mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
smaller
git-svn-id: file:///home/svn/incoming/trunk@2898 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
b49241c90a
commit
109aa7f63b
@ -210,6 +210,17 @@ protected
|
|||||||
return Rex::Proto::Http::Response.new(code, message, proto);
|
return Rex::Proto::Http::Response.new(code, message, proto);
|
||||||
end
|
end
|
||||||
|
|
||||||
|
#
|
||||||
|
# Transmits an HTML response to the supplied client.
|
||||||
|
#
|
||||||
|
def send_html_response(cli, body, headers = nil)
|
||||||
|
response = create_response
|
||||||
|
response['Content-Type'] = 'text/html'
|
||||||
|
response.body = body
|
||||||
|
|
||||||
|
cli.send_response(response)
|
||||||
|
end
|
||||||
|
|
||||||
#
|
#
|
||||||
# Generates a random URI for use with making finger printing more
|
# Generates a random URI for use with making finger printing more
|
||||||
# challenging.
|
# challenging.
|
||||||
|
@ -93,6 +93,7 @@ class Exploits::Windows::MS03_020_Ie_ObjectType < Msf::Exploit::Remote
|
|||||||
print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...")
|
print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...")
|
||||||
|
|
||||||
# Transmit the response to the client
|
# Transmit the response to the client
|
||||||
|
send_html_response(cli, content)
|
||||||
response = create_response
|
response = create_response
|
||||||
response['Content-Type'] = 'text/html'
|
response['Content-Type'] = 'text/html'
|
||||||
response.body = content
|
response.body = content
|
||||||
|
Loading…
Reference in New Issue
Block a user