Check in sysnative if wow64
parent
2dc4faad72
commit
3dec7f61a5
|
@ -92,8 +92,8 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
end
|
||||
|
||||
if sysinfo['Architecture'] =~ /WOW64/i
|
||||
# Unable to check the file in System32 (Need to add a DisableWOW64FSRedirection option to meterp!)
|
||||
return Exploit::CheckCode::Detected
|
||||
path = svc['Command'].gsub('"','').strip
|
||||
path.gsub!("system32","sysnative")
|
||||
else
|
||||
path = svc['Command'].gsub('"','').strip
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue