See #782. Updating rogue_send form capture_sendto
git-svn-id: file:///home/svn/framework3/trunk@8264 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
4374b8ccc4
commit
71c44dadd8
|
@ -47,23 +47,13 @@ class Metasploit3 < Msf::Auxiliary
|
|||
end
|
||||
|
||||
def run_host(ip)
|
||||
pcap = open_pcap
|
||||
open_pcap
|
||||
|
||||
dst_mac,src_mac = lookup_eth(ip)
|
||||
if dst_mac == "ff:ff:ff:ff:ff:ff"
|
||||
print_error("#{ip}: Not reponding to ARP.")
|
||||
return
|
||||
end
|
||||
pcap = self.capture
|
||||
|
||||
inject_eth(:payload => build_tcp_syn(ip),
|
||||
:eth_daddr => dst_mac,
|
||||
:eth_saddr => src_mac
|
||||
)
|
||||
capture_sendto(build_tcp_syn(ip), ip)
|
||||
|
||||
inject_eth(:payload => build_icmp(ip),
|
||||
:eth_daddr => dst_mac,
|
||||
:eth_saddr => src_mac
|
||||
)
|
||||
capture_sendto(build_icmp(ip), ip)
|
||||
|
||||
close_pcap
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue