metasploit-framework/msfvenom

492 lines
13 KiB
Plaintext
Raw Normal View History

#!/usr/bin/env ruby
# -*- coding: binary -*-
class MsfVenomError < StandardError; end
2016-05-10 03:25:23 +08:00
class HelpError < StandardError; end
class UsageError < MsfVenomError; end
require 'optparse'
2018-03-17 14:30:54 +08:00
require 'timeout'
2020-05-05 19:34:44 +08:00
# Silences warnings as they only serve to confuse end users
if defined?(Warning) && Warning.respond_to?(:[]=)
Warning[:deprecated] = false
end
2020-03-13 01:58:26 +08:00
msfbase = __FILE__
while File.symlink?(msfbase)
msfbase = File.expand_path(File.readlink(msfbase), File.dirname(msfbase))
end
$:.unshift(File.expand_path(File.join(File.dirname(msfbase), 'lib')))
2020-03-13 01:58:26 +08:00
require 'metasploit/framework/profiler'
Metasploit::Framework::Profiler.start
def require_deps
require 'msfenv'
$:.unshift(ENV['MSF_LOCAL_LIB']) if ENV['MSF_LOCAL_LIB']
require 'rex'
require 'msf/ui'
require 'msf/base'
require 'msf/core/payload_generator'
@framework_loaded = true
end
# Creates a new framework object.
#
# @note Ignores any previously cached value.
# @param (see ::Msf::Simple::Framework.create)
# @return [Msf::Framework]
def init_framework(create_opts={})
require_deps unless @framework_loaded
create_opts[:module_types] ||= [
::Msf::MODULE_PAYLOAD, ::Msf::MODULE_ENCODER, ::Msf::MODULE_NOP
]
create_opts[:module_types].map! do |type|
type = Msf.const_get("MODULE_#{type.upcase}")
end
@framework = ::Msf::Simple::Framework.create
end
# Cached framework object
#
# @return [Msf::Framework]
def framework
return @framework if @framework
init_framework
@framework
end
def parse_args(args)
opts = {}
datastore = {}
opt = OptionParser.new
banner = "MsfVenom - a Metasploit standalone payload generator.\n"
banner << "Also a replacement for msfpayload and msfencode.\n"
2018-04-11 00:14:14 +08:00
banner << "Usage: #{$0} [options] <var=val>\n"
banner << "Example: #{$0} -p windows/meterpreter/reverse_tcp LHOST=<IP> -f exe -o payload.exe"
opt.banner = banner
opt.separator('')
opt.separator('Options:')
2018-08-25 03:33:36 +08:00
opt.on('-l', '--list <type>', Array, 'List all modules for [type]. Types are: payloads, encoders, nops, platforms, archs, encrypt, formats, all') do |l|
2018-06-02 07:33:07 +08:00
if l.to_s.empty?
l = ["all"]
end
opts[:list] = l
end
2018-04-11 00:14:14 +08:00
opt.on('-p', '--payload <payload>', String,
2018-05-24 14:34:19 +08:00
"Payload to use (--list payloads to list, --list-options for arguments). Specify '-' or STDIN for custom") do |p|
if p == '-'
opts[:payload] = 'stdin'
else
opts[:payload] = p
end
end
2018-05-24 14:34:19 +08:00
opt.on('--list-options', "List --payload <value>'s standard, advanced and evasion options") do
opts[:list_options] = true
end
2015-05-19 05:39:52 +08:00
opt.on('-f', '--format <format>', String, "Output format (use --list formats to list)") do |f|
opts[:format] = f.downcase
end
opt.on('-e', '--encoder <encoder>', String, 'The encoder to use (use --list encoders to list)') do |e|
opts[:encoder] = e
end
2015-05-19 05:39:52 +08:00
opt.on('--sec-name <value>', String, 'The new section name to use when generating large Windows binaries. Default: random 4-character alpha string') do |s|
opts[:secname] = s
end
opt.on('--smallest', 'Generate the smallest possible payload using all available encoders') do
opts[:smallest] = true
2018-04-11 00:14:14 +08:00
end
opt.on('--encrypt <value>', String, 'The type of encryption or encoding to apply to the shellcode (use --list encrypt to list)') do |e|
opts[:encryption_format] = e
2018-04-11 00:14:14 +08:00
end
opt.on('--encrypt-key <value>', String, 'A key to be used for --encrypt') do |e|
init_framework
opts[:encryption_key] = Rex::Text.dehex(e)
2018-04-11 00:14:14 +08:00
end
opt.on('--encrypt-iv <value>', String, 'An initialization vector for --encrypt') do |e|
2018-04-11 00:14:14 +08:00
opts[:encryption_iv] = e
end
2018-08-25 03:33:36 +08:00
opt.on('-a', '--arch <arch>', String, 'The architecture to use for --payload and --encoders (use --list archs to list)') do |a|
opts[:arch] = a
end
opt.on('--platform <platform>', String, 'The platform for --payload (use --list platforms to list)') do |l|
opts[:platform] = l
end
opt.on('-o', '--out <path>', 'Save the payload to a file') do |x|
opts[:out] = x
end
opt.on('-b', '--bad-chars <list>', String, 'Characters to avoid example: \'\x00\xff\'') do |b|
init_framework
opts[:badchars] = Rex::Text.dehex(b)
end
opt.on('-n', '--nopsled <length>', Integer, 'Prepend a nopsled of [length] size on to the payload') do |n|
opts[:nops] = n.to_i
end
opt.on('--pad-nops', 'Use nopsled size specified by -n <length> as the total payload size, auto-prepending a nopsled of quantity (nops minus payload length)') do
opts[:padnops] = true
end
2018-04-11 00:14:14 +08:00
opt.on('-s', '--space <length>', Integer, 'The maximum size of the resulting payload') do |s|
opts[:space] = s
end
2018-04-11 00:14:14 +08:00
opt.on('--encoder-space <length>', Integer, 'The maximum size of the encoded payload (defaults to the -s value)') do |s|
opts[:encoder_space] = s
end
2018-04-11 00:14:14 +08:00
opt.on('-i', '--iterations <count>', Integer, 'The number of times to encode the payload') do |i|
opts[:iterations] = i
end
2018-04-11 00:14:14 +08:00
opt.on('-c', '--add-code <path>', String, 'Specify an additional win32 shellcode file to include') do |x|
opts[:add_code] = x
end
2018-04-11 00:14:14 +08:00
opt.on('-x', '--template <path>', String, 'Specify a custom executable file to use as a template') do |x|
opts[:template] = x
end
opt.on('-k', '--keep', 'Preserve the --template behaviour and inject the payload as a new thread') do
opts[:keep] = true
end
opt.on('-v', '--var-name <value>', String, 'Specify a custom variable name to use for certain output formats') do |x|
opts[:var_name] = x
end
opt.on('-t', '--timeout <second>', Integer, "The number of seconds to wait when reading the payload from STDIN (default 30, 0 to disable)") do |x|
2018-04-13 19:31:34 +08:00
opts[:timeout] = x
2018-04-13 19:16:11 +08:00
end
opt.on_tail('-h', '--help', 'Show this message') do
2016-05-10 03:25:23 +08:00
raise HelpError, "#{opt}"
end
begin
opt.parse!(args)
rescue OptionParser::InvalidOption => e
raise UsageError, "Invalid option\n#{opt}"
rescue OptionParser::MissingArgument => e
raise UsageError, "Missing required argument for option\n#{opt}"
end
if opts.empty?
raise UsageError, "No options\n#{opt}"
end
if args
args.each do |x|
k,v = x.split('=', 2)
datastore[k.upcase] = v.to_s
end
2018-05-24 14:34:19 +08:00
if opts[:payload].to_s =~ /[\_\/]reverse/ && datastore['LHOST'].nil?
init_framework
datastore['LHOST'] = Rex::Socket.source_address
end
end
if opts[:payload].nil? # if no payload option is selected assume we are reading it from stdin
opts[:payload] = "stdin"
end
2018-05-24 14:34:19 +08:00
if opts[:payload].downcase == 'stdin' && !opts[:list]
$stderr.puts "Attempting to read payload from STDIN..."
begin
2018-04-13 19:31:34 +08:00
opts[:timeout] ||= 30
2018-04-13 19:16:11 +08:00
::Timeout.timeout(opts[:timeout]) do
opts[:stdin] = payload_stdin
end
rescue Timeout::Error
opts[:stdin] = ''
end
end
opts[:datastore] = datastore
opts
end
# Read a raw payload from stdin (or whatever IO object we're currently
# using as stdin, see {#initialize})
#
# @return [String]
def payload_stdin
@in = $stdin
@in.binmode
payload = @in.read
payload
end
def dump_platforms
init_framework(:module_types => [])
supported_platforms = []
2018-05-24 14:34:19 +08:00
Msf::Module::Platform.subclasses.each {|c| supported_platforms << c.realname.downcase}
tbl = Rex::Text::Table.new(
'Indent' => 4,
'Header' => "Framework Platforms [--platform <value>]",
'Columns' =>
[
"Name",
])
supported_platforms.sort.each do |name|
tbl << [name]
end
"\n" + tbl.to_s + "\n"
end
2018-08-25 03:33:36 +08:00
def dump_archs
init_framework(:module_types => [])
2018-08-25 03:33:36 +08:00
supported_archs = ARCH_ALL.dup
tbl = Rex::Text::Table.new(
'Indent' => 4,
'Header' => "Framework Architectures [--arch <value>]",
'Columns' =>
[
"Name",
])
2018-08-25 03:33:36 +08:00
supported_archs.sort.each do |name|
tbl << [name]
end
"\n" + tbl.to_s + "\n"
end
def dump_encrypt
init_framework(:module_types => [])
tbl = Rex::Text::Table.new(
'Indent' => 4,
'Header' => "Framework Encryption Formats [--encrypt <value>]",
'Columns' =>
[
"Name",
])
::Msf::Simple::Buffer.encryption_formats.each do |name|
tbl << [ name]
end
"\n" + tbl.to_s + "\n"
end
def dump_formats
init_framework(:module_types => [])
tbl1 = Rex::Text::Table.new(
'Indent' => 4,
'Header' => "Framework Executable Formats [--format <value>]",
'Columns' =>
[
"Name"
])
::Msf::Util::EXE.to_executable_fmt_formats.each do |name|
tbl1 << [ name ]
end
tbl2 = Rex::Text::Table.new(
'Indent' => 4,
'Header' => "Framework Transform Formats [--format <value>]",
'Columns' =>
[
"Name"
])
::Msf::Simple::Buffer.transform_formats.each do |name|
tbl2 << [ name ]
end
"\n" + tbl1.to_s + "\n" + tbl2.to_s + "\n"
end
def dump_payloads(platform = nil, arch = nil)
init_framework(:module_types => [ :payload ])
tbl = Rex::Text::Table.new(
'Indent' => 4,
'Header' => "Framework Payloads (#{framework.stats.num_payloads} total) [--payload <value>]",
'Columns' =>
[
"Name",
"Description"
])
framework.payloads.each_module(
'Platform' => platform ? Msf::Module::PlatformList.transform(platform.split(',')) : nil,
'Arch' => arch ? arch.split(',') : nil) do |name, mod|
tbl << [ name, mod.new.description.split.join(' ') ]
end
"\n" + tbl.to_s + "\n"
end
def dump_encoders(arch = nil)
init_framework(:module_types => [ :encoder ])
tbl = Rex::Text::Table.new(
'Indent' => 4,
'Header' => "Framework Encoders" + ((arch) ? " (architectures: #{arch})" : "") + " [--encoder <value>]",
'Columns' =>
[
"Name",
"Rank",
"Description"
])
cnt = 0
framework.encoders.each_module(
'Arch' => arch ? arch.split(',') : nil) do |name, mod|
tbl << [ name, mod.rank_to_s, mod.new.name ]
cnt += 1
end
(cnt > 0) ? "\n" + tbl.to_s + "\n" : "\nNo compatible encoders found.\n\n"
end
def dump_nops
init_framework(:module_types => [ :nop ])
tbl = Rex::Text::Table.new(
'Indent' => 4,
'Header' => "Framework NOPs (#{framework.stats.num_nops} total)",
'Columns' =>
[
"Name",
"Description"
])
framework.nops.each_module do |name, mod|
tbl << [ name, mod.new.description.split.join(' ') ]
end
"\n" + tbl.to_s + "\n"
end
begin
generator_opts = parse_args(ARGV)
2016-05-10 03:25:23 +08:00
rescue HelpError => e
$stderr.puts e.message
exit(1)
rescue MsfVenomError => e
$stderr.puts "Error: #{e.message}"
exit(1)
end
if generator_opts[:list]
generator_opts[:list].each do |mod|
case mod.downcase
when "payloads", "payload", "p"
$stdout.puts dump_payloads(generator_opts[:platform], generator_opts[:arch])
when "encoders", "encoder", "e"
$stdout.puts dump_encoders(generator_opts[:arch])
when "nops", "nop", "n"
$stdout.puts dump_nops
when "platforms", "dump_platform"
$stdout.puts dump_platforms
2018-08-25 03:33:36 +08:00
when "archs", "dump_arch"
$stdout.puts dump_archs
when "encrypts", "encrypt", "encryption"
$stdout.puts dump_encrypt
when "formats", "format", "f"
$stdout.puts dump_formats
when "all", "a"
# Init here so #dump_payloads doesn't create a framework with
# only payloads, etc.
init_framework
$stdout.puts dump_payloads
$stdout.puts dump_encoders
$stdout.puts dump_nops
$stdout.puts dump_platforms
2018-08-25 03:33:36 +08:00
$stdout.puts dump_archs
$stdout.puts dump_encrypt
$stdout.puts dump_formats
else
2018-08-25 03:33:36 +08:00
$stderr.puts "Invalid type (#{mod}). These are valid: payloads, encoders, nops, platforms, archs, encrypt, formats, all"
end
end
exit(0)
end
if generator_opts[:list_options]
payload_mod = framework.payloads.create(generator_opts[:payload])
if payload_mod.nil?
$stderr.puts "Invalid payload: #{generator_opts[:payload]}"
exit(1)
end
$stderr.puts "Options for #{payload_mod.fullname}:\n" + "="*25 + "\n\n"
$stdout.puts ::Msf::Serializer::ReadableText.dump_module(payload_mod, ' ')
$stderr.puts "\nAdvanced options for #{payload_mod.fullname}:\n" + "="*25 + "\n\n"
$stdout.puts ::Msf::Serializer::ReadableText.dump_advanced_options(payload_mod, ' ')
$stderr.puts "\nEvasion options for #{payload_mod.fullname}:\n" + "="*25 + "\n\n"
$stdout.puts ::Msf::Serializer::ReadableText.dump_evasion_options(payload_mod, ' ')
exit(0)
end
generator_opts[:framework] = framework
generator_opts[:cli] = true
begin
venom_generator = Msf::PayloadGenerator.new(generator_opts)
payload = venom_generator.generate_payload
rescue Msf::InvalidFormat => e
$stderr.puts "Error: #{e.message}"
$stderr.puts dump_formats
rescue ::Exception => e
elog("#{e.class} : #{e.message}\n#{e.backtrace * "\n"}")
$stderr.puts "Error: #{e.message}"
end
# No payload generated, no point to go on
exit(2) unless payload
if generator_opts[:out]
begin
::File.open(generator_opts[:out], 'wb') do |f|
f.write(payload)
end
$stderr.puts "Saved as: #{generator_opts[:out]}"
rescue ::Exception => e
# If I can't save it, then I can't save it. I don't think it matters what error.
elog("#{e.class} : #{e.message}\n#{e.backtrace * "\n"}")
$stderr.puts "Error: #{e.message}"
end
else
output_stream = $stdout
output_stream.binmode
output_stream.write payload
# trailing newline for pretty output
$stderr.puts unless payload =~ /\n$/
2013-11-21 07:57:08 +08:00
end