diff --git a/modules/exploits/windows/browser/keyhelp_launchtripane_exec.rb b/modules/exploits/windows/browser/keyhelp_launchtripane_exec.rb index a9894ab2ff..a6cc2bd239 100644 --- a/modules/exploits/windows/browser/keyhelp_launchtripane_exec.rb +++ b/modules/exploits/windows/browser/keyhelp_launchtripane_exec.rb @@ -85,6 +85,10 @@ class Metasploit3 < Msf::Exploit::Remote ], self.class) end + # The following handles deleting the copied vbs payload and mof file + def on_new_session(client) + print_status("The exe payload (C:\\windows\\system32\\msfmsf.exe) and mof file (C:\\windows\\system32\\wbem\\mof\\good\\msfmsf.mof) must be removed manually.") + end def auto_target(cli, request) agent = request.headers['User-Agent']