From 9ade107325af97015fac231c9939118bb51aeba4 Mon Sep 17 00:00:00 2001 From: Brent Cook Date: Tue, 10 Mar 2015 16:54:56 -0500 Subject: [PATCH] disable reverse_http methods from upexec and shell payloads These don't work over http and don't appear to have ever, as far back as I could test. They appear to be an accident perhaps. --- modules/payloads/stages/windows/shell.rb | 2 +- modules/payloads/stages/windows/upexec.rb | 2 +- modules/payloads/stages/windows/x64/shell.rb | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/modules/payloads/stages/windows/shell.rb b/modules/payloads/stages/windows/shell.rb index 70411fa234..80f95c50f6 100644 --- a/modules/payloads/stages/windows/shell.rb +++ b/modules/payloads/stages/windows/shell.rb @@ -23,7 +23,7 @@ module Metasploit3 'Session' => Msf::Sessions::CommandShellWindows, 'PayloadCompat' => { - 'Convention' => 'sockedi -https' + 'Convention' => 'sockedi -http -https' }, 'Stage' => { diff --git a/modules/payloads/stages/windows/upexec.rb b/modules/payloads/stages/windows/upexec.rb index eae0067d3a..1d833ed93a 100644 --- a/modules/payloads/stages/windows/upexec.rb +++ b/modules/payloads/stages/windows/upexec.rb @@ -23,7 +23,7 @@ module Metasploit3 'Session' => Msf::Sessions::CommandShellWindows, 'PayloadCompat' => { - 'Convention' => 'sockedi -https' + 'Convention' => 'sockedi -http -https' }, 'Stage' => { diff --git a/modules/payloads/stages/windows/x64/shell.rb b/modules/payloads/stages/windows/x64/shell.rb index 7e325830ae..4e511bd5ff 100644 --- a/modules/payloads/stages/windows/x64/shell.rb +++ b/modules/payloads/stages/windows/x64/shell.rb @@ -23,7 +23,7 @@ module Metasploit3 'Session' => Msf::Sessions::CommandShellWindows, 'PayloadCompat' => { - 'Convention' => 'sockrdi' + 'Convention' => 'sockrdi -http -https' }, 'Stage' => {