1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Consistent use of handler(cli) after the payload is sent to the user

git-svn-id: file:///home/svn/framework3/trunk@4645 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
HD Moore 2007-04-04 04:34:17 +00:00
parent 71a7355e20
commit 0c8f9e96b5
17 changed files with 43 additions and 0 deletions

View File

@ -89,6 +89,9 @@ class Exploits::Windows::Browser::AimGoaway < Msf::Exploit::Remote
# Transmit the response to the client
send_response_html(cli, content)
# Handle the payload
handler(cli)
end
end

View File

@ -182,6 +182,7 @@ class Exploits::Windows::Browser::IE_ANI_CVE_2007_0038 < Msf::Exploit::Remote
# Transmit the compressed response to the client
send_response(cli, generate_ani(p, mytarget), { 'Content-Type' => 'application/octet-stream' })
# Handle the payload
handler(cli)
end

View File

@ -75,6 +75,9 @@ class Exploits::Windows::Browser::Apple_Itunes_Playlist < Msf::Exploit::Remote
# Transmit the response to the client
send_response_html(cli, content, { 'Content-Type' => 'text/html' })
# Handle the payload
handler(cli)
end
end

View File

@ -69,6 +69,9 @@ class Exploits::Windows::Browser::Apple_Quicktime_RTSP < Msf::Exploit::Remote
print_status("Sending exploit to #{client.peerhost}:#{client.peerport}...")
send_response(client, content, { 'Content-Type' => 'text/html' })
# Handle the payload
handler(cli)
end
end

View File

@ -236,6 +236,9 @@ function #{var_func_exploit}( ) {
# Transmit the response to the client
send_response_html(cli, content)
# Handle the payload
handler(cli)
end
end

View File

@ -106,6 +106,9 @@ class Exploits::Windows::Browser::IE_IsComponentInstalled < Msf::Exploit::Remote
# Transmit the response to the client
send_response_html(cli, content)
# Handle the payload
handler(cli)
end
end

View File

@ -113,6 +113,9 @@ class Exploits::Windows::Browser::McAfeeMcSubMgrVsprintf < Msf::Exploit::Remote
# Transmit the response to the client
send_response_html(cli, content)
# Handle the payload
handler(cli)
end
end

View File

@ -73,6 +73,9 @@ class Exploits::Windows::Browser::Mirc_Irc_Url < Msf::Exploit::Remote
# Transmit the response to the client
send_response_html(cli, content)
# Handle the payload
handler(cli)
end
end

View File

@ -103,6 +103,9 @@ class Exploits::Windows::Browser::MS03_020_Ie_ObjectType < Msf::Exploit::Remote
# Transmit the response to the client
send_response_html(cli, content)
# Handle the payload
handler(cli)
end
end

View File

@ -95,6 +95,7 @@ class Exploits::Windows::Browser::MS06_001_WMF_SETABORTPROC < Msf::Exploit::Remo
# Transmit the compressed response to the client
send_response(cli, generate_metafile(p), { 'Content-Type' => 'text/plain' })
# Handle the payload
handler(cli)
end

View File

@ -171,6 +171,9 @@ class Exploits::Windows::Browser::MS06_013_CreateTextRange < Msf::Exploit::Remot
# Transmit the response to the client
send_response_html(cli, content)
# Handle the payload
handler(cli)
end
end

View File

@ -140,6 +140,9 @@ class Exploits::Windows::Browser::MS06_055_VML_Overflow < Msf::Exploit::Remote
# Transmit the response to the client
send_response_html(cli, content)
# Handle the payload
handler(cli)
end
end

View File

@ -130,6 +130,9 @@ class Exploits::Windows::Browser::MS06_057_WebView_SetSlice < Msf::Exploit::Remo
# Transmit the response to the client
send_response_html(cli, content)
# Handle the payload
handler(cli)
end
end

View File

@ -104,6 +104,7 @@ class Exploits::Windows::Browser::MS06_067_KEYFRAME < Msf::Exploit::Remote
send_response(cli,
"<html><script language='javascript'>#{trigger_js}</script></html>")
# Handle the payload
handler(cli)
end

View File

@ -79,6 +79,9 @@ class Exploits::Windows::Browser::Realplayer_Smil < Msf::Exploit::Remote
# Transmit the response to the client
send_response_html(cli, content, { 'Content-Type' => 'text/html' })
# Handle the payload
handler(cli)
end
end

View File

@ -100,6 +100,7 @@ class Exploits::Windows::Browser::WinAmp_Playlist_UNC < Msf::Exploit::Remote
# Transmit the compressed response to the client
send_response(cli, generate_playlist(p), { 'Content-Type' => 'text/plain' })
# Handle the payload
handler(cli)
end

View File

@ -77,6 +77,9 @@ class Exploits::Windows::Browser::Xmplay_Asx < Msf::Exploit::Remote
# Transmit the response to the client
send_response_html(cli, content)
# Handle the payload
handler(cli)
end
end