Class: Msf::Exploit::Local

Inherits:
Msf::Exploit show all
Includes:
PostMixin
Defined in:
lib/msf/core/exploit/local.rb

Overview

A specialization of the exploit module class that is geared toward exploits that are performed locally. Locally, in this case, is defined as an exploit that is realized by means other than network communication.

Defined Under Namespace

Modules: CompileC, Linux, LinuxKernel

Instance Attribute Summary

Attributes included from PostMixin

#passive

Attributes included from Module::HasActions

#actions, #default_action, #passive, #passive_actions

Attributes inherited from Msf::Exploit

#default_target, #fail_detail, #fail_reason, #payload, #payload_info, #payload_instance, #session_count, #successful, #targets

Attributes inherited from Module

#arch, #author, #datastore, #error, #job_id, #license, #module_store, #options, #platform, #privileged, #references, #uuid

Attributes included from Framework::Offspring

#framework

Attributes included from Rex::Ui::Subscriber::Input

#user_input

Attributes included from Rex::Ui::Subscriber::Output

#user_output

Instance Method Summary collapse

Methods included from PostMixin

#check_for_session_readiness, #cleanup, #compatible_sessions, #initialize, #passive?, #post_commands, #session, #session_compatible?, #setup, #sysinfo

Methods included from Post::Common

#cmd_exec, #cmd_exec_get_pid, #get_env, #get_envs, #has_pid?, #peer, #report_vm, #rhost, #rport

Methods included from Module::HasActions

#action, #find_action, #initialize, #passive?, #passive_action?

Methods included from Auxiliary::Report

#db, #get_client, #get_host, #initialize, #inside_workspace_boundary?, #mytask, #myworkspace, #report_auth_info, #report_client, #report_exploit, #report_host, #report_loot, #report_note, #report_service, #report_vuln, #report_web_form, #report_web_page, #report_web_site, #report_web_vuln, #store_cred, #store_local, #store_loot

Methods inherited from Msf::Exploit

#add_handler, #aggressive?, #autofilter, #autofilter_ports, #autofilter_services, #capabilities, #cleanup, #compatible_encoders, #compatible_payloads, #encode_begin, #encode_end, #encode_shellcode_stub, #exploit, #fail_with, #generate_payload, #generate_single_payload, #handler, #handler_enabled?, #initialize, #make_nops, mixins, #nop_generator, #nop_save_registers, #on_new_session, #passive?, #pattern_create, #payload_append, #payload_append_encoder, #payload_badchars, #payload_encoder_options, #payload_encoder_type, #payload_extended_options, #payload_max_nops, #payload_min_nops, #payload_prepend, #payload_prepend_encoder, #payload_space, #rand_char, #rand_text, #rand_text_alpha, #rand_text_alpha_lower, #rand_text_alpha_upper, #rand_text_alphanumeric, #rand_text_english, #rand_text_highascii, #rand_text_numeric, #regenerate_payload, #register_autofilter_ports, #register_autofilter_services, #report_failure, #reset_session_counts, #session_created?, #setup, #stack_adjustment, #stance, #supports_check?, #supports_exploit?, #target, #target_arch, #target_index, #target_platform, type, #type, #wfs_delay

Methods inherited from Module

#[], #[]=, #alias, #arch?, #arch_to_s, #author_to_s, #auxiliary?, cached?, #check, #comm, #compat, #compatible?, #debugging?, #description, #disclosure_date, #each_arch, #each_author, #encoder?, #exploit?, #fail_with, #file_path, #framework, fullname, #fullname, #import_defaults, #initialize, is_usable, #name, #nop?, #orig_cls, #owner, #payload?, #platform?, #platform_to_s, #post?, #print_error, #print_good, #print_line, #print_line_prefix, #print_prefix, #print_status, #print_warning, #privileged?, #rank, rank, #rank_to_h, rank_to_h, #rank_to_s, rank_to_s, #refname, #register_parent, #replicant, #search_filter, #share_datastore, shortname, #shortname, #support_ipv6?, #target_host, #target_port, #type, type, #validate, #vprint_debug, #vprint_error, #vprint_good, #vprint_line, #vprint_status, #vprint_warning, #workspace

Methods included from Rex::Ui::Subscriber

#copy_ui, #init_ui, #reset_ui

Methods included from Rex::Ui::Subscriber::Input

#gets

Methods included from Rex::Ui::Subscriber::Output

#flush, #print, #print_debug, #print_error, #print_good, #print_line, #print_status, #print_warning

Instance Method Details

#exploit_typeObject

Returns the fact that this exploit is a local exploit.


19
20
21
# File 'lib/msf/core/exploit/local.rb', line 19

def exploit_type
  Msf::Exploit::Type::Local
end