release/0.1.55
Full Changelog: release/0.1.54...release/0.1.55
evidence
Compresses the 'sessions' folder and encodes it into a video using the lazyown_infinitestorage.py script.
If a filename is provided as an argument, it decodes the specified video instead.
This function operates in two modes depending on the input:
- Encode Mode (default):
- Compresses the contents of the 'sessions' directory into a ZIP file named 'sessions.zip'.
- Utilizes the lazyown_infinitestorage.py script to convert the ZIP file into a high-definition video file named 'encoded_output.avi' with a frame size of 1920x1080 and a frame rate of 25 FPS.
- Decode Mode:
- When the 'line' parameter contains the string "decode", it lists all available video files in the 'sessions' directory (files with .mp4, .mkv, or .avi extensions).
- If there are no video files present, it prints an error message and exits.
- Prompts the user to select a video by entering its corresponding number.
- Constructs a command to decode the selected video file using the lazyown_infinitestorage.py script, outputting the decoded result to a specified directory.
:param line: An optional parameter that, when provided, indicates that the user wants to decode a video. If not provided, the function operates in encode mode.
:type line: str
:returns: None
Example usage:
- To compress and encode: do_evidence()
- To decode a video: do_evidence('decode')
Notes:
- The 'sessions' directory must exist and contain files for encoding.
- The lazyown_infinitestorage.py script must be present in the specified directory.
- Ensure that the output paths for both encoding and decoding do not conflict with existing files.
rejetto_hfs_exec
HttpFileServer version 2.3. Vulnerable using the module rejetto_hfs_exec of metasploit
:param line: Command line input that provides the LHOST and RHOST.
:type line: str
:returns: None
ms08_067_netapi
SMB CVE-2008-4250. Vulnerable using the module ms08_067_netapi of metasploit
:param line: Command line input that provides the LHOST and RHOST.
:type line: str
:returns: None
automsf
Try to check if Vulnerable using the module passed by argument of lazyown example automsf exploit/windows/iis/iis_webdav_upload_asp to use in metasploit
:param line: Command line input that provides the LHOST and RHOST.
:type line: str
:returns: None
iis_webdav_upload_asp
(CVE-2017-7269). Vulnerable using the module iis_webdav_upload_asp of metasploit
:param line: Command line input that provides the LHOST and RHOST.
:type line: str
:returns: None
nano
Opens or creates the file using line in the sessions directory for editing using nano.
:param line: name of the file to use in nano in session directory.
:returns: None
nc
Runs nc
with the specified port for listening.
This function starts a nc
listener on the specified local port. It can use a port defined in the lport
parameter or a port provided as an argument.
Usage:
pwncatcs
:param line: The port number to use for the nc
listener. If not provided, it defaults to the lport
parameter.
:type line: str
:returns: None
Manual execution:
- Ensure that
nc
is installed and accessible from your command line. - The port number can either be provided as an argument or be set in the
lport
parameter of the function. - Run the function to start
nc
on the specified port.
If no port is provided as an argument, the function will use the port specified in the lport
parameter. If a port is provided, it overrides the lport
value.
After starting the listener, the function prints a message indicating that nc
is running on the specified port and another message when the session is closed.
Dependencies:
nc
: A tool used for creating reverse shells or bind shells.