From c37b60de7b2d22b59af76bd0d4e60623db23033d Mon Sep 17 00:00:00 2001 From: wchen-r7 Date: Tue, 7 Jul 2015 00:57:37 -0500 Subject: [PATCH] Do some print_status with ms14_064 --- modules/exploits/windows/browser/ms14_064_ole_code_execution.rb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/modules/exploits/windows/browser/ms14_064_ole_code_execution.rb b/modules/exploits/windows/browser/ms14_064_ole_code_execution.rb index 34240e01a5..99cd39a738 100644 --- a/modules/exploits/windows/browser/ms14_064_ole_code_execution.rb +++ b/modules/exploits/windows/browser/ms14_064_ole_code_execution.rb @@ -375,6 +375,7 @@ end function # It should be \r\n . vbs = Msf::Util::EXE.to_exe_vbs(data).gsub(/\x0a/, "\r\n") + print_status("Sending VBS stager") send_response(cli, vbs) else # The VBS technique is only for Windows XP. So if a non-XP system is requesting it, @@ -382,6 +383,7 @@ end function send_not_found(cli) end else + print_status("Sending exploit...") send_exploit_html(cli, get_html) end end