diff --git a/modules/exploits/windows/browser/adobe_flash_sps.rb b/modules/exploits/windows/browser/adobe_flash_sps.rb index d9dd7b21e0..f75b6bea97 100644 --- a/modules/exploits/windows/browser/adobe_flash_sps.rb +++ b/modules/exploits/windows/browser/adobe_flash_sps.rb @@ -89,9 +89,8 @@ class Metasploit3 < Msf::Exploit::Remote # Avoid the attack if the victim doesn't have the same setup we're targeting if my_target.nil? print_error("Browser not supported, will not launch attack: #{agent.to_s}: #{cli.peerhost}:#{cli.peerport}") - #send_not_found(cli) - #return - my_target = targets[1] + send_not_found(cli) + return end # The SWF requests our MP4 trigger