diff --git a/modules/exploits/windows/local/bypassuac.rb b/modules/exploits/windows/local/bypassuac.rb index 93b5676aa1..d72685fafc 100644 --- a/modules/exploits/windows/local/bypassuac.rb +++ b/modules/exploits/windows/local/bypassuac.rb @@ -81,9 +81,7 @@ class Metasploit3 < Msf::Exploit::Local print_good "UAC is set to Default" print_good "BypassUAC can bypass this setting, continuing..." when 0 - print_error "UAC is not enabled, no reason to run module" - print_error "Run exploit/windows/local/ask to elevate" - return + print_warning "Could not determine UAC level - attempting anyways..." end # Check if you are an admin