使用现有的用net/http编写的Ruby脚本作为metasploit辅助

发布于 2025-01-06 11:29:04 字数 1154 浏览 6 评论 0原文

我想使用以下使用 net/http 编写的 ruby​​ 代码作为 metasploit 辅助。

我想知道哪一个可以帮助我轻松地转换 librex 或任何其他支持文件读/写和使用 gsub 进行字符串操作的 Metasploit API:

我的代码如下:

require 'net/http'
require 'uri'

puts "Enter Target:\n"
target = URI(gets())
Net::HTTP.start(target.host, target.port) do |http|
request = Net::HTTP::Get.new target.request_uri
response = http.request request 
puts response.body
end
a = target
puts "File contents:\n"
f= File.open("fuzz.txt","r")
outfile = File.new('out.txt','w')
while line = f.gets do
    line1 = URI.escape("#{line}")
    puts "\n---------------------------------------------\nAttack value: #{line1}"
    newuri = a.to_s.gsub('fuzz',"#{line1}\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~")
    puts "Attack Request:\n\n#{newuri}\n"
    nuri = URI.parse("#{newuri}")
    outfile.puts "\nAttack Value:#{line1}\nRequest:#{newuri}\n####################\n\n"
    Net::HTTP.start(nuri.host, nuri.port) do |http|
    request = Net::HTTP::Get.new nuri.request_uri
    response = http.request request 
    puts "Attack Response \n\n####################\n\n"
    puts response.body
    outfile.puts response.body
end

end

I want to use follwing ruby code written using net/http as metasploit auxiliary.

I want to know which one will help me to convert it easily either librex or any other metasploit API that supports file reading/writing and string manipulation using gsub:

My code is foloowing:

require 'net/http'
require 'uri'

puts "Enter Target:\n"
target = URI(gets())
Net::HTTP.start(target.host, target.port) do |http|
request = Net::HTTP::Get.new target.request_uri
response = http.request request 
puts response.body
end
a = target
puts "File contents:\n"
f= File.open("fuzz.txt","r")
outfile = File.new('out.txt','w')
while line = f.gets do
    line1 = URI.escape("#{line}")
    puts "\n---------------------------------------------\nAttack value: #{line1}"
    newuri = a.to_s.gsub('fuzz',"#{line1}\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~")
    puts "Attack Request:\n\n#{newuri}\n"
    nuri = URI.parse("#{newuri}")
    outfile.puts "\nAttack Value:#{line1}\nRequest:#{newuri}\n####################\n\n"
    Net::HTTP.start(nuri.host, nuri.port) do |http|
    request = Net::HTTP::Get.new nuri.request_uri
    response = http.request request 
    puts "Attack Response \n\n####################\n\n"
    puts response.body
    outfile.puts response.body
end

end

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(1

昔日梦未散 2025-01-13 11:29:04

我建议您查看 Github 上的 Metasploit 存储库,以获取与您尝试执行的操作类似的示例。

https://github.com/rapid7/metasploit-framework

你永远不应该使用 puts 在 Metasploit 辅助模块中。您应该使用注册选项来进行用户输入。您可以使用 print_line 代替 puts

有关 Metasploit 指南的更多信息,请查看:

https://github.com/rapid7/metasploit -framework/blob/master/HACKING

I'd recommend you check out the Metasploit repo at Github for examples similar to what you are trying to do.

https://github.com/rapid7/metasploit-framework

You should never use puts in a Metasploit auxiliary module. You should use register options for user input. You can use print_line instead of puts.

For more on Metasploit guidelines check out:

https://github.com/rapid7/metasploit-framework/blob/master/HACKING

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文