From d03eacc3867935fe77c5e560a970388249b1d56b Mon Sep 17 00:00:00 2001 From: Joshua Drake Date: Fri, 16 Apr 2010 05:30:27 +0000 Subject: [PATCH] move exploit specific stuff back to exploit method git-svn-id: file:///home/svn/framework3/trunk@9094 4d416f70-5f16-0410-b530-b9f4589650da --- modules/exploits/windows/smb/ms05_039_pnp.rb | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/modules/exploits/windows/smb/ms05_039_pnp.rb b/modules/exploits/windows/smb/ms05_039_pnp.rb index 9e5e53f223..e373bdd5d4 100644 --- a/modules/exploits/windows/smb/ms05_039_pnp.rb +++ b/modules/exploits/windows/smb/ms05_039_pnp.rb @@ -163,12 +163,9 @@ class Metasploit3 < Msf::Exploit::Remote else raise e end - else - print_status('The server should have executed our payload') end # Cleanup - handler disconnect if (dcerpc.last_response != nil and dcerpc.last_response.stub_data != nil and @@ -210,6 +207,10 @@ class Metasploit3 < Msf::Exploit::Remote pipe = target['Pipe'] ? target['Pipe'] : datastore['SMBPIPE'] pnp_probe(buf, pipe) + + print_status('The server should have executed our payload') + + handler end end