Renaming sendto to capture_sendto to give the user a hint as to where it came from.
git-svn-id: file:///home/svn/framework3/trunk@8260 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
3053bd702a
commit
709c634bfa
|
@ -186,11 +186,11 @@ module Exploit::Capture
|
|||
inject pkt,pcap
|
||||
end
|
||||
|
||||
# Sendto is intended to replace the old Rex::Socket::Ip.sendto method. It requires
|
||||
# Capture_sendto is intended to replace the old Rex::Socket::Ip.sendto method. It requires
|
||||
# a payload and a destination address. To send to the broadcast address, set bcast
|
||||
# to true (this will guarantee that packets will be sent even if ARP doesn't work
|
||||
# out).
|
||||
def sendto(payload="", dhost=nil, bcast=false)
|
||||
def capture_sendto(payload="", dhost=nil, bcast=false)
|
||||
raise RuntimeError, "Could not access the capture process (remember to open_pcap first!)" unless self.capture
|
||||
raise RuntimeError, "Must specify a host to sendto" unless dhost
|
||||
dst_mac,src_mac = lookup_eth(dhost)
|
||||
|
|
|
@ -77,7 +77,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
begin
|
||||
probe = buildprobe(shost, sport, dhost, dport)
|
||||
|
||||
sendto(probe, dhost)
|
||||
capture_sendto(probe, dhost)
|
||||
|
||||
reply = readreply(pcap, to)
|
||||
|
||||
|
|
Loading…
Reference in New Issue