Select comm in ReverseTcpDoubleSsl as well

And don't extend the comm object, that gets handled by the Rex::Socket
system if it's necessary.
bug/bundler_fix
James Lee 2015-10-06 14:33:22 -05:00
parent 6b558010f0
commit 645a59349a
No known key found for this signature in database
GPG Key ID: 2D6094C7CEA0A321
2 changed files with 4 additions and 10 deletions

View File

@ -33,7 +33,7 @@ module ReverseTcpDoubleSSL
end
#
# Initializes the reverse TCP handler and ads the options that are required
# Initializes the reverse TCP handler and adds the options that are required
# for all reverse TCP payloads, like local host and local port.
#
def initialize(info = {})
@ -68,20 +68,15 @@ module ReverseTcpDoubleSSL
ex = false
comm = datastore['ReverseListenerComm']
if comm.to_s == "local"
comm = ::Rex::Socket::Comm::Local
else
comm = nil
end
# Identify the comm to use from
# Msf::Handler::ReverseTcpComm.select_comm
comm = select_comm
local_port = bind_port
addrs = bind_address
addrs.each { |ip|
begin
comm.extend(Rex::Socket::SslTcp)
self.listener_sock = Rex::Socket::SslTcpServer.create(
'LocalHost' => ip,
'LocalPort' => local_port,

View File

@ -71,7 +71,6 @@ module ReverseTcpSsl
addrs.each { |ip|
begin
comm.extend(Rex::Socket::SslTcp)
self.listener_sock = Rex::Socket::SslTcpServer.create(
'LocalHost' => ip,
'LocalPort' => local_port,