Module cleanups
git-svn-id: file:///home/svn/framework3/trunk@4178 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
d20e4bac39
commit
6298019847
|
@ -75,7 +75,9 @@ class Auxiliary::Scanner::Discovery::SweepUDP < Msf::Auxiliary
|
|||
parse_reply(r)
|
||||
end
|
||||
|
||||
rescue => e
|
||||
rescue ::Interrupt
|
||||
raise $!
|
||||
rescue ::Exception => e
|
||||
print_status("Unknown error: #{e.to_s}")
|
||||
print_status(e.backtrace.join("\n"))
|
||||
end
|
||||
|
@ -114,10 +116,10 @@ class Auxiliary::Scanner::Discovery::SweepUDP < Msf::Auxiliary
|
|||
inf = ver if ver
|
||||
when 137
|
||||
app = 'NetBIOS'
|
||||
# inf = pkt[0].unpack('H*')[0]
|
||||
inf = pkt[0].unpack('H*')[0]
|
||||
when 111
|
||||
app = 'Portmap'
|
||||
# inf = pkt[0].unpack('H*')[0]
|
||||
inf = pkt[0].unpack('H*')[0]
|
||||
when 1434
|
||||
app = 'SQL Server'
|
||||
mssql_ping_parse(pkt[0]).each_pair { |k,v|
|
||||
|
|
|
@ -80,7 +80,6 @@ class Exploits::Hpux::Lpd::CleanupExec < Msf::Exploit::Remote
|
|||
return
|
||||
end
|
||||
|
||||
|
||||
print_status("Forcing an error and hijacking the cleanup routine...")
|
||||
|
||||
begin
|
||||
|
|
|
@ -24,8 +24,8 @@ class Exploits::Osx::Afp::AFPLoginExt < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'BID', '10271'],
|
||||
[ 'CVE', '2004-0430'],
|
||||
[ 'OSVDB', '5762' ],
|
||||
[ 'MIL', '2' ],
|
||||
[ 'OSVDB', '5762'],
|
||||
[ 'MIL', '2'],
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
Loading…
Reference in New Issue