exploits: Set tftphost option for modules which use Windows TFTP stager #16727
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Windows exploit modules which use the TFTP command stager require a
tftphost
option to be set (rapid7/rex-exploitation#34 rapid7/rex-exploitation#31).This PR adds this option to the following modules (all modules which force set
'CmdStagerFlavor' => 'tftp'
):It does not patch
modules/exploits/windows/iis/ms01_026_dbldecode.rb
as this is addressed in #16724.Note: Many of these modules likely won't work for other reasons (such as using a Meterpreter payload by default). Fixing the TFTP stager means at least one less thing is broken.
set HttpTrace true
can be used to show the before and after effect of this patch.