rename generate_exe -> generate_payload_exe

git-svn-id: file:///home/svn/framework3/trunk@10388 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-09-20 04:37:25 +00:00
parent e59ec467af
commit 21d88b36c1
5 changed files with 5 additions and 5 deletions

View File

@ -63,7 +63,7 @@ module Exploit::CmdStager
def generate_cmdstager(opts = {}, pl = nil)
pl ||= payload.encoded
@exe = generate_exe
@exe = generate_payload_exe
@stager_instance = create_stager(@exe)
cmd_list = @stager_instance.generate(opts)

View File

@ -21,7 +21,7 @@ module Exploit::EXE
], self.class)
end
def generate_exe(opts = {})
def generate_payload_exe(opts = {})
if (altexe = datastore['EXETEMPLATE'])
opts.merge!({ :template => altexe })
end

View File

@ -117,7 +117,7 @@ class Metasploit3 < Msf::Exploit::Remote
if (Regexp.new(Regexp.escape(@payload)+'$', true).match(request.uri))
print_status "Sending payload executable to target ..."
return if ((p = regenerate_payload(cli)) == nil)
data = generate_exe({ :code => p.encoded })
data = generate_payload_exe({ :code => p.encoded })
send_response(cli, data, { 'Content-Type' => 'application/octet-stream' })
return

View File

@ -75,7 +75,7 @@ class Metasploit3 < Msf::Exploit::Remote
# Use the CmdStager or not?
if (not datastore['UseCmdStager'])
exe = generate_exe
exe = generate_payload_exe
mssql_upload_exec(exe, datastore['VERBOSE'])
else
execute_cmdstager({ :linemax => 1500, :nodelete => true })

View File

@ -129,7 +129,7 @@ class Metasploit3 < Msf::Exploit::Remote
end
# Generate a payload EXE to execute
exe = generate_exe
exe = generate_payload_exe
printers.each { |pr|