Module: Msf::Post::Linux::Wsl

Includes:
Kernel
Defined in:
lib/msf/core/post/linux/wsl.rb

Instance Method Summary collapse

Methods included from Kernel

#aslr_enabled?, #cpu_flags, #dmesg_restrict?, #exec_shield_enabled?, #grsec_installed?, #kaiser_enabled?, #kernel_arch, #kernel_config, #kernel_hardware, #kernel_modules, #kernel_name, #kernel_release, #kernel_version, #kpti_enabled?, #kptr_restrict?, #lkrg_installed?, #mmap_min_addr, #pax_installed?, #selinux_enforcing?, #selinux_installed?, #smap_enabled?, #smep_enabled?, #uname, #unprivileged_bpf_disabled?, #userns_enabled?, #yama_enabled?, #yama_installed?, #yama_ptrace_scope

Methods included from File

#_append_file_powershell, #_append_file_unix_shell, #_can_echo?, #_read_file_meterpreter, #_read_file_powershell, #_read_file_powershell_fragment, #_shell_command_with_success_code, #_shell_process_with_success_code, #_unix_max_line_length, #_win_ansi_append_file, #_win_ansi_write_file, #_win_bin_append_file, #_win_bin_write_file, #_write_file_meterpreter, #_write_file_powershell, #_write_file_powershell_fragment, #_write_file_unix_shell, #append_file, #attributes, #cd, #chmod, #copy_file, #dir, #directory?, #executable?, #exist?, #expand_path, #exploit_data, #exploit_source, #file?, #file_local_write, #file_remote_digestmd5, #file_remote_digestsha1, #file_remote_digestsha2, #immutable?, #initialize, #mkdir, #pwd, #read_file, #readable?, #rename_file, #rm_f, #rm_rf, #setuid?, #stat, #upload_and_chmodx, #upload_file, #writable?, #write_file

Methods included from Common

#clear_screen, #cmd_exec, #cmd_exec_get_pid, #cmd_exec_with_result, #command_exists?, #create_process, #get_env, #get_envs, #initialize, #peer, #report_virtualization, #rhost, #rport

Instance Method Details

#wsl?Boolean

Returns a boolean if the kernel includes WSL indicators

Returns:

  • (Boolean)


11
12
13
# File 'lib/msf/core/post/linux/wsl.rb', line 11

def wsl?
  kernel_release.downcase.include?('-microsoft')
end