From 6f3bd81b64ff401ee7710f6f4dce257935540876 Mon Sep 17 00:00:00 2001 From: HD Moore Date: Sun, 11 Oct 2015 12:52:46 -0500 Subject: [PATCH] Enable 64-bit payloads for MSSQL modules --- modules/exploits/windows/mssql/mssql_linkcrawler.rb | 1 + modules/exploits/windows/mssql/mssql_payload.rb | 1 + modules/exploits/windows/mssql/mssql_payload_sqli.rb | 1 + 3 files changed, 3 insertions(+) diff --git a/modules/exploits/windows/mssql/mssql_linkcrawler.rb b/modules/exploits/windows/mssql/mssql_linkcrawler.rb index e03b2907be..e9bc7580e0 100644 --- a/modules/exploits/windows/mssql/mssql_linkcrawler.rb +++ b/modules/exploits/windows/mssql/mssql_linkcrawler.rb @@ -42,6 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Scott Sutherland "nullbind" ' ], 'Platform' => [ 'win' ], + 'Arch' => [ ARCH_X86, ARCH_X86_64 ], 'License' => MSF_LICENSE, 'References' => [ diff --git a/modules/exploits/windows/mssql/mssql_payload.rb b/modules/exploits/windows/mssql/mssql_payload.rb index 063dcf9ece..d5ebe45d04 100644 --- a/modules/exploits/windows/mssql/mssql_payload.rb +++ b/modules/exploits/windows/mssql/mssql_payload.rb @@ -54,6 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'BID', '4797' ] ], 'Platform' => 'win', + 'Arch' => [ ARCH_X86, ARCH_X86_64 ], 'Targets' => [ [ 'Automatic', { } ], diff --git a/modules/exploits/windows/mssql/mssql_payload_sqli.rb b/modules/exploits/windows/mssql/mssql_payload_sqli.rb index 963631e449..4ab1c8beb6 100644 --- a/modules/exploits/windows/mssql/mssql_payload_sqli.rb +++ b/modules/exploits/windows/mssql/mssql_payload_sqli.rb @@ -75,6 +75,7 @@ class Metasploit3 < Msf::Exploit::Remote ], 'Platform' => 'win', + 'Arch' => [ ARCH_X86, ARCH_X86_64 ], 'Payload' => { 'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c&=+?:;-,/#.\\\$\%",