From 7bab8252243cb3ef97c494578d7d42c747d6051d Mon Sep 17 00:00:00 2001 From: sinn3r Date: Sat, 20 Sep 2014 18:39:09 -0500 Subject: [PATCH] Last changes --- lib/msf/core/exploit/remote/browser_exploit_server.rb | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/lib/msf/core/exploit/remote/browser_exploit_server.rb b/lib/msf/core/exploit/remote/browser_exploit_server.rb index 251d16f5a1..5442336567 100644 --- a/lib/msf/core/exploit/remote/browser_exploit_server.rb +++ b/lib/msf/core/exploit/remote/browser_exploit_server.rb @@ -83,7 +83,7 @@ module Msf register_advanced_options([ OptString.new('CookieName', [false, "The name of the tracking cookie", DEFAULT_COOKIE_NAME]), OptString.new('CookieExpiration', [false, "Cookie expiration in years (blank=expire on exit)"]), - OptInt.new('Obfuscation', [false, "JavaScript obfuscation"]) + OptInt.new('JsObfuscate', [false, "JavaScript obfuscation"]) ], Exploit::Remote::BrowserExploitServer) end @@ -454,7 +454,8 @@ module Msf ua = request.headers['User-Agent'] || '' init_profile(tag) print_status("Sending response HTML.") - send_response(cli, get_detection_html(ua), {'Set-Cookie' => cookie_header(tag)}) + html = get_detection_html(ua) + send_response(cli, html, {'Set-Cookie' => cookie_header(tag)}) when /#{@info_receiver_page}/ #