Instead of raising, offer advice on BPF filtering
Many people don't know how to disable ICMP echo responses off the top of their head. However, the problem is solvable with a decent BPF filter.bug/bundler_fix
parent
c6533621a0
commit
c2586d0907
|
@ -127,7 +127,10 @@ class Metasploit3 < Msf::Auxiliary
|
|||
# -(Windows) netsh firewall set opmode mode = ENABLE
|
||||
|
||||
if packet.icmp_type == 0 and packet.icmp_code == 0 and packet.ip_saddr == @iface_ip
|
||||
raise RuntimeError , "Dectected ICMP echo response. Disable OS ICMP handling!"
|
||||
print_error "Dectected ICMP echo response. You must either disable ICMP handling"
|
||||
print_error "or try a more restrictive BPF filter. You might try:"
|
||||
print_error " set BPF_FILTER icmp and not src #{datastore['LOCALIP']}"
|
||||
return
|
||||
end
|
||||
|
||||
if @record
|
||||
|
|
Loading…
Reference in New Issue