Skip to content

Commit 05d2703

Browse files
committed
Explain why obfuscation is disabled
1 parent 50c7212 commit 05d2703

File tree

2 files changed

+9
-10
lines changed

2 files changed

+9
-10
lines changed

modules/auxiliary/server/browser_autopwn.rb

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -236,6 +236,11 @@ def setup
236236
print_debug("NOTE: Debug Mode; javascript will not be obfuscated")
237237
else
238238
pre = Time.now
239+
240+
#
241+
# 2/12/2015: Obfuscation is disabled because this is currently breaking BrowserAutoPwn
242+
#
243+
239244
#print_status("Obfuscating initial javascript #{pre}")
240245
#@init_js.obfuscate
241246
#print_status "Done in #{Time.now - pre} seconds"
@@ -826,6 +831,10 @@ def build_script_response(cli, request)
826831
js << "#{js_debug("'starting exploits (' + global_exploit_list.length + ' total)<br>'")}\n"
827832
js << "window.next_exploit(0);\n"
828833

834+
#
835+
# 2/12/2015: Obfuscation is disabled because this is currently breaking BrowserAutoPwn
836+
#
837+
829838
#js = ::Rex::Exploitation::JSObfu.new(js)
830839
#js.obfuscate unless datastore["DEBUG"]
831840

modules/exploits/windows/browser/ms14_064_ole_code_execution.rb

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,18 +11,8 @@ class Metasploit4 < Msf::Exploit::Remote
1111
Rank = ExcellentRanking
1212

1313
include Msf::Exploit::Remote::BrowserExploitServer
14-
#include Msf::Exploit::Remote::BrowserAutopwn
1514
include Msf::Exploit::Powershell
1615

17-
#autopwn_info({
18-
# :ua_name => HttpClients::IE,
19-
# :ua_minver => "3.0",
20-
# :ua_maxver => "10.0",
21-
# :javascript => true,
22-
# :os_name => OperatingSystems::Match::WINDOWS,
23-
# :rank => ExcellentRanking
24-
#})
25-
2616
def initialize(info={})
2717
super(update_info(info,
2818
'Name' => "Microsoft Internet Explorer Windows OLE Automation Array Remote Code Execution",

0 commit comments

Comments
 (0)