Skip to content

Commit 9ade107

Browse files
author
Brent Cook
committed
disable reverse_http methods from upexec and shell payloads
These don't work over http and don't appear to have ever, as far back as I could test. They appear to be an accident perhaps.
1 parent 7be665d commit 9ade107

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

modules/payloads/stages/windows/shell.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ def initialize(info = {})
2323
'Session' => Msf::Sessions::CommandShellWindows,
2424
'PayloadCompat' =>
2525
{
26-
'Convention' => 'sockedi -https'
26+
'Convention' => 'sockedi -http -https'
2727
},
2828
'Stage' =>
2929
{

modules/payloads/stages/windows/upexec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ def initialize(info = {})
2323
'Session' => Msf::Sessions::CommandShellWindows,
2424
'PayloadCompat' =>
2525
{
26-
'Convention' => 'sockedi -https'
26+
'Convention' => 'sockedi -http -https'
2727
},
2828
'Stage' =>
2929
{

modules/payloads/stages/windows/x64/shell.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ def initialize(info = {})
2323
'Session' => Msf::Sessions::CommandShellWindows,
2424
'PayloadCompat' =>
2525
{
26-
'Convention' => 'sockrdi'
26+
'Convention' => 'sockrdi -http -https'
2727
},
2828
'Stage' =>
2929
{

0 commit comments

Comments
 (0)