Autofilter based on existence of the softcart cgi
git-svn-id: file:///home/svn/framework3/trunk@7297 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
aa09862813
commit
a41b1db7de
|
@ -70,6 +70,14 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
], self.class)
|
], self.class)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
# Make sure the CGI exists before trying to exploit it
|
||||||
|
def autofilter
|
||||||
|
res = send_request_raw({
|
||||||
|
'uri' => datastore['URI']
|
||||||
|
}, 5)
|
||||||
|
(res and res.body and res.body =~ /Copyright.*Mercantec/)
|
||||||
|
end
|
||||||
|
|
||||||
def brute_exploit(address)
|
def brute_exploit(address)
|
||||||
|
|
||||||
buffer =
|
buffer =
|
||||||
|
|
Loading…
Reference in New Issue