NullArray / AutoSploit

Automated Mass Exploiter
GNU General Public License v3.0
5.02k stars 1.13k forks source link

[Request] Custom Payloads #76

Closed zero77 closed 6 years ago

zero77 commented 6 years ago

Can you please add an option to use a custom payload instead. Thanks

Ekultek commented 6 years ago

Already implemented, create a text file with your payloads and pass the -E flag with the path to your text file make sure to add just the path to the payloads

Ekultek commented 6 years ago

For example:

baal@baal-Aspire-5733Z:~/bin/python/autosploit$ cat mods.txt
auxiliary/fuzzers/ssh/ssh_kexinit_corrupt;exploit
auxiliary/fuzzers/ssh/ssh_version_15;exploit
auxiliary/fuzzers/ssh/ssh_version_2;exploit
auxiliary/fuzzers/ssh/ssh_version_corrupt;exploit
auxiliary/fuzzers/tds/tds_login_corrupt;exploit
auxiliary/fuzzers/tds/tds_login_username;exploit
baal@baal-Aspire-5733Z:~/bin/python/autosploit$ sudo python autosploit.py -E mods.txt
                              _____     _       _____     _     _ _
#--Author : Vector/NullArray |  _  |_ _| |_ ___|   __|___| |___|_| |_
#--Twitter: @Real__Vector    |     | | |  _| . |__   | . | | . | |  _|
#--Type   : Mass Exploiter   |__|__|___|_| |___|_____|  _|_|___|_|_|
#--Version: 2.0                                    |_|
##############################################

[+] welcome to autosploit, give us a little bit while we configure
[+] checking for services
[+] attempting to load API keys
[?] enter your Shodan API token: ... 
[?] enter your Censys API token: ...
[?] enter your Censys ID: ...
[+] checking if there are multiple exploit files
[+] converting mods.txt to JSON format
[+] converted successfully and saved under /home/baal/bin/python/autosploit/etc/json/aCdjMQp.json
baal@baal-Aspire-5733Z:~/bin/python/autosploit$ cat  /home/baal/bin/python/autosploit/etc/json/aCdjMQp.json
{
    "exploits": [
        "auxiliary/fuzzers/ssh/ssh_kexinit_corrupt;exploit", 
        "auxiliary/fuzzers/ssh/ssh_version_15;exploit", 
        "auxiliary/fuzzers/ssh/ssh_version_2;exploit", 
        "auxiliary/fuzzers/ssh/ssh_version_corrupt;exploit", 
        "auxiliary/fuzzers/tds/tds_login_corrupt;exploit", 
        "auxiliary/fuzzers/tds/tds_login_username;exploit"
    ]
}baal@baal-Aspire-5733Z:~/bin/python/autosploit$ 
Ekultek commented 6 years ago

Now it will prompt you at the start which payload file you want to use:

baal@baal-Aspire-5733Z:~/bin/python/autosploit$ sudo python autosploit.py
                              _____     _       _____     _     _ _
#--Author : Vector/NullArray |  _  |_ _| |_ ___|   __|___| |___|_| |_
#--Twitter: @Real__Vector    |     | | |  _| . |__   | . | | . | |  _|
#--Type   : Mass Exploiter   |__|__|___|_| |___|_____|  _|_|___|_|_|
#--Version: 2.0                                    |_|
##############################################

[+] welcome to autosploit, give us a little bit while we configure
[+] checking for services
[-] no arguments have been parsed, defaulting to terminal session. press 99 to quit and help to get help
[+] checking if there are multiple exploit files
[+] total of 2 exploit files discovered for use, select one
1. default_modules
2. aCdjMQp

root@autosploit# 
zero77 commented 6 years ago

Would this work with a binary or with PowerShell payloads, in this case would you just add the file path to the text file.