Permalink
Browse files

Make all the EXE options OptPath

  • Loading branch information...
1 parent 1eb4900 commit 753ddb27c5dc14bcc6a073e877498dbcaaabec3a @egypt egypt committed Jan 10, 2012
Showing with 3 additions and 3 deletions.
  1. +3 −3 lib/msf/core/exploit/exe.rb
@@ -17,16 +17,16 @@ def initialize(info = {})
register_advanced_options(
[
OptPath.new( 'EXE::Custom', [ false, 'Use custom exe instead of automatically generating a payload exe']),
- OptString.new( 'EXE::Path', [ false, 'The directory in which to look for the executable template' ]),
- OptString.new( 'EXE::Template', [ false, 'The executable template file name.' ]),
+ OptPath.new( 'EXE::Path', [ false, 'The directory in which to look for the executable template' ]),
+ OptPath.new( 'EXE::Template', [ false, 'The executable template file name.' ]),
OptBool.new( 'EXE::Inject', [ false, 'Set to preserve the original EXE function' ]),
OptBool.new( 'EXE::OldMethod', [ false, 'Set to use the substitution EXE generation method.' ]),
OptBool.new( 'EXE::FallBack', [ false, 'Use the default template in case the specified one is missing' ])
], self.class)
end
def get_custom_exe
- print_status("Using custom executable #{datastore["EXE::Custom"]}, RHOST and RPORT settins will be ignored!")
+ print_status("Using custom executable #{datastore["EXE::Custom"]}, RHOST and RPORT settings will be ignored!")
datastore['DisablePayloadHandler'] = true
file = ::File.open(datastore['EXE::Custom'],'rb')
exe = file.read(file.stat.size)

0 comments on commit 753ddb2

Please sign in to comment.