rename generate_exe -> generate_payload_exe
git-svn-id: file:///home/svn/framework3/trunk@10388 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
e59ec467af
commit
21d88b36c1
|
@ -63,7 +63,7 @@ module Exploit::CmdStager
|
|||
def generate_cmdstager(opts = {}, pl = nil)
|
||||
pl ||= payload.encoded
|
||||
|
||||
@exe = generate_exe
|
||||
@exe = generate_payload_exe
|
||||
|
||||
@stager_instance = create_stager(@exe)
|
||||
cmd_list = @stager_instance.generate(opts)
|
||||
|
|
|
@ -21,7 +21,7 @@ module Exploit::EXE
|
|||
], self.class)
|
||||
end
|
||||
|
||||
def generate_exe(opts = {})
|
||||
def generate_payload_exe(opts = {})
|
||||
if (altexe = datastore['EXETEMPLATE'])
|
||||
opts.merge!({ :template => altexe })
|
||||
end
|
||||
|
|
|
@ -117,7 +117,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
if (Regexp.new(Regexp.escape(@payload)+'$', true).match(request.uri))
|
||||
print_status "Sending payload executable to target ..."
|
||||
return if ((p = regenerate_payload(cli)) == nil)
|
||||
data = generate_exe({ :code => p.encoded })
|
||||
data = generate_payload_exe({ :code => p.encoded })
|
||||
|
||||
send_response(cli, data, { 'Content-Type' => 'application/octet-stream' })
|
||||
return
|
||||
|
|
|
@ -75,7 +75,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
# Use the CmdStager or not?
|
||||
if (not datastore['UseCmdStager'])
|
||||
exe = generate_exe
|
||||
exe = generate_payload_exe
|
||||
mssql_upload_exec(exe, datastore['VERBOSE'])
|
||||
else
|
||||
execute_cmdstager({ :linemax => 1500, :nodelete => true })
|
||||
|
|
|
@ -129,7 +129,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
# Generate a payload EXE to execute
|
||||
exe = generate_exe
|
||||
exe = generate_payload_exe
|
||||
|
||||
printers.each { |pr|
|
||||
|
||||
|
|
Loading…
Reference in New Issue