1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-05 14:57:30 +01:00

and the bins, tiny modification to the ruby side and update the README.

git-svn-id: file:///home/svn/framework3/trunk@8891 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Stephen Fewer 2010-03-24 00:03:32 +00:00
parent 9a4293c445
commit 75661291fa
5 changed files with 27 additions and 11 deletions

2
README
View File

@ -37,7 +37,7 @@ This license does not apply to the following components:
corresponding header files in the source tree
- The Packet Sniffer SDK (MicroOLAP) library embedded into the Meterpreter
Sniffer extension. HD Moore has a single-seat developer license.
- The vncdll.dll and vncdll.x64.dll binaries and their associated source code (modified TightVNC)
- The modified TightVNC binaries and their associated source code.
- The icons used by msfweb that were not created by Metasploit
- The Bit-Struct library located under lib/bit-struct
- The Byakugan plugin located under external/source/byakugan

Binary file not shown.

Binary file not shown.

View File

@ -52,6 +52,12 @@ module Metasploit3
false,
"Disables the Metasploit Courtesy shell",
false
]),
OptBool.new('DisableSessionTracking',
[
false,
"Disables the VNC payload from following the active session as users log in an out of the input desktop",
false
])
], self.class)
options.remove_option('DLL')
@ -71,6 +77,8 @@ module Metasploit3
flags |= 1 if (datastore['DisableCourtesyShell'])
flags |= 2 if (datastore['DisableSessionTracking'])
# Transmit the one byte flag
session.rstream.put([ flags ].pack('C'))

View File

@ -61,6 +61,12 @@ module Metasploit3
false,
"Disables the Metasploit Courtesy shell",
false
]),
OptBool.new('DisableSessionTracking',
[
false,
"Disables the VNC payload from following the active session as users log in an out of the input desktop",
false
])
], self.class)
options.remove_option('DLL')
@ -80,6 +86,8 @@ module Metasploit3
flags |= 1 if (datastore['DisableCourtesyShell'])
flags |= 2 if (datastore['DisableSessionTracking'])
# Transmit the one byte flag
session.rstream.put([ flags ].pack('C'))