/
OpenExploit.go
54 lines (44 loc) · 1.47 KB
/
OpenExploit.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
/*
* NETCAP - Traffic Analysis Framework
* Copyright (c) 2017-2020 Philipp Mieden <dreadl0ck [at] protonmail [dot] ch>
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
package transform
import (
"fmt"
"log"
"os"
"os/exec"
"path/filepath"
"github.com/dreadl0ck/maltego"
"github.com/dreadl0ck/netcap/env"
)
func openExploit() {
var (
lt = maltego.ParseLocalArguments(os.Args)
trx = &maltego.Transform{}
exploitDirPath = os.Getenv(env.MaltegoExploitDirectory)
)
if exploitDirPath == "" {
exploitDirPath = filepath.Join("/usr", "local", "etc", "netcap")
}
filePath := filepath.Join(exploitDirPath, lt.Values["file"])
dieIfExecutable(filePath)
openCommandName, args := createOpenCommand(
[]string{filePath},
)
out, err := exec.Command(openCommandName, args...).CombinedOutput()
if err != nil {
maltego.Die(err.Error(), "open exploit failed:\n"+string(out))
}
log.Println(string(out))
trx.AddUIMessage("completed!", maltego.UIMessageInform)
fmt.Println(trx.ReturnOutput())
}