Update the check() comments to reflect new information >:(

git-svn-id: file:///home/svn/framework3/trunk@5825 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2008-11-03 15:29:51 +00:00
parent 97b2adcc46
commit 4b30f3ef1a
2 changed files with 12 additions and 3 deletions

View File

@ -43,6 +43,12 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
#
# This method is based on the python script: http://labs.portcullis.co.uk/download/ms08-067_check.py
# There are two problems with this method:
# 1. It can sometimes lead to a crash of svchost.exe due to a race condition
# 2. The Python script may be based on a Nessus plugin, which violates the Tenable license
#
# Overload the RPORT setting
def rport

View File

@ -378,9 +378,12 @@ class Metasploit3 < Msf::Exploit::Remote
=end
#
# Vulnerability check technique borrowed from ms08-067_check.py
# Written by Bernardo Damele A. G. <bernardo.damele[at]gmail.com>
#
# This method is based on the python script: http://labs.portcullis.co.uk/download/ms08-067_check.py
# There are two problems with this method:
# 1. It can sometimes lead to a crash of svchost.exe due to a race condition
# 2. The Python script may be based on a Nessus plugin, which violates the Tenable license
#
def check
print_status("Connecting to the target...")