Skip to content

Commit 513dcf3

Browse files
committed
We don't need these methods anymore
1 parent fdb715c commit 513dcf3

File tree

1 file changed

+0
-40
lines changed

1 file changed

+0
-40
lines changed

lib/msf/core/exploit/browser_autopwnv2.rb

Lines changed: 0 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -558,46 +558,6 @@ def start_service
558558
end
559559

560560

561-
# Prints all user-configurable payloads. It's the same as the "show payloads" command in console.
562-
#
563-
# @return [void]
564-
def show_payloads
565-
DEFAULT_PAYLOADS.keys.each do |platform|
566-
payload_name = get_selected_payload_name(platform)
567-
p = framework.payloads.create(payload_name)
568-
next unless p
569-
p.datastore['LHOST'] = get_payload_lhost
570-
p.datastore['LPORT'] = get_selected_payload_lport(platform)
571-
p_opt = Serializer::ReadableText.dump_options(p, ' ')
572-
print("\nPayload options (#{payload_name}):\n\n#{p_opt}\n") if (p_opt and p_opt.length > 0)
573-
end
574-
end
575-
576-
577-
# Prints a message that explains how the user should set a payload. This is the same as the
578-
# "set payload" command in console.
579-
#
580-
# @return [void]
581-
def set_payload
582-
print_status("'set payload' has been disabled for BrowserAutoPwn.")
583-
print_status('You should set a platform-specific payload instead via advanced options:')
584-
print_line
585-
table = Rex::Ui::Text::Table.new(
586-
'Header' => 'Advanced Options',
587-
'Indent' => 1,
588-
'Columns' => ['Option Name', 'Description']
589-
)
590-
DEFAULT_PAYLOADS.each_pair do |platform, payload_info|
591-
table << ["PAYLOAD_#{platform.to_s.upcase}", "Payload for #{platform} browser exploits"]
592-
end
593-
print_line(table.to_s)
594-
print_status("Example: set PAYLOAD_WIN windows/meterpreter/reverse_tcp")
595-
print_line
596-
print_status("For a list of payloads, you can do: show payloads")
597-
print_status("You can also see 'show advanced' for more options.")
598-
end
599-
600-
601561
# Returns a list of suitable exploits for the current client based on what #sort_bap_exploits
602562
# gives us. It will do a global exploitable requirement check (the best it can do). There's
603563
# actually a target-specific exploitable requirement check too, but that is performed in

0 commit comments

Comments
 (0)