Home > exploit_loop

exploit_loop

Exploit_loop is a project mainly written in Ruby, based on the MIT license.

simple exploit loop for standard CTF contests

== DESCRIPTION Iterate all exploits from a specified directory over all hosts within a ctf.

Exploits should:

  • print flags to STDOUT
  • print errors to STDERR
  • use an option --target
  • complete specified timeout
  • online exploits should not end with suffix 'off'.

== SYNOPSIS

% exploit_loop [options]

Specific options:

-h, --help                       Display this help.
-V, --version                    Print version.
    --minimum <i>                Minimum iteration time in seconds.
    --exploit_dir <dir>          Directory that contains exploits.
    --flag_dir <dir>             Directory in which flags are written to.
    --timeout <sec>              Timeout in seconds for blocking calls.
    --without <host>             Without this host
    --target_network <network>   network like 10.0.x.y , where "x" will be changed according to --target_range and "y" will be changed according to --target_host.
    --target_host <y>            Host address, the "y" within --target_network.
    --target_range <x>           Network range, the "x" within --target_network. Example: 5,23 will be a Range 5..23

== REQUIREMENTS

Ruby 1.8.7

== INSTALL

% git clone <url>
% cd exploit_loop
% rake gem
% sudo gem install pkg/*.gem

== TODO

  • write some tests

== Bug reports

== AUTHORS

Sandor Szücs, [email protected]

== LICENSE

See LICENSE file.