We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 3d199fe commit 04ec4e4Copy full SHA for 04ec4e4
modules/payloads/singles/linux/mipsle/shell_bind_tcp.rb
@@ -1,7 +1,3 @@
1
-##
2
-# $Id$
3
4
-
5
##
6
# This file is part of the Metasploit Framework and may be subject to
7
# redistribution and commercial restrictions. Please see the Metasploit
@@ -23,7 +19,6 @@ module Metasploit3
23
19
def initialize(info = {})
24
20
super(merge_info(info,
25
21
'Name' => 'Linux Command Shell, Bind TCP Inline',
26
- 'Version' => '$Revision$',
27
22
'Description' => 'Listen for a connection and spawn a command shell',
28
'Author' => 'Vlatko Kosturjak',
29
'License' => MSF_LICENSE,
@@ -40,7 +35,7 @@ def initialize(info = {})
40
35
end
41
36
42
37
def generate
43
- if(!datastore['LPORT'] or datastore['LPORT'].empty? )
38
+ if !datastore['LPORT']
44
39
return super
45
46
0 commit comments