modules/exploits/windows/browser/adobe_flashplayer_avm.rb: print_status("Sending #{self.name} HTML to #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/adobe_flashplayer_flash10o.rb: print_status("Sending trigger SWF to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/adobe_flashplayer_flash10o.rb: print_status("Sending HTML to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/adobe_flashplayer_newfunction.rb: print_status("Sending crafted PDF w/SWF to #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/adobe_flatedecode_predictor02.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/adobe_geticon.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/adobe_jbig2decode.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/adobe_media_newplayer.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb: print_status("Sending exploit DIR to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb: print_status("Sending exploit HTML to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/adobe_utilprintf.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/aim_goaway.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/amaya_bdo.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/aol_ampx_convertfile.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/aol_icq_downloadagent.rb: print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/aol_icq_downloadagent.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/apple_itunes_playlist.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ask_shortformat.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/asus_net4switch_ipswcom.rb: print_error("Browser not supported: #{agent.to_s}: #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/asus_net4switch_ipswcom.rb: print_status("Sending html to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/athocgov_completeinstallation.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/autodesk_idrop.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/aventail_epi_activex.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/awingsoft_web3d_bof.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/awingsoft_winds3d_sceneurl.rb: print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/awingsoft_winds3d_sceneurl.rb: print_status("Sending #{self.name} HTML to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/baofeng_storm_onbeforevideodownload.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/barcode_ax49.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/c6_messenger_downloaderactivex.rb: print_error("Target not supported: #{cli.peerhost}:#{cli.peerport} (#{agent})") modules/exploits/windows/browser/c6_messenger_downloaderactivex.rb: print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/c6_messenger_downloaderactivex.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ca_brightstor_addcolumn.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/chilkat_crypt_writefile.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/cisco_anyconnect_exec.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/citrix_gateway_actx.rb: print_status("Sending nsepa.ocx to #{cli.peerhost}") modules/exploits/windows/browser/citrix_gateway_actx.rb: print_status("Sending #{self.name} HTML to #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/communicrypt_mail_activex.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/creative_software_cachefolder.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/dxstudio_player_exec.rb: print_status("Sending file.dxstudio payload to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/dxstudio_player_exec.rb: print_status("Sending #{self.name} HTML to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ea_checkrequirements.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ebook_flipviewer_fviewerloading.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/enjoysapgui_comp_download.rb: print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/enjoysapgui_comp_download.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/enjoysapgui_preparetoposthtml.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/facebook_extractiptc.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/gom_openurl.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/greendam_url.rb: print_status("Sending DLL to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/greendam_url.rb: print_status("Sending HTML to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/hp_easy_printer_care_xmlcachemgr.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/hp_easy_printer_care_xmlsimpleaccessor.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/hp_loadrunner_addfile.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/hp_loadrunner_addfolder.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/hpmqc_progcolor.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/hyleos_chemviewx_activex.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ibmegath_getxmlvalue.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ibmlotusdomino_dwa_uploadmodule.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ie_iscomponentinstalled.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ie_unsafe_scripting.rb: print_status("Request received from #{cli.peerhost}:#{cli.peerport}..."); modules/exploits/windows/browser/ie_unsafe_scripting.rb: print_status("Sending exploit html/javascript to #{cli.peerhost}:#{cli.peerport}..."); modules/exploits/windows/browser/java_basicservice_impl.rb: print_status("Sending Jar file to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/java_codebase_trust.rb: print_status("Sending class file to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/java_codebase_trust.rb: print_status("Sending HTML file to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/java_docbase_bof.rb: print_status("Sending exploit HTML to #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/java_mixer_sequencer.rb: print_status("Sending JAR file to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/java_mixer_sequencer.rb: print_status("Sending RMF file to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/java_mixer_sequencer.rb: print_status("Sending html to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/java_ws_arginject_altjvm.rb: print_status("Unknown User-Agent #{agent} from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/java_ws_arginject_altjvm.rb: print_status("Responding to \"GET #{request.uri}\" request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/java_ws_arginject_altjvm.rb: print_status("Sending DLL to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/java_ws_arginject_altjvm.rb: print_status("Sending JS version HTML to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/java_ws_arginject_altjvm.rb: print_status("Sending non-JS version HTML to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/java_ws_arginject_altjvm.rb: print_status("Sending js detection HTML to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/java_ws_arginject_altjvm.rb: print_status("Responding to WebDAV \"OPTIONS #{request.uri}\" request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/java_ws_arginject_altjvm.rb: print_status("Received WebDAV \"PROPFIND #{request.uri}\" request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/java_ws_vmargs.rb: print_status("Unknown User-Agent #{agent} from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/java_ws_vmargs.rb: print_status("Responding to \"GET #{request.uri}\" request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/java_ws_vmargs.rb: print_status("Sending DLL to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/java_ws_vmargs.rb: print_status("Sending JNLP to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/java_ws_vmargs.rb: print_status("Sending redirect to the JNLP file to #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/java_ws_vmargs.rb: print_status("Responding to WebDAV \"OPTIONS #{request.uri}\" request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/java_ws_vmargs.rb: print_status("Received WebDAV \"PROPFIND #{request.uri}\" request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/juniper_sslvpn_ive_setupdll.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/kazaa_altnet_heap.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/logitechvideocall_start.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/lpviewer_url.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/macrovision_downloadandexecute.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/macrovision_unsafe.rb: print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/macrovision_unsafe.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/mcafee_mcsubmgr_vsprintf.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/mcafeevisualtrace_tracetarget.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/mirc_irc_url.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/mozilla_reduceright.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms05_054_onload.rb: print_error("Unknown User-Agent #{agent} from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms05_054_onload.rb: print_status("Sending #{self.name} to client #{cli.peerhost}") modules/exploits/windows/browser/ms06_001_wmf_setabortproc.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms06_013_createtextrange.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms06_055_vml_method.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms06_057_webview_setslice.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms06_067_keyframe.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms06_071_xml_core.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb: print_status("Mozilla request received from #{cli.peerhost}. To exploit Mozilla browsers, SRVPORT must be set to 80 and URIPATH must be '/'") modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb: print_status("Unknown User-Agent #{agent} from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb: print_status("Unknown User-Agent #{agent} from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb: print_status("Unknown User-Agent #{agent} from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb: print_status("Received WebDAV OPTIONS request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb: print_status("Received WebDAV PROPFIND request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb: print_status("Sending HTML page to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms08_041_snapshotviewer.rb: print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms08_041_snapshotviewer.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms08_053_mediaencoder.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms08_070_visual_studio_msmask.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms08_078_xml_corruption.rb: print_status("Sending #{self.name} init HTML to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms08_078_xml_corruption.rb: print_status("Sending DLL to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms08_078_xml_corruption.rb: print_status("Sending exploit HTML to #{cli.peerhost}:#{cli.peerport} (Using .NET DLL)") modules/exploits/windows/browser/ms08_078_xml_corruption.rb: print_status("Sending exploit HTML to #{cli.peerhost}:#{cli.peerport} (Using Heap Spray)") modules/exploits/windows/browser/ms09_002_memory_corruption.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms09_043_owc_htmlurl.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms09_043_owc_msdso.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms09_072_style_object.rb: print_status("Entering heap spray mode for #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms10_002_aurora.rb: print_status("Sending #{self.name} to client #{cli.peerhost}") modules/exploits/windows/browser/ms10_018_ie_tabular_activex.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport} (target: #{target.name})...") modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb: print_status("Unknown User-Agent #{agent} from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb: print_status("Sending HLP to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb: print_status("Sending EXE to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb: print_status("Responding to GET request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb: print_status("Sending HTML page to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb: print_status("Responding to WebDAV OPTIONS request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb: print_status("Received WebDAV PROPFIND request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms10_026_avi_nsamplespersec.rb: print_status("Sending trigger loader to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms10_026_avi_nsamplespersec.rb: print_status "Sending AVI trigger to #{cli.peerhost}:#{cli.peerport} ..." modules/exploits/windows/browser/ms10_026_avi_nsamplespersec.rb: print_status "Sending DLL file to #{cli.peerhost}:#{cli.peerport} ..." modules/exploits/windows/browser/ms10_026_avi_nsamplespersec.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms10_042_helpctr_xss_cmd_exec.rb: print_status "Sending gif image to WMP at #{cli.peerhost}:#{cli.peerport} ..." modules/exploits/windows/browser/ms10_042_helpctr_xss_cmd_exec.rb: print_status("Sending asx file to #{cli.peerhost}:#{cli.peerport} ...") modules/exploits/windows/browser/ms10_042_helpctr_xss_cmd_exec.rb: print_status("Sending exploit trigger to #{cli.peerhost}:#{cli.peerport} ...") modules/exploits/windows/browser/ms10_042_helpctr_xss_cmd_exec.rb: print_status("Sending exploit html to #{cli.peerhost}:#{cli.peerport} ...") modules/exploits/windows/browser/ms10_042_helpctr_xss_cmd_exec.rb: print_status("Responding to WebDAV OPTIONS request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms10_042_helpctr_xss_cmd_exec.rb: print_status("Received WebDAV PROPFIND request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms10_046_shortcut_icon_dllloader.rb: print_status "Sending DLL payload #{cli.peerhost}:#{cli.peerport} ..." modules/exploits/windows/browser/ms10_046_shortcut_icon_dllloader.rb: print_status "Sending LNK file to #{cli.peerhost}:#{cli.peerport} ..." modules/exploits/windows/browser/ms10_046_shortcut_icon_dllloader.rb: print_status "Sending UNC redirect to #{cli.peerhost}:#{cli.peerport} ..." modules/exploits/windows/browser/ms10_046_shortcut_icon_dllloader.rb: print_status("Responding to WebDAV OPTIONS request from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms10_046_shortcut_icon_dllloader.rb: print_status("Received WebDAV PROPFIND request from #{cli.peerhost}:#{cli.peerport} #{path}") modules/exploits/windows/browser/ms10_090_ie_css_clip.rb: print_error("Unknown User-Agent #{agent} from #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/ms10_090_ie_css_clip.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport} (target: #{mytarget.name})...") modules/exploits/windows/browser/ms12_004_midi.rb: print_status("Sending midi file to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ms12_004_midi.rb: print_status("Sending html to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/msvidctl_mpeg2.rb: print_status("Sending GIF to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/msvidctl_mpeg2.rb: print_status("Sending HTML to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/msvidctl_mpeg2.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/mswhale_checkforupdates.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/nctaudiofile2_setformatlikesample.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/nis2004_antispam.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/nis2004_get.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/novelliprint_callbackurl.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/novelliprint_datetime.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/novelliprint_executerequest.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/novelliprint_executerequest_dbg.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/novelliprint_getdriversettings.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/novelliprint_getdriversettings_2.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/novelliprint_target_frame.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/oracle_dc_submittoexpress.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/orbit_connecting.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/persits_xupload_traversal.rb: print_status("Sending exploit html to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/persits_xupload_traversal.rb: print_status("Sending payload exe to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/real_arcade_installerdlg.rb: print_status("Sending payload to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/real_arcade_installerdlg.rb: print_status("Sending HTML to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/realplayer_cdda_uri.rb: print_status("Sending #{self.name} HTML to #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/realplayer_console.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/realplayer_import.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/realplayer_qcp.rb: print_status("Sending trigger file to #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/realplayer_qcp.rb: print_status("Sending malicious page to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/realplayer_smil.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/roxio_cineplayer.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/safari_xslt_output.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/sapgui_saveviewtosessionfile.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/softartisans_getdrivename.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/sonicwall_addrouteentry.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/symantec_altirisdeployment_downloadandinstall.rb: print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/symantec_altirisdeployment_downloadandinstall.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/symantec_altirisdeployment_runcmd.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/symantec_appstream_unsafe.rb: print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/symantec_appstream_unsafe.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/symantec_backupexec_pvcalendar.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/symantec_consoleutilities_browseandsavefile.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/systemrequirementslab_unsafe.rb: print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/systemrequirementslab_unsafe.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/teechart_pro.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/trendmicro_extsetowner.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/trendmicro_officescan.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/tumbleweed_filetransfer.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/ultraoffice_httpupload.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/verypdf_pdfview.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/viscom_movieplayer_drawtext.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/vlc_amv.rb: print_status("Sending trigger file to #{cli.peerhost}:#{cli.peerport}") modules/exploits/windows/browser/vlc_amv.rb: print_status("Sending malicious page to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/webex_ucf_newobject.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/winamp_playlist_unc.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/windvd7_applicationtype.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/xmplay_asx.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/yahoomessenger_fvcom.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/yahoomessenger_server.rb: print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb: print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb: print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...")