Skip to content

Commit 8384be6

Browse files
committed
Fix rand_text_alpha and bump max exploit count to 21
1 parent d6565a9 commit 8384be6

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

lib/msf/core/exploit/remote/browser_exploit_server.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -87,10 +87,10 @@ def initialize(info={})
8787
# Requirements are conditions that the browser must have in order to be exploited.
8888
@requirements = extract_requirements(self.module_info['BrowserRequirements'] || {})
8989

90-
@info_receiver_page = rand_text_alpha(5)
91-
@exploit_receiver_page = rand_text_alpha(6)
92-
@noscript_receiver_page = rand_text_alpha(7)
93-
@flash_swf = "#{rand_text_alpha(9)}.swf"
90+
@info_receiver_page = Rex::Text.rand_text_alpha(5)
91+
@exploit_receiver_page = Rex::Text.rand_text_alpha(6)
92+
@noscript_receiver_page = Rex::Text.rand_text_alpha(7)
93+
@flash_swf = "#{Rex::Text.rand_text_alpha(9)}.swf"
9494

9595
register_options(
9696
[

modules/auxiliary/server/browser_autopwn2.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ def initialize(info={})
7878

7979
register_advanced_options([
8080
OptInt.new('ExploitReloadTimeout', [false, 'Number of milliseconds before trying the next exploit', 3000]),
81-
OptInt.new('MaxExploitCount', [false, 'Number of browser exploits to load', 20]),
81+
OptInt.new('MaxExploitCount', [false, 'Number of browser exploits to load', 21]),
8282
OptString.new('HTMLContent', [false, 'HTML Content', '']),
8383
OptAddressRange.new('AllowedAddresses', [false, "A range of IPs you're interested in attacking"]),
8484
OptInt.new('MaxSessionCount', [false, 'Number of sessions to get', -1]),

0 commit comments

Comments
 (0)