Add documentatio to the mixin

bug/bundler_fix
jvazquez-r7 2013-09-16 11:55:30 -05:00
parent a5049df320
commit a8198bc948
1 changed files with 12 additions and 4 deletions

View File

@ -4,15 +4,23 @@ require 'msf/core/exploit/cmdstager'
module Msf
###
####
# Allows for staging cmd to arbitrary payloads through the CmdStagerEcho.
#
# This mixin provides an interface for staging cmd to arbitrary payloads
#
###
# This stager uses the echo's "-e" flag, that enable interpretation of
# backslash escapes, to drop an ELF with the payload embedded to disk.
# The "-e" flag is usually available on linux environments. This stager
# has been found useful on restricted linux based embedded devices.
####
module Exploit::CmdStagerEcho
include Msf::Exploit::CmdStager
# Initializes a CmdStagerEcho instance for the supplied payload
#
# @param exe [String] The payload embedded into an ELF
# @return [Rex::Exploitation::CmdStagerEcho] Stager instance
def create_stager(exe)
Rex::Exploitation::CmdStagerEcho.new(exe)
end