move exploit specific stuff back to exploit method
git-svn-id: file:///home/svn/framework3/trunk@9094 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
74a344ce7a
commit
d03eacc386
|
@ -163,12 +163,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
else
|
||||
raise e
|
||||
end
|
||||
else
|
||||
print_status('The server should have executed our payload')
|
||||
end
|
||||
|
||||
# Cleanup
|
||||
handler
|
||||
disconnect
|
||||
|
||||
if (dcerpc.last_response != nil and dcerpc.last_response.stub_data != nil and
|
||||
|
@ -210,6 +207,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
pipe = target['Pipe'] ? target['Pipe'] : datastore['SMBPIPE']
|
||||
|
||||
pnp_probe(buf, pipe)
|
||||
|
||||
print_status('The server should have executed our payload')
|
||||
|
||||
handler
|
||||
end
|
||||
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue