mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-12 11:52:01 +01:00
* display something when the exploit is sent so the user has some indication of status
git-svn-id: file:///home/svn/incoming/trunk@3499 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
40961655d6
commit
d7e2e99cef
@ -81,6 +81,8 @@ class Exploits::Windows::Browser::MS06_001_WMF_SETABORTPROC < Msf::Exploit::Remo
|
||||
# Re-generate the payload
|
||||
return if ((p = regenerate_payload(cli)) == nil)
|
||||
|
||||
print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...")
|
||||
|
||||
# Transmit the compressed response to the client
|
||||
send_response(cli, generate_metafile(p), { 'Content-Type' => 'text/plain' })
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user