Closed zero77 closed 6 years ago
Already implemented, create a text file with your payloads and pass the -E
flag with the path to your text file make sure to add just the path to the payloads
For example:
baal@baal-Aspire-5733Z:~/bin/python/autosploit$ cat mods.txt
auxiliary/fuzzers/ssh/ssh_kexinit_corrupt;exploit
auxiliary/fuzzers/ssh/ssh_version_15;exploit
auxiliary/fuzzers/ssh/ssh_version_2;exploit
auxiliary/fuzzers/ssh/ssh_version_corrupt;exploit
auxiliary/fuzzers/tds/tds_login_corrupt;exploit
auxiliary/fuzzers/tds/tds_login_username;exploit
baal@baal-Aspire-5733Z:~/bin/python/autosploit$ sudo python autosploit.py -E mods.txt
_____ _ _____ _ _ _
#--Author : Vector/NullArray | _ |_ _| |_ ___| __|___| |___|_| |_
#--Twitter: @Real__Vector | | | | _| . |__ | . | | . | | _|
#--Type : Mass Exploiter |__|__|___|_| |___|_____| _|_|___|_|_|
#--Version: 2.0 |_|
##############################################
[+] welcome to autosploit, give us a little bit while we configure
[+] checking for services
[+] attempting to load API keys
[?] enter your Shodan API token: ...
[?] enter your Censys API token: ...
[?] enter your Censys ID: ...
[+] checking if there are multiple exploit files
[+] converting mods.txt to JSON format
[+] converted successfully and saved under /home/baal/bin/python/autosploit/etc/json/aCdjMQp.json
baal@baal-Aspire-5733Z:~/bin/python/autosploit$ cat /home/baal/bin/python/autosploit/etc/json/aCdjMQp.json
{
"exploits": [
"auxiliary/fuzzers/ssh/ssh_kexinit_corrupt;exploit",
"auxiliary/fuzzers/ssh/ssh_version_15;exploit",
"auxiliary/fuzzers/ssh/ssh_version_2;exploit",
"auxiliary/fuzzers/ssh/ssh_version_corrupt;exploit",
"auxiliary/fuzzers/tds/tds_login_corrupt;exploit",
"auxiliary/fuzzers/tds/tds_login_username;exploit"
]
}baal@baal-Aspire-5733Z:~/bin/python/autosploit$
Now it will prompt you at the start which payload file you want to use:
baal@baal-Aspire-5733Z:~/bin/python/autosploit$ sudo python autosploit.py
_____ _ _____ _ _ _
#--Author : Vector/NullArray | _ |_ _| |_ ___| __|___| |___|_| |_
#--Twitter: @Real__Vector | | | | _| . |__ | . | | . | | _|
#--Type : Mass Exploiter |__|__|___|_| |___|_____| _|_|___|_|_|
#--Version: 2.0 |_|
##############################################
[+] welcome to autosploit, give us a little bit while we configure
[+] checking for services
[-] no arguments have been parsed, defaulting to terminal session. press 99 to quit and help to get help
[+] checking if there are multiple exploit files
[+] total of 2 exploit files discovered for use, select one
1. default_modules
2. aCdjMQp
root@autosploit#
Would this work with a binary or with PowerShell payloads, in this case would you just add the file path to the text file.
Can you please add an option to use a custom payload instead. Thanks