From c96c8a03cfec3dbbb9f014e4aae019e9c4ede43d Mon Sep 17 00:00:00 2001 From: Brent Cook Date: Tue, 30 Dec 2014 13:55:56 -0600 Subject: [PATCH] CmdStagerVBS is now in Rex::Exploitation ``` $ ./msfconsole -qx "loadpath test/modules/; exit" Loaded 32 modules: 12 auxiliarys 12 exploits 8 posts ``` --- test/modules/exploits/test/cmdweb.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/test/modules/exploits/test/cmdweb.rb b/test/modules/exploits/test/cmdweb.rb index e76a845025..1ca3b47739 100644 --- a/test/modules/exploits/test/cmdweb.rb +++ b/test/modules/exploits/test/cmdweb.rb @@ -10,7 +10,7 @@ class Metasploit3 < Msf::Exploit::Remote # =( need more targets and perhaps more OS specific return values OS specific would be preferred include Msf::Exploit::Remote::HttpClient - include Msf::Exploit::CmdStagerVBS + include Rex::Exploitation::CmdStagerVBS def initialize(info = {}) super(update_info(info,