We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents 6e1b6e9 + 118caa1 commit 02d40ebCopy full SHA for 02d40eb
lib/msf/core/exploit/browser_autopwn2.rb
@@ -130,6 +130,7 @@ def set_exploit_options(xploit)
130
xploit.datastore['PAYLOAD'] = p.first[:payload_name]
131
xploit.datastore['LPORT'] = p.first[:payload_lport]
132
xploit.datastore['SRVHOST'] = datastore['SRVHOST']
133
+ xploit.datastore['SRVPORT'] = datastore['SRVPORT']
134
xploit.datastore['LHOST'] = get_payload_lhost
135
136
%w(JsObfuscate CookieName VERBOSE Retries SSL SSLVersion SSLCipher URIHOST URIPORT).each do |opt|
0 commit comments