Update the check() comments to reflect new information >:(
git-svn-id: file:///home/svn/framework3/trunk@5825 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
97b2adcc46
commit
4b30f3ef1a
|
@ -43,6 +43,12 @@ class Metasploit3 < Msf::Auxiliary
|
|||
], self.class)
|
||||
end
|
||||
|
||||
#
|
||||
# This method is based on the python script: http://labs.portcullis.co.uk/download/ms08-067_check.py
|
||||
# There are two problems with this method:
|
||||
# 1. It can sometimes lead to a crash of svchost.exe due to a race condition
|
||||
# 2. The Python script may be based on a Nessus plugin, which violates the Tenable license
|
||||
#
|
||||
|
||||
# Overload the RPORT setting
|
||||
def rport
|
||||
|
|
|
@ -378,9 +378,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
=end
|
||||
|
||||
#
|
||||
# Vulnerability check technique borrowed from ms08-067_check.py
|
||||
# Written by Bernardo Damele A. G. <bernardo.damele[at]gmail.com>
|
||||
#
|
||||
# This method is based on the python script: http://labs.portcullis.co.uk/download/ms08-067_check.py
|
||||
# There are two problems with this method:
|
||||
# 1. It can sometimes lead to a crash of svchost.exe due to a race condition
|
||||
# 2. The Python script may be based on a Nessus plugin, which violates the Tenable license
|
||||
#
|
||||
|
||||
def check
|
||||
print_status("Connecting to the target...")
|
||||
|
||||
|
|
Loading…
Reference in New Issue