Skip to content

Commit c37b60d

Browse files
committed
Do some print_status with ms14_064
1 parent 9e2e64b commit c37b60d

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

modules/exploits/windows/browser/ms14_064_ole_code_execution.rb

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -375,13 +375,15 @@ def on_request_exploit(cli, request, target_info)
375375
# It should be \r\n .
376376
vbs = Msf::Util::EXE.to_exe_vbs(data).gsub(/\x0a/, "\r\n")
377377

378+
print_status("Sending VBS stager")
378379
send_response(cli, vbs)
379380
else
380381
# The VBS technique is only for Windows XP. So if a non-XP system is requesting it,
381382
# something is not right.
382383
send_not_found(cli)
383384
end
384385
else
386+
print_status("Sending exploit...")
385387
send_exploit_html(cli, get_html)
386388
end
387389
end

0 commit comments

Comments
 (0)