Metasploit mailing list archives

error in browser based exploit


From: rhyskidd at gmail.com (Rhys Kidd)
Date: Fri, 6 Jul 2007 16:47:09 +0800

I believe the change occured in Changeset
5015<http://metasploit.com/dev/trac/changeset/5015> to
the 
framework3/trunk/lib/msf/core/exploit/tcp.rb<http://metasploit.com/dev/trac/browser/framework3/trunk/lib/msf/core/exploit/tcp.rb>
file.
This Changeset was commented by HD as relating to the new SMB server
functionality to assist his talk at Blackhat. Both the SMB server and
the HTTP server based exploits inherent the SRVHOST default setting from
their shared parent file (tcp.rb).

For those interested, the relevant change was:

register_options(
        [
                OptAddress.new('SRVHOST', [ true, "The local host to listen
on.", Rex::Socket.source_address ]),
                OptAddress.new('SRVHOST', [ true, "The local host to listen
on.", '0.0.0.0' ]),
                OptPort.new('SRVPORT',    [ true, "The local port to listen
on.", 8080 ])
        ], Msf::Exploit::Remote::TcpServer)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070706/9d8c43b6/attachment.htm>


Current thread: