diff --git a/modules/exploits/linux/http/dreambox_openpli_shell.rb b/modules/exploits/linux/http/dreambox_openpli_shell.rb index f75fa306cc..b9175e4cdb 100644 --- a/modules/exploits/linux/http/dreambox_openpli_shell.rb +++ b/modules/exploits/linux/http/dreambox_openpli_shell.rb @@ -45,12 +45,6 @@ class Metasploit3 < Msf::Exploit::Remote 'RequiredCmd' => 'netcat generic' } }, - 'Compat' => - { - 'Encoder' => { - 'RequiredCmd' => 'generic' - } - }, 'Targets' => [ [ 'Automatic Target', { }] diff --git a/modules/exploits/linux/http/lifesize_uvc_ping_rce.rb b/modules/exploits/linux/http/lifesize_uvc_ping_rce.rb index 9646238852..8e905fca09 100644 --- a/modules/exploits/linux/http/lifesize_uvc_ping_rce.rb +++ b/modules/exploits/linux/http/lifesize_uvc_ping_rce.rb @@ -43,12 +43,6 @@ class Metasploit3 < Msf::Exploit::Remote 'RequiredCmd' => 'python' } }, - 'Compat' => - { - 'Encoder' => { - 'RequiredCmd' => 'generic' - } - }, 'DisclosureDate' => "Mar 21 2014", 'DefaultTarget' => 0)) @@ -63,6 +57,7 @@ class Metasploit3 < Msf::Exploit::Remote end def exploit + print_status("#{payload.encoded}") res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'accounts', 'login/') }) diff --git a/modules/exploits/linux/http/sophos_wpa_iface_exec.rb b/modules/exploits/linux/http/sophos_wpa_iface_exec.rb index aa0cd93719..8daa0f6905 100644 --- a/modules/exploits/linux/http/sophos_wpa_iface_exec.rb +++ b/modules/exploits/linux/http/sophos_wpa_iface_exec.rb @@ -34,12 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote ], 'Platform' => ['unix'], 'Arch' => ARCH_CMD, - 'Compat' => - { - 'Encoder' => { - 'RequiredCmd' => 'generic' - } - }, 'Privileged' => true, 'Payload' => { diff --git a/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb b/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb index a803fb82fa..63b7031cbc 100644 --- a/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb +++ b/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb @@ -47,12 +47,6 @@ class Metasploit3 < Msf::Exploit::Remote 'RequiredCmd' => 'generic netcat-e' # Because quotes and double-quotes aren't valid } }, - 'Compat' => - { - 'Encoder' => { - 'RequiredCmd' => 'generic' - } - }, 'Targets' => [ [ 'Sophos Web Protection Appliance 3.7.0', { }] diff --git a/modules/exploits/linux/http/wanem_exec.rb b/modules/exploits/linux/http/wanem_exec.rb index cce7c80e95..e50c966fed 100644 --- a/modules/exploits/linux/http/wanem_exec.rb +++ b/modules/exploits/linux/http/wanem_exec.rb @@ -47,12 +47,6 @@ class Metasploit3 < Msf::Exploit::Remote 'RequiredCmd' => 'generic netcat netcat-e', } }, - 'Compat' => - { - 'Encoder' => { - 'RequiredCmd' => 'generic' - } - }, 'DefaultOptions' => { 'ExitFunction' => 'none'