Module: Msf::Post::Linux::Wsl
- Includes:
- Kernel
- Defined in:
- lib/msf/core/post/linux/wsl.rb
Instance Method Summary collapse
-
#wsl? ⇒ Boolean
Returns a boolean if the kernel includes WSL indicators.
Methods included from Kernel
#aslr_enabled?, #cpu_flags, #dmesg_restrict?, #exec_shield_enabled?, #grsec_installed?, #kaiser_enabled?, #kernel_arch, #kernel_config, #kernel_hardware, #kernel_modules, #kernel_name, #kernel_release, #kernel_version, #kpti_enabled?, #kptr_restrict?, #lkrg_installed?, #mmap_min_addr, #pax_installed?, #selinux_enforcing?, #selinux_installed?, #smap_enabled?, #smep_enabled?, #uname, #unprivileged_bpf_disabled?, #userns_enabled?, #yama_enabled?, #yama_installed?, #yama_ptrace_scope
Methods included from File
#_append_file_powershell, #_append_file_unix_shell, #_can_echo?, #_read_file_meterpreter, #_read_file_powershell, #_read_file_powershell_fragment, #_shell_command_with_success_code, #_shell_process_with_success_code, #_unix_max_line_length, #_win_ansi_append_file, #_win_ansi_write_file, #_win_bin_append_file, #_win_bin_write_file, #_write_file_meterpreter, #_write_file_powershell, #_write_file_powershell_fragment, #_write_file_unix_shell, #append_file, #attributes, #cd, #chmod, #copy_file, #dir, #directory?, #executable?, #exist?, #expand_path, #exploit_data, #exploit_source, #file?, #file_local_write, #file_remote_digestmd5, #file_remote_digestsha1, #file_remote_digestsha2, #immutable?, #initialize, #mkdir, #pwd, #read_file, #readable?, #rename_file, #rm_f, #rm_rf, #setuid?, #stat, #upload_and_chmodx, #upload_file, #writable?, #write_file
Methods included from Common
#clear_screen, #cmd_exec, #cmd_exec_get_pid, #cmd_exec_with_result, #command_exists?, #create_process, #get_env, #get_envs, #initialize, #peer, #report_virtualization, #rhost, #rport
Instance Method Details
#wsl? ⇒ Boolean
Returns a boolean if the kernel includes WSL indicators
11 12 13 |
# File 'lib/msf/core/post/linux/wsl.rb', line 11 def wsl? kernel_release.downcase.include?('-microsoft') end |