From d567737657431963e7c526b135729d55dbb61e49 Mon Sep 17 00:00:00 2001 From: Niel Nielsen Date: Tue, 7 Jan 2014 22:12:38 +0100 Subject: [PATCH] Update reverse_tcp_rc4_dns.rb Change to OpenSSL::Digest from deprecated OpenSSL::Digest::Digest --- modules/payloads/stagers/windows/reverse_tcp_rc4_dns.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/payloads/stagers/windows/reverse_tcp_rc4_dns.rb b/modules/payloads/stagers/windows/reverse_tcp_rc4_dns.rb index 5ce5f408c7..45f86306b2 100644 --- a/modules/payloads/stagers/windows/reverse_tcp_rc4_dns.rb +++ b/modules/payloads/stagers/windows/reverse_tcp_rc4_dns.rb @@ -89,7 +89,7 @@ module Metasploit3 end def generate_stage - m = OpenSSL::Digest::Digest.new('sha1') + m = OpenSSL::Digest.new('sha1') m.reset key = m.digest(datastore["RC4PASSWORD"] || "") c1 = OpenSSL::Cipher::Cipher.new('RC4') @@ -102,7 +102,7 @@ module Metasploit3 def internal_generate p = super # Write keys into stage - m = OpenSSL::Digest::Digest.new('sha1') + m = OpenSSL::Digest.new('sha1') m.reset key = m.digest(datastore["RC4PASSWORD"] || "") p[offsets['XORKey'][0], 4] = key[0,4]