= Ronin Exploits

* http://ronin.rubyforge.org/exploits/
* http://github.com/postmodern/ronin-exploits
* irc.freenode.net #ronin
* Postmodern (postmodern.mod3 at gmail.com)

== DESCRIPTION:

Ronin Exploits is a Ruby library for Ronin that provides exploitation and
payload crafting functionality.

Ronin is a Ruby platform for exploit development and security research.
Ronin allows for the rapid development and distribution of code, exploits
or payloads over many common Source-Code-Management (SCM) systems.

=== Ruby

Ronin's Ruby environment allows security researchers to leverage Ruby with
ease. The Ruby environment contains a multitude of convenience methods
for working with data in Ruby, a Ruby Object Database, a customized Ruby
Console and an extendable command-line interface.

=== Extend

Ronin's more specialized features are provided by additional Ronin
libraries, which users can choose to install. These libraries can allow
one to write and run Exploits and Payloads, scan for PHP vulnerabilities,
perform Google Dorks or run 3rd party scanners.

=== Publish

Ronin allows users to publish and share code, exploits, payloads or other
data via Overlays. Overlays are directories of code and data that can be
hosted on any SVN, Hg, Git or Rsync server. Ronin makes it easy to create,
install or update Overlays.

== FEATURES:

* Ability to define Payloads based on:
* Contributing authors.
* Behaviors they control.
* Helpers they use.
* Ability to define Payload Encoders:
* Architectures they target.
* OSes they target.
* Ability to define Exploits based on:
* Whether they are local or remote.
* Protocol they use.
* Contributing authors.
* Behaviors they control.
* Disclosure status.
* Level of weaponization.
* Architectures they target.
* OSes they target.
* Products they target.
* Helpers they use.
* Provides a simple three phase process of building, verifying and
deploying Exploits and Payloads.
* Allows adding arbitrary target data to the targets of Exploits.
* Allows combining Payloads with Exploits.
* Allows using a raw-payload with an Exploit.
* Allows the addition of multiple Payload Encoders to an Exploit.
* Allows chaining multiple Payloads together.
* Provides a multitude of exploit and payload generators which can create
customized skeleton Ruby Exploits and Payloads.

== SYNOPSIS:

* Generate a skeleton exploit, with some custom information:

$ ronin-gen exploit exploit.rb --name Example \
--controls command_exec \
--status proven \
--authors Postmodern \
--description "This is an example."

* To generate other types of exploits, you can specify +local_exploit+,
+remote_exploit+, +remote_tcp_exploit+, +remote_udp_exploit+,
+ftp_exploit+, +http_exploit+ or +web_exploit+, instead of simply
+exploit+.

* Generate a skeleton payload, with some custom information:

$ ronin-gen payload payload.rb --name Example \
--controls file_read file_write \
--authors Postmodern \
--description "This is an example."

* To generate other types of payloads, you can specify +binary_payload+,
+shellcode+ or +nops+, instead of simply +payload+.

* List available payloads:

$ ronin-payloads

* Print information about a payload:

$ ronin-payloads -n NAME -v

* Build and output a payload:

$ ronin-payload NAME

* Build and output a raw unescaped payload:

$ ronin-payload NAME --raw

* Load a payload from a file, then build and output it:

$ ronin-payload -f FILE

* List available exploits:

$ ronin-exploits

* Print information about an exploit:

$ ronin-exploits -n NAME -v

* Build and deploy an exploit:

$ ronin-exploit -n NAME --host example.com --port 9999

* Load an exploit from a file, then build and deploy it:

$ ronin-exploit -f FILE --host example.com --port 9999

* Build and deploy an exploit, with a payload:

$ ronin-exploit -n NAME --host example.com --port 9999 -P PAYLOAD_NAME

* Build and deploy an exploit, with a raw payload:

$ ronin-exploit -n NAME --host example.com --port 9999 \
--raw-payload \
`echo -en "\x66\x31\xc0\xfe\xc0\xb3\xff\xcd\x80"`

== EXAMPLES:

* Define a shellcode payload:

ronin_shellcode do
#
# Cacheable data.
#
cache do
self.name = 'test'
self.version = '0.5'
self.description = %is an example shellcode payload.

author(:name => 'Postmodern', :organization => 'SophSec')

self.arch :i686
self.os :name => 'Linux'
end

#
# Configurable parameters.
#
parameter :exit_status,
:default => 0,
:description => 'Exit status of shellcode'

#
# Builds the assembly payload, which will call the SYS_EXIT
# syscall with the exit_status of the shellcode.
#
def build
@payload = "\x66\x31\xc0\xfe\xc0"

unless @exit_status == 0
@payload << "\xb3#@exit_status@exit_status.chr"
else
@payload << "\x66\x31\xdb"
end

@payload << "\xcd\x80"
return @payload
end
end

* Define a payload encoder:

ronin_payload_encoder do
#
# Cacheable data.
#
cache do
self.name = 'base64_encode'
self.description = %base64 payload encoder

self.arch :i686
self.os :name => 'Linux'
end

#
# Base64 encodes the specified _data_.
#
def encode(data)
return data.to_s.base64_encode
end
end

* Define a remote TCP exploit:

ronin_remote_tcp_exploit do
helper :buffer_overflow

#
# Cacheable data.
#
cache do
self.name = 'test'
self.description = %is an example exploit.

self.status = :potential
self.disclosure = [:in_wild, :public]

author(:name => 'Postmodern', :organization => 'SophSec')

control :code_exec

targeting do |target|
target.arch :i686
target.os :name => 'Linux'
target.product :name => 'ExampleWare', :version => '2.4.7b'
end
end

#
# Builds the exploit.
#
def build
@buffer = "USER #build_buffer\n"
end

#
# Deploys the built exploit.
#
def deploy
tcp_send @buffer
end
end

== REQUIREMENTS:

* ronin[http://ronin.rubyforge.org/] >= 0.3.0
* ronin-gen[http://ronin.rubyforge.org/gen/] >= 0.2.0

== INSTALL:

$ sudo gem install ronin-exploits

== LICENSE:

Ronin Exploits - A Ruby library for Ronin that provides exploitation and
payload crafting functionality.

Copyright (c) 2007-2009 Hal Brodigan (postmodern.mod3 at gmail.com)

This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA