rapid7/metasploit-framework

View on GitHub
modules/auxiliary/vsploit/pii/email_pii.rb

Summary

Maintainability
A
0 mins
Test Coverage
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Auxiliary

  #
  # This module sends pii via an attacker smtp machine
  #
  include Msf::Exploit::Remote::SMTPDeliver
  include Msf::Auxiliary::PII

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'VSploit Email PII',
      'Description'    => %q{
          This auxiliary reads from a file and sends data which
      should be flagged via an internal or external SMTP server.
      },
      'License'        => MSF_LICENSE,
      'Author'         =>  ['willis']
    ))
      register_options(
        [
          OptString.new('RHOST', [true, "SMTP server address",'127.0.0.1']),
          OptPort.new('RPORT', [true, "SMTP server port", 25])
        ])
  end

  def run

    msg = Rex::MIME::Message.new
    msg.mime_defaults
    msg.subject = datastore['SUBJECT']
    msg.to = datastore['MAILTO']
    msg.from = datastore['MAILFROM']

    data = create_pii

    msg.add_part(data, "text/plain")
    msg.add_part_attachment(data, rand_text_english(10))

    resp = send_message(msg.to_s)
  end
end