Enable 64-bit payloads for MSSQL modules

This commit is contained in:
HD Moore 2015-10-11 12:52:46 -05:00
parent ed0b9b0721
commit 6f3bd81b64
3 changed files with 3 additions and 0 deletions

View File

@ -42,6 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Scott Sutherland "nullbind" <scott.sutherland[at]netspi.com>'
],
'Platform' => [ 'win' ],
'Arch' => [ ARCH_X86, ARCH_X86_64 ],
'License' => MSF_LICENSE,
'References' =>
[

View File

@ -54,6 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'BID', '4797' ]
],
'Platform' => 'win',
'Arch' => [ ARCH_X86, ARCH_X86_64 ],
'Targets' =>
[
[ 'Automatic', { } ],

View File

@ -75,6 +75,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'Platform' => 'win',
'Arch' => [ ARCH_X86, ARCH_X86_64 ],
'Payload' =>
{
'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c&=+?:;-,/#.\\\$\%",