Minor fixes. Includes a test module.
parent
26be236896
commit
2086224a4c
|
@ -33,7 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
developer." To work around this issue, you will need to manually build and sign
|
||||
an OSX app containing your payload with a custom URL handler called "openurl".
|
||||
|
||||
You can put newlines & unicode in your APP_NAME, although you must be careful not
|
||||
You can put newlines and unicode in your APP_NAME, although you must be careful not
|
||||
to create a prompt that is too tall, or the user will not be able to click
|
||||
the buttons, and will have to either logout or kill the CoreServicesUIAgent
|
||||
process.
|
||||
|
|
|
@ -12,13 +12,13 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => "heaplib2 test",
|
||||
'Name' => "Heaplib2 Test",
|
||||
'Description' => %q{
|
||||
This tests heaplib2
|
||||
This tests heaplib2. Since it is a test module, it's not intended to do much useful work in the field.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'sinn3r' ],
|
||||
'References' =>
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://metasploit.com' ]
|
||||
],
|
||||
|
@ -79,4 +79,4 @@ class Metasploit3 < Msf::Auxiliary
|
|||
exploit
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue