Skip to content

Commit e3f613e

Browse files
committed
Bypass: Metasploit OS detection
SEP is triggering on HTTP POSTs which start with `os_name`
1 parent 48f6740 commit e3f613e

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

lib/msf/core/exploit/remote/browser_exploit_server.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -430,7 +430,6 @@ def get_detection_html(user_agent)
430430
window.onload = function() {
431431
var osInfo = os_detect.getVersion();
432432
var d = {
433-
"os_name" : osInfo.os_name,
434433
"os_vendor" : osInfo.os_vendor,
435434
"os_device" : osInfo.os_device,
436435
"ua_name" : osInfo.ua_name,
@@ -439,7 +438,8 @@ def get_detection_html(user_agent)
439438
"java" : misc_addons_detect.getJavaVersion(),
440439
"silverlight" : misc_addons_detect.hasSilverlight(),
441440
"flash" : misc_addons_detect.getFlashVersion(),
442-
"vuln_test" : <%= js_vuln_test %>
441+
"vuln_test" : <%= js_vuln_test %>,
442+
"os_name" : osInfo.os_name
443443
};
444444
445445
<% if os.match(OperatingSystems::Match::WINDOWS) and client == HttpClients::IE %>

0 commit comments

Comments
 (0)