actually use Msf::Exploit::EXE
git-svn-id: file:///home/svn/framework3/trunk@9896 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
276a83d7b4
commit
dd7a8178d7
|
@ -117,8 +117,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
if (Regexp.new(Regexp.escape(@payload)+'$', true).match(request.uri))
|
||||
print_status "Sending payload executable to target ..."
|
||||
return if ((p = regenerate_payload(cli)) == nil)
|
||||
|
||||
data = Msf::Util::EXE.to_win32pe(framework, p.encoded)
|
||||
data = generate_exe({ :code => p.encoded })
|
||||
|
||||
send_response(cli, data, { 'Content-Type' => 'application/octet-stream' })
|
||||
return
|
||||
|
|
Loading…
Reference in New Issue