-
Notifications
You must be signed in to change notification settings - Fork 14k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Apply exploits to RHOSTS instead of RHOST #7614
Comments
I like this idea, I've always wanted it too. However, this would be a challenge for the current architecture considering the handler is meant to receive only one type of payload by default. For example, if you have a multi-platform exploit that targets Windows and Linux, and that a cross-platform payload isn't an option, your exploit would only work one of those platforms. Also, some modules may require the user to tweak the settings based on the target or platform they're attacking. There might be other challenges I haven't thought of, I think @egypt is good candidate to bring in this conversation. |
@bcook-r7 Did you guys want to add the RHOSTS feature within the scope too? Or separate? |
Im thinking about using some OOP design. I will have a look at it and suggest some solutions. |
As @wchen-r7 alluded to, this would require a major architectural change. The handler is not the only problem. Payload settings and If the handler problem is solved, it may be possible for something like this to work for some exploits, or even classes of exploits, but I don't think it's possible to generically work for all exploits. |
is there any update on this issue? is there any way to set rhosts and loop over them trying to exploit or not? |
one-liner RC script that does what you want for now:
|
I think it will be great to have a module that can accomplish this in a generic way.
For example, the options that the module should take are:
I am thinking about extending either Auxiliary class or Exploit class to accomplish this. It will be great if you can give me some ideas on what do you think on this issue.
The difficulties here is different exploits have different options. We will create a new_module with a module called generic_exploit. Then user can do the following:
We will need a new command here to call the extended class. Let say we create a new command called extend.
for i in ips:
super.run() // this is calling the exploit chosen by user and run by calling super
I reckon this is feasible and does not require a huge amount of effort. I am not sure about adding a new command to metasploit is a good idea or not. So I am happy to hear your opinion.
Thanks.
The text was updated successfully, but these errors were encountered: