use base_dir

GSoC/Meterpreter_Web_Console
Tim W 2018-06-08 14:53:21 +08:00
parent 9c14bddd93
commit 641ffca98c
2 changed files with 3 additions and 6 deletions

View File

@ -117,12 +117,10 @@ class MetasploitModule < Msf::Exploit::Local
end
def exploit_file
@exploit_file ||=
"#{datastore['WritableDir']}/#{Rex::Text.rand_text_alpha(8)}"
@exploit_file ||= "#{base_dir}/#{Rex::Text.rand_text_alpha(8)}"
end
def payload_file
@payload_file ||=
"#{datastore['WritableDir']}/#{Rex::Text.rand_text_alpha(8)}"
@payload_file ||= "#{base_dir}/#{Rex::Text.rand_text_alpha(8)}"
end
end

View File

@ -188,8 +188,7 @@ class MetasploitModule < Msf::Exploit::Local
end
def payload_file
@payload_file ||=
"#{datastore['WritableDir']}/#{Rex::Text.rand_text_alpha(8)}"
@payload_file ||= "#{base_dir}/#{Rex::Text.rand_text_alpha(8)}"
end
def cleanup