22811257db
This patch fixes #4711. The problem here is that the browser sometimes will shutdown some of our exploit's connections (in my testing, all Java), and that will cause Ruby to call a rb_sys_fail with "getpeername(2)". The error goes all the way to Rex::IO::StreamServer's monitor_listener method, which triggers a "break" to quit monitoring. And then this causes another chain of reactions that eventually forces BrowserAutoPwn to quit completely (while the JavaScript on the browser is still running) |
||
---|---|---|
.. | ||
comm | ||
comm.rb | ||
ip.rb | ||
parameters.rb | ||
range_walker.rb | ||
ssl_tcp.rb | ||
ssl_tcp_server.rb | ||
subnet_walker.rb | ||
switch_board.rb | ||
tcp.rb | ||
tcp_server.rb | ||
udp.rb |