diff --git a/external/source/shellcode/windows/x86/build.py b/external/source/shellcode/windows/x86/build.py index 2c939c3a56..c8114ae8eb 100644 --- a/external/source/shellcode/windows/x86/build.py +++ b/external/source/shellcode/windows/x86/build.py @@ -1,5 +1,5 @@ #=============================================================================# -# A simple python build script to build the singles/stages/stagers and +# A simple python build script to build the singles/stages/stagers and # some usefull information such as offsets and a hex dump. The binary output # will be placed in the bin directory. A hex string and usefull comments will # be printed to screen. @@ -59,9 +59,11 @@ def xmit( name, dump_ruby=True ): f = open( bin, 'rb') data = f.read() print "# Name: %s\n# Length: %d bytes" % ( name, len( data ) ) - xmit_offset( data, "Port", pack( ">H", 4444 ) ) # 4444 + xmit_offset( data, "Port", pack( ">H", 4444 ) ) # 4444 + xmit_offset( data, "LEPort", pack( "L", 0x7F000001 ) ) # 127.0.0.1 - xmit_offset( data, "CodeLen", pack( " 'Oracle Account Discovery.', @@ -63,8 +63,9 @@ class Metasploit3 < Msf::Auxiliary :data => "#{datastore['DBUSER']}/#{datastore['DBPASS']} with sid #{datastore['SID']}" ) print_status("Found user/pass of: #{datastore['DBUSER']}/#{datastore['DBPASS']} on #{datastore['RHOST']} with sid #{datastore['SID']}") - end + end end end end end + diff --git a/modules/exploits/unix/webapp/awstats_configdir_exec.rb b/modules/exploits/unix/webapp/awstats_configdir_exec.rb index 43ddadf4cb..392629180a 100644 --- a/modules/exploits/unix/webapp/awstats_configdir_exec.rb +++ b/modules/exploits/unix/webapp/awstats_configdir_exec.rb @@ -46,7 +46,7 @@ class Metasploit3 < Msf::Exploit::Remote 'PayloadType' => 'cmd', 'RequiredCmd' => 'generic perl ruby bash telnet', } - }, + }, 'Platform' => 'unix', 'Arch' => ARCH_CMD, 'Targets' => [[ 'Automatic', { }]], @@ -106,3 +106,4 @@ class Metasploit3 < Msf::Exploit::Remote end end + diff --git a/modules/exploits/windows/http/hp_nnm_ovas.rb b/modules/exploits/windows/http/hp_nnm_ovas.rb index fed26fd7da..0c49a88fe7 100644 --- a/modules/exploits/windows/http/hp_nnm_ovas.rb +++ b/modules/exploits/windows/http/hp_nnm_ovas.rb @@ -101,7 +101,7 @@ class Metasploit3 < Msf::Exploit::Remote targ = target if (target['auto']) - + print_status("Detecting the remote version...") resp = send_request_raw({'uri' => '/topology/home'}, 5) if resp.nil? print_status("No response to request") @@ -167,7 +167,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'data' => payload_buf }) - rescue ::Rex::ConnectionError, ::Errno::ECONNRESET, ::Errno::EINTR # do nothing let the exploit live this catches the # connection reset by peer error which is expected