', 'windows']
# attack URLs
BASE_URL = 'http://%s:%s/_search?pretty'
MONKEY_RESULT_FIELD = "monkey_result"
@ -38,6 +36,7 @@ class ElasticGroovyExploiter(HostExploiter):
def __init__(self, host):
super(ElasticGroovyExploiter, self).__init__(host)
self._target_os_type = ['linux', 'windows']
self._config = __import__('config').WormConfiguration
self.skip_exist = self._config.skip_exploit_if_file_exist

View File

@ -232,10 +232,10 @@ class CMDClientFactory(rdp.ClientFactory):
class RdpExploiter(HostExploiter):
_target_os_type = ['windows']
def __init__(self, host):
super(RdpExploiter, self).__init__(host)
self._target_os_type = ['windows']
self._config = __import__('config').WormConfiguration
self._guid = __import__('config').GUID

View File

@ -31,7 +31,6 @@ class SambaCryExploiter(HostExploiter):
SambaCry exploit module, partially based on the following implementation by CORE Security Technologies' impacket:
https://github.com/CoreSecurity/impacket/blob/master/examples/sambaPipe.py
"""
_target_os_type = ['linux']
# Name of file which contains the monkey's commandline
SAMBACRY_COMMANDLINE_FILENAME = "monkey_commandline.txt"
@ -52,6 +51,7 @@ class SambaCryExploiter(HostExploiter):
def __init__(self, host):
super(SambaCryExploiter, self).__init__(host)
self._target_os_type = ['linux']
self._config = __import__('config').WormConfiguration
def exploit_host(self):

View File

@ -21,14 +21,13 @@ DOWNLOAD_TIMEOUT = 300 # copied from rdpgrinder
class ShellShockExploiter(HostExploiter):
_target_os_type = ['linux']
_attacks = {
"Content-type": "() { :;}; echo; "
}
def __init__(self, host):
super(ShellShockExploiter, self).__init__(host)
self._target_os_type = ['linux']
self._config = __import__('config').WormConfiguration
self.HTTP = [str(port) for port in self._config.HTTP_PORTS]
self.success_flag = ''.join(

View File

@ -14,8 +14,6 @@ LOG = getLogger(__name__)
class SmbExploiter(HostExploiter):
_target_os_type = ['windows']
KNOWN_PROTOCOLS = {
'139/SMB': (r'ncacn_np:%s[\pipe\svcctl]', 139),
'445/SMB': (r'ncacn_np:%s[\pipe\svcctl]', 445),
@ -24,6 +22,7 @@ class SmbExploiter(HostExploiter):
def __init__(self, host):
super(SmbExploiter, self).__init__(host)
self._target_os_type = ['windows']
self._config = __import__('config').WormConfiguration
self._guid = __import__('config').GUID

View File

@ -18,10 +18,10 @@ TRANSFER_UPDATE_RATE = 15
class SSHExploiter(HostExploiter):
_target_os_type = ['linux', None]
def __init__(self, host):
super(SSHExploiter, self).__init__(host)
self._target_os_type = ['linux', None]
self._config = __import__('config').WormConfiguration
self._update_timestamp = 0
self.skip_exist = self._config.skip_exploit_if_file_exist

View File

@ -152,12 +152,12 @@ class SRVSVC_Exploit(object):
class Ms08_067_Exploiter(HostExploiter):
_target_os_type = ['windows']
_windows_versions = {'Windows Server 2003 3790 Service Pack 2': WindowsVersion.Windows2003_SP2,
'Windows Server 2003 R2 3790 Service Pack 2': WindowsVersion.Windows2003_SP2}
def __init__(self, host):
super(Ms08_067_Exploiter, self).__init__(host)
self._target_os_type = ['windows']
self._config = __import__('config').WormConfiguration
self._guid = __import__('config').GUID

View File

@ -14,10 +14,9 @@ LOG = logging.getLogger(__name__)
class WmiExploiter(HostExploiter):
_target_os_type = ['windows']
def __init__(self, host):
super(WmiExploiter, self).__init__(host)
self._target_os_type = ['windows']
self._config = __import__('config').WormConfiguration
self._guid = __import__('config').GUID