Skip to content

Commit 8ce10ac

Browse files
committed
Avoid String.fromCharCode which gets detected
1 parent 48f6740 commit 8ce10ac

File tree

66 files changed

+73
-73
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

66 files changed

+73
-73
lines changed

modules/exploits/windows/browser/adobe_flash_rtmp.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -372,7 +372,7 @@ def on_request_uri(cli, request)
372372

373373
if datastore['OBFUSCATE']
374374
js = ::Rex::Exploitation::JSObfu.new(js)
375-
js.obfuscate
375+
js.obfuscate(memory_sensitive: true)
376376
end
377377

378378
swf_uri = ('/' == get_resource[-1,1]) ? get_resource[0, get_resource.length-1] : get_resource

modules/exploits/windows/browser/adobe_flash_sps.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ def on_request_uri(cli, request)
140140

141141
if datastore['OBFUSCATE']
142142
js = ::Rex::Exploitation::JSObfu.new(js)
143-
js.obfuscate
143+
js.obfuscate(memory_sensitive: true)
144144
end
145145

146146
myhost = (datastore['SRVHOST'] == '0.0.0.0') ? Rex::Socket.source_address('50.50.50.50') : datastore['SRVHOST']

modules/exploits/windows/browser/adobe_flashplayer_flash10o.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,7 @@ def on_request_uri(cli, request)
236236
#Javascript obfuscation is optional
237237
if datastore['OBFUSCATE']
238238
js = ::Rex::Exploitation::JSObfu.new(js)
239-
js.obfuscate
239+
js.obfuscate(memory_sensitive: true)
240240
end
241241

242242
trigger_file_name = "#{get_resource}/#{rand_text_alpha(rand(3))}.swf"

modules/exploits/windows/browser/aladdin_choosefilepath_bof.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ def ie_heap_spray(p)
139139

140140
if datastore['OBFUSCATE']
141141
js = ::Rex::Exploitation::JSObfu.new(js)
142-
js.obfuscate
142+
js.obfuscate(memory_sensitive: true)
143143
end
144144

145145
return js

modules/exploits/windows/browser/apple_quicktime_mime_type.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ def on_request_uri(client, request)
184184

185185
if datastore['OBFUSCATE']
186186
js = ::Rex::Exploitation::JSObfu.new(js)
187-
js.obfuscate
187+
js.obfuscate(memory_sensitive: true)
188188
end
189189

190190
content = "<html>"

modules/exploits/windows/browser/apple_quicktime_texml_font_table.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ def on_request_uri(client, request)
218218
#obfuscate on demand
219219
if datastore['OBFUSCATE']
220220
js_spray = ::Rex::Exploitation::JSObfu.new(js_spray)
221-
js_spray.obfuscate
221+
js_spray.obfuscate(memory_sensitive: true)
222222
end
223223
else
224224
js_spray = <<-JS

modules/exploits/windows/browser/asus_net4switch_ipswcom.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ def on_request_uri(cli, request)
134134
#obfuscate on demand
135135
if datastore['OBFUSCATE']
136136
js = ::Rex::Exploitation::JSObfu.new(js)
137-
js.obfuscate
137+
js.obfuscate(memory_sensitive: true)
138138
end
139139

140140
html = <<-EOS

modules/exploits/windows/browser/athocgov_completeinstallation.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ def on_request_uri(cli, request)
9595
}
9696
js = ::Rex::Exploitation::ObfuscateJS.new(js, opts)
9797
js.update_opts(js_heap_spray.opts)
98-
js.obfuscate()
98+
js.obfuscate(memory_sensitive: true)
9999
content = %Q|
100100
<html>
101101
<body>

modules/exploits/windows/browser/baofeng_storm_onbeforevideodownload.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ def on_request_uri(cli, request)
100100
}
101101
js = ::Rex::Exploitation::ObfuscateJS.new(js, opts)
102102
js.update_opts(js_heap_spray.opts)
103-
js.obfuscate()
103+
js.obfuscate(memory_sensitive: true)
104104

105105
# Generate the final HTML
106106
content = %Q|<html>

modules/exploits/windows/browser/chilkat_crypt_writefile.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ def on_request_uri(cli, request)
118118
}
119119
}
120120
js = ::Rex::Exploitation::ObfuscateJS.new(js, opts)
121-
js.obfuscate()
121+
js.obfuscate(memory_sensitive: true)
122122
=end
123123
js = encrypt_js(js, @javascript_encode_key)
124124

0 commit comments

Comments
 (0)