We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents 29ad993 + a87e414 commit 463725eCopy full SHA for 463725e
lib/msf/core/exploit/winrm.rb
@@ -35,21 +35,8 @@ def initialize(info = {})
35
end
36
37
def winrm_poke(timeout = 20)
38
- opts = {
39
- 'uri' => datastore['URI'],
40
- 'data' => Rex::Text.rand_text_alpha(8)
41
- }
42
- c = connect(opts)
43
- to = opts[:timeout] || timeout
44
- ctype = "application/soap+xml;charset=UTF-8"
45
- resp = send_winrm_request(opts.merge({
46
- 'uri' => opts['uri'],
47
- 'method' => 'POST',
48
- 'ctype' => ctype,
49
- 'data' => opts['data']
50
- }), to)
51
- return resp
52
- end
+ send_winrm_request(Rex::Text.rand_text_alpha(8), timeout)
+ end
53
54
def parse_auth_methods(resp)
55
return [] unless resp and resp.code == 401
0 commit comments