Use PAYLOAD instead of CMD

This commit is contained in:
jvazquez-r7 2015-01-21 20:49:05 -06:00
parent f37ac39b4c
commit 500d7159f1
1 changed files with 1 additions and 1 deletions

View File

@ -79,7 +79,7 @@ class Metasploit3 < Msf::Exploit::Remote
print_status("#{peer} - Exploiting...")
if datastore['CMD']
if datastore['PAYLOAD'] == 'cmd/unix/generic'
exploit_cmd
else
exploit_session