diff --git a/modules/exploits/windows/browser/ms10_018_ie_behaviors.rb b/modules/exploits/windows/browser/ms10_018_ie_behaviors.rb index b00638448e..032d9e89e7 100644 --- a/modules/exploits/windows/browser/ms10_018_ie_behaviors.rb +++ b/modules/exploits/windows/browser/ms10_018_ie_behaviors.rb @@ -34,17 +34,17 @@ class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::Remote::HttpServer::HTML # - # Superceded by ms10_090_ie_css_clip, disable for BrowserAutopwn + # ms10_090_ie_css_clip is newer but *much* less reliable # - #include Msf::Exploit::Remote::BrowserAutopwn - #autopwn_info({ - # :ua_name => HttpClients::IE, - # :ua_minver => "6.0", - # :ua_maxver => "7.0", - # :javascript => true, - # :os_name => OperatingSystems::WINDOWS, - # :vuln_test => nil, # no way to test without just trying it - #}) + include Msf::Exploit::Remote::BrowserAutopwn + autopwn_info({ + :ua_name => HttpClients::IE, + :ua_minver => "6.0", + :ua_maxver => "7.0", + :javascript => true, + :os_name => OperatingSystems::WINDOWS, + :vuln_test => nil, # no way to test without just trying it + }) def initialize(info = {}) super(update_info(info, @@ -87,7 +87,7 @@ class Metasploit3 < Msf::Exploit::Remote 'DefaultOptions' => { 'EXITFUNC' => 'process', - 'InitialAutoRunScript' => 'migrate -f', + #'InitialAutoRunScript' => 'migrate -f', }, 'Payload' => { diff --git a/modules/exploits/windows/browser/ms10_090_ie_css_clip.rb b/modules/exploits/windows/browser/ms10_090_ie_css_clip.rb index 481ea4a7ab..3ec0831ad1 100644 --- a/modules/exploits/windows/browser/ms10_090_ie_css_clip.rb +++ b/modules/exploits/windows/browser/ms10_090_ie_css_clip.rb @@ -15,15 +15,16 @@ class Metasploit3 < Msf::Exploit::Remote Rank = GoodRanking include Msf::Exploit::Remote::HttpServer::HTML - include Msf::Exploit::Remote::BrowserAutopwn - autopwn_info({ - :ua_name => HttpClients::IE, - :ua_minver => "6.0", - :ua_maxver => "7.0", - :javascript => true, - :os_name => OperatingSystems::WINDOWS, - :vuln_test => nil, # no way to test without just trying it - }) + # Unreliable + #include Msf::Exploit::Remote::BrowserAutopwn + #autopwn_info({ + # :ua_name => HttpClients::IE, + # :ua_minver => "6.0", + # :ua_maxver => "7.0", + # :javascript => true, + # :os_name => OperatingSystems::WINDOWS, + # :vuln_test => nil, # no way to test without just trying it + #}) def initialize(info = {}) super(update_info(info,