eselect-metasploit: armitage link fix, main select module fixed

This commit is contained in:
Anton Bolshakov 2012-09-04 13:54:28 +00:00
parent c61e479840
commit 1c4e6a4025
5 changed files with 226 additions and 5 deletions

View file

@ -1,2 +1,4 @@
AUX metasploit.eselect-0.1 4629 SHA256 71159ab40077f05d099294b26e7bd40b9d36bca35d26b30d76b5fa016e3b64fe SHA512 ea26e8f4319fde16cc55d0fa26d2f6d39dcc75cfb9b78c14a7367ea7aaa5b678606a5adac7c4ac9194f4b9483c2a72f779a6aa744b0fd3493b8168e063df7a1a WHIRLPOOL 6e6d785a05726d2891a8975d6b0080deb9934d35853d2fa5ea5feeb6626cf9a112301318c33dcaea9c7145e92b96b7a01a3bc13cae61f99eea5041a80f4013b1
AUX metasploit.eselect-0.1 4736 SHA256 fdc39f97b3ab9828715b9ebb3712f15caa348802028eee6f6a730bdf70177b37 SHA512 76c704fc09b715bebd1f0fdaa3cedef9b421759157cb179892756075aa7039eef8cb56e396ca0277f85cd332d3d0bb13f6b1fdddaeddf7118045553cc8f99faf WHIRLPOOL c4319b29dba297063997efe1034f4da05790950753a590b8f27bdc6fb541a95c33cc7c82523346e2b0cc96b5c6baa73bc84f061a0c45ec045bfbef65b68f107a
AUX metasploit.eselect-0.2 4698 SHA256 3013a9c2a5274e871fa663a04e925fc30fb95d4fdd04ad0bd05f071696b4e553 SHA512 0c978eb70f7cd51394d0f5074705497628ba4d4729af9762fd2eedcdef2ba90b93e3d1ddd61c2c2000f03e90ebdef391501f36244a765a25730baa0c729b5686 WHIRLPOOL 527abbf95e6e82b78af1a2c162c92cf36f8960250df15d458dc80d4c17c670e16335b0b097bab35a71bfef904e985ce7e231bca5d03879b5955989c27edd820d
EBUILD eselect-metasploit-0.1.ebuild 650 SHA256 410adea739a778c037d5d91172d623d315808f62d31b72f2cfa62b98c39fa7cc SHA512 fbb0d87cc71a0c81334b900d2c2450f7c1408a70e19df744c414b8f2ebb57eb3eb74c53d4cfd6b390fe64e3e2b278151b6ef87dc826c17e8608edf9d0e356bd7 WHIRLPOOL c80c81113e0b926d865807df248e8034e2fd87d7c8ec5203b054e6866982664eee18e73dd1e4dbdb64711e320edce75cf9e687e80580ffe95a93974f2c780d64
EBUILD eselect-metasploit-0.2.ebuild 650 SHA256 410adea739a778c037d5d91172d623d315808f62d31b72f2cfa62b98c39fa7cc SHA512 fbb0d87cc71a0c81334b900d2c2450f7c1408a70e19df744c414b8f2ebb57eb3eb74c53d4cfd6b390fe64e3e2b278151b6ef87dc826c17e8608edf9d0e356bd7 WHIRLPOOL c80c81113e0b926d865807df248e8034e2fd87d7c8ec5203b054e6866982664eee18e73dd1e4dbdb64711e320edce75cf9e687e80580ffe95a93974f2c780d64

View file

@ -0,0 +1,29 @@
# Copyright 1999-2012 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: $
EAPI=4
DESCRIPTION="eselect module for metasploit"
HOMEPAGE="http://www.pentoo.ch/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~amd64 ~arm ~x86"
IUSE=""
DEPEND="app-admin/eselect"
RDEPEND="${DEPEND}"
S=${WORKDIR}
src_install() {
insinto /usr/share/eselect/modules
newins "${FILESDIR}/metasploit.eselect-${PV}" metasploit.eselect
}
pkg_postinst() {
elog "To switch between installed slots, execute as root:"
elog " # eselect metasploit set [slot number]"
}

View file

@ -36,7 +36,7 @@ find_targets() {
# remove the metasploit symlink
remove_symlink() {
for i in $(qlist metasploit | grep $(canonicalise "${EROOT}${MSFPATH}")/msf)
for i in $(qlist metasploit | grep $(canonicalise "${EROOT}${MSFPATH}")/msf) "${EROOT}${MSFPATH}")/armitage
do
unlink /usr/bin/$(echo ${i} | awk -F'/' '{print $5}')
done
@ -57,13 +57,13 @@ set_symlink() {
#this stanza doesn't appear to be needed...
elif [[ -d ${EROOT}/usr/$(get_libdir)/${target} ]]; then
ln -s "${target}" "${EROOT}${MSFPATH}"
for i in $(qlist metasploit | grep /usr/$(get_libdir)/${target}/msf)
for i in $(qlist metasploit | grep /usr/$(get_libdir)/${target}/msf) /usr/$(get_libdir)/${target}/armitage
do
ln -s ${i} /usr/bin/$(echo ${i} | awk -F'/' '{print $5}')
done
elif [[ -d ${EROOT}${MSFPATH}${target} ]]; then
ln -s "metasploit${target}" "${EROOT}${MSFPATH}"
for i in $(qlist metasploit | grep /usr/$(get_libdir)/${target}/msf)
for i in $(qlist metasploit | grep /usr/$(get_libdir)/${target}/msf) /usr/$(get_libdir)/${target}/armitage
do
ln -s ${i} /usr/bin/$(echo ${i} | awk -F'/' '{print $5}')
done

View file

@ -0,0 +1,190 @@
# -*-eselect-*- vim: ft=eselect
# Copyright 2005-2011 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2 or later
# $
DESCRIPTION="Control which metaploit version is active"
MAINTAINER="zerochaos@pentoo.ch"
SVN_DATE='$Date: 2011-09-25 15:27:36 +0200 (Sun, 25 Sep 2011) $'
VERSION=$(svn_date_to_version "${SVN_DATE}")
###WARNING: don't even think of using this insanity for a reference (but it works)
#base idea from kernel.eselect, get_libdir from php.eselect with --use-old from opencl.eselect
#all modified randomly until it worked
###/WARNING
inherit multilib
get_libdir() {
local dir
if has lib64 $(list_libdirs); then
echo lib64
return
fi
echo lib
}
MSFPATH="/usr/$(get_libdir)/metasploit"
# find a list of metasploit symlink targets and sort them
find_targets() {
local f
for f in "${EROOT}${MSFPATH}"[[:digit:]]*; do
[[ -d ${f} ]] && basename "${f}"
done | LC_ALL=C sort
}
# remove the metasploit symlink
remove_symlink() {
for i in $(qlist metasploit | grep $(canonicalise "${EROOT}${MSFPATH}")/msf) "${EROOT}${MSFPATH}"/armitage
do
unlink /usr/bin/$(echo ${i} | awk -F'/' '{print $5}')
done
unlink "${EROOT}${MSFPATH}"
}
# set the metasploit symlink
set_symlink() {
local target=$1
if is_number "${target}"; then
local targets=( $(find_targets) )
target=${targets[target-1]}
fi
if [[ -z ${target} ]]; then
die -q "Target \"$1\" doesn't appear to be valid!"
#this stanza doesn't appear to be needed...
elif [[ -d ${EROOT}/usr/$(get_libdir)/${target} ]]; then
ln -s "${target}" "${EROOT}${MSFPATH}"
for i in $(qlist metasploit | grep /usr/$(get_libdir)/${target}/msf) /usr/$(get_libdir)/${target}/armitage
do
ln -s ${i} /usr/bin/$(echo ${i} | awk -F'/' '{print $5}')
done
elif [[ -d ${EROOT}${MSFPATH}${target} ]]; then
ln -s "metasploit${target}" "${EROOT}${MSFPATH}"
for i in $(qlist metasploit | grep /usr/$(get_libdir)/${target}/msf) /usr/$(get_libdir)/${target}/armitage
do
ln -s ${i} /usr/bin/$(echo ${i} | awk -F'/' '{print $5}')
done
else
die -q "Target \"$1\" doesn't appear to be valid!"
fi
}
# wrapper to safely set the symlink
set_symlink_safe() {
if [[ -L ${EROOT}${MSFPATH} ]]; then
# existing symlink
remove_symlink || die -q "Couldn't remove existing symlink"
set_symlink "$1" || die -q "Couldn't set a new symlink"
elif [[ -e ${EROOT}${MSFPATH} ]]; then
# we have something strange
die -q "${EROOT}${MSFPATH} exists but is not a symlink"
else
set_symlink "$1" || die -q "Couldn't set a new symlink"
fi
}
### show action ###
describe_show() {
echo "Show the current metasploit symlink"
}
do_show() {
write_list_start "Current metasploit symlink:"
if [[ -L ${EROOT}${MSFPATH} ]]; then
local metasploit=$(canonicalise "${EROOT}${MSFPATH}")
write_kv_list_entry "${metasploit%/}" ""
else
write_kv_list_entry "(unset)" ""
fi
}
### list action ###
describe_list() {
echo "List available metasploit symlink targets"
}
do_list() {
local i targets=( $(find_targets) )
write_list_start "Available metasploit symlink targets:"
for (( i = 0; i < ${#targets[@]}; i++ )); do
[[ ${targets[i]} = \
$(basename "$(canonicalise "${EROOT}${MSFPATH}")") ]] \
&& targets[i]=$(highlight_marker "${targets[i]}")
done
write_numbered_list -m "(none found)" "${targets[@]}"
}
### set action ###
describe_set() {
echo "Set a new metasploit symlink target"
}
describe_set_parameters() {
echo "<target>"
}
describe_set_options() {
echo "<target> : Target name or number (from 'list' action)"
echo "--use-old : If an implementation is already set, use that one instead"
}
do_set() {
local action="error"
local current=$(canonicalise "${EROOT}${MSFPATH}")
local available=( $(find_targets) )
local new
local opt
while [[ ${#@} -gt 0 ]] ; do
opt=$1
shift
case ${opt} in
--use-old)
if [[ -n ${current} ]] && has ${current} ${available}; then
action="old-implementation"
fi
;;
*)
if [[ ${action} != "old-implementation" ]] ; then
action="set-implementation"
fi
if is_number ${opt} ; then
new=${available[$(( ${opt} - 1 ))]}
if [[ -z ${new} ]] ; then
die -q "Unrecognized option: ${opt}"
fi
elif has ${opt} ${available}; then
new="${opt}"
else
die -q "Unrecognized option: ${opt}"
fi
;;
esac
done
case ${action} in
old-implementation)
set_symlink_safe ${current}
return $?
;;
set-implementation)
if [[ -n ${new} ]] ; then
set_symlink_safe ${new}
return $?
else
die -q "Please specify an implementation to set"
fi
;;
*)
die -q "Invalid usage of set action."
;;
esac
}

View file

@ -1,3 +1,3 @@
app-admin/genmenu **
~app-admin/eselect-metasploit-0.1
~app-admin/eselect-metasploit-0.2