diff --git a/modules/exploits/apple_ios/ssh/cydia_default_ssh.rb b/modules/exploits/apple_ios/ssh/cydia_default_ssh.rb index 1233a718b8..fad9cdcc8d 100644 --- a/modules/exploits/apple_ios/ssh/cydia_default_ssh.rb +++ b/modules/exploits/apple_ios/ssh/cydia_default_ssh.rb @@ -39,6 +39,12 @@ class Metasploit3 < Msf::Exploit::Remote 'ConnectionType' => 'find' } }, + 'Compat' => + { + 'Encoder' => { + 'RequiredCmd' => 'generic' + } + }, 'Platform' => 'unix', 'Arch' => ARCH_CMD, 'Targets' => diff --git a/modules/exploits/irix/lpd/tagprinter_exec.rb b/modules/exploits/irix/lpd/tagprinter_exec.rb index b7f26527e2..d4d378f339 100644 --- a/modules/exploits/irix/lpd/tagprinter_exec.rb +++ b/modules/exploits/irix/lpd/tagprinter_exec.rb @@ -38,6 +38,12 @@ class Metasploit3 < Msf::Exploit::Remote 'RequiredCmd' => 'generic telnet', } }, + 'Compat' => + { + 'Encoder' => { + 'RequiredCmd' => 'generic' + } + }, 'Targets' => [ [ 'Automatic Target', { }] diff --git a/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb b/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb index 83c739cf54..95e6d897c9 100644 --- a/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb +++ b/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb @@ -45,6 +45,12 @@ class Metasploit3 < Msf::Exploit::Remote 'RequiredCmd' => 'generic' } }, + 'Compat' => + { + 'Encoder' => { + 'RequiredCmd' => 'generic' + } + }, 'Targets' => [ [ 'Automatic Target', { }] diff --git a/modules/exploits/linux/http/ddwrt_cgibin_exec.rb b/modules/exploits/linux/http/ddwrt_cgibin_exec.rb index bfbb0ab651..7cc7acddfc 100644 --- a/modules/exploits/linux/http/ddwrt_cgibin_exec.rb +++ b/modules/exploits/linux/http/ddwrt_cgibin_exec.rb @@ -42,6 +42,12 @@ class Metasploit3 < Msf::Exploit::Remote 'RequiredCmd' => 'generic netcat netcat-e' } }, + 'Compat' => + { + 'Encoder' => { + 'RequiredCmd' => 'generic' + } + }, 'Targets' => [ [ 'Automatic Target', { }] diff --git a/modules/exploits/linux/http/dreambox_openpli_shell.rb b/modules/exploits/linux/http/dreambox_openpli_shell.rb index b9175e4cdb..f75fa306cc 100644 --- a/modules/exploits/linux/http/dreambox_openpli_shell.rb +++ b/modules/exploits/linux/http/dreambox_openpli_shell.rb @@ -45,6 +45,12 @@ class Metasploit3 < Msf::Exploit::Remote 'RequiredCmd' => 'netcat generic' } }, + 'Compat' => + { + 'Encoder' => { + 'RequiredCmd' => 'generic' + } + }, 'Targets' => [ [ 'Automatic Target', { }] diff --git a/modules/exploits/linux/http/lifesize_uvc_ping_rce.rb b/modules/exploits/linux/http/lifesize_uvc_ping_rce.rb index c97e1db578..9646238852 100644 --- a/modules/exploits/linux/http/lifesize_uvc_ping_rce.rb +++ b/modules/exploits/linux/http/lifesize_uvc_ping_rce.rb @@ -43,6 +43,12 @@ class Metasploit3 < Msf::Exploit::Remote 'RequiredCmd' => 'python' } }, + 'Compat' => + { + 'Encoder' => { + 'RequiredCmd' => 'generic' + } + }, 'DisclosureDate' => "Mar 21 2014", 'DefaultTarget' => 0)) diff --git a/modules/exploits/linux/http/nginx_chunked_size.rb b/modules/exploits/linux/http/nginx_chunked_size.rb index 8ca4131d31..d7b8f1d821 100644 --- a/modules/exploits/linux/http/nginx_chunked_size.rb +++ b/modules/exploits/linux/http/nginx_chunked_size.rb @@ -42,6 +42,12 @@ class Metasploit4 < Msf::Exploit::Remote }, 'Arch' => ARCH_CMD, 'Platform' => 'unix', + 'Compat' => + { + 'Encoder' => { + 'RequiredCmd' => 'generic' + } + }, 'Targets' => [ [ 'Ubuntu 13.04 32bit - nginx 1.4.0', { diff --git a/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb b/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb index 693c4f991f..95672710da 100644 --- a/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb +++ b/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb @@ -38,6 +38,12 @@ class Metasploit3 < Msf::Exploit::Remote 'RequiredCmd' => 'generic openssl' } }, + 'Compat' => + { + 'Encoder' => { + 'RequiredCmd' => 'generic' + } + }, 'Platform' => ['unix'], 'Arch' => ARCH_CMD, 'References' => diff --git a/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb b/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb index 63b7031cbc..a803fb82fa 100644 --- a/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb +++ b/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb @@ -47,6 +47,12 @@ class Metasploit3 < Msf::Exploit::Remote 'RequiredCmd' => 'generic netcat-e' # Because quotes and double-quotes aren't valid } }, + 'Compat' => + { + 'Encoder' => { + 'RequiredCmd' => 'generic' + } + }, 'Targets' => [ [ 'Sophos Web Protection Appliance 3.7.0', { }] diff --git a/modules/exploits/linux/http/wanem_exec.rb b/modules/exploits/linux/http/wanem_exec.rb index e50c966fed..cce7c80e95 100644 --- a/modules/exploits/linux/http/wanem_exec.rb +++ b/modules/exploits/linux/http/wanem_exec.rb @@ -47,6 +47,12 @@ class Metasploit3 < Msf::Exploit::Remote 'RequiredCmd' => 'generic netcat netcat-e', } }, + 'Compat' => + { + 'Encoder' => { + 'RequiredCmd' => 'generic' + } + }, 'DefaultOptions' => { 'ExitFunction' => 'none'