Mostly cosmetic changes from local tree

git-svn-id: file:///home/svn/framework3/trunk@7970 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2009-12-26 03:31:20 +00:00
parent 2b6a1993aa
commit d0969746a4
5 changed files with 16 additions and 9 deletions

View File

@ -60,8 +60,10 @@ def xmit( name, dump_ruby=True ):
data = f.read()
print "# Name: %s\n# Length: %d bytes" % ( name, len( data ) )
xmit_offset( data, "Port", pack( ">H", 4444 ) ) # 4444
xmit_offset( data, "LEPort", pack( "<H", 4444 ) ) # 4444
xmit_offset( data, "Host", pack( ">L", 0x7F000001 ) ) # 127.0.0.1
xmit_offset( data, "CodeLen", pack( "<L", 0x12345678 ) ) # Filler
xmit_offset( data, "Hostname", "https" )
xmit_offset( data, "ExitFunk", pack( "<L", 0x0A2A1DE0 ) ) # kernel32.dll!ExitThread
xmit_offset( data, "ExitFunk", pack( "<L", 0x56A2B5F0 ) ) # kernel32.dll!ExitProcess
xmit_offset( data, "ExitFunk", pack( "<L", 0xEA320EFE ) ) # kernel32.dll!SetUnhandledExceptionFilter
@ -97,3 +99,4 @@ def main( argv=None ):
if __name__ == "__main__":
main()
#=============================================================================#

View File

@ -9,6 +9,9 @@
[BITS 32]
[ORG 0]
; Disabled until this is better tested
; %include "./src/block/block_antidebug.asm"
cld ; Clear the direction flag.
call start ; Call start, this pushes the address of 'api_call' onto the stack.
delta: ;

View File

@ -68,3 +68,4 @@ class Metasploit3 < Msf::Auxiliary
end
end
end

View File

@ -106,3 +106,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end

View File

@ -101,7 +101,7 @@ class Metasploit3 < Msf::Exploit::Remote
targ = target
if (target['auto'])
print_status("Detecting the remote version...")
resp = send_request_raw({'uri' => '/topology/home'}, 5)
if resp.nil?
print_status("No response to request")
@ -167,7 +167,6 @@ class Metasploit3 < Msf::Exploit::Remote
},
'data' => payload_buf
})
rescue ::Rex::ConnectionError, ::Errno::ECONNRESET, ::Errno::EINTR
# do nothing let the exploit live this catches the
# connection reset by peer error which is expected